Recommendations to take to prevent Cryptocurrency mining and Ransomware attacks:
- Backup, backup, backup!
- If you do not know who sent it, do not open the attachment.
- Look for elevated priviledges on your authorized User list
- The attachment is not opened until you confirm that the person actually sent it to you.
- Enable the display of the file extension.If the attachment ends in .js, .vbs, .exe, .scr, or .bat, do not open them for any reason.
- Use Accessories such as VirusTotal to scan attachments.
- Make sure all Windows updates are installed Also make sure you update all programs, especially Java, Flash and Adobe Reader. Older programs contain security holes commonly exploited by malware distributors. Therefore, it is very important to keep updating.
- Make sure you are using some kind of security software installed with behavior detection or white list technology. Whitelisting can be a painstaking training, but if you are willing to stock it, you can get the maximum return.
- Use a long and non-word password and do not reuse the same password at multiple sites.