5 Key Features of Ransomware Mitigation