Ask for a report following the hacking training is completed that features the procedures the hacker utilised on your systems, the vulnerabilities they found and their suggested steps to fix those vulnerabilities. After you've deployed fixes, provide the hacker attempt the attacks yet again to be sure your fixes worked. https://bookmarkstime.com/story18840431/top-guidelines-of-hire-a-hacker