The communication channels used by companies continue to increase as technology improves. In this new collection of tips, contributor Michael Cobb reviews defenses for an organization's biggest data leak and attack points.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
- Smartphone technology
- Enterprise instant messaging
- Business VoIP communications
- Effective email communication
- Social networking tools
With features like wireless email and Web browsing, mobile devices like the iPhone and the BlackBerry have become important parts of the enterprise -- and need to be protected as such. Most employees, however, access sensitive information on their smartphone when they're away from the office. It is therefore essential to enforce smartphone mobile security practices. Michael Cobb explains how to protect smartphone data from leaking out of the organization.
Enterprise instant messaging (IM)
Another popular enterprise channel of communication is instant messaging. In fact, according to recent research, IM is set to take over email as the preferred way to communicate in the office. Enterprise instant messaging, however, can disrupt a network, and the security of IM communications often doesn't keep pace with its adoption, leaving many enterprises vulnerable to attacks and exploits. Make sure you know how to take control of IM in the workplace.
Business VoIP communications
Voice over IP (VoIP) communication is an appealing option for companies looking to cut their costs. But before rushing the decision, it's important to know if you have the technology necessary for securing VoIP. The technology, after all, is just as cost-effective for spammers. Michael Cobb reviews the emerging enterprise channel of communication and focuses, particularly, on how to protect VoIP traffic as it moves onto the network.
Effective email communication
Not enough IT administrators know about the email server authentication initiatives that exist to try and combat messaging abuse. Are the Sender Policy Framework (SPF), Sender ID or DomainKeys and DomainKeys Identified Mail (DKIM) new to you? Our expert contributor explains why these freely available frameworks are the key to effective email communication. Learn how to stop enterprise spam and email forgery.
Social networking tools
No matter how you feel about social networking tools like Facebook, Twitter or LinkedIn, you may have to live with them, depending on your organization. This particular enterprise channel of communication, however, may lead to employees accidentally leaking sensitive data. When letting employees access social networking sites, you are responsible, legally speaking, for the information that they put out there on the Web. Michael Cobb explains how to secure social networking communications and prepare for any e-discovery disasters that may arise.