Skip to main content

Instant messaging security. What are key factors?

Business IT message board users generally trust that the key factors around IM security is policy, enforcement and training. Apparently, individual business structures should solve how far they want to go with each of these, depending on the nature of the risk and its potential impact on the business processes, write Kate Danbury, head of information security, and Ollie Ross, head of research, at The Corporate IT Forum.

Everywhere, there is rising pressure from within corporates for IT to provide communication and collaboration technologies that users are familiar with and use extensively in home and social environments: most notably instant messaging. Instant Messaging supports productivity; it's fast, it's easy to use and it's the tool of choice for the new generation of office workers.

But from security sign, its risks are comparable with e-mail. It might also impact workforce productivity - at least until the novelty of 'chat' wears off - it can shortcut processes and undermine reporting and approval mechanisms, it's causal quality can be inappropriate for business conversations, and it can have an adverse impact on your network traffic. So deploying or switching on IM requires very careful consideration.

Firstly, decide where you would use instant messaging. Don't assume it's an all-or-nothing choice. Many of our members use IM internally across the enterprise without opening up the capability externally. Others use it as an effective tool between trusted partners (e.g. in an outsourced or support relationship). External IM is rarely used by businesses in the broader, public arena, thus minimising the risks associated with opening up the network.

Then decide what tool might best suit your requirements. Typically Forum members use proprietary solutions in-house rather than relying on consumer social networking tools.

Next, determine how IM may be used. Ensure your acceptable use policy offers clear guidelines around appropriate and inappropriate use, and that these really are understood and accepted by your users.

And finally, put a process in place that enables you to understand how instant messaging is being used, by whom and for what purpose. It's is widely recommended that usage is recorded and monitored. It is therefore auditable. Make sure your employees know this and understand the implications.

As drivers and business cases for collaboration increase so, too, does the risk that IT security becomes a business disabler. IM might offer true opportunities for your organisation. Or it could lead to real problems. It's a fine balance between having a 'safe and secure' network and helping the business to be as agile and reactive as it wants to be. And it's also very much about trust.

Comments

Popular posts from this blog

Want To Get Answering Machine For Your IM?

Computer's personal often face problems when they have to take a break from their PC for some time and can’t answer to emails and instant messages. Actually, for email you can set up an autoresponder if you use Outlook software, and there’s a way out for gmail, too. But what can you do with your instant messenger? I have a lot of IM accounts for any purposes with different people in each account. So what utility can tell these people that I am out on a vacation or down with fever? Answer.im comes to the rescue by setting up an automated web based answering machine for your instant messenger. It works with MSN, ICQ, AIM, Yahoo and Google Talk as of now. How it Works Setting it up is very simple. First, hop over to http://answer.im/. Then, select your IM network (like GTalk, Yahoo, etc). Fill in your username and password and hit Login. Features Now, you can customize your automated reply and select the status you would like your account to remain at. Since the service is web based, ...

Durov: The phone of the richest man in the world was hacked through WhatsApp.

The founder of "VKontakte" and Telegram Pavel Durov said that back in November 2019 he warned about the vulnerability of the WhatsApp application, through which hackers hacked the smartphone of the richest man on the planet Jeff Bezos. Durov wrote about it in his Telegram-channel. Earlier, the company Facebook, which owns WhatsApp, noted that the businessman's mobile phone was hacked because of vulnerabilities in the operating system from Apple. At the same time, Durov is convinced that the problem is not iOS. " WhatsApp in its marketing campaign uses the words 'end-to-end encryption' as a magic spell, which itself should ensure the security of all communications. But this technology alone cannot guarantee absolute confidentiality," says the founder of Telegram. One of the drawbacks of end-to-end encryption, he says, is that backups of transmitted data are often not encrypted. In addition, says Durov, each application has "ways around...

Primus to Provide VoIP for MSN Messenger

Primus Telecommunications Group, Inc. has entered into an agreement with Microsoft Corp. to provide Voice-over-Internet Protocol (VoIP) services for MSN Messenger Service customers. Marketed as "PrimusTalk," once a user has logged into MSN Messenger Service, calls can be made by clicking on the "Make a Phone Call" link. A phone dialer will appear where a call can be made to any number -- national, international or mobile. The McLean, Va.-based Primus will provide PrimusTalk service as an Internet telephony application that can be accessed by any user accessing MSN Messenger Service. Specifically, the PC-to-phone service will be integrated with the MSN Messenger Service as an option that may be accessed by users of Microsoft client software programs. "Primus is leading the way to a carrier class era of converged communications solutions," said John Melick, co-president of Primus and one of the principal developers and implementers of the company's VoIP ...