Page 234 - Cyber Defense eMagazine August 2024
P. 234
ransomware for all employees. This will heighten their awareness of strange activity and prevent them
from falling for common tricks.
Implement cybersecurity policies for employees: Have a detailed cybersecurity policy so employees fully
understand how to work safely and securely. This includes password management, using multi-factor
authentication for logins, and policies for using company devices on unsecured networks.
Enable spam and web filters to block suspicious activity: Employ a managed spam filter service and web
filters to block all such content in advance.
Encourage communication and transparency: Ensure employees report suspicious activity to IT or
cybersecurity teams and their coworkers. This will help stop threats early, and prevent them from evolving
into larger problems.
Have an incident response plan: Even with regular training, employees can still make mistakes. An
incident response helps employees follow the best course of action if illegal crypto miners manage to
compromise IT infrastructure.
Staying ahead of emerging threats and enabling protective measures before cybercriminals can identify
potential gaps have never been more important for businesses. Through education and training,
businesses can not only fend off the risks of illegal crypto mining, but also from all other types of harmful
attacks such as ransomware, while creating a safe security culture across the entire organization.
About the Author
Andy Syrewicze, Security Evangelist at Hornetsecurity, is a 20+ year IT Pro
specializing in M365, cloud technologies, security, and infrastructure. By day,
he's a Security Evangelist for Hornetsecurity, leading technical content. By night,
he shares his IT knowledge online or over a cold beer. He holds the Microsoft
MVP award in Cloud and Datacenter Management. Website:
https://www.hornetsecurity.com/en/
Cyber Defense eMagazine – August 2024 Edition 234
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.