How to Protect Yourself from the Newest Cyberthreat: Cryptojacking

How to Protect Yourself from the Newest Cyberthreat: Cryptojacking

The Cybersecurity landscape is always changing as criminals devise new ways to crack your system. The newest threat is the next evolution of Ransomware. Instead of locking you out of your computer unless a ransom is paid, Cryptojacking worms will infiltrate your system and use your electricity and processing power to mine cryptocurrency. Carbonite writer Andrew Burton describes it like this:

“Here’s how it works. Cyber criminals distribute malicious links via phishing emails, not unlike in a ransomware attack. But, when a victim clicks the link, the crypto mining code is loaded onto their computer without any indication. Once installed, it uses the system’s CPU in tandem with hundreds or even thousands of other infected computers to mine cryptocurrency. It works in the background, slowing your computer down and increasing power consumption.

Individuals may not even notice the decrease in performance or the power spike. However, if many computers across an organization are infected, its electric bills can skyrocket. A recent study in the energy research journal Joule found that that the energy used for crypto mining doubles every six months, and that crypto mining will account for an estimated 3% of the world’s electricity consumption by 2020.”

So what can you do to protect yourself? We always recommend having a good, up to date antivirus system in place, such as Symantec Endpoint Protection 14 1-Year Subscription for 501c3 Non-Profit Organizations. This sentiment is mirrored by Carbonite:

“Developing a ransomware protection strategy starts with antivirus protection. Make sure to deploy modern antivirus software, and keep it updated. Be certain to keep your operating system(s) and applications patched and up-to-date, as well. Ransomware is constantly being modified and updated to evade security measures and exploit OS and application vulnerabilities. So, keeping everything up should be considered essential.

Employee training is also essential. Be sure employees can identify phishing emails and know what to do if they receive one­—whether they open it or not. As noted above, cyber criminals are becoming more sophisticated. However, a little education can go a long way in preventing a ransomware infection.

Finally, make sure you have an offsite backup of your data. This allows you to restore everything without the need to pay a ransom. If you do suffer a ransomware attack, backup is your last line of defense against data loss.”

If you are worried about losing data, it is essential to have a good backup plan in place. The simplest, and most effective backup solution is Carbonite Backup for 501c3 Non-Profit Organizations. Carbonite will automatically back up all your files, and if you do lose something you can click a button to get it back.

Genesis Technologies provides software discounts to 501c3 Non-Profit Organizations. We have a small team that is always ready to help or answer questions about any of our products. If you would like to learn more about any of the products mentioned above, feel free to hop on our LiveChat App, or give us a call at 1-800-433-6326.