Artwork
iconShare
 
Manage episode 151079275 series 1014615
Content provided by SearchSecurity.com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SearchSecurity.com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Instant messaging can be a conduit through which viruses come in to and sensitive data goes out of the corporate network. Enterprises need a thorough IM policy and the technical measures to back it up, regardless of whether IM is allowed or strictly prohibited. This tip outlines the factors you should consider when writing an IM policy and the technical measures for enforcing it.
  continue reading

23 episodes