If you have a network security provider contact them at once if not gather as much information as quickly as possible. Confirm which systems were compromised, determine the IP addresses that were used in the attack, and identify the type of attack, such as unauthorized remote access, a virus, or a malware page tacked onto your website. Use the administration tools available in your routers and firewalls, such as traffic logs and syslog messages.