Any security professional who has dealt with a cyberattack can tell you that the early stages are often chaotic, with the extent of the damage and the magnitude of the intrusion difficult to immediately determine.