Digital Extortion - New Cyber24 Podcast


Extortion is nothing new. Mob bosses and regular, non-digital criminals have been doing it for ages: using some form of coercion or threat to get people to do what they want them to. In our increasingly digital landscape, extortion has become easier and more anonymous than ever, and just about anyone can suddenly become a victim.

Digital extortion often takes the form of a bad actor obtaining some sort of private information—anything from out-of-context messages to explicit photos—and then demands something in exchange for not revealing the stolen data. Usually, the targets of these digital extortion attacks are people who have a lot to lose when sensitive information is leaked, such as public figures or sponsored athletes, but sometimes extortionists will simply hold on to information until such a time as it becomes valuable.
Enter Michael Orozco, with MorganFranklin Cybersecurity. Orozco spent much of his career with top management consulting firms, seeing how top businesses operated from within. He now uses that experience in the cybersecurity field, and on this episode of Cyber 24 discusses his experience in dealing with digital extortion. His helpful advice includes avoiding public Wi-Fi networks and assuming someone could retrieve anything you send via digital means and use it against you. He also suggests applications that help keep communication private while warning about the weaknesses of some applications that come from larger organizations.

Tune in for the latest on digital extortion.



Episode 174: Digital Extortion


Listen to the Podcast



check point


Organizations worldwide spend billions of dollars a year on cybersecurity, yet continue to be overwhelmed by security alerts, cyberattacks, and data breaches.


Because managing security based on multiple point solutions and manual processes cannot keep pace with ever-changing threats and environments. Your team just can’t react fast enough!

With Check Point Software Technologies, you can take back your security. With Check Point Infinity, you can consolidate all your security functions in one place for stronger security. With a single console and one unified policy, you can manage all of your security including your users, devices, data, applications - wherever they are.

With Check Point Infinity, you can achieve the best security against both known and unknown threats across all networks, cloud, and mobile devices - all managed centrally, enabling IT to tackle targeted campaigns in real-time and ensure business continuity.

Learn more about consolidating your security solutions with Check Point by visiting


arctic wolf


You’ve all seen the headlines: every 39 seconds, there’s a new attempted cyberattack in the U.S. As the threat landscape becomes more complex, the need for security operations is greater than ever before. But for many organizations, lacking processes and the inability to attract and retain the security talent necessary to provide 24x7 coverage, drown under an overwhelming number of alerts and struggle with what to do next.

It’s time to put experts in your corner.

For something as important as your organizations’ security, having a named engineer and analyst paired with you is critical. Arctic Wolf is a leader in security operations, utilizing a cloud-nativce security analytics platform to deliver security operations as a concierge service. Arctic Wolf’s Security Operations Center as-a-service is always on-guard, with security experts monitoring your environments 24/7.

Don’t become the next headline. Learn more about Arctic Wolf’s redefined cybersecurity approach at



About Cyber24

CYBER24 is a podcast and website designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We talk with experts who share their knowledge in an easily understandable format designed to arm public and private sector leaders with the information they need to protect their organization. 


About VLCM Cybersecurity

VLCM’s Cybersecurity Team offers leading industry expertise to design, implement, and support the right cybersecurity solutions. VLCM’S Cybersecurity architects Get IT Right by implementing layered security strategies, and partner with a wide range of industry-leading IT security vendors to develop the best cybersecurity defense for your unique organization. Team up with our experts to be more cyber secure, in control, and home in time for dinner.