quickly responded to the potentialcyberattackby shutting down certain systems to prevent further damage. The breach was contained through the prompt actions of the ICT and informational security teams. Soon, the affected systems were restored and fully operational. ...