ZOOM reduces bandwidth of conference calls in US & enables security features by default

Early today ZOOM started alerting its customers that “in order to preserve bandwidth and to ensure that they were making the best use of global bandwidth we may experience intermittent use of HD during meetings with 3 or more participants”.

They later went on to explain that ZOOM Rooms and rooms with a Conference Connecter will remain HD enabled. This comes amid a wave of news recently regarding bandwidth being used at a higher capacity ever seen in the home and enterprise markets as uncertainty around COVID-19 grows.

Blog Photo

Additionally this comes as ZOOM also has plans to enforce greater overall security which they announced in an email on April 3rd 2020 after backlash regarding ZOOM Room bombings and privacy concerns regarding leaking of data to Facebook.

We’re always striving to deliver you a secure virtual meeting environment. Starting April 5th, we’ve chosen to enable passwords on your meetings and turn on Waiting Rooms by default as additional security enhancements to protect your privacy.

They went on to write instructions for how to handle the increased and now enforced security measures and are shared below.

 To enhance the security of single-seat Pro accounts, starting April 5th, meeting passwords and Waiting Rooms will be turned on by default. As the meeting host, there are some steps you may need to take to familiarize yourself with these changes and ensure that your attendees can join your upcoming meetings seamlessly. Please read this article for step-by-step instructions.

Meeting Passwords Enabled “On”

Going forward, your previously scheduled meetings (including those scheduled via your Personal Meeting ID) will have passwords enabled. If your attendees are joining via a meeting link, there will be no change to their joining experience. For attendees who join meetings by manually entering a Meeting ID, they will need to enter a password to access the meeting. 

For attendees joining manually, we highly recommend re-sharing the updated meeting invitationbefore your workweek begins.** Here’s how you can do that:

Log in to your account, visit your Meetings tab, select your upcoming meeting by name, and copy the new meeting invitation to share with your attendees. For step-by-step instructions, please watch this 2-minute video or read this FAQ.

For meetings scheduled moving forward, the meeting password can be found in the invitation. For instant meetings, the password will be displayed in the Zoom client. The password can also be found in the meeting join URL.

Virtual Waiting Room Turned on by Default

Going forward, the virtual waiting room feature will be automatically turned on by default. The Waiting Room is just like it sounds: It’s a virtual staging area that prevents people from joining a meeting until the host is ready.

How do I admit participants into my meeting? 

It’s simple. As the host, once you’ve joined, you’ll begin to see the number of participants in your waiting room within the Manage Participants icon. Select Manage Participants to view the full list of participantsthen,you’ll have the option to admit individually by selecting the blue Admit button or all at once with the Admit All option on the top right-hand side of your screen.  For step-by-step instructions, please watch this 2-minute video.

Check out these resources to learn How to Manage Your Waiting Room and Secure Your Meetings with Virtual Waiting Rooms.

For more information on how to leverage passwords and Waiting Rooms to secure your meetings, please visit our Knowledge Center, attend a daily live demo, or visit our Blog.

Please reach out to our Support Team if you have any questions at support@zoom.us.

AI Usage Transparency Report

Pre-AI Era · Written before widespread use of generative AI tools

AI Signal Composition

Rep Tone Struct List Instr
Repetition: 33%
Tone: 52%
Structure: 45%
List: 7%
Instructional: 62%
Emoji: 0%

Score: 0.07 · Low AI Influence

Summary

Zoom announces changes to preserve bandwidth, enable passwords and virtual waiting rooms by default for meetings with 3 or more participants.

Related Posts

Leaving Flickr: Migrating 20,000+ Photos to Synology and Taking Back Control

There’s a certain kind of friction you start to notice when you’ve been using a service for a long time. Not enough to make you leave immediately, but enough to make you pause. Flickr had been that kind of service for me. It quietly held years of photos, uploads from old phones, albums I hadn’t looked at in ages, and a massive "Auto Upload" collection that had grown into something I didn’t fully understand anymore.

Read more

How I Finally Passed the PMP Exam (After 12 Years of Waiting)

Back in 2013, I registered for a PMI membership with every intention of pursuing my PMP certification. I downloaded the handbook, bookmarked the eligibility requirements, and even told a few friends that I was going to do it "soon." At the time, I thought getting certified would be a straightforward process, but little did I know what lay ahead in terms of studying and preparation.

Read more

The Evolution of Apple Certification: A Journey Through Versions, Challenges & Growth

When I recently passed the Apple Certified Support Professional (ACSP) exam again, I paused to reflect — not just on this milestone, but on the long path I’ve walked through Apple’s certification landscape. My first certification dates back to macOS 10.5, and over the years, I’ve earned credentials across nearly every version since. In that time, the exams — and Apple itself — have transformed significantly.

Read more

Secure Software, Secure Career: How I Passed the CSSLP

After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.

Read more

Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune

Alright, so today we're going to be talking about the management of bring your own device BYOD for Android devices. There's a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM on the market. We just happen to use Jamf where I work, but you could use anything from Braavos to SimpleMDM to Kanji or JumpCloud. Mosyle is also a great option.

Read more

BYO with me in 2025: iOS with User Enrollment in JAMF Pro

It really depends on your company's needs. For example, many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the company's sensitive data in all forms. This may involve implementing policies for contractor-owned devices, ensuring that all devices accessing company data meet minimum security standards, and regularly reviewing and updating these standards to stay ahead of emerging threats.

Read more

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block email access on non-company devices by default and ensure only sanctioned apps can access organizational email accounts. This approach will help prevent unauthorized access and data breaches, aligning with our commitment to maintaining the security and integrity of company communications.

Read more

How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies

Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here's a detailed account of my experience, including the resources I used, some tips that helped me along the way, and what I learned from the process itself.

Read more

Get more out of scripting than you may expect

Expect is an extension to the Tcl scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the Unix platform, has since become available for Microsoft Windows and other systems. Its functionality allows users to interact with these programs through scripted commands, eliminating the need for manual input.

Read more