Driving into work, you hear a news report about a ransomware attack on a university in a nearby state. Because this story is gaining attention, a local news reporter calls to ask if she can interview you about the larger threats of identity breaches. You agree, and she sends you several questions so you can prepare your responses.