Database Spotlight: 5 Keys to Prepare for and Respond to Cyberattacks