Ransomware: How to make sure backups are ready for a real attack