Know the IM risks

September 2008 IT infrastructure

IM continues to evolve and company managers are realising that, when used correctly, it can be a powerful customer service tool to boost the bottom line.

Hubert Wentzel, divisional director, EOH Consulting, says the main strength of instant messaging (IM) lies in its immediacy. If IM does not detract from the user's real task and integrates with other business tools, then there is genuine benefit in this important technology.

According to IDC, there will be more than 506 million people using IM by the end of 2008. As it has, since the Internet's earliest days, IM continues to evolve and company managers are realising that, when used correctly, it can be a powerful customer service tool to boost the bottom line. And, with an increasing number of people choosing to work from home, IM will play an even more important role in the future.

Gartner research recently indicated that collaboration capabilities available to businesses will change fundamentally during the next five to 10 years. Rather than having one application where you do your work and another separate application where you collaborate with others about your work, the two purposes will flow together seamlessly. The application will offer collaboration when appropriate, guiding the user to contact the right person at the correct time.

Wentzel says it is important for SMEs to consider emerging technologies, like IM, to see how these can be applied appropriately to cut costs and improve bottom-line growth. "As an effective alternative to spam- and virus-ridden e-mail, IM is helping more and more businesses communicate cost-effectively and efficiently. This snappy technology does not, however, come without risks."

While IM has escalated amongst business users, IT security departments are still coming to grips with the threats it brings. The file sharing capabilities within IM make it easy for users to bypass traditional security measures and e-mail policies. Major advancements over the past few years have enabled instant messaging users to run computer scripts, play online games and initiate web conferences.

This added functionality has opened security holes which leave companies vulnerable to spam. The best defence in this regard is education.

As with any Internet-based technology, users need to be educated about the security issues involved with instant messaging. Yes, spam is a security threat, but not because of viruses, but because of people. It is a human tendency to open links and attachments from unknown senders, which underlines the fact that people are the weakest link in any security solution.

Indications are that the real threat for the future of IM is worms, which are non-discriminate and target all computer systems of a particular network. The number of worms for instant messaging is increasing each month, and looking at the success of some of these worms, clearly instant messaging is an up and coming platform for malicious threats.

So, while IM holds great potential as a business tool, it is often abused by employees and poses significant liability and security risks. Wentzel says that it is the onus of each individual business to ensure there are written policies in place regarding IM use on their network.

"Used properly, instant messaging can be an extremely useful addition to a company's communications tools. Instant messaging reduces time and effort and helps a business react quickly to new challenges, competition and customer requests. Before signing up for an instant messaging service, however, ensure that you have got the necessary network and computer security in place."

For more information contact Hubert Wentzel, EOH Consulting, divisional director, +27 (0)11 607 8100.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber resilience is more than cybersecurity
Technews Publishing Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Reliable, low-maintenance video appliances
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring News IT infrastructure Products
Symetrix, part of the Agera Group, has added the AES range of video recording servers, storage appliances and workstations to its portfolio.

Infinidat a leader in ransomware protection
IT infrastructure Products
InfiniSafe brings together the key foundational requirements essential for delivering comprehensive cyber-recovery capabilities with immutable snapshots, logical air-gapped protection, a fenced forensic network, and near-instantaneous recovery of backups of any repository size.

What’s the difference between SASE, SD-WAN and SSE?
IT infrastructure
When it comes to the wide area network (WAN), the letter ‘S’ plays a pivotal role – from SASE to SD-WAN to SSE – but there can be some confusion with so many WAN ‘S’ acronyms.

Cold chain integrity in real time
Technews Publishing Editor's Choice Asset Management, EAS, RFID IT infrastructure Transport (Industry) Logistics (Industry)
DeltaTrak offers real-time farm-to-fork IoT monitoring of the cold chain to ensure every step of the journey is recorded and verifiable via the cloud.

BCX and Alibaba Cloud confirm partnership
News IT infrastructure
BCX and Alibaba Cloud have formed a partnership to bring cloud technologies to businesses in South Africa to drive local digitalisation.

IoV – the cutting edge of vehicle automation
Integrated Solutions IT infrastructure Transport (Industry) Logistics (Industry)
Today’s cars have become bona fide connected machines and not merely an extension of our mobile devices such as smartphones.

Advanced technologies to curb corruption
News Cyber Security IT infrastructure
The use of advanced technology to curb fraud, corruption and cyber-related crimes received a massive boost as the Council for Scientific and Industrial Research (CSIR) and Special Investigation Unit (SIU) agreed to work together.

DMaaS is the solution to hybrid cloud complexity woes
IT infrastructure
After an initial scramble to move everything to the cloud, companies are increasingly moving to a hybrid cloud environment, with a mix of private and public cloud infrastructure and services, coupled with on-premises storage.

The current and future state of smart OT security
Technews Publishing Industrial (Industry) Cyber Security IT infrastructure
Nearly 60% of survey respondents also revealed that their organisation suffered at least one OT breach during the past 12 months, with 10% experiencing four or more.