You are the chief security officer for a mid-sized engineering firm that specializes in solar technology. Recently, during a security protocol sweep, you discovered attempts to infiltrate your network from sources outside of the United States. You think that some data may have been stolen, but so far you have not been able to make a determination as to whether the data was indeed accessed or if it contained proprietary information.
What actions should you recommend that the company take at this time, and why?