Triple extortion tactics and why cyber insurance is no longer a substitute for a mature incident response architecture.