When a hacker took over one of a technological business’s important control panels and launched a Distributed Denial of Service (DDoS) assault, the corporation demanded payment in exchange for regaining control of its operations. Instead of paying the extortionists’ demands, the corporation tried to regain…