Ransomware Exploitation Understanding the Threat and How to Prevent It