3 Strategies to Defend Against Resurging Infostealers