flat.social

Is Zoom Secure? An Honest Look at Encryption, Privacy, and Safety in 2026

What Zoom does well, where the risks remain, and the specific settings you should change today to protect your meetings.

By Flat Team·

This is an independent guide. Not affiliated with or endorsed by Zoom Communications, Inc.

Your IT department just approved Zoom for company-wide use, but a quick search turns up headlines about data breaches, "Zoombombing," and privacy lawsuits. So which is it: is Zoom secure enough for your team's confidential conversations, or are you rolling the dice every time you click "Join Meeting"?

The short answer: Zoom is significantly more secure in March 2026 than it was during the pandemic-era scramble of 2020. The company has added end-to-end encryption, overhauled its data handling practices, and earned compliance certifications that didn't exist five years ago. But "more secure" doesn't mean "bulletproof." Your settings, your habits, and your plan tier all affect how safe your meetings actually are.

This guide breaks down exactly what Zoom protects, where gaps remain, and the specific steps you can take to lock things down. Here are the facts you can act on.

Is Zoom secure?

Zoom is generally considered secure for most business and personal use cases. It offers AES 256-bit GCM encryption by default and optional end-to-end encryption (E2EE) for meetings. Zoom states on its Trust Center that it holds SOC 2 Type II, ISO 27001, and HIPAA compliance certifications. However, security depends heavily on user settings; default configurations may leave some features like waiting rooms and passcodes turned off on certain plan tiers.

How Zoom Encryption Actually Works

Zoom encrypts meetings, but the type of encryption matters. Understanding the difference helps you decide whether Zoom is secure enough for your specific needs.

Default encryption (AES 256-bit GCM): Every Zoom meeting uses AES 256-bit encryption in Galois/Counter Mode as of March 2026. This means data is encrypted between your device and Zoom's servers. It's the same encryption standard used by banks and government agencies. An attacker who intercepts the data stream sees gibberish.

The catch: Zoom's servers can technically decrypt the data because they hold the encryption keys. This is called "in-transit encryption." For most team standups and project check-ins, this level of protection is more than adequate.

End-to-end encryption (E2EE): Zoom introduced optional E2EE in late 2020 and has expanded it since. When E2EE is enabled, only the meeting participants hold the decryption keys. Zoom's own servers can't read the content. As of March 2026, E2EE is available on all paid plans and the free tier for meetings with up to 200 participants.

The trade-off: enabling E2EE disables cloud recording, live transcription, polling, and breakout rooms. You're choosing maximum privacy over convenience.

Zoom Phone and Zoom Mail: Zoom Phone calls use the same AES 256-bit GCM encryption. Zoom Mail (launched in 2023) uses E2EE by default for messages between Zoom Mail users, with keys stored only on user devices.

For example, your legal team is reviewing a merger document on a Zoom call. With standard encryption, the call is protected from outside eavesdroppers, but Zoom could theoretically access it. With E2EE toggled on, not even Zoom employees can listen in. For that legal review, E2EE is worth the feature trade-offs.

What Data Does Zoom Collect (and Who Sees It)?

Encryption protects data in transit. But what about the data Zoom stores on its servers? This is where the privacy picture gets more complicated.

Data Zoom collects as of March 2026:

  • Account information (name, email, phone number, job title)
  • Meeting metadata (date, time, duration, participant list, IP addresses)
  • Device information (OS version, device type, unique device identifiers)
  • Content you choose to store (cloud recordings, chat messages, whiteboards)
  • Usage data (features used, frequency, performance metrics)

Data Zoom says it does not sell: In its updated privacy policy (revised January 2026), Zoom states it does not sell personal data to third parties and does not use meeting audio, video, or chat content to train AI models without customer consent.

This "consent" language matters. In August 2023, Zoom faced backlash when a privacy policy update appeared to grant the company rights to use customer data for AI training. Zoom quickly revised the policy after public outcry, adding explicit opt-in language. As of March 2026, the AI Companion features require account admin approval before any meeting data is processed for AI summaries.

Data residency controls: Paid account admins can choose which data center regions process their meeting data. Options include the US, Europe, Asia Pacific, and other regions. Free accounts have their data routed through the nearest available data center, which for US users means US-based servers.

Third-party integrations: Zoom's app marketplace includes hundreds of integrations. Each third-party app has its own privacy policy. When you install a Zoom app, you're granting that developer access to certain meeting data. Review these permissions carefully. A scheduling tool integration might request more data than it needs.

Meetings That Feel Like a Real Room

Flat.social uses spatial audio so conversations happen naturally. Walk up to someone to chat, step away when you\'re done. No grid fatigue, no awkward unmuting.

What Is Flat.social?

A virtual space where you move, talk, and meet — not just stare at a grid of faces

Walk closer to hear someone, step away to leave the conversation

Try It Free

Zoom's Security Track Record: Past Incidents and Fixes

You can't assess whether Zoom is secure today without understanding what went wrong before. Here's a timeline of the most notable incidents and how Zoom responded.

April 2020: Zoombombing epidemic. When the pandemic pushed millions onto Zoom overnight, uninvited guests began crashing meetings with offensive content. The root cause: meetings had no passwords or waiting rooms by default, and meeting IDs were easy to guess. Zoom responded by enabling passwords and waiting rooms by default for all new meetings. Zoom reported that these changes significantly reduced unauthorized meeting access.

April 2020: Misleading encryption claims. Security researchers discovered that Zoom marketed "end-to-end encryption" when it was actually using standard TLS in-transit encryption. The FTC investigated, and in November 2020, Zoom settled by agreeing to implement a security program with biennial third-party assessments. Actual E2EE launched in October 2020.

April 2020: Data routed through China. Some calls from users outside China were routed through Chinese data centers. Zoom attributed this to a capacity error during the pandemic surge and quickly added data routing controls so admins could choose which regions process their data.

2020: Facebook SDK sharing device data. The Zoom iOS app was sending device analytics to Facebook even for users without Facebook accounts. Zoom removed the Facebook SDK within days of the report. This incident led to a class-action lawsuit settled for $85 million in August 2021.

March 2023: Google Project Zero vulnerability. A critical zero-click vulnerability (CVE-2023-28597) could allow remote code execution. Zoom released a patch shortly after responsible disclosure and auto-updated affected clients.

Recent years. Zoom's security disclosure page shows continued patching of vulnerabilities, which is standard practice for major software platforms. No large-scale breaches or data exposures have been widely reported since the 2020 incidents.

The pattern: Zoom's 2020 was messy, driven by explosive growth that outpaced its security infrastructure. Since then, Zoom says it has invested heavily in security and expanded its CISO team. The question isn't whether Zoom had problems. It's whether they fixed them. The evidence suggests they have, at least for the known issues.

Is Zoom Secure for Enterprise, Healthcare, and Therapy?

Different industries need different levels of security. Here's where Zoom stands on the certifications that matter.

SOC 2 Type II: Zoom holds a current SOC 2 Type II report, which means an independent auditor has verified its security controls over a sustained period. This is the baseline certification most enterprises require from SaaS vendors.

ISO 27001: Zoom's information security management system is ISO 27001 certified as of March 2026. This is the international standard for managing sensitive data.

HIPAA compliance: Zoom offers a HIPAA-compliant configuration for healthcare providers on paid plans (Business tier and above). This includes a signed Business Associate Agreement (BAA), disabled cloud recording by default, and E2EE availability. Zoom states that thousands of healthcare providers use the platform for telehealth (see Zoom's healthcare page for current figures).

Is Zoom secure for therapy? Yes, when configured correctly. Therapists need to use a paid plan with a BAA in place, enable waiting rooms, disable file transfer, and ideally turn on E2EE. For a detailed walkthrough, see our dedicated Zoom HIPAA compliance guide.

GDPR: Zoom provides Data Processing Addendums (DPAs) for EU customers and supports data residency in European data centers. Standard Contractual Clauses (SCCs) cover international data transfers.

FedRAMP: Zoom for Government is FedRAMP Moderate authorized, meaning it meets US federal security standards. This version runs on separate infrastructure from consumer Zoom.

Education (FERPA/COPPA): Zoom for Education is designed to meet FERPA requirements and does not use student data for advertising. Schools should use Zoom for Education accounts (not personal accounts) to ensure compliance.

Healthcare organizations should consult a qualified HIPAA compliance professional before relying on any video platform for PHI. The free tier does not qualify for a BAA, and default settings alone don't meet HIPAA requirements.

8 Zoom Security Settings You Should Change Today

Zoom's default settings are reasonably secure, but "reasonably" isn't good enough for sensitive meetings. These eight changes take about five minutes and close the most common gaps.

1. Require meeting passcodes. Go to Settings > Security in the Zoom web portal. Toggle on "Require a passcode when scheduling new meetings." This is enabled by default on most accounts as of 2026, but verify it hasn't been toggled off.

2. Enable the waiting room. Under Settings > Security, turn on "Waiting Room." This forces every participant to wait for host approval before joining. It's the single most effective defense against uninvited guests.

3. Lock the meeting after everyone joins. Once all participants are in, click Security in the meeting toolbar and select "Lock Meeting." Nobody else can join, even with the correct link and passcode.

4. Disable file transfer in chat. Under Settings > In Meeting (Basic), toggle off "File transfer." This prevents participants from sending potentially malicious files through Zoom chat.

5. Control screen sharing. Under Settings > In Meeting (Basic), set "Who can share?" to "Host Only" for sensitive meetings. You can always grant sharing permission to specific participants during the call.

6. Enable E2EE for confidential meetings. Under Settings > Security, toggle on "Allow use of end-to-end encryption." Then when setting up a meeting, select "End-to-end encryption" under the Security section. Remember: this disables cloud recording and some collaboration features.

7. Disable join before host. Under Settings > In Meeting (Advanced), toggle off "Allow participants to join before host." This prevents participants from being in a meeting room without the host present.

8. Use authenticated profiles. Under Settings > Security, enable "Only authenticated users can join meetings." This requires participants to be signed into a Zoom account, preventing anonymous access.

These settings cover 90% of the security scenarios most teams face. For the remaining 10%, the biggest risk factor isn't Zoom's technology. It's human behavior: sharing meeting links publicly, reusing the same meeting ID for every call, or clicking suspicious links in Zoom chat.

Try a Different Kind of Meeting

Flat.social replaces the video grid with spatial rooms where you walk around and talk naturally. Great for team socials, networking events, and casual collaboration.

Is Zoom Safe From Hackers?

No software is completely safe from hackers, and anyone who tells you otherwise is selling something. The better question: how well does Zoom defend against common attack vectors?

Credential stuffing: Hackers use passwords leaked from other breaches to try logging into Zoom accounts. In April 2020, security researchers reported that large numbers of Zoom credentials appeared on dark web forums. These weren't from a Zoom breach; they came from users who reused passwords across services. Zoom's defense: two-factor authentication (2FA), available on all accounts since September 2020. If you haven't enabled 2FA on your Zoom account, do it today.

Meeting bombing: Addressed by default passcodes, waiting rooms, and the ability to lock meetings (covered in the settings section above).

Zero-day exploits: Zoom runs a bug bounty program through HackerOne, rewarding researchers who report vulnerabilities. The company also partners with security firms for regular penetration testing.

Man-in-the-middle attacks: AES 256-bit GCM encryption protects against interception. E2EE eliminates even the theoretical risk of Zoom-side interception.

Social engineering: The weakest link in any security chain. Phishing emails that impersonate Zoom meeting invites remain common. Zoom can't prevent a user from clicking a fake "Join Meeting" link that leads to a credential-harvesting page. Train your team to verify meeting links and use calendar integrations instead of clicking links from unknown emails.

Is Zoom safe from hackers? It's as safe as any major cloud platform when you use 2FA, unique passwords, and the security settings outlined above. The biggest risk isn't Zoom's code. It's your own password hygiene.

How Zoom's Security Compares to Other Platforms

Zoom isn't the only video conferencing option. Here's how its security stacks up against the main alternatives as of March 2026.

Microsoft Teams: Also uses AES 256-bit encryption and offers E2EE for one-on-one calls (extended to group calls in late 2025). Teams benefits from Microsoft's broader security ecosystem, including integration with Azure Active Directory and Microsoft Defender. Compliance certifications are comparable to Zoom's. For organizations already using Microsoft 365, Teams' security is tightly integrated with existing identity management. See our Microsoft Teams alternatives guide for a detailed comparison.

Google Meet: Uses AES 256-bit encryption for all calls. Google doesn't offer user-selectable E2EE for standard Meet calls (Client-side encryption is available on Workspace Enterprise Plus plans only). Google's data practices are governed by its broader privacy policy, which includes data use for service improvement.

WebRTC-based platforms (including Flat.social): Platforms built on WebRTC use SRTP (Secure Real-time Transport Protocol) with DTLS key exchange by default. Audio and video travel peer-to-peer when possible, meaning the data never touches a central server. There's no cloud recording to worry about because there's nothing stored server-side. For teams that want privacy by architecture rather than privacy by policy, WebRTC platforms are worth considering.

No single platform is "the most secure." Security depends on your threat model. Zoom is a strong choice for organizations that need compliance certifications, admin controls, and enterprise features. For teams that prioritize minimal data collection and peer-to-peer architecture, spatial meeting platforms offer a fundamentally different approach.

Frequently Asked Questions About Zoom Security

Zoom is a trademark of Zoom Communications, Inc. This article is an independent publication and is not affiliated with, endorsed by, or sponsored by Zoom Communications, Inc.

The Bottom Line: Is Zoom Secure Enough for Your Team?

Zoom in 2026 is a fundamentally different product from the one that made security headlines in 2020. AES 256-bit encryption protects every call. Optional E2EE is available on every plan tier. SOC 2, ISO 27001, HIPAA, and FedRAMP certifications cover the compliance needs of most organizations.

But security isn't just about the platform. It's about how you use it. Here's your action list:

  1. Enable two-factor authentication on every Zoom account in your organization.
  2. Turn on waiting rooms and passcodes for all scheduled meetings.
  3. Use E2EE for any meeting involving confidential information (legal, financial, medical, HR).
  4. Review third-party app permissions in your Zoom marketplace integrations quarterly.
  5. Keep Zoom updated to the latest version on all devices.

These five steps put you ahead of 95% of Zoom users on security. If your threat model demands more (you're handling classified information, operating under strict data sovereignty laws, or simply prefer a platform that collects less data by design) consider a WebRTC-based alternative where audio travels peer-to-peer and nothing is stored on a central server.

Your meetings contain your team's ideas, strategies, and honest conversations. They deserve to be protected.

Meetings That Are Private by Design

Flat.social uses peer-to-peer WebRTC audio with no server-side recording. Walk around a virtual space, talk to your team naturally, and never wonder who else might be listening. Try it free.

Explore More Use Cases

Try a Different Kind of Meeting

Create a free Flat.social space and see what meetings feel like when people can actually move around.