When Digital Spaces Are Attacked
- Sonia Brown MBE

- Jun 16
- 4 min read
Updated: Jul 5

How to Safeguard Your Webinar from Virtual Violence
In a time where digital spaces have become our stages, classrooms and communities what happens when that space is violated in the most invasive way imaginable?
During a recent live webinar, designed to empower and equip a professional audience an uninvited individual entered under false pretences. Within moments, they performed a sexually explicit act live on video. It was shocking, disturbing and intentional. What’s more it was strategically targeted at a room filled predominantly with women.
What followed was disbelief. Not just from our team, but from attendees, speakers and even fellow webinar hosts we reached out to. Most had never encountered something like this and yet, when it happens, it’s unforgettable.
Let’s Call It What It Is
This wasn’t a prank. This wasn’t a hack. This was zoom bombing and more accurately, it was a virtual act of violence.
So, we decided to do something more than react. We took notes. We reviewed our tech. We created a protocol. And now, we’re sharing it, not because we want sympathy, but because we want standards.
This feature is not a cry for help. It’s a call to action for every event host, facilitator and changemaker building meaningful conversations online.
What Is Zoom Bombing?
Zoom or Webinar bombing is the deliberate hijacking of a virtual event, usually with the intent to disrupt, intimidate or traumatise. It is not “just” digital abuse. It is the use of virtual space to commit psychological assault, often targeting identity-based communities. Women, BAME professionals groups and others.
Just because it happens behind a screen doesn’t mean it’s harmless. It’s calculated, predatory and deeply violating.
What makes it even more dangerous is how unprepared many hosts and speakers are until it happens.
8 Critical Safeguards Every Webinar Host Must Implement
In today’s digital-first world, webinars have become a lifeline for thought leadership, business development and education. But with visibility comes vulnerability. Increasingly, hosts and attendees are reporting incidents of zoom bombing, where uninvited individuals force their way into sessions to harass, shock, or even traumatize participants.
Let’s be clear, this isn’t just trolling. It’s virtual violence and it must be met with serious safeguards and professional responsibility.
This guide offers 8 essential strategies to help you protect your audience, your credibility and your peace of mind.
1. Eject Zoom Bombers Instantly
If a disruptive person or bot enters your event, remove them immediately,
Open the Participants panel
Hover over their name and click More > Remove
Use Suspend Participant Activities if needed to freeze the session instantly
Bots often use generic names like “Meeting Notetaker” or “AI Recorder.” Know how to spot and remove them fast. Memorise this step or assign a trained co-host to act swiftly.
2. Use Webinar Mode, Not Meeting Mode
Webinar mode restricts attendees from using video, audio and screen sharing unless invited. This prevents on-the-spot disruptions. Use the correct mode based on audience size and event type.
3. Turn Off Attendee Video & Audio by Default
Ensure participants join with cameras and microphones off. Require them to request permission to present. This prevents sudden intrusions and gives you full control.
4. Enable Waiting Rooms and Lock Your Meeting
Waiting rooms allow you to manually admit verified attendees. Once your event begins, use the Lock Meeting feature to block additional entries, even if someone has the link.
5. Only Allow Registered or Authenticated Users
Require participants to register and authenticate using approved domains or credentials. Never share meeting links publicly. Controlled access prevents gate-crashing.
6. Assign Co-Hosts and Moderators
Don’t host alone. Assign trusted co-hosts to manage the chat, monitor the waiting room and remove anyone who behaves inappropriately. Keep a private backchannel open for real-time coordination.
7. Remove, Don’t Just Block
Blocking a participant might mute or hide them, but it won’t eject them. Always use Remove to eliminate them entirely. And disable “Allow removed participants to rejoin.”
8. Start with a Community Conduct Statement
Set the tone from the beginning, “This is a moderated space. Disruption or harassment of any kind will lead to immediate removal and reporting.”
This affirms your leadership, protects your attendees and sets expectations.
As a host, zoom bombing is not just a tech glitch, it’s an assault on your space and values. By following these eight safeguards, you’re not just protecting a meeting, you’re protecting your mission.
Lead decisively. Act confidently. And never compromise on digital safety.
What to Do If It Happens to You
If your space is ever breached and / or targeted then
Immediately pause the session and remove the offender. Don’t push through. Even 60 seconds of silence can reset the room and reinforce leadership.
Remove the offender. Immediately and fully, then document their name/email/time of the incident, including username, timestamp, screenshots..
Report it. To your platform provider and if the content was criminal in nature to the police if the act was illegal or sexually explicit.
Debrief your team, talk through what worked and what didn’t and update your safeguarding protocol and educate your wider network.
This Is Not Just About Tech. It’s About Leadership
This experience taught us something every digital leader must understand, you are not just managing a webinar you are stewarding a space of trust.
In an era where visibility comes with vulnerability, leadership means foreseeing risks, not just reacting to them. It means building strong digital doors and being unafraid to slam them shut when needed.
We didn’t ask for this. But we’re no longer unprepared. And neither should you be.
Moving Forward. Our Safeguarding Commitments
As a result of this incident, we are
Upgrading all webinars to secured formats with restricted video and audio access
Implementing moderator-led waiting rooms and pre-approval for all participants
Training our team on rapid response and virtual safeguarding
Opening every session with safety principles and participant expectations
Sharing this experience transparently to protect others
Finally, this is not a press release. It’s a leadership memo for every facilitator, educator and changemaker hosting events online.
Whether you’re running a global summit or a local training, know this, you don’t have to wait for a breach to start protecting your room. And if you've already been targeted, you're not alone and you're not to blame.
We stand for safe spaces. And we stand by everyone committed to creating them.
📥 Download Our Webinar Safeguarding Checklist




Comments