Skip to main content

7 Tips to Help Secure Your Webinars

 



Webinars are a valuable way for today’s organizations to connect with potential and existing customersengage employees through all-hands meetings, and run large-scale events. In order to create a seamless and engaging webinar experience, you need to first make sure you’re providing a controlled and secure environment.

At Zoom, we’ve created our platform — including our Zoom Video Webinars solution — with security in mind. Our webinar security controls are designed to help hosts and co-hosts manage and safeguard the experience while maximizing the potential of their session.

Here are few key ways you can help secure your webinars: 

7 webinar security best practices

  • Turn off chat for attendees: To prevent side chatter or unwarranted commentary during your webinar, you can disable the chat feature for all participants. If the host has disabled attendee chat, the host and other panelists can still chat among themselves. You can disable chat in your account settings or during the webinar.
  • Control the Q&A: The Q&A feature allows attendees to ask questions during the webinar, and for the panelists, co-hosts, and host to answer them. To help manage the Q&A function from potentially being abused by an attendee, disable “Allow attendees to view” in the Q&A section of your “Webinars” panel in the Zoom web portal. That way, attendees will only be able to view the questions that hosts and panelists have chosen to answer. 
  • Remove the anonymous feature: In the Q&A tab in your settings, turn off “Allow anonymous questions” to disable anonymous submissions. By removing this option, participants won’t be able to send questions without providing their name to the host, co-host, and panelists.
  • Require a passcode: Webinar hosts can require passcodes for an added layer of security. Passcodes can be enabled in account settings, and attendees will need the passcode to access the webinar.
  • Manage your panelists and participants: You can manage both panelists and attendees in your webinar via the host controls:
    • Panelists: Hosts can mute/ask to unmute, put on hold, or remove panelists. You can also promote a panelist to co-host or change their role to attendee.
    • Attendees: Hosts can lower attendees’ raised hands, as well as rename or remove the attendee. They can also promote an attendee to be a panelist, which means they’ll be able to appear on video and audio so other audience members can see and hear them.
  • Lock the webinar: Once the intended audience has joined your webinar, you can prevent any new panelists or attendees from joining the session by locking it via the host controls. Once a webinar is locked, no new attendees or panelists will be able to join unless you unlock it.
  • Set up authentication for your webinar: Admins can enable authentication profiles to require webinar attendees to be logged into their Zoom account to join a session. You can further limit access to Zoom users whose email address matches a certain domain or prevent users in specific domains from joining meetings or webinars. This feature, which is implemented at the account level, can be useful if you want to restrict your participant list to verified users or users from a certain organization, such as for an internal all-hands. 

Security & scale in one solution

Whether you’re connecting with hundreds or thousands of attendees, these security controls can help you take the stage with confidence. With Zoom Video Webinars enabling memorable experiences in a scalable and secure environment, companies can minimize distractions and keep their audience focused on the content being presented. 


For additional security recommendations, check out our blogs dedicated to security tips for Zoom Meetings and Zoom Events security features.





Zoom Blog

Comments

Popular posts from this blog

Use Vault for Gmail Confidential Messages and Jamboard Files

Google vault will be supporting two new formats in the future, Gmail confidential mode emails & Jamboard files stored in Google Drive. Google Vault gives you a chance to retain, hold, search, and export data to support your organization’s retention and eDiscovery needs. This dispatch includes support for new information types with the goal that you can thoroughly oversee your association's information. What happens when individuals in your association sends confidential messages? Vault can hold, retain, search, and export all confidential mode messages sent by users in your association. Messages are constantly accessible to Vault, notwithstanding when the sender sets a termination date or denies access to private messages. Here’s an example of what admin@ink-42.com will see in Vault when they search for sam@ink-42.com and preview this email sent by lisa@ink-42.com . But It’ll not work vise versa. Admins can hold, retain, search and export message headers and s

Zoom’s Work Transformation Summit on Jan. 19: Fresh Approaches for Moving Forward

These past two years have undoubtedly reshaped work. More specifically, these past two years — shuffling between remote, in-person, and hybrid work scenarios — reshaped what employees expect out of their jobs, how they want to work, and what the office means to them.  Organizations are challenged with making big decisions to meet those expectations, and those decisions will dramatically alter how they hire, manage their facilities, buy technology, and maintain productivity. Simply adjusting policies and retooling previous work models won’t do. It takes a comprehensive reimagining. To help organizations navigate this next phase of work, Zoom is hosting our  Work Transformation Summit  on Jan. 19, a free, half-day virtual event designed to provide you and your organization with meaningful strategies, creative approaches, and innovative solutions for redefining work.  Summit attendees will have the opportunity to hear from peers and industry experts on the importance of embracing technolo

Access well-known educational technology tools straight from Google Classroom.

  We're making it simpler for instructors to use popular EdTech products that are most effective for their class right in Google Classroom with a new seamless integration of single sign-on, assigning, and grading. With the help of this feature, teachers can find, assign, and grade interesting content for their classes, and both teachers and students can access their EdTech tools without needing to navigate to other websites or apps or go through a cumbersome login process that requires remembering numerous usernames and passwords. This offers a more simplified experience when using technology to affect learning, in addition to saving instructors and students time. We partnered with 15+ EdTech companies to build custom add-ons, including Kahoot!, Pear Deck, IXL, and Nearpod.  Admins :  In order for educators to use add-ons, district administrators must provide access to them. For further information on how to install the add-ons functionality and specific add-ons for a domain, OU, o