TechTarget's Security Media Group presents a comprehensive guide to secure collaboration software. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype. Access >>>
Table of contents
- Corporate Policies for Instant Messaging Security Issues
- A Policy Template for Information Awareness Training
- Securing VoIP Communication in the Workplace
- Pros and Cons of Skype Security for Encrypted Phone Calls
Premium Content for Free.
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...