Beyond malware removal: How to respond to a compromised system alert