In the age of IM, just about any document can be sent out of the organization with a click of the keyboard. Establish and enforce an IM security policy, take advantage of technology tools to prevent security breaches, and train employees on the dos and don’ts of protecting confidential information.