Step 4: Try to contain the breach