In our series, we’ll be covering what ransomware is, how it gets into a computer system, who the cybercriminals launching these cyberextortion attacks are, and how cybercriminals use the victims’ own computers to encrypt their data and hold it for ransom.