Reality Check: Enterprise IM security and social networking security

Elaine J. Hom, Associate Editor

With forms of communication such as instant messaging (IM) and social networking like Twitter, Facebook and LinkedIn becoming more popular in enterprises, the possibility of security breaches is growing. If you are responsible for an enterprise network, you had better make sure you're ready to tackle enterprise IM security issues, such as breaches and policies, as well as social networking security problems. Should you ban social networking for your users? What are the best practices for preventing data leakage and malware?

In this month's edition of Reality Check, we sat down with Tony Bradley, one of our UC experts, to discuss the topics of enterprise IM security and social networking security. We asked Tony whether or not social networking sites belong in the workplace, and how to prevent hacks and breaching. In the podcast, Tony discusses best practices when trying to maintain IM security and social networking sites' security. For more best practices in social networking, check out our Reality Check on using Twitter and a blog entry on Facebook best practices.

This was first published in June 2009

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: