Assessing Cybersecurity Following String of Hacks