How we defend your network from illicit cryptomining
It's more than just a digital gold rush, threat actors increasingly look toward illicit cryptomining as an easy source of income. Cryptomining is the production of virtual currency, also known as cryptocurrency, such as Bitcoin and Monero. It comes at the expense of system performance and power consumption. Moreover, threat actors are infiltrating networks to use their victims’ computer resources to do this work for them. In this white paper, you will learn how to defend your organization from illicit cryptomining with the Cisco security portfolio.
Motivated attackers will try every avenue available to them. Your defences need a wide view of the threat horizon, not a patchwork of keyholes from point products.
We see a threat once and protect everywhere. It’s not enough to just block the attack. Everything we learn about a threat—files, URLs, techniques, traffic patterns, and so on—is shared across our portfolio to defend you from any angle.