Discussion of the history of electronic extortion from hit man threats, real vs. copy cat DDoS and ransomware then into using Phishing data for targeted threat intel, varying types of DDoS and readiness, and basic steps for ransomware defense and hardening