AFTER THE HACK Five mistakes to avoid when containing and repairing the damage caused by a cybersecurity breach BY JAIKUMAR VIJAYAN 32 GCN JUNE/JULY 2017 • GCN.COM