IM and Security
The security issue dealing with IM, is a key element in IM process. Information is not always given the protection it deserves based on its value. The following best practices are to consider:
Identify roles and responsibilities in regard to the access, protection, and distribution of information.
Categorize information - don't treat all information the same. categorize information to manage it according to its value.
Store information and data according to its value.
Protect data according to its value
Replicate critical information and data throughout the day to ensure no data loss incurs
Backup important data and information to an alternative location
Test data recovery and business continuity/disaster recovery regularly (daily) to ensure it can overcome any potential data loss as soon as possible.
Ensure types of users are identified and enforced, such as administrator, read and write access, read only access or no access