The MOST important reason to use a centralized mechanism to identify information security incidents is to: