Inside the Ingram Micro Ransomware Attack: Lessons in Zero Trust