"I agree with Mr.Anoop. We use the Mac binding for all the devices for any network connectivity and allowing any resources including hardware, software, information assets accesses after due authentication."
"After the detection of vulnerabilities in Zoom, presently we have restricted usage to:
1) Meetings on non-critical issues
2) General Staff interactions
3) Education & Training Sessions
until they come out with secure solutions.
We do not conduct any…"