- Inc. Technology - http://technology.inc.com -
Minimize Security Threats from IM
Posted By Mary O. Foley On March 1, 2008 @ 12:00 am In Computer Security | No Comments
It’s no secret that instant messaging (IM) is wildly popular. It’s faster than e-mail, and so discreet that two people in the same business meeting can use it to communicate across the room virtually undetected. To top it off, it’s easy to get: many public IM software packages, such as Google Talk and MSN Messenger, are offered as free downloads.
But IM carries the same security risks as e-mail — it can fall prey to worms, viruses, Trojans, and “spim” — unwanted spam sent via IM instead of e-mail. It can be intercepted by competitors, allowing trade secrets or confidential client information to fall into the wrong hands. And all of these risks can create the same types of security problems for your business — including regulatory and e-discovery non-compliance risks — that e-mail can.
Chances are, you already know what type of e-mail system your office uses, have established guidelines for its use, and are vigorously protecting it with firewalls, anti-viral software, and the like. But are you aware if public IM systems are being used in your office?
“It’s one of those stealth technologies, where people just install it, and it’s not blocked by an organization’s gateway,” notes Richi Jennings, an analyst with San Francisco-based Ferris Research . “You could ask many companies, ‘do you use IM?’ and they would say no, but they actually do.”
Here are some tips from the experts on ways to minimize your risk:
For businesses wanting to bundle their corporate IM service with other technologies, experts note, there are “a number of anchor points,” notes Koplowitz. “If you have an on-premise e-mail system, you may look to [link IM in with] e-mail,” he says. “But you can also link IM with telephony, or with some other business vendor.”
Companies that offer full-service packages that include IM include FaceTime, whose Unified Security Gateway solution provides URL filtering, public IM, VoIP and P2P, and can work with unified communications suites offered by IBM Lotus Sametime and Microsoft’s Office Communications Server, according to Frank Cabri, FaceTime’s vice president of product management.
These types of integrated solutions are likely to become more common at the enterprise level, and to trickle down to small and mid-size business-scale products as well, says Koplowitz.
Whatever option you choose, experts advise that you take IM security as seriously as email security. The risks are real.
Article printed from Inc. Technology: http://technology.inc.com
URL to article: http://technology.inc.com/2008/03/01/minimize-security-threats-from-im/
URLs in this post:
 Ferris Research: http://technology.inc.com”http://www.ferris.com”
 Forrester Research: http://technology.inc.com”http://www.forrester.com”
 Lotus Sametime: http://technology.inc.com”http://www.lotus.com/sametime”
 Joel Dubin: http://technology.inc.com”http://www.joeldubin.com”
 FaceTime’s: http://technology.inc.com”http://www.facetime.com”
Copyright © 2011 Inc Technology. All rights reserved.