{"id":2352,"date":"2004-11-12T00:00:00","date_gmt":"2004-11-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/12\/companies-warned-on-im-dangers\/"},"modified":"2021-12-30T11:41:08","modified_gmt":"2021-12-30T11:41:08","slug":"companies-warned-on-im-dangers","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/12\/companies-warned-on-im-dangers\/","title":{"rendered":"Companies warned on IM dangers"},"content":{"rendered":"<p>Instant messaging is still used more often for personal reasons in the workplace than for business purposes, a new survey shows.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A report issued on Thursday by Meta Group found that 57 percent of the people surveyed at 300 companies worldwide use IM at work for personal chitchat more often than for job-related communications.<\/p>\n<p>In a nod to IM as a productivity tool, Meta found that 56 percent of employees use the applications at home for work-related activity.<\/p>\n<p>&#8220;We believe that by 2008, most new employees will be assigned an IM account when they start a job, just as they are issued an email account today.&#8221;  As a result of IM&#8217;s growing popularity, Tzirimis said an increasing number of companies are looking at ways to track employee use of the applications.<\/p>\n<p>A recent survey released by ePolicy-AMA found that 60 percent of US companies now use software to monitor incoming and outgoing external email and that 27 percent of employers use software to track internal email between employees.<\/p>\n<p>Tzirimis recommends that more companies use tools for tracking IM use, because the software potentially an even larger security threat than email, based on the sort of attacks designed to take advantage of the applications.<\/p>\n<p>http:\/\/news.zdnet.co.uk\/business\/employment\/0,39020648,39173540,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2352","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2352"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2352\/revisions"}],"predecessor-version":[{"id":4839,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2352\/revisions\/4839"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}