After a long day of video calls, you might feel like your brain has been wrung out like a wet washcloth—we certainly do. It’s exhausting to stare into a computer for hours every day while participating in meetings or classes. This condition is called Zoom fatigue, and it’s a recent affliction for most of us because the pandemic has dramatically increased the popularity of video calls. We don’t mean to beat on Zoom here—this condition plagues people who use Cisco WebEx, FaceTime, Google Hangouts, Google Meet, Microsoft Teams, Skype, and other videoconferencing software too.
But there are techniques you can employ to reduce Zoom fatigue. Researchers at Stanford University have identified four reasons why video calls are so tiring and offer suggestions on making them less so. They include:
-
Close-up eye contact is overwhelming. You usually sit about an arm’s length from your computer display, and if one person is on screen at a time, their head may be close to life-size. You’d never be that near someone’s face in real life unless they were a close family member, and even then, you wouldn’t hold that position for long. Shrink your window or switch to gallery view so you’re talking to postage stamps rather than feeling like someone is up in your face.
-
Looking at yourself is psychologically harmful. We all have mirrors, but can you imagine staring into one for hours every day? Only a pathological narcissist would do that. Worse, constantly seeing your own image can make you worry about your appearance and what others think of you. Once you’ve verified that you’re properly framed and don’t have salad in your teeth, hide your preview or switch to a view that doesn’t include you.
-
Sitting perfectly still is difficult. This is hardest on kids, but even adults have trouble staying sufficiently still to remain perfectly framed in a video window. When you’re on a standard phone call or in an in-person meeting, you might pace around the room or at least adjust your position in your chair. Try turning off your camera when possible—most calls work just as well without video—or position it so you can fidget or pace in person. Another solution is Apple’s Center Stage technology on the new M1-based iPad Pros, which automatically pans and zooms to keep you in the picture as you move around.
-
Video calls make you constantly think about call mechanics. There’s nothing natural about interacting with multiple people on a screen, so we’ve all come up with behaviors (some of which we just recommended!) to smooth over the cracks in the system. For instance, your brain has to expend extra effort to help you stay framed in the video window, worry about how you look, use exaggerated facial expressions so people know you’re paying attention, and use techniques like a thumbs-up to indicate approval without unmuting. The solution is to turn off your camera and hide the video window so your brain can take a break and focus on just the audio content of the call.
You’ll notice that most of the recommendations for reducing the mental strain of video calls come down to eliminating video. It shouldn’t be surprising because talking on the phone isn’t nearly as tiring, even when you’re on a conference call with a couple of people. There’s no question that video can help convey information that would be lost in a phone call, and it’s nice to see far-flung friends and family, but there’s no rule that video calls are the best form of communication for all situations.
We’ve started to put these recommendations into practice ourselves, and we encourage you to do so as well. And if you need support for why you’re turning off your camera or asking for audio-only calls, send people a link to this article.
AI Usage Transparency Report
Pre-AI Era · Written before widespread use of generative AI tools
AI Signal Composition
Score: 0.05 · Low AI Influence
Summary
Zoom fatigue is a condition caused by prolonged video calls, which can be alleviated by employing techniques such as shrinking the window, hiding the preview, turning off the camera, and using audio-only calls.
Related Posts
How I Finally Passed the PMP Exam (After 12 Years of Waiting)
Back in 2013, I registered for a PMI membership with every intention of pursuing my PMP certification. I downloaded the handbook, bookmarked the eligibility requirements, and even told a few friends that I was going to do it "soon." At the time, I thought getting certified would be a straightforward process, but little did I know what lay ahead in terms of studying and preparation.
10 Things You Didn't Know You Could Do With Apple Configurator (That Save Mac Admins Hours)
Most of us treat Apple Configurator like a fire extinguisher: break glass, DFU, restore, move on. But it can do a lot more, and when you know the edges, you can turn a bricked morning into a ship-it afternoon. Below are ten things I regularly use (or wish I’d used sooner) that demonstrate its capabilities beyond just emergency recovery.
The Evolution of Apple Certification: A Journey Through Versions, Challenges & Growth
When I recently passed the Apple Certified Support Professional (ACSP) exam again, I paused to reflect — not just on this milestone, but on the long path I’ve walked through Apple’s certification landscape. My first certification dates back to macOS 10.5, and over the years, I’ve earned credentials across nearly every version since. In that time, the exams — and Apple itself — have transformed significantly.
Secure Software, Secure Career: How I Passed the CSSLP
After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.
Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune
Alright, so today we're going to be talking about the management of bring your own device BYOD for Android devices. There's a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM on the market. We just happen to use Jamf where I work, but you could use anything from Braavos to SimpleMDM to Kanji or JumpCloud. Mosyle is also a great option.
BYO with me in 2025: iOS with User Enrollment in JAMF Pro
It really depends on your company's needs. For example, many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the company's sensitive data in all forms. This may involve implementing policies for contractor-owned devices, ensuring that all devices accessing company data meet minimum security standards, and regularly reviewing and updating these standards to stay ahead of emerging threats.
Securing BYOD Email Access: Exploring Strategies in Microsoft 365
In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block email access on non-company devices by default and ensure only sanctioned apps can access organizational email accounts. This approach will help prevent unauthorized access and data breaches, aligning with our commitment to maintaining the security and integrity of company communications.
How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies
Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here's a detailed account of my experience, including the resources I used, some tips that helped me along the way, and what I learned from the process itself.
Get more out of scripting than you may expect
Expect is an extension to the Tcl scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the Unix platform, has since become available for Microsoft Windows and other systems. Its functionality allows users to interact with these programs through scripted commands, eliminating the need for manual input.
Cybersecurity is more than having the right tools
Processes, cybersecurity is 99% documentation, writing, that's what it is. If you don't enjoy writing policies and procedures, or enforcing them, be aware that this may lead to conflicts with your coworkers. You'll need to communicate clearly and consistently, which can be a challenge for some people.