Preparing for a hacker threat