"You may need to hire a forensic auditor, network security specialist, or other professionals to determine which databases and files have been compromised, which members may be affected, the types of member data breached, how hackers gained access to the data, etc. 2." . . . . .