Q: My team has been dealing with a worst-case scenario. One of our customers was hit with CryptoWall 4.0, and their systems need to be restored. We’ve paid the ransom, and the ordeal is over, but none of us (my customer and my team) want to deal with this again. To avoid another ransomware attack, I want to find out exactly how the malware infiltrated their network. How can I pinpoint where the breach happened and protect my customer from another attack?