You’ve become a victim of a cybersecurity attack: Now what?