How cybercriminals hold data hostage and why the best solution is often paying a ransom