Let the hacker have as much free rein since they have to have, provided that they don't negatively have an effect on your stability devices, deteriorate your providers or merchandise or harm your relationships with shoppers. A cellphone hack to find out if your organization's cellular phones are vulnerable — https://trustedhackers.org/