Don’t shut the cyber door after the hacker has bolted