1.4 Consider mitigations following cyber security testing