Skip to main content

Some advices for boosting IM security

* Adopt a user policy for instant messaging. Your employees need to know whether you view instant messaging as an appropriate vehicle to communicate with customers or business partners. Any policy should contain at least general guidelines for its use. -- Julie Lancaster, director of marketing, Visualware Inc., Turlock, Calif.

* Integrate IM into your existing corporate directory. This is very important, as the corporate directory is the lifeblood of "who's who" in an enterprise. Requiring a third party to maintain a list of your employees creates an opportunity for a security breach. -- Brian White, senior product manager for presence and instant messaging, and Kevin McLellan, marketing manager for workplace collaboration products, IBM's Lotus Software Group, Cambridge, Mass.

* Integrate your IM application with the internal personnel system as a way to securely register IM names. This is an easy way to capture identities and manage changes in users' IM screen names while maintaining a record of their previous conversations under their old screen names. -- Tommy Wright, vice president and manager of information systems development, FTN Financial, Memphis

* An ounce of prevention is worth a pound of cure. Keep your IM client and server software patched. There is simply no substitute to maintaining the patch levels of your IM software and ensuring that you are protected against known vulnerabilities. -- Andre Yee, chief technology officer, NFR Security Inc., Rockville, Md.

* Be aware of virus infections and related security risks. Most IM services allow you to transfer files with your messages. IM file attachments carrying viruses penetrate firewalls more easily than e-mail attachments. Instant messages that carry viruses will run and dip into a firewall until they find an opening. If you collaborate on documents for your business, file transfer is important. It's wise to learn more about the quality of your own firewall protection to decide whether or not to restrict transferring files through IM.-- Julie Lancaster, Visualware

* Be your own host. Host your own IM server if possible. That will allow you to ensure that the server is secured, as opposed to using a general public server for which you have no control. -- Andre Yee, NFR Security

* To work in real time with those outside your own company, it is vital to connect to that company's secured users. The new SIP/SIMPLE standard for IM interoperability provides that capability without requiring both parties to leave their secure IM to jump onto an unsecured public network. -- Brian White and Kevin McLell, Lotus Software Group

* Be original. Avoid using the same password for IM as you would for other authenticated means of communication. This ensures that if the IM password is compromised, it doesn't lead to a breach of other communication mechanisms. -- Andre Yee, NFR Security

* Be aware that instant messages can be saved. You may think IM is great because you can let your guard down; make bold statements; chastise a boss, employee or co-worker; and have it all wiped away from the record when you are done. What's often forgotten is that one of the parties to your conversation can copy and paste the entire chat onto a notepad or Word document, and some IM services allow you to archive entire messages. -- Julie Lancaster, Visualware

* Handle with care. Reject content from unknown sources. As you would with e-mail, avoid opening files or accessing links sent to you from unknown contacts. -- Andre Yee, NFR Security

* Don't use instant messaging to communicate confidential or sensitive information. If your company is in the business of providing professional advice regarding stocks, finances, medicine or law, it's not smart to do so through instant messaging. IM is better suited to quick information about project status, meeting times or a person's whereabouts.-- Julie Lancaster, Visualware Inc.

* Mum's the word. Regard IM as a nonconfidential communication channel. Users should be strongly advised against communicating proprietary and sensitive information over IM.-- Andre Yee, NFR Security


Source: Computerworld

Comments

Popular posts from this blog

Want To Get Answering Machine For Your IM?

Computer's personal often face problems when they have to take a break from their PC for some time and can’t answer to emails and instant messages. Actually, for email you can set up an autoresponder if you use Outlook software, and there’s a way out for gmail, too. But what can you do with your instant messenger? I have a lot of IM accounts for any purposes with different people in each account. So what utility can tell these people that I am out on a vacation or down with fever? Answer.im comes to the rescue by setting up an automated web based answering machine for your instant messenger. It works with MSN, ICQ, AIM, Yahoo and Google Talk as of now. How it Works Setting it up is very simple. First, hop over to http://answer.im/. Then, select your IM network (like GTalk, Yahoo, etc). Fill in your username and password and hit Login. Features Now, you can customize your automated reply and select the status you would like your account to remain at. Since the service is web based, ...

Durov: The phone of the richest man in the world was hacked through WhatsApp.

The founder of "VKontakte" and Telegram Pavel Durov said that back in November 2019 he warned about the vulnerability of the WhatsApp application, through which hackers hacked the smartphone of the richest man on the planet Jeff Bezos. Durov wrote about it in his Telegram-channel. Earlier, the company Facebook, which owns WhatsApp, noted that the businessman's mobile phone was hacked because of vulnerabilities in the operating system from Apple. At the same time, Durov is convinced that the problem is not iOS. " WhatsApp in its marketing campaign uses the words 'end-to-end encryption' as a magic spell, which itself should ensure the security of all communications. But this technology alone cannot guarantee absolute confidentiality," says the founder of Telegram. One of the drawbacks of end-to-end encryption, he says, is that backups of transmitted data are often not encrypted. In addition, says Durov, each application has "ways around...

Primus to Provide VoIP for MSN Messenger

Primus Telecommunications Group, Inc. has entered into an agreement with Microsoft Corp. to provide Voice-over-Internet Protocol (VoIP) services for MSN Messenger Service customers. Marketed as "PrimusTalk," once a user has logged into MSN Messenger Service, calls can be made by clicking on the "Make a Phone Call" link. A phone dialer will appear where a call can be made to any number -- national, international or mobile. The McLean, Va.-based Primus will provide PrimusTalk service as an Internet telephony application that can be accessed by any user accessing MSN Messenger Service. Specifically, the PC-to-phone service will be integrated with the MSN Messenger Service as an option that may be accessed by users of Microsoft client software programs. "Primus is leading the way to a carrier class era of converged communications solutions," said John Melick, co-president of Primus and one of the principal developers and implementers of the company's VoIP ...