Top Trending: Employers Are Paying Freelancers Big Bucks for These 25 in-Demand Skills

Spammers Target IM

Protection for IM Spam, reporting computer intrusions and more
  • ---Shares
This story appears in the November 2005 issue of Entrepreneur. Subscribe »

IM Spam, Spam IM
You have e-mail filters, e-mail spam control and e-mail archives. Now it's a good time to apply the same scrutiny to IM. A recent Radicati study shows that the majority of North American companies now use IM. But security and archiving is often overlooked. (The Radicati study covered usage, but didn't cover security and archiving.)

Viruses and worms spread over IM are increasing. A report by IMlogicshowed a 2,700 percent increase over the previous year in new IM threats including viruses, worms, spam, malware and phishing attacks in the second quarter of 2005. A variety of companies now offer security solutions for IM. They range from network appliances like AkonixSystem's L7 CM5000 to solutions like IMlogic's IM Manager. FaceTime Communicationsis another major player at this level. These programs can cost in the thousands, but they provide heavy-duty security, control and archiving features.

If those offerings are more than you need, check into basic protection from your anti-virus provider. Both McAfeeand Symantecinclude IM scanning in their anti-virus software. Zone Labsoffers IM Secure Pro software for $20. Whatever you go with, it's a good idea to keep a handle on your business IM.

The global mobile web industry is expected to grow from
$1 billion
in 2005 to
$15.3 billion
in 2010.
Statistic Source: Pelorus Group
Only 20%
of businesses reported computer intrusions to legal authorities last year, keeping incidents quiet so as not to damage their images.
Statistic Source: FBI/Computer Security Institute
Edition: May 2017

Get the Magazine

Limited-Time Offer: 1 Year Print + Digital Edition and 2 Gifts only $9.99
Subscribe Now
OK

This website uses cookies to allow us to see how our website and related online services are being used. By continuing to use this website, you consent to our cookie collection. More information about how we collect cookies is found here.