The Front Lines of Cyber Risk: 4 Steps to Protecting Endpoints from Ransomware