contact contact contact
Advertise
Contact
SecurityWatch
Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Free VoIP Assessment for your business

IM at Work Means Extra Security Threats
Author: IT-Observer Staff
Tuesday, 17 May 2005, 19:47 GMT

The emerging use of Instant Messaging (IM) as a business communication tool in the UK is exposing companies to new security threats, according to a poll of more than 2000 UK consumers. The polls findings indicate that over 60 percent of companies are unprotected from the threats arising from misuse of instant messaging.

The poll, conducted by Akonix Systems, showed that 25 percent of all respondents said they had used IM to say something their boss wouldn't approve of, 16 percent of people admit to having used IM at work to send or receive sensitive company information or documents, 21 percent of companies have a general policy in place regarding IM use, 19 percent have technology installed to manage and/or block IM, 62% have no policy or technology in place.

The use of IM in the UK workplace is growing rapidly, but our research shows that the majority of organizations are unprepared to deal with the potential security and management issues associated with this rise in use," said Peter Shaw, Akonix CEO.

"IM benefits companies enormously by improving productivity, speed of decision making and increasing efficiency of communication in the workplace. We know that 97% of IM transactions are constructive and legitimate, but the 3% of inappropriate transactions could be hugely damaging to businesses. The findings of this survey should be a wake-up call to UK companies: IM should be embraced but protect your business adequately or the consequences could be severe."

Monday, May 23, 2005

Network Security

Hackers get tricky with pharming
Hiring a hacker? Think again, experts warn
Why security vulnerabilities expand beyond operating system, enterprise
How Dangerous Was The Cisco Code Theft?


Free VoIP Assessment for your business


Wireless Security

picoChip, Hifn unveil WiMAX basestation reference
Why wireless devices must be connected to critical applications
Securing 'strange' Wi-Fi devices
IT giants fight wireless patent

InfoSec Directory

Phishing attacks and countermeasures
Overview of image security techniques with applications in multimedia systems
Inoculating SSH Against Address-Harvesting Worms
What is the point of encryption if you don�t know who for?


Free VoIP Assessment for your business


Press Releases

nCipher helps combat phishing attacks with Chip and PIN
LANDesk Named to 2005 Red Herring Top 100
HP Simplifies Business Protection for Small and Mid-size Businesses with New Smart Office Program
Clifford Chance appoints Redbus Interhouse to Provide Pan-European Services
�Copyright � 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy
Site Meter