Purchase this Document
Price: $195.00 USD (PAGES: 9)
To purchase this document, you will need to register or sign in above.
There were a number of damaging cyberattacks against enterprises in 2013, and enhanced cyberthreats will continue in 2014. We present recommendations so enterprises can avoid disasters.
Table of Contents
Impacts and Recommendations
Because fraudsters are using new tactics, enterprises are finding it more difficult to detect criminal activity
People continue to be the weakest link in the security chain, so the criminal social engineering of victims will increase in levels of deviousness and frequency in 2014
Enterprises' security controls and monitoring systems don't filter out and prioritize the most egregious and dangerous events, so insider threats will continue to evade them
As enterprises tighten online controls, fraudsters are turning more toward telephony channels to perpetrate attacks
- Because fraudsters are using new tactics, enterprises are finding it more difficult to detect criminal activity
Gartner Recommended Reading