Imagine you walk into your agency Monday morning to find the place in utter chaos. You quickly learn that a cyberhacker has infiltrated your agency’s IT systems and frozen every program and system. Access to financial systems: gone. Access to contract records: gone. Access to email: gone. Access to all of the documents and data that you need to complete your job: gone.