Author: IT-Observer Staff Friday, 20 May 2005, 14:02 GMT
In today?s fast-moving business environment, Instant Messaging offers a number of advantages, such as sending e-mails, transfer file etc. Because IM uses Peer-to-Peer technology to enable direct communication, it can allow hackers to bypass firewalls and access IT systems and has the potential to threaten your entire network with a whole raft of security attacks.
A key concern with IM is the lack of encryption for data sent across the network, allowing attackers to view sensitive information. Instant Messaging, usually based on HTTP protocol, creates issues for server-based anti-virus systems, which do not monitor IM traffic. This could allow worms to propagate inside the network.
What can you do about IM? There are plenty of things to be done to make the use of IM more secure in business environments:
Encrypt Data ? Deploy encrypted IM services, or choose an IM client that is compatible with some of the major networks.
Scan for Viruses - Consider employing a system that scans content exchanged over IM, just as you would for files shared via email.
Establish an IM Usage Policy - A corporate policy will show users the acceptable bounds of IM use - including permitted services and monitoring practices - whilst highlighting the company's legal position.
Log IM Communications - Keeping records of IM access and message flow will link traffic back to specific users, which can be an invaluable aid to enforcing IM usage policies.
Deploy Desktop Protection - Local AV and firewall software will add an extra line of defense against IM attacks.
"IM is rapidly becoming commonplace, and used sensibly it provides great benefit to any organization," explains Mark Stevens, Chief Strategy Officer, WatchGuard Technologies. "Implementing an effective policy to govern IM use, by following the tips we've outlined below, will enable businesses to enjoy these many advantages whilst minimizing the risks."
dxpnet has been online since 1997, powered by real conversations and a passionate astrology community.
If this page helped you, you can support the site below.
I have only been in two relationships in my life both 8 months, so sometimes I feel like I don't know how to be a "girlfriend". (IN YOUR PERSONAL OPINION) What characteritics make up a good girlfriend?
What do you believe? In this world, and perhaps the next? What does anyone believe? What ideals, What faith, What dreams do they grip to Which lead them along a never faulting path towards Their destiny,
Did you ever notice how some of the strangest combinations of food are supposed to be aphrodisiacs? Like sausages and oysters. And really, what's the deal? Why are they supposed to work? Probably because they may resemble certain important ingrediants in
Hi. I spent the weekend with my sagitarrius friend and we got along very good, I could easily be myself around him and we enjoyed each other;s company...the thing is when I was leaving to go home he mad a comment like "You are cool as h*ll!" I didn't say
I am a Libra and have a Sag. male who tells me that he loves me. However, he broke up with me because he doesn't know how to handle some of the stresses that he is going through at work. So my question is; do Sag's break up and come back to a person tha
Just checken in sayen High, I am a typical Sag male cept, I am kinda old fashioned romantic, its like I heard a comedian say, Getting in a relationship For sex, is like buying a jumbo jet for the peanuts.
Friday, 20 May 2005, 14:02 GMT
In today?s fast-moving business environment, Instant Messaging offers a number of advantages, such as sending e-mails, transfer file etc. Because IM uses Peer-to-Peer technology to enable direct communication, it can allow hackers to bypass firewalls and access IT systems and has the potential to threaten your entire network with a whole raft of security attacks.
A key concern with IM is the lack of encryption for data sent across the network, allowing attackers to view sensitive information. Instant Messaging, usually based on HTTP protocol, creates issues for server-based anti-virus systems, which do not monitor IM traffic. This could allow worms to propagate inside the network.
What can you do about IM? There are plenty of things to be done to make the use of IM more secure in business environments:
Encrypt Data ? Deploy encrypted IM services, or choose an IM client that is compatible with some of the major networks.
Scan for Viruses - Consider employing a system that scans content exchanged over IM, just as you would for files shared via email.
Establish an IM Usage Policy - A corporate policy will show users the acceptable bounds of IM use - including permitted services and monitoring practices - whilst highlighting the company's legal position.
Log IM Communications - Keeping records of IM access and message flow will link traffic back to specific users, which can be an invaluable aid to enforcing IM usage policies.
Deploy Desktop Protection - Local AV and firewall software will add an extra line of defense against IM attacks.
"IM is rapidly becoming commonplace, and used sensibly it provides great benefit to any organization," explains Mark Stevens, Chief Strategy Officer, WatchGuard Technologies. "Implementing an effective policy to govern IM use, by following the tips we've outlined below, will enable businesses to enjoy these many advantages whilst minimizing the risks."