How to prepare by securing your third-party risks How to proactively protect valuable information How to protect your organization against a ransom attack