by Mike Foster | Apr 21, 2020 | Uncategorized
Using two-step logon is one of the best things you can do to keep unauthorized people from logging into your account. Use the checkbox to “remember this device” and eliminate the need to perform the second step repetitively. The two-step logon is when you...
by Mike Foster | Apr 8, 2020 | Cyber Security, Cybersecurity, IT Best Practices, Technology Safety Tips, two step login, Uncategorized, Zoom
Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you. This video walks you through setting up the two step login feature of Zoom. To help protect your Zoom meetings, watch other...
by Mike Foster | Apr 8, 2020 | Alerts, Cyber Security, IT Best Practices, Technology Safety Tips, Uncategorized, Video Meeting Security, Zoom
Zoom has many security settings. This is a detailed but concise guide to the settings and how they work. Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s...
by Mike Foster | Apr 7, 2020 | Cyber Security, Cyber Security Training, Executive Tips, IT Best Practices, Video Meeting Security, Zoom
Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people working all the time to break Zoom’s security. To help address...
by Mike Foster | Apr 3, 2020 | Cyber Security Training, Executive Tips, IT Best Practices, Zoom
Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the...