RANSOMWARE ATTACK VECTORS: HOW CYBERCRIMINALS GAIN ACCESS AND HOW X-PHY PROTECTS YOU