Be sure your VPN Has a Kill Switch in Place, and develop a Robust System to Capture and Block Fraudulent Emails. Use data loss prevention (DLP) solutions to monitor unauthorized accesses and breaches, stopping them from leaking information. Compartmentalize within the network by forming virtual local area networks (VLANs). Use data collection tools that detect anomalous behavior and block attempts to infiltrate the system. 24-hour monitoring of network activity should be the policy. Use a VPN kill switch to protect your network from hackers, worm viruses to malware.
Source: https://thehackernews.com/2019/12/botnet-malware-attacks.html

