Discussion:
"Endpoint Communications" Please respond to the following:
• Imagine that you are an IT Manager and you need to create a PowerPoint for training purposes that outlines the potential threats involved in e-mail and social networking. Determine the top five risks that you would cover in your presentation. Provide a rationale for your response.
• Many organizations do not allow office employees on the corporate intranet to use social networking sites and instant messaging software. Take a position for or against these policies and provide a rationale for your response.