practical steps to check cyber-attacks