Double Extortion Ransomware Webinar Summary

 

Ransomware has always been a serious threat to companies. But it’s still evolving (and quickly).There is no longer just the risk of losing important data or paying a pricey ransom that companies have to worry about. Attackers have taken it a step further with something called “double extortion” ransomware. With double extortion ransomware, the attackers actually exfiltrate your data prior to holding it for ransom. So if you don’t pay, there’s a threat your data will be leaked online as opposed to just lost.

Companies need to understand the severity of these threats because it can put their customers at a huge risk. 

This Webinar includes two cybersecurity experts, CEO of Ubiq Security Wias Issa and COO of DNSFilter Jen Ayers. In this webinar, they have teamed up to discuss their thoughts on this threat. They tackle the following questions:

  • How are attackers evolving?
  • What industry is at risk?
  • How do attackers choose their targets?
  • How can I protect my clients' data?
  • Are encryption and backups enough to protect my company?
  • How can I trust the attacker if I already paid the ransom?


Learn how you can protect your company from double extortion and watch the webinar now!

Search
  • There are no suggestions because the search field is empty.
Latest posts
Smarter DNS Policies: What You Should Be Blocking (But Probably Aren’t) Smarter DNS Policies: What You Should Be Blocking (But Probably Aren’t)

DNS filtering is a foundational layer of defense and helps to fortify the strongest security stacks. Most organizations use DNSFilter to block the obvious: malware, phishing, and adult content. That’s a great start, but many are missing out on the broader potential of DNS policies.

Educating Your Clients on the Sophistication of Phishing Attacks Educating Your Clients on the Sophistication of Phishing Attacks

Imagine losing $31,583 every minute. That’s how much cybercrime cost American businesses in 2024, according to the FBI’s Internet Crime Complaint Center. Phishing was one of the top threats behind that number. If you're still thinking phishing is just about misspelled emails from a Nigerian prince, you're dangerously underestimating today’s threat.

IAM Userless: Streamline AWS Access & Reduce the Attack Surface IAM Userless: Streamline AWS Access & Reduce the Attack Surface

Security and scalability are paramount in modern cloud architectures. Amazon Web Services (AWS) Identity and Access Management is a critical tool that helps you manage users, permissions, and access control across AWS services. While Identity and Access Management (IAM) users have traditionally been the go-to approach for granting access to resources, there are significant advantages to moving to IAM roles.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.