Don’t pay the ransom: A three-step guide to ransomware protection