On the prevention side we have many controls that form the overall preventative system. For example, we have security technology in place to block certain types of attacks and certain types of emails from going through. We also conduct a number of assessments on the infrastructure to ensure that it is hardened, that it has all of the preventative mechanisms in place, and closes vulnerabilities. Also, we do supply-chain integrity checks. We have processes in place for that. There are quite an elaborate number of preventative tasks that we do, including identity management and ensuring access controls.
When things do slip, we have very good detection capabilities. As Ron mentioned, we have the security operations centre monitoring 24-7. As soon as we detect a breach, we act swiftly, respond to it, and then recover from the breaches. We have a holistic approach to security, working very closely with our security partners, and also the customers.