Nine Instant Messaging Best Practices - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Nine Instant Messaging Best Practices-6 Next

People frequently use IM at work, but it’s easy to send a message to someone you didn’t intend to contact — particularly when chatting with multiple people at once. When in doubt about the appropriate use of IM at work, check your company’s policy.

Could it be the “instant” in instant messaging that makes this form of online chat so appealing? It isn’t used in every office, but it is becoming more common as a business communication tool. One of the reasons its popularity is growing is because it allows you to send and receive messages so quickly. But before sending your next IM, Robert Half Technology suggests that you follow these etiquette rules.

More Slideshows:


Top Outsourcing Trends for Q2 2011The latest outsourcing trends identified by the Everest Group.

Significant Increase in Malware Attacks on Mobile Platforms Seen in Q2 2011Report shows record growth for malware and rootkits; major hacktivist activity.

Five Mistakes Companies Make in Their Cloud StrategiesLearn how to capture the full potential of the cloud.

 

Related Topics : Call Centers, Service Level Agreements

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.