After a hack, remediation efforts entail more than just plugging that one hole through which attackers gained entry.