. . . "So it is critical that we keep our system extremely secure, particularly as an attacker could use us as a stepping stone to break into our customers' systems." .