Report weaknesses, making your organization aware about all vulnerabilities they discover during their hack and offering solutions to fix them. – Case Study one: A business figuring out and addressing vulnerabilities of their community before a potential cyber attack. Cell phone hacking to examine if the business’s telephones are susceptible. https://trustedhackers.org/