Dear SearchExchange.com member, Read this featured white paper, "Managing & Securing IM: Why It Should be a Top Priority," on SearchExchange.com today.
Download this white paper here: http://searchExchange.com/r/0,,34782,00.htm?track=NL-336&ad=496912 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ABOUT THIS FEATURED WHITE PAPER SPONSORED BY AKONIX SYSTEMS ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ IM is becoming an essential communications tool for employees to keep in touch with colleagues, business partners and customers. While IM is proving to be a boon to productivity, it is also a very real source of potential network and data attacks if left uncontrolled. While users are aware of standard security measures such as email anti-virus and firewalls, most are ignorant of the risks posed by IM software. This has allowed hackers to write increasingly sophisticated worms and Trojan horses that piggyback on the IM system and infect local computers. Once infected the hackers have the ability to change passwords, access documents on local and network resources, transfer files, and infect hundreds or thousands of other users. Corporate networks are especially at risk because this form of malware spreads via the users list of contacts (or buddies) rather than scanning for vulnerable IP addresses, making it potentially far more virulent and difficult to contain. In addition, IM is subject to the same rules as any other form of electronic communication, yet it is over often overlooked, leaving many businesses out of compliance with government and industry regulations. And at some companies employees are even using IM software without the knowledge and consent of their companies. In this white paper, read about how foresight concerning IM policies can pay dividends in avoiding IM risks. Topics covered in the white paper include: ** What the risks of unmanaged IM are, including serious network security and compliance concerns for IT departments. ** Why IM security should be a top priority now rather than later ** Strategies for IM management and security ** How IM can lead to real productivity benefits and cost savings ** How IM can help achieve a competitive advantage Click here to download this white paper: http://searchExchange.com/r/0,,34782,00.htm?track=NL-336&ad=496912 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =================================================================== To subscribe to "Exchange Adviser" go to: http://searchExchange.techtarget.com/OptIn/1,290894,sid43,00.html?track=NL-336&ad=496912&cid=496912&em=&tid=3546&FE=1 Not a SearchExchange.com member? We'll activate your membership with your subscription. =================================================================== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by SearchWin2000.com, a targeted Web site from TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "White Paper Alerts": Go to unsubscribe: http://SearchWin2000.com/u?cid=496912&lid=485202&track=NL-336 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: SearchWin2000 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
