Now that you've closed the suspicious program, restarted your computer, and observed any unusual behavior, what should be your next step?