Extortion in the Enterprise: Defending Against BlackFile Attacks