Business Continuity Steps to a foolproof strategy for ransomware protection and ending cyber extortion