"Endpoint Communications"
Imagine that you are an IT Manager and you need to create a PowerPoint for training purposes that outlines the potential threats involved in e-mail and social networking. Determine the top five (5) risks that you would cover in your presentation. Provide a rationale for your response.
Many organizations do not allow office employees on the corporate intranet to use social networking sites and instant messaging software. Take a position for or against these policies and provide a rationale for your response.