You are at your desk sipping a hot cup of coffee, ready to tackle the day ahead. As the caffeine starts working, so do you. Checking emails, you open one from a familiar sender and the email prompts you to click on a link. The link you clicked on leads nowhere. You think nothing of it, delete the email, and move on.

The ransom demand soon arrives via email: “Pay $50,000 within 48 hours. Failure to do so will result in the removal of your company’s data and network.” When you clicked on that link, you unwittingly launched a cyberattack.