Two hackers ready to attack your company systems. What do you do?