<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/0962dd4d02924e9caa30ff0ee7ec326e&quot; frameborder=&quot;0&quot; width=&quot;1152&quot; height=&quot;864&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>864</height><width>1152</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>864</thumbnail_height><thumbnail_width>1152</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/0962dd4d02924e9caa30ff0ee7ec326e-00001.gif</thumbnail_url><duration>260.3333333333333</duration><title>Protecting Meetings from Zoom Bombing Attacks</title><description>In this video, I provide a quick overview of how to protect a meeting from Zoom bombing attacks. I emphasize the importance of having the host code enabled and explain the steps to obtain it. I also discuss how to handle a Zoom bombing situation, including suspending participant activities and locking the meeting. Additionally, I suggest disabling the ability for participants to rename themselves and unmute themselves to prevent interruptions. It is crucial to read the meeting guidelines for security on our website. Take these precautions to ensure a safe and uninterrupted meeting experience.</description></oembed>