5 key actions after discovering a cyberattack