How to protect your network from watering hole attacks

How to protect your network from watering hole attacks