Your team logs in one morning to find your scheduling system unavailable. There’s no breach notification, just locked files and a message explaining that access will be restored after payment. The entry point turns out to be an old remote access tool that was never removed after a software change.