As an information security professional, I’ve responded to such events, I’ve read very few reports from others who have had their systems compromised.
Such information is extremely helpful in preventing such compromises in others systems and enterprises.
It would be greatly appreciated if the Straight Dope could be given in regards to this compromise, once, of course, the investigation is complete.
Information such as length of compromise, the method utilized to compromise SD systems and similar information would go far in helping others prevent the same thing happening to them.
Thank you in advance, I sincerely hope that recovery was straightforward.