— Ransomware Prevention Perimeter Protections Network Defenses Endpoint Protections Ransomware Response Containment and Eradication Recovery and Post-Incident Activity