Share this
Double Extortion Ransomware Webinar Summary
by Carmella Arroyo on Sep 27, 2021 12:00:00 AM
.png)
Ransomware has always been a serious threat to companies. But it’s still evolving (and quickly).There is no longer just the risk of losing important data or paying a pricey ransom that companies have to worry about. Attackers have taken it a step further with something called “double extortion” ransomware. With double extortion ransomware, the attackers actually exfiltrate your data prior to holding it for ransom. So if you don’t pay, there’s a threat your data will be leaked online as opposed to just lost.
Companies need to understand the severity of these threats because it can put their customers at a huge risk.
This Webinar includes two cybersecurity experts, CEO of Ubiq Security Wias Issa and COO of DNSFilter Jen Ayers. In this webinar, they have teamed up to discuss their thoughts on this threat. They tackle the following questions:
- How are attackers evolving?
- What industry is at risk?
- How do attackers choose their targets?
- How can I protect my clients' data?
- Are encryption and backups enough to protect my company?
- How can I trust the attacker if I already paid the ransom?
Learn how you can protect your company from double extortion and watch the webinar now!
Share this

DNS filtering is a foundational layer of defense and helps to fortify the strongest security stacks. Most organizations use DNSFilter to block the obvious: malware, phishing, and adult content. That’s a great start, but many are missing out on the broader potential of DNS policies.

Imagine losing $31,583 every minute. That’s how much cybercrime cost American businesses in 2024, according to the FBI’s Internet Crime Complaint Center. Phishing was one of the top threats behind that number. If you're still thinking phishing is just about misspelled emails from a Nigerian prince, you're dangerously underestimating today’s threat.

Security and scalability are paramount in modern cloud architectures. Amazon Web Services (AWS) Identity and Access Management is a critical tool that helps you manage users, permissions, and access control across AWS services. While Identity and Access Management (IAM) users have traditionally been the go-to approach for granting access to resources, there are significant advantages to moving to IAM roles.