If your computer is running slower these days, it could be because hackers are using it to make money. Literally.They\u2019re surreptitiously hijacking machines \u2013 in some cases, hundreds or more at a time \u2013 for personal gain. But in this case, unlike the stealing of corporate data, they don\u2019t represent a major threat. They simply want to tap into your computer\u2019s central processing unit (CPU) to make cryptocurrency.The activity has risen in popularity as cryptocurrency value continues to soar. In November, the most well-known of cryptocurrencies, bitcoin, reached a record high of $8,101.91 after starting the year at just under $1,000. Hackers have, of course, taken an interest in the market, since they like to go where the money goes. Besides, it gives them a new revenue stream to pursue, as opposed to more extreme and illegal acts such as ransomware, which is getting \u201cmessier\u201d by the day thanks to stepped-up law enforcement.However, it takes plenty of processing power to solve the complex, mathematical equations needed to create the digital coins. That\u2019s why the hackers who are \u201cmining\u201d for cryptocurrency infect the computers of unsuspecting users, to \u201cborrow\u201d the power in the interest of making more money, faster. It doesn\u2019t matter if you use cryptocurrency either; the hackers are only interested in your processing power so, really, any device provides value to them.Not surprisingly, \u201ccryptomining\u201d is emerging as a big business.In September, Kaspersky Lab reported the discovery of botnets which were distributing mining software through users\u2019 voluntary installation of adware programs. \u201cZcash\u201d and \u201cMonero\u201d are popular cryptocurrencies for the botnet activity because they have lower market value than bitcoin and, thus, are less complex and easier to mine. They also have cryptographic features which make it harder to trace transactions \u2013 all the better to fly under the radar. In 2013, Kaspersky reports that it was protecting 205,000 global users from the threat. This grew to 701,000 by 2014 and, within the first eight months of 2017, to 1.65 million.Then, in October, AdGuard reported that 2.2 percent of the top 100,000 websites were using cryptomining scripts \u2013 up from \u201cnear zero\u201d within just three weeks. An estimated 500 million users are potentially vulnerable, and the websites earned $43,000 from cryptomining during the three-week period. Press reports have linked a wide variety of sites to the practice \u2013 including CBS\u2019s Showtime; Pirate Bay, a peer-to-peer file-sharing index for digital entertainment that has encountered legal difficulties over copyright infringement; and even the official website of soccer star Cristiano Ronaldo.Now, from an enterprise IT professional or manager\u2019s perspective, cryptomining isn\u2019t exactly something to worry about at night. As indicated, the hackers are after computing power, not the usual \u201ccrown jewels\u201d of proprietary information and customer data. Victims don\u2019t even realize that they\u2019re victims. Yes, they lose a bit of machine functionality \u2013 their internet may run a bit slower or some programs might take longer to start up \u2013 but that\u2019s about it.That said, the hackers are establishing a presence on your employees\u2019 devices and, therefore, your network. Given this, you don\u2019t want to encourage the activity or otherwise turn a blind eye to it. If the hackers are using a vulnerable platform, for example, the platform\u2019s risk problems become your company\u2019s risk problems. So you should take the following steps to discourage cryptomining inside your enterprise:Keep signatures up to date. Regardless of the intent behind it, cryptomining programs are still malware and so are the payloads used to gain and maintain access. When your signature tools are current, you\u2019re better positioned to recognize the malware at several points and remove it.Monitor developments via Windows Task Manager, to find out which memory and CPUs are getting an unusually strenuous workout. Also, cryptominers like to work in groups. They join peer-to-peer networks to collectively combine computing power and accelerate the production of digital currency. You can identify this abundance of group activity through capable security content using a variety of tools.If you pay for cloud services, watch out for fluctuations in your monthly bill. A cryptominer-causes CPU usage spikes and instance replication that will lead to higher charges.Sure, as far as cyber schemes go, cryptomining is one of the more benign ones. No data gets stolen. No one gets hurt. Processing power takes a small hit, but this amounts to, at most, a minor irritation rather than a techno-crisis.Still, you need to exercise vigilance for all forms of malware \u2013 even malware which isn\u2019t quite as ill-intended as the rest. By taking proactive steps toward enterprise-wide protection, you ensure that cryptominers will look to \u201ccash out\u201d elsewhere.