![Threat Monitor artwork](https://is4-ssl.mzstatic.com/image/thumb/Features/v4/5f/88/96/5f8896e9-9be5-529a-af14-cc807367568a/mza_1382744875394257421.png/100x100bb.jpg)
Secure instant messaging in the enterprise
Threat Monitor
English - July 13, 2006 15:56 - 3.25 MBTechnology News Tech News computer security threats information hack attacks viruses worms trojans backdoors Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Next Episode: Avoiding the scourge of DNS amplification attacks
Instant messaging can be a conduit through which viruses come in to and sensitive data goes out of the corporate network. Enterprises need a thorough IM policy and the technical measures to back it up, regardless of whether IM is allowed or strictly prohibited. This tip outlines the factors you should consider when writing an IM policy and the technical measures for enforcing it.