Instant messaging has been around for almost a decade. In that time it has not only become as indispensable as a telephone to teenagers, but it has become an integral part of life for many working adults. Recent research suggests that CSOs would do well to pay attention to how IM is used in their enterprises. Forrester Research estimates that 48 percent of online households in North America use instant message clients. About 14 percent of those surveyed said they use IM at work. In most of those cases, users prefer consumer clients such as those offered by AOL, MSN or Yahoo, which they download to their computers often without approval from the IT department. Forrester says that just 12 percent of those who use IM at work use a client thats officially sanctioned and supported by their companies. In other words, 88 percent of enterprise IM users are using the equivalent of rogue software to communicate with friends, family and, even more troubling, to information security executives, co-workers and business partners. Because of its creep into the enterprise, IM has become a target of regulators. For instance, the SEC has (something missing??) mandated that companies in the financial industry address the usage and retention of IM. Companies that must follow HIPAA and Sarbanes-Oxley guidelines must also make provisions for IM retention and use. In addition to introducing compliance issues, IM clients can expose the enterprise to threats such as worms and viruses. Earlier this month, versions of the Bropia and Kelvir worms attacked users of MSN Messenger. Then there are nuisances, like spim (the IM version of e-mail spam). A recent report by the Pew Internet & American Life Project says that one third (or 17 million) of the 52 million American adults who use IM have received spim. It seems that for every opportunity that IM opens for productivity and collaboration, a potential threat emerges. Tell us what you think. Does IM belong in the enterprise? If so, what are you doing about it? Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe