This graphic highlights a quote from a security professional, describing how a threat moved through the network encrypting files.

This graphic highlights a quote from a security professional, describing how a threat moved through the network encrypting files.