Port 22

A guide to combatting human-operated ransomware: Part 2