Summary
In this chapter, we discussed:
What to do in the event of a hack
The difference between device hacks and profile hacks
Whom to contact in the event of a hack or a lost/damaged device
Partial wipes and complete wipes
Your checklist in the event of a hack or a lost/damaged device