You are here: IT-Observer » Articles » Editorial RSS | White Papers |   

Instance Messaging Expose Companies to Vulnearbilities





IT managers do not monitor instance messaging use on their company’s network and leaving employee’s instant messaging communications uncontrolled which increase the exposure to security and compliance vulnerabilities and place the businesses in a higher risk of leaking intellectual property outside of the company.

A research conducted by Akonix highlights the fact that instant messaging is a growing threat to company’s security. With 27 percent said a supervisor controlled their IM use and 29 percent did not know if they were being monitored by their employer.

This indicates that companies are lacking communication policies and IM management technology to help increase employee productivity and protect corporate resources. With META Group predicting IM to be as prevalent as email by 2008, it's critical that organizations protect themselves from its potential abuses.

Key findings of the research include: 50 new IM security threats were identified this past May, more than half of the total recorded for the first quarter of 2005 and 55 percent of businesses retain and review email messages for government and industry compliance purpose.

Because IM typically enters an organization through individual staff members logging on for personal communications, many companies don't realize they are legally responsible for not just email, but instant messages that are sent by their employees across both corporate and public networks.

"It's remarkable that organizations are still leaving their door wide open to security attacks and legal repercussions due to their lack of instant messaging management," said Peter Shaw, CEO of Akonix. "We hope that by the end of 2005, more than 50% of global corporations will have adopted an IM policy, as well as the technology to protect their networks. Real-time communication offers huge productivity benefits for organizations who responsibly embrace its use."

Further more, Businesses must have the ability to block and manage external IM communications. Otherwise, they run the risk of employees sending file attachments and other material to others outside of the organization. This can range from highly confidential product designs to internal financial data.



GFI LANguard N.S.S. NEW v8 out now!
Complete network vulnerability management, providing powerful vulnerability scanning, patch management and auditing solution. DOWNLOAD A 30-DAY TRIAL TODAY!

Visit GFI Security Software page for more information.

 

FREE IP PBX: 3CX VOIP Phone System for Windows. No timeouts or limitations

 

Latest News

Essential Bluetooth hacking tools
25.05.07  Bluetooth provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires.

DEP for IE7 in Vista
22.05.07  Security tips blog, security-hacks, has posted details on how to enable DEP for Internet Explorer 7 in Vista.

SMB over SSH: Secure File Sharing
18.05.07  Security tips blog, security-hacks, has published an simple guide to share files securely in heterogeneous networks.

Avoid data leaks by clearing the page file
14.05.07  Security-Hacks publishes a useful tip to avoid potential data leaks when you run out of memory.

How to set Master Password in Firefox
11.05.07  Nowadays many web sites require you to type a user name and password before you can enter the site.

How to test your firewall?
10.05.07  Security tips blog, Security-Hacks, has published a compilation of tools to test your firewall: "We’ve compiled a list of tools we believe will be of value to both home users and advance users.

eEye released integer overflow auditing tool
16.02.07  Vulnerability research company eEye Security has released a free security vulnerability auditing tool that helps spotting possible integer overflow vulnerabilities.

Copyright © IT-Observer Online Publication 2000 - 2007 Top | RSS Feeds | About Us   
Site Meter