3 Steps for Ransomware Defense