Creating a “Kill Switch” in the Cybersecurity “Kill Chain”