TITLE

Is Instant Messaging Worth The Trouble It Poses?

AUTHOR(S)
Adams, John
PUB. DATE
January 2005
SOURCE
Bank Technology News;Jan2005, Vol. 18 Issue 1, p20
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that financial firms are not sure how to utilize instant messaging (IM). New technology that protects networks from instant messaging related infection aims is to keep employees from wasting time using new technology for personal reasons. The long-term ramifications of IM filters go far beyond keeping tabs of customer serviee representatives talking to friends. instant messaging use by employees is one of the biggest threats to electronic security, in large part because SPAM that winds up in a users IM account can corrupt an entire company's network.
ACCESSION #
15790013

 

Related Articles

  • ClickAware gauges e-mail habits. Garcia, Andrew // eWeek;1/31/2005, Vol. 22 Issue 5, p44 

    The article informs that the new ClickAware tool from WatchGuard, released earlier this month for free, provides a novel way to anonymously assess the effectiveness of e-mail training. ClickAware generates a series of e-mail messages that mimic widespread worms or phish to distribute to...

  • Mail abuse: how spammers get inside your inbox. Maher, William // Australian Personal Computer;May2003, Issue 293, p104 

    The article focuses on ten ways to avoid junk mails get inside the mailbox.The tentacles of spammers have reached far and wide, from chat rooms, to IRC, to home pages, even inside PC using spyware. Spammers love chat sites, Web sites, Internet bulletin boards, newsgroups, and instant message...

  • MailFrontier ASG 2.0 picks out more spam. Sturdevant, Cameron // eWeek;5/19/2003, Vol. 20 Issue 20, p58 

    Anti-spam toolmaker MailFrontier plans to launch the computer software Anti-Spam Gateway Version 2.0, which is worth evaluation by organizations that want to keep spam management in-house. MailFrontier costs $15 per seat per year for 250 to 499 seats. The subscription includes all MailFrontier...

  • DOWNTIME.  // Computer Weekly;5/17/2005, p64 

    This article presents information on developments and activities related to information technology (IT) firms. An IT manager, who will remain anonymous, kitted out his house with a state-of-the-art wireless home network, including security and content filtering for his children. However, he told...

  • Experience Key in starting security Career.  // Certification Magazine;Jan2009, Vol. 11 Issue 1, p12 

    The article offers insights from two information technology (IT) experts regarding the right IT career. A reader shares that he would like to proceed a network security career and is now attending an A+ certification class and Net+ next. One expert suggests that, he should first take a look at...

  • Capitalizing on junk e-mails. Rosenzweig, Stan // Fairfield County Business Journal;5/2/2005, Vol. 44 Issue 18, p36 

    The article presents the author's comments on junk E-mailing. The author discusses the habit of people sending e-mails to a list of recipients by mentioning all the e-mail addresses in the "To" window. Giving everyone's e-mail address to everyone else on the list causes them security nightmares....

  • Short Takes.  // Network World;1/26/2004, Vol. 21 Issue 4, p29 

    Presents a update on the news in the networking industry. Reports of selection of five anti-spam vendors as 2004's top suppliers of products or services that detect unwanted e-mail, by The Radicati Group; Collaboration between Microsoft Outlook and ePeople; Highlights of their server-based...

  • e-Channel Aid. Bland, Vikki // New Zealand Management;Sep2004, Vol. 51 Issue 8, p58 

    Discusses the importance of electronic channels (e-channels) like electronic mail systems, the Web, and text messaging to marketing managers in New Zealand. Number of customers interested in using e-channels for marketing; Effect of anti-spam legislation on e-channels; Businesses that use...

  • The Odds Are That There is More Than One Way to Stop Spam.  // Database Trends & Applications;Sep2003, Vol. 17 Issue 9, p34 

    This column points out that there are many ways to filter spam. One can refuse to accept mail from mailers on real-time blacklists, lists that quickly locate and register sources of spam. One can filter e-mail based on a set of rules, each which adds weight to an overall spam score where...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics