Threats to IM

Write a 5-6 page academic paper that first identifies the threats to IM use that the enterprise must defend against to keep their information assets secure.  Then, taking into account the best practices for IM use and current technologies available to monitor IM...