Page 6 - AeM_June_2019
P. 6
RESEARCH, ANALYSIS & TRENDS
Security is a journey, not a destination
Now, more than ever, cybersecurity teams are seeking using their own computing resources. But it
to become more agile. They help organizations meet becomes illegal when they use someone else’s
regulatory compliance requirements, align to industry resources – CPU power and energy – without their
best practices, and accelerate business transformation knowledge or permission, to mine cryptocurrency
initiatives. Effective cybersecurity acts as a business for their own financial benefit. In 2018,
enabler – building customer, shareholder, and employee cryptojacking, while still in its infancy, caught many
trust. This enables organizations to protect and enhance organizations off-guard and represented a
their reputation and reduces the risk of the many significant amount of hostile activity. Protect your
negative consequences of a cybersecurity breach. organization from the threat of cryptojacking by
applying ‘least privilege’ controls and implementing
By providing value to the business, cybersecurity helps egress and ingress filtering restrictions, as well as
differentiate in an otherwise crowded marketplace and browser plugins to limit site functionality. Also,
improves users’ and customers’ experience. From on- deny Stratum protocol usage, and segment your
premise IT, mobile devices, connected operational network environments.
systems, to public, private, and hybrid technology
deployments, cybersecurity leaders need the confidence • Credential theft isn’t a concept that’s new to most
that their infrastructure and data are adequately people – but in the context of cybersecurity, it’s
protected. become increasingly prevalent over the last few
years. Credentials are the ‘keys to your kingdom’,
For several years now, Dimension Data publishes protecting your organization’s networks and data
an Executive Guide that provides insights in and from unauthorized access. This makes stolen
analysis from the shifting threat landscape, with best credentials a valuable target for threat actors.
practice guidance and practical measures to bolster Dimension Data’s observations reveal that phishing
cybersecurity defences, including the following: and malware are cybercriminals’ techniques of
choice when it comes to launching credential theft
• Cryptojacking, also known as coin mining, campaigns and sees a spike in the number of
cryptomining, and cryptocurrency mining, isn’t credential theft attacks targeting cloud platforms.
necessarily all unlawful: for instance, users may Successfully fending off credential theft attacks on
install a coin mining program on their personal your business involves implementing multi-factor
system to generate cryptocurrency for themselves,
6 June 2019 - Cyber-security & Data Protection