How Enterprises Can Avoid Top Cyberthreats in 2014

Archived Published: 18 February 2014 ID: G00260458


Purchase this Document

Price: $195.00 USD (PAGES: 9)

To purchase this document, you will need to register or sign in above.


There were a number of damaging cyberattacks against enterprises in 2013, and enhanced cyberthreats will continue in 2014. We present recommendations so enterprises can avoid disasters.

Table of Contents

  • Analysis
  • Impacts and Recommendations
    • Because fraudsters are using new tactics, enterprises are finding it more difficult to detect criminal activity
    • People continue to be the weakest link in the security chain, so the criminal social engineering of victims will increase in levels of deviousness and frequency in 2014
    • Enterprises' security controls and monitoring systems don't filter out and prioritize the most egregious and dangerous events, so insider threats will continue to evade them
    • As enterprises tighten online controls, fraudsters are turning more toward telephony channels to perpetrate attacks
  • Gartner Recommended Reading
© 2014 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more