Read Bennett Gold LLP's privacy policies and practices regarding this web site.
LINK TO: Bennett Gold LLP's Privacy Policies and Practices. E-CommerceALERT.com is part of the Bennett Gold LLP web site network.
LINK TO: Bennett Gold LLP, Chartered Accountants, home page.
LINK TO: E-CommerceALERT.com Home Page.
CLICK to GO BACK to Main Page.

Research and retrieval of news articles by Bennett Gold LLP, Chartered Accountants


SPECIAL NOTE TO ALL VISITORS:
Effective December 31, 2012, articles are no longer being updated on this web site.
The site is now maintained as an historical archive, covering articles from the period 1999 to 2012.


THE HIDDEN THREAT OF INSTANT MESSAGING

Source: ITBusiness

Posted on September 3, 2002

      Instant messaging is a tool most teenagers would say they'd have a hard time living without. In theory, conducting a conversation via computers in real-time means no one can eavesdrop on what is being said. But for corporations, these chats can be a productivity-killer and a silent threat lurking on the network.

      "It's happening all over the place and the IT guys don't even know about it," says Nick Galletto, partner and expert with Deloitte & Touche's secure e-business practice.

      According to Framingham, Mass-based IDC (U.S.), IM will reach over 180 million corporate users by 2004 and Gartner predicts that by 2005 IM will be integrated into 50 per cent of business applications. For example, two years ago the US navy implemented a system called "Collaboration at Sea," using Lotus Domino and Sametime for mobile command forces, ships at sea and shore-based command centres. Anyone on a US Navy ship at sea anywhere in the world can be aware of anyone on line on any other ship at sea.

      But it isn't corporate-sanctioned IM that's seen as problematic says Warren Shiau, software analyst with Toronto-based IDC. He says companies risk losing a certain degree of control when it comes to rogue IM travelling across the network.

      "ICQ or AIM (AOL's instant messenger system) exist outside internal messaging applications and what people use them for is not work-related -- it's just talking to friends. But the question is, how do companies keep track of it?" says Shiau. "There are security issues there. Chatting to friends isn't illegal, but passing information to someone could be."

      When workers download and install IM applications to their desktops without the IT department knowing about it, Shiau says they could also be unknowingly inviting security threats such as viruses.

      The concern is that IM can bypass anti-virus defence systems and firewalls. While an anti-virus software package will scan e-mail before it comes in, it won't recognize IM. There's also the issue of continuous chat room conversations eating up bandwidth on the network.

      Galletto says that when Deloitte conducts network security reviews for their clients, IM is something that is highlighted as a potential threat. One way to address the problem, he says, is to make sure individuals are aware of the implications of using IM, then take steps to put controls in place to monitor or eliminate use.

      "Most organizations today are still blind-sided by it. Some of them think it's just in small pockets, and when they start digging a little deeper it's 10-fold and proliferating throughout, which is pretty scary when you think about it. If you start engaging in large file transfers there is the risk of downloading malicious code," says Galletto.

      In most cases, all the information is transmitted in plain text, making it possible for someone to read what is being typed as it travels over the network. There's also an authentication issue: in some cases when a user logs on the information is not encrypted.

      "A lot of these IM software packages can go into remote control mode. So someone from the outside can use it to take over your system and then use it as a gateway into internal systems," says Galletto.

      One way to pick up on IM use is through the use of a network intrusion detection system, but Galletto says it must be told to specifically look for the actual protocol each application uses. For example, with AOL's AIM service, it would have to look for and block the AOL protocol.

      Users should also make sure what is being typed can be encrypted. "If you're going to be using something like this, make sure the system encrypts your user ID and password, then limit it to internal use only," he said.




CLICK to GO BACK to Main Page.

E-Commerce Alerts are issued by Bennett Gold LLP, Chartered Accountants as situations develop. Bookmark this site and check back often. Our e-mail address is: info@BennettGold.ca

In accordance with United States Code, Title 17, Section 107 and Article 10 of The Berne Convention on Literary and Artistic Works, the news clippings on this web site are made available without profit for research and educational purposes.


ALERT
ARCHIVES
Final Entries
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999


LINK TO: Bennett Gold Chartered Accountants: A Licensed Provider of WebTrust Services.

WebTrust Is Your
Best Defense
Against
Privacy Breaches.

Get WebTrust
Working For
Your Site.