You refuse to follow IT support's instructions. You decide to delete the infected files on your own. But in doing so, you miss a critical part of the malware that quietly infects the backup drives as well.
Weeks later, you realize that your system is still compromised, and the hacker has full control over your devices.
"YOU CAN NEVER OUTRUN THE HACKER."