Cybersecurity Takeaways After the Colonial Pipeline Hack