meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />

Monday, May 05, 2008

How to protect against IM threats

Did you know that IM programs automatically create and store logs of all conversations on a user's computer? Do your users know that? They should. Your first step in protecting against IM threats is to learn about the best safety and security practices, educate users, and create policies around instant messaging.

Labels: ,

0 Comments:

Post a Comment

<< Home