Share this
Double Extortion Ransomware Webinar Summary
by Carmella Arroyo on Sep 27, 2021 12:00:00 AM
.png)
Ransomware has always been a serious threat to companies. But it’s still evolving (and quickly).There is no longer just the risk of losing important data or paying a pricey ransom that companies have to worry about. Attackers have taken it a step further with something called “double extortion” ransomware. With double extortion ransomware, the attackers actually exfiltrate your data prior to holding it for ransom. So if you don’t pay, there’s a threat your data will be leaked online as opposed to just lost.
Companies need to understand the severity of these threats because it can put their customers at a huge risk.
This Webinar includes two cybersecurity experts, CEO of Ubiq Security Wias Issa and COO of DNSFilter Jen Ayers. In this webinar, they have teamed up to discuss their thoughts on this threat. They tackle the following questions:
- How are attackers evolving?
- What industry is at risk?
- How do attackers choose their targets?
- How can I protect my clients' data?
- Are encryption and backups enough to protect my company?
- How can I trust the attacker if I already paid the ransom?
Learn how you can protect your company from double extortion and watch the webinar now!
Share this

Managing endpoint security across an organization—whether as an MSP overseeing multiple customers or an admin overseeing a tech stack—should be simple, efficient, and effective. That’s why we’re excited to introduce a revamped Roaming Client management experience, designed to provide greater confidence and ease in managing your fleet of DNSFilter Roaming Clients.

Why DNS Security Matters for ISO 27001 Certification
DNS security is more than just a technical concern—it’s a pillar of ISO 27001 compliance. As businesses work to protect sensitive data, secure network infrastructure, and meet regulatory requirements, DNS security solutions play a critical role in achieving ISO 27001 certification and ensuring compliance with evolving security standards.

The Old-School Operations Role: Backbone or Bottleneck?
In the early days of IT, the operations team was the unsung hero—the silent, and often siloed, force that kept everything running. They were responsible for the infrastructure: Servers, databases, and networks that powered the business. They managed deployments, monitored systems, and ensured uptime. If it was working, no one noticed them. If it wasn't? Well, then the questions started: "Wha...