Cisco Umbrella SLED Threat Intelligence Data Sheet

Issue link:

Contents of this Issue


Page 0 of 2

Data sheet Cisco Umbrella Learn more about cryptomining • Infographic Find out who malicious cryptominers are targeting and the best way to protect your network resources. • Whitepaper Learn how to defend your organization from illicit cryptomining with the Cisco security portfolio. • At-A-Glance Learn about how malicious cryptomining works and how Cisco Umbrella can protect your organization. • Blog Umbrella customers can detect, block and protect against unwanted cryptomining in their environments by simply enabling the cryptomining security category in their policy settings. The cloud introduces new security challenges Organizations everywhere are grappling with the transition to the cloud and what it means for security. The introduction of cloud applications enables increased collaboration and productivity, but they also introduce new security threats. For government organizations and educational institutions, securing access to the internet and cloud applications is particularly important to reduce risk to the organization, as well as meet compliance and regulations. Organizations need a solution that proactively blocks threats, provides complete visibility and control — on and off-network, and is easy to deploy and manage. Threats continue to increase in frequency and sophistication Public Sector and educational organizations are frequent targets of malicious attacks. Let's explore two of the common threats facing your organization today, and how you can proactively protect against these and other threats. Protect against the latest threats with Umbrella's powerful threat intelligence © 2019 Cisco and/or its affiliates. All rights reserved. Cryptomining Cryptocurrency is making it easier for hackers to get paid while protecting their anonymity. Malicious cryptomining is on the rise — moving more mainstream, and as a result, more profitable than ever. And the market volatility of cryptocurrency makes this emerging threat more financially lucrative than ransomware. Our research shows that Energy/Utilities, Higher Education, K-12 Education, and Local Government industries have a surprisingly high volume of cryptomining traffic: Energy/Utilities 34% Education: College 22% Education: K-12 4% Local Government 4% Other Industries 36%

Articles in this issue

Links on this page

view archives of Datasheets - Cisco Umbrella SLED Threat Intelligence Data Sheet