• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

Fight Over Zoom Encryption Gets More Complicated

October 26, 2020 by Hector

Home » Blog » Fight Over Zoom Encryption Gets More Complicated

zoom-video-encryption-e2e-privacy-data

The debate over the benefits and vulnerabilities of Zoom is becoming even more complicated as Zoom was forced to walk back a previous decision to deny End-to-End Encryption (E2E) for free users. As millions of new users took to the video conferencing tool during the coronavirus pandemic, it was quickly discovered that Zoom’s cybersecurity features were not all that was promised. After several additional scandals and responses by the company’s CEO, Zoom encryption is finally receiving an update in 2020.

Mass Migration to Zoom During COVID-19

COVID-19 and the shutdowns it caused in the name of social distancing saw many leverage video technology to continue personal interactions as well as work from home. Zoom quickly rose to the top of the list of preferred application as the company boasted it saw 300 million daily meeting participants in April 2020 (up from only 10 million in only five months). The relatively easy features and availability of the app saw it being used for multiple contact channels, from business meetings to classroom lectures, and even to government proceedings.

Lack of Encryption and Cybersecurity Uncovered

However, a practice labeled “Zoombombing,” where victims were harassed by bad actors who had broken into their video calls, brought the state of Zoom’s security into question. The app had had a few major exploitable bugs revealed publicly in recent years, but now that the user base had grown so exponentially, there was a much bigger backlash and considerable scrutiny followed. In reality, the consistent cybersecurity gaps hinted at a much bigger problem with the app’s data security controls, but the extent was unknown the spotlight forced it to the forefront.

Zoom’s marketing had misled customers – despite claims of sophisticated encryption through EE2E, any video chat actually had the same native security as a web browser. Actual data protection fell to the company itself, which had open access to all collected user information. While Zoom has sworn that it does not mine this data, additional findings provided implied they actually were selling personal information to advertisers and social networks.

Zoom Plans to Remove Encryption for Free Users

The backlash over the revelation forced Zoom to take steps to improve their cybersecurity stance; however, company representatives expressed stipulations of this plan that would cause even more controversy. In order to provide actual secure encryption, the company ostensibly needed information only included with paid accounts. Many observers either reinforced or questioned this reasoning, but the debate became even more muddled by Zoom itself when the CEO made additional claims that encryption would block the company from working with law enforcement.

Data Privacy and Censorship Scandals

The Zoom CEO’s comments came in the middle of protests sparked by the killing of George Floyd by a Minneapolis police officer, and generated immediate backlash. This was further aggravated by additional revelations that Zoom had cooperated with China in suppressing activists with accounts on their platform. Though the company later joined others in blocking user data requests from the Chinese government, the damage was done – Zoom’s ability – and willingness – to ensure user data privacy was called into question.

zoom-encryption-cybersecurity-video

 

Major Reversal Leads to Roll-out of New E2E Features

The mounting backlash finally forced Zoom to include free users in its end-to-end encryption service, though with yet another caveat. As long as these accounts provide additional information that would allow verification of their identity, they will receive the same level of E2E as paid users do. As of this writing, the new security features are still being rolled out and tested in the real word, and we will have the full picture on their impact in the near future.

The Cybersecurity Challenge of Video Apps

Zoom is also still in the spotlight as of this writing, with delays in delivering a promised transparency report on how it provides data to governments. This scrutiny is not likely to end soon given the precedent created by Zoom itself, as well as by similar hardware-connected apps. The age of digital transformation continues to remind the public that everything with an Internet connection is inextricably linked, and this lesson will undoubtedly be on display again when the next hot tech company drops the data privacy ball.

Many of these apps inevitably contain exploitable backdoor connections, for a variety of reasons but mostly boiling down to money. Whether because the cost of operating end-to-end security on the developer’s end is too great, or because the data mining applications are too lucrative, there will always be an element of exposure in many digital applications on the market. Most importantly, no technology will ever be full proof against human error.

Let SWK Help You Secure Zoom or Find an Alternative

SWK Technologies has experience with providing customers with security solutions for many software and network vulnerabilities. We can help you cybersecure your existing applications, or direct to a better alternative for video communications, like Microsoft Teams.

Contact SWK today to learn how we can enable you to avoid the cybersecurity pitfalls of Zoom and other unsecure apps.[fc id=’34’][/fc]

Category: Blog, Cybersecurity, IT Services

Sidebar

Recent Posts

  • How Your ERP Software Impacts Tariff Costs
  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Cargo ship "Tokyo Triumph" loaded with shipping containers in various colors, representing international trade and supply chains affected by tariffs impacting manufacturing operations.

How Your ERP Software Impacts Tariff Costs

Read moreHow Your ERP Software Impacts Tariff Costs
Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand