Ethan identifies the attackers’ IP address and takes steps to block their access.
“We’ve identified the attackers and blocked their access. They won’t be able to compromise our system anymore.”