Analysis of infrastructure, history, servers and logins allowed to determine when the incident occurred, who did it and how he did it. The data was restored. After eliminating the consequences and causes, the work on cybersecurity and reconfiguration of servers and services, code audit and its refinement was made. Then the product was provided with a technical support.
The current security system and infrastructure allow an infinite number of employees and developers to simultaneously work on the product and not worry about overflowing information or about hacking.