This post paints a really bad picture without full understanding of how IT infrastructure works. When the good folks down in IT see an activity spike and files start becoming encrypted, they shut everything off in order to isolate the threat. It’s kind of like closing fire doors. Unfortunately this sometimes means…