Learning Guide

How to protect different enterprise channels of communication

When you are an organization with hundreds of employees, there are many enterprise channels of communication that need to be secured. Important and confidential enterprise data passes through enterprise messaging (IM) conversations, social networking communications, mobile devices and emails.

The communication channels used by companies continue to increase as technology improves. In this new collection of tips, contributor Michael Cobb reviews defenses for an organization's biggest data leak and attack points.

Smartphone technology
With features like wireless email and Web browsing, mobile devices like the iPhone and the BlackBerry have become important parts of the enterprise -- and need to be protected as such. Most employees, however, access sensitive information on their smartphone when they're away from the office. It is therefore essential to enforce
smartphone mobile security practices. Michael Cobb explains how to protect smartphone data from leaking out of the organization.

Enterprise instant messaging (IM)
Another popular enterprise channel of communication is instant messaging. In fact, according to recent research, IM is set to take over email as the preferred way to communicate in the office.
Enterprise instant messaging, however, can disrupt a network, and the security of IM communications often doesn't keep pace with its adoption, leaving many enterprises vulnerable to attacks and exploits. Make sure you know how to take control of IM in the workplace.

Business VoIP communications
Voice over IP (VoIP) communication is an appealing option for companies looking to cut their costs. But before rushing the decision, it's important to know if you have the technology necessary for
securing VoIP. The technology, after all, is just as cost-effective for spammers. Michael Cobb reviews the emerging enterprise channel of communication and focuses, particularly, on how to protect VoIP traffic as it moves onto the network.

Effective email communication
Not enough IT administrators know about the email server authentication initiatives that exist to try and combat messaging abuse. Are the Sender Policy Framework (SPF), Sender ID or DomainKeys and DomainKeys Identified Mail (DKIM) new to you? Our expert contributor explains why these freely available frameworks are the key to
effective email communication. Learn how to stop enterprise spam and email forgery.

Social networking tools
No matter how you feel about social networking tools like Facebook, Twitter or LinkedIn, you may have to live with them, depending on your organization. This particular enterprise channel of communication, however, may lead to employees accidentally leaking sensitive data. When letting employees access social networking sites, you are responsible, legally speaking, for the information that they put out there on the Web. Michael Cobb explains how to
secure social networking communications and prepare for any e-discovery disasters that may arise.

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in September 2009

 

COMMENTS powered by Disqus  //  Commenting policy