{"id":41647,"date":"2020-04-28T00:00:00","date_gmt":"2020-04-28T00:00:00","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/how-to-avoid-zoombombs\/"},"modified":"2025-03-13T06:27:13","modified_gmt":"2025-03-13T13:27:13","slug":"how-to-avoid-zoombombs","status":"publish","type":"post","link":"\/us\/en\/blog\/how-to-avoid-zoombombs\/","title":{"rendered":"Avoid getting Zoombombed by following these best practices"},"content":{"rendered":"<p><em>Updated Apr 2020<\/em><\/p>\n<hr \/>\n<p>While video conferencing is not a new technology, the entire world is now learning to find creative ways to continue being productive while not being able to be physically in the same room (hello, social distancing).<\/p>\n<p>Teachers have taken to <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/elearning-online-meetings\/\" target=\"_blank\" rel=\"noopener noreferrer\">virtual classrooms<\/a>, healthcare providers are using <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/video-conferencing-telehealth\/\" target=\"_blank\" rel=\"noopener noreferrer\">video calls to provide telehealth<\/a>, friends are sharing links in order to share time, and the world is learning to move forward, even when we can\u2019t be together.<\/p>\n<p>In a time where it\u2019s not only good, but also necessary to be an early adopter to new technology, one conferencing platform that received initial attention was Zoom.<\/p>\n<p>But like all technologies, video conferencing has its hiccups. It was only a matter of time until hackers and people with too much time on their hands found a way to turn something good into something gross.<\/p>\n<p>Enter \u201cZoombombing.\u201d<\/p>\n<p>There\u2019s lots of <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/the-best-video-conferencing\/\" target=\"_blank\" rel=\"noopener noreferrer\">video conferencing software<\/a> out there, but much like most of us now know what it is to \u201cUber home\u201d even when we\u2019re using a Lyft, it\u2019s become clear that \u201cZoombombing\u201d isn\u2019t limited only to, well, Zoom.<\/p>\n<p>In this post, we\u2019ll look at:<\/p>\n<ul class=\"table-of-content\">\n<li><a href=\"#What exactly Zoombombing is\">What exactly Zoombombing is<\/a><\/li>\n<li><a href=\"#The response to Zoombombing so far\">The response to Zoombombing so far<\/a><\/li>\n<li><a href=\"#The 6 Dos and Don\u2019ts of video conferencing\">The 6 Dos and Don\u2019ts of video conferencing<\/a><\/li>\n<\/ul>\n<hr \/>\n<p class=\"p1\">\ud83e\udd14\u00a0 What are some affordable Zoom alternatives? Check out this <strong>free comparison chart<\/strong>.<\/p>\n<p class=\"p1\">\n<div class=\"download-form-widget standart-download-form\" data-url=\"https:\/\/netstorage.ringcentral.com\/infographics\/zoom_alternatives.pdf\" data-id=\"6a09c6fa2b366\" id=\"6a09c6fa2b366\">\n\t\t<button tabindex=\"on\"  on=\"tap:6a09c6fa2b366.toggleClass(class='open')\" class=\"open-modal-download-action download-form-button\" type=\"submit\">\ud83d\udc40 Grab the chart<\/button><\/p>\n<div class=\"download-form-modal\">\n<div class=\"download-form-modal-body\">\n<div class=\"download-form-modal-content\">\n<div class=\"download-form-modal-title\">Learn about 4 affordable Zoom alternatives. <\/div>\n<form class=\"download-form SMB\" method=\"post\">\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Full Name\" aria-required=\"true\" aria-invalid=\"false\" type=\"text\" name=\"fullname\" placeholder=\"Full Name\" data-dl-events-hover=\"true\" data-dl-element=\"text\" data-dl-additional-info=\"download form\">\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Email (please enter a work email address)\" aria-required=\"true\" aria-invalid=\"false\" type=\"email\" autocomplete=\"on\" name=\"email\" placeholder=\"Email (please enter a work email address)\" data-dl-events-hover=\"true\" data-dl-element=\"email\" data-dl-additional-info=\"download form\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"popup_form\" value=\"1\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"Lead_Entry_Source__c\" value=\"RC Blog\" class=\"download-form-input\"\/>\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<button class=\"download-form-submit\" type=\"submit\" data-dl-element=\"button\" data-no-auto-dl=\"true\" data-dl-additional-info=\"download form\" data-dl-name=\"Start comparing\">Start comparing<\/button>\n\t\t\t\t\t\t<\/div>\n<\/p><\/form>\n<p> \t\t\t\t\t<button on=\"tap:6a09c6fa2b366.toggleClass(class='open')\" role=\"button\" tabindex=\"0\"  class=\"download-form-modal-close\"><\/button>\n\t\t\t\t<\/div>\n<div class=\"download-form-modal-thank\">Enjoy! <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p>\n<hr \/>\n<p><a name=\"What exactly Zoombombing is\"><\/a><\/p>\n<h2>So what <em>is<\/em> Zoombombing?<\/h2>\n<p>Basically, Zoombombing is an unwanted interruption of a video conference call that causes disruption and confusion. It can be jarring, annoying, and sometimes downright traumatizing\u2014and most importantly, it invades the users\u2019 privacy and security.<\/p>\n<p>Now that the security of these types of softwares have been called into question, the WFH world is asking, \u201cHow do I keep these meetings free from unwanted outsiders?\u201d<br \/>\n<a name=\"The response to Zoombombing so far\"><\/a><\/p>\n<h2>What has been the response to Zoombombing?<\/h2>\n<p>In an interview by <a href=\"https:\/\/abcnews.go.com\/US\/fbi-warns-video-conference-hijacking-amid-coronavirus-pandemic\/story?id=69901757\" target=\"_blank\" rel=\"noopener noreferrer\">ABC News<\/a>, Brad Garrett, a former FBI agent, said Zoom has been a rich target for cyber criminals and malicious actors.<\/p>\n<p>&#8220;Cyber criminals are targeting video conferencing sites like Zoom, particularly during the COVID-19 pandemic,&#8221; Garrett, now an ABC News contributor, said. &#8220;Typically they create domains that impersonate Zoom, with the goal of stealing personal information.&#8221;<\/p>\n<p><a href=\"https:\/\/twitter.com\/FBIBoston\/status\/1244710356385173511?s=20\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-4316 size-large\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/image3-73-1024x733.png\" alt=\"FBI warns of Teleconferencing and Online Classroom Highjacking during Covid-19 Pandemic\" width=\"840\" height=\"601\" \/><\/a><\/p>\n<p>He noted that because about 60% of Fortune 500 companies use apps like Zoom, cyber criminals see an opportunity to potentially steal corporate proprietary information and sensitive information about employees.<\/p>\n<p>&#8220;As more schools and businesses work remotely, this creates an ideal environment for cyber thieves,&#8221; Garrett said.<\/p>\n<p>No matter what video conferencing or <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/screen-sharing-software\/\" target=\"_blank\" rel=\"noopener noreferrer\">screen sharing software<\/a> you\u2019re using, everyone is susceptible to having their video conferences hacked, so here are a few ways to safeguard your meetings so that this doesn\u2019t happen to you (and one reason why RingCentral would be a great fit for your video conferencing needs).<\/p>\n<p><a name=\"The 6 Dos and Don\u2019ts of video conferencing\"><\/a><\/p>\n<h2>The 6 Dos and Don&#8217;ts of video conferencing security<\/h2>\n<h3>1. DO password protect your meetings<\/h3>\n<p>While it\u2019s a good first step to not post your meeting links to a public forum, you could go a step further and protect the meeting with a specific password or meeting ID.<\/p>\n<p>For example, in <a href=\"https:\/\/www.ringcentral.com\/video\" target=\"_blank\" rel=\"noopener noreferrer\">RingCentral Video<\/a>, you can set these options right when you schedule a new meeting:<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-4317 size-large\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/image2-92-1024x715.png\" alt=\"Password protect your meetings on RingCentral Video\" width=\"840\" height=\"587\" \/><\/p>\n<p>This way, someone has to know your meeting ID and the password\u2014both of which are completely unique to your meeting\u2014to get in.<\/p>\n<p>The password should be sent out ahead of time to all participants and chosen by the organizer. If the meeting is recurring, you don\u2019t necessarily have to use a new password every time, but it would certainly help you keep the conference secure. See this in action by <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/schedule-a-demo\/\" target=\"_blank\" rel=\"noopener noreferrer\">getting a product tour<\/a>.<\/p>\n<h3>2. DON&#8217;T allow anyone and\/or everyone to screen share<\/h3>\n<p>Again, another handy security feature built into most <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/best-video-conferencing-for-small-businesses\" target=\"_blank\" rel=\"noopener noreferrer\">video conferencing software<\/a> is the ability to <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/screen-sharing-software\/\" target=\"_blank\" rel=\"noopener noreferrer\">share screens<\/a> with one another. This feature is helpful to those needing to present different statistics or teach a new idea, but it\u2019s also a way for predators to take over the meeting.<\/p>\n<p>By limiting screen sharing or even allowing only the host to control the screen, you can minimize the chances of someone posting inappropriate stuff or annotating in unseemly ways.<\/p>\n<h3>3. DO lock the meeting once everyone\u2019s arrived<\/h3>\n<p>This is just a good habit to have\u2014once all your attendees are in the meeting, some video conferencing software will let you lock it so that strangers can\u2019t stumble in:<\/p>\n<figure id=\"attachment_4318\" aria-describedby=\"caption-attachment-4318\" style=\"width: 840px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-4318 size-large\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/image1-107-1024x458.png\" alt=\"Locking a meeting in RingCentral Video\" width=\"840\" height=\"376\" \/><figcaption id=\"caption-attachment-4318\" class=\"wp-caption-text\">Locking a meeting in RingCentral Video<\/figcaption><\/figure>\n<h3>4. DON&#8217;T share meeting links on social media<\/h3>\n<p>While social media has helped businesses market their goods and keep friends and family connected, it also leaves people vulnerable to having anything they put on the internet read by literally anyone.<\/p>\n<p>For example, as Von Glitschka states from an interview with <a href=\"https:\/\/www.cnbc.com\/2020\/04\/02\/how-to-avoid-becoming-a-victim-of-a-zoombombing-on-zoom-video-calls.html\" target=\"_blank\" rel=\"noopener noreferrer\">CNBC<\/a>, he \u201cwas just trying to teach people how to create designs in Adobe Illustrator.\u201d<\/p>\n<p>\u201cGlitschka, half of the two-person design firm Glitschka Studios in Salem, Oregon, had shared the link to his Zoom video call on his Facebook, LinkedIn, and Twitter profiles on Saturday, and a dozen or more people tuned in.\u201d<\/p>\n<p>Glitschka\u2019s conference was gatecrashed by an individual shouting racist slurs, causing him to have to shut the entire conference down. He no longer shares these links online, but invites anyone wanting to tune in to direct message him so that he can send the info directly to anyone interested.<\/p>\n<p>It seems like a simple tactic, but keeping these conference links private and sharing them only with those you are wanting to allow into the meeting is an effective way to keep your conferences from being taken over by someone with an alternative agenda.<\/p>\n<p>To go a step further, we\u2019d suggest only sharing the link for the conference a little before the meeting is supposed to start. If you send out a link an hour before the meeting is set to begin, you\u2019re giving hackers less of a window to find that sensitive information.<\/p>\n<h3>5. DO review the other security settings<\/h3>\n<p>In an era where we are quick to hit \u201cI accept\u201d when our devices ask if we\u2019ve read and reviewed the privacy settings, it\u2019s now more important than ever to take a few moments to familiarize yourself with how video conferencing works and which tools are built in to already keep you safe when in a meeting.<\/p>\n<p>Most video conferencing platforms have comparable security settings: the ability to turn screen sharing off and on, allow the use of waiting rooms, etc. But it\u2019s important to know how to use these settings before jumping into the first meeting. Familiarizing yourself with a few security tools will only contribute to the overall security of each meeting you hold.<\/p>\n<h3>6. DO consider tools that come with security features<\/h3>\n<p>Using a tool that\u2019s well known may seem like the obvious choice, but it can also be a bit of a double-edged sword.<\/p>\n<p>Zoom is used for not only business meetings, but also parties, family get-togethers, and really any random gathering that people are wanting to throw together. Popularity naturally makes it a bigger target, and if you\u2019re hoping to get business done, using the tool that\u2019s so heavily in the press may not be the best option.<\/p>\n<p>On the other hand, as a more business-focused platform, <a href=\"https:\/\/www.ringcentral.com\/video\" target=\"_blank\" rel=\"noopener noreferrer\">RingCentral Video<\/a> comes with many of the features we mentioned above, like controlled annotations, password-protected meetings, and industry security standards likewebRTC\u2014without the same level of mainstream attention from bored teenagers and hackers.<\/p>\n<div class=\"tip\">\n<div class=\"tip-heading\"><strong>Pro-tip:<\/strong><\/div>\n<p><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more about RingCentral\u2019s Video\u2019s security features and what it\u2019s doing to protect customers\u2019 privacy<\/a>, such as not routing meetings through servers in China or sharing information with Facebook.<\/p>\n<\/div>\n<h2>The bottom line for not getting Zoombombed<\/h2>\n<p>The fact is that this can happen to anyone, whether you&#8217;re using Zoom or a <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/zoom-alternatives\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zoom alternative<\/a>, but that doesn\u2019t mean that we should live in fear of using technology. Video conferencing is a <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/communication-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\">communication tool,<\/a> and like all tools, it\u2019s best to know how to use it securely.<\/p>\n<p>To summarize it all up, make sure to always reach out if you do notice any suspicious activity (like people with names you don\u2019t recognize joining your meeting), keep your meeting links confidential, and review the security settings in order to know the best way to protect your (and your coworkers\u2019) safety when working remotely.<\/p>\n<hr \/>\n<p class=\"p1\"><span class=\"s1\">\ud83d\udd79\ufe0f<\/span> Get a hands-on look at how RingCentral works by booking a product tour:<\/p>\n<p class=\"p1\"><button data-href=\"#leadform-popup\" class=\"js-open-popup-activator btn primary\" >Choose a time<\/button><\/p>\n<p>\ud83d\udcb0 You can also <strong><a href=\"http:\/\/www.ringcentral.com\/roi-calculator\" target=\"_blank\" rel=\"noopener noreferrer\">use this calculator<\/a> <\/strong>to see roughly how much your business could save by using RingCentral to support your team&#8217;s communications with clients, customers, and each other.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated Apr 2020 While video conferencing is not a new technology, the entire world is now learning to find creative ways to continue being productive while not being able to be physically in the same room (hello, social distancing). Teachers have taken to virtual classrooms, healthcare providers are using video calls to provide telehealth, friends &#8230;<\/p>\n","protected":false},"author":29,"featured_media":46363,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17901],"tags":[18109,18110,18111,18112],"class_list":["post-41647","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-leadership","tag-hacked-video-meetings","tag-zoom","tag-zoombombing","tag-zoombombs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Avoid getting Zoombombed by following these best practices | RingCentral<\/title>\n<meta name=\"description\" content=\"Learn about 6 dos and don&#039;t that&#039;ll help you and your team avoid getting Zoombombed by unwelcome meeting attendees while on a video conference meeting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-to-avoid-zoombombs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoid getting Zoombombed by following these best practices\" \/>\n<meta property=\"og:description\" content=\"Learn about 6 dos and don&#039;t that&#039;ll help you and your team avoid getting Zoombombed by unwelcome meeting attendees while on a video conference meeting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-to-avoid-zoombombs\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-28T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T13:27:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/how-to-avoid-zoombombs\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"Avoid getting Zoombombed by following these best practices\",\"datePublished\":\"2020-04-28T00:00:00+00:00\",\"dateModified\":\"2025-03-13T13:27:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/how-to-avoid-zoombombs\/\"},\"wordCount\":1486,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg\",\"keywords\":[\"hacked video meetings\",\"zoom\",\"zoombombing\",\"zoombombs\"],\"articleSection\":[\"Business &amp; leadership\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/how-to-avoid-zoombombs\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/\",\"name\":\"Avoid getting Zoombombed by following these best practices | RingCentral\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg\",\"datePublished\":\"2020-04-28T00:00:00+00:00\",\"dateModified\":\"2025-03-13T13:27:13+00:00\",\"description\":\"Learn about 6 dos and don't that'll help you and your team avoid getting Zoombombed by unwelcome meeting attendees while on a video conference meeting.\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg\",\"width\":930,\"height\":700,\"caption\":\"task management software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoid getting Zoombombed by following these best practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Avoid getting Zoombombed by following these best practices | RingCentral","description":"Learn about 6 dos and don't that'll help you and your team avoid getting Zoombombed by unwelcome meeting attendees while on a video conference meeting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-to-avoid-zoombombs\/","og_locale":"en_US","og_type":"article","og_title":"Avoid getting Zoombombed by following these best practices","og_description":"Learn about 6 dos and don't that'll help you and your team avoid getting Zoombombed by unwelcome meeting attendees while on a video conference meeting.","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-to-avoid-zoombombs\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2020-04-28T00:00:00+00:00","article_modified_time":"2025-03-13T13:27:13+00:00","og_image":[{"width":930,"height":700,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg","type":"image\/jpeg"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#article","isPartOf":{"@id":"\/us\/en\/blog\/how-to-avoid-zoombombs\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"Avoid getting Zoombombed by following these best practices","datePublished":"2020-04-28T00:00:00+00:00","dateModified":"2025-03-13T13:27:13+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/how-to-avoid-zoombombs\/"},"wordCount":1486,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg","keywords":["hacked video meetings","zoom","zoombombing","zoombombs"],"articleSection":["Business &amp; leadership"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/how-to-avoid-zoombombs\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/","name":"Avoid getting Zoombombed by following these best practices | RingCentral","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg","datePublished":"2020-04-28T00:00:00+00:00","dateModified":"2025-03-13T13:27:13+00:00","description":"Learn about 6 dos and don't that'll help you and your team avoid getting Zoombombed by unwelcome meeting attendees while on a video conference meeting.","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg","width":930,"height":700,"caption":"task management software"},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-to-avoid-zoombombs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Avoid getting Zoombombed by following these best practices"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2013\/08\/task-management-software.jpg","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/trending\/business-leadership\/amp\">Business &amp; leadership<\/a>","amp_link":"\/us\/en\/blog\/how-to-avoid-zoombombs\/amp","excerpt_title":"Avoid getting Zoombombed by following these best practices","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/41647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=41647"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/41647\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/46363"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=41647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=41647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=41647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}