Request a report after the hacking exercising is done that includes the solutions the hacker used with your programs, the vulnerabilities they uncovered as well as their proposed measures to repair People vulnerabilities. Once you've deployed fixes, hold the hacker try the assaults once more to ensure your fixes worked. https://trustedhackers.org/