Before, During and After a Ransomware Attack: A Resilience Strategy