Enterprises failing to implement layered fraud prevention

Stuart Sumner
clock • 1 min read

Analyst firm Gartner argues that a single layer will not keep out determined attackers

Just 15 per cent of enterprises will adopt a layered fraud prevention strategy by 2014, according to analyst firm Gartner. But a single layer of authentication or other fraud prevention techniqu...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
University CIO: 'We were owned in 4 hours'

Threats and Risks

And that certainly focused minds, says Salford University’s Mark Wantling

clock 20 March 2024 • 5 min read
Exclusive: Behind the scenes of DWP's ambitious tech transformation

Government

Modernising Europe’s biggest IT estate

clock 13 March 2024 • 5 min read
'It just suddenly narrows at the top': Advice for women seeking the C-suite

Leadership

Focus on doing the right thing – not the easy thing

clock 06 March 2024 • 4 min read

More on Threats and Risks

UK sanctions China-based hackers

UK sanctions China-based hackers

Attackers were targeting voters and politicians

clock 28 March 2024 • 3 min read
Russian cyber spies target German politicians in sophisticated phishing attack

Russian cyber spies target German politicians in sophisticated phishing attack

Germany's cyber agency BSI warned that state-backed hackers aimed to establish long-term access to German political networks

clock 25 March 2024 • 3 min read
Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

US researchers find baked-in flaw

Graeme Burton
clock 22 March 2024 • 2 min read