This is part 1 of a multipart series! In this article we will look at what Ransomware is, where it originated and the increasing risks accordingly, this article will be followed up with subsequent articles looking at different forms of ransomware and targeted devices, how ransomware work and methods to minimise the risk prevent the […]