by Mike Foster | May 1, 2020 | Executive Tips, Executives and IT, IT Best Practices, Remote Worker Security, Zoom
CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to install a program or app on your computer or device. What if the...
by Mike Foster | Apr 21, 2020 | Uncategorized
Using two-step logon is one of the best things you can do to keep unauthorized people from logging into your account. Use the checkbox to “remember this device” and eliminate the need to perform the second step repetitively. The two-step logon is when you...
by Mike Foster | Apr 8, 2020 | Cyber Security, Cybersecurity, IT Best Practices, Technology Safety Tips, two step login, Uncategorized, Zoom
Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you. This video walks you through setting up the two step login feature of Zoom. To help protect your Zoom meetings, watch other...
by Mike Foster | Apr 8, 2020 | Alerts, Cyber Security, IT Best Practices, Technology Safety Tips, Uncategorized, Video Meeting Security, Zoom
Zoom has many security settings. This is a detailed but concise guide to the settings and how they work. Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s...