Home SecurityData Breach Priorities in preparing for a ransomware attack: people, processes, and technology