Building a Multi-Layered Defense Against Data Extortion