Dear SearchExchange.com member,

Read this featured white paper, "Managing & Securing IM: Why It Should be a Top 
Priority," on SearchExchange.com today. 

Download this white paper here:
http://searchExchange.com/r/0,,34782,00.htm?track=NL-336&ad=496912

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ABOUT THIS FEATURED WHITE PAPER SPONSORED BY AKONIX SYSTEMS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IM is becoming an essential communications tool for employees to keep in touch 
with colleagues, business partners and customers. While IM is proving to be a 
boon to productivity, it is also a very real source of potential network and 
data attacks if left uncontrolled. 

While users are aware of standard security measures such as email anti-virus 
and firewalls, most are ignorant of the risks posed by IM software. This has 
allowed hackers to write increasingly sophisticated worms and Trojan horses 
that piggyback on the IM system and infect local computers. Once infected the 
hackers have the ability to change passwords, access documents on local and 
network resources, transfer files, and infect hundreds or thousands of other 
users.

Corporate networks are especially at risk because this form of malware spreads 
via the users list of contacts (or buddies) rather than scanning for vulnerable 
IP addresses, making it potentially far more virulent and difficult to contain. 
In addition, IM is subject to the same rules as any other form of electronic 
communication, yet it is over often overlooked, leaving many businesses out of 
compliance with government and industry regulations. And at some companies 
employees are even using IM
software without the knowledge and consent of their companies.

In this white paper, read about how foresight concerning IM policies can pay 
dividends in avoiding IM risks. Topics covered in the white paper include:

** What the risks of unmanaged IM are, including serious network 
   security and compliance concerns for IT departments. 
** Why IM security should be a top priority now rather than later
** Strategies for IM management and security
** How IM can lead to real productivity benefits and cost savings 
** How IM can help achieve a competitive advantage 

Click here to download this white paper:
http://searchExchange.com/r/0,,34782,00.htm?track=NL-336&ad=496912

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

===================================================================
To subscribe to "Exchange Adviser" go to:
http://searchExchange.techtarget.com/OptIn/1,290894,sid43,00.html?track=NL-336&ad=496912&cid=496912&em=&tid=3546&FE=1

Not a SearchExchange.com member? We'll activate your membership with your 
subscription.
===================================================================

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by SearchWin2000.com, a targeted Web site from 
TechTarget, the most targeted IT media and events company. TechTarget offers 
magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT 
professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "White Paper Alerts":
 
Go to unsubscribe: http://SearchWin2000.com/u?cid=496912&lid=485202&track=NL-336
 
Please note, unsubscribe requests may take up to 24 hours to process; you may 
receive additional mailings during that time. A confirmation e-mail will be 
sent when your request has been successfully processed.
 
Contact us:
SearchWin2000
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to