We have secured our networks, implemented 'defense in depth' enforced strong passwords and educated our end users to report any suspicious files or activity on their computer. We have our firewall and intrusion detection systems in place. We are on top of patch management and security templates...