style="FONT-FAMILY: 'Arial','sans-serif'; FONT-SIZE: 9pt; mso-fareast-font-family: 'Times New Roman'; mso-bidi-language: AR-SA; mso-ansi-language: EN-US; mso-fareast-language: EN-US">

In the workplace,
instant messaging (IM)often replaces  alt="Security Audit Program" align=right
src="http://www.itproductivity.org/images/audit.gif" width=85 height=110> alt="Security Manual Template - Sarbanes-Oxley" vspace=3 align=right
src="http://www.itproductivity.org/images/Security.gif" width=85
longDesc="Security Manual Template - Sarbanes-Oxley" height=110>


e-mail and phone calls
for user-to-user or group conversations. This includes frequent exchanges of
files, records and other data, plus regular back-and-forth texting between
coworkers or collaborators busy getting their jobs done. Though much IM traffic
involves pairs of users, it’s neither difficult nor unusual for multiparty IM
sessions to replace conference calls. Many IM security problems can expose
organizations directly to serious security risks and potentially devastating
legal liabilities or financial losses. Because most consumer-grade IM technology
is not encrypted, that makes a good place to start exploring how and why this
claim holds water. Many IM packages also lack strong proofs of user identity,
perform neither file nor content screening on transmissions and directly expose
users to malicious software and behavior. style="mso-special-character: line-break"> style="mso-special-character: line-break">

Resources
Post Your Resume to 65+ Job Sites
Resume Service

Post to Twitter Tweet This Post