Different passwords should be used for each room. Again, only make the passcode available via the Blackboard site and change it in the event of an incident. Without one, automated bots can find and exploit room links. Passwords: All Zoom meetings should have a passcode. Once they have done this once, Zoom should remember them for future meetings however. Students will need to pick the option to sign in via SSO and then input before being directed to a Sheffield Hallam login screen. It is also important that students know not to share links with anyone.Īllow only SHU users to join: Unless your meeting includes external speakers or collaborative partners (who will not have SHU IT accounts) consider selecting the option to allow authenticated users only so that only SHU staff and students can access. Likewise, WebEx and Teams links should only be disseminated via Blackboard where possible. There is also no need to email Collaborate links, as they can be accessed on-site. Links placed on Blackboard sites can only be seen by students enrolled on the site. This makes a meeting far easier to infiltrate by a Zoombomber, Zoom now alerts meeting owners to the risk by email where possible. It is therefore worth considering security issues alongside other considerations when choosing the platform to use.ĭistribute links securely: Some students and staff have shared links online via websites and social media. Collaborate also automatically registers attendance including how long each participant remains in the session. Blackboard Collaborate is less likely to be zoombombed because users have to log into Blackboard to access the session. A combination of approaches and settings will significantly reduce any risk of Zoombombing occurring in your online meetings.Ĭhoose the most appropriate platform: Zoom is popular for its performance but is the most open to unwanted externals entering sessions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |