What should I do if I suspect that our system is compromised? What do you think is the best security perimeter to protect a network?