Cybersecurity data breach encryption firewall malware phishing ransomware vulnerability