How to Avoid the Potential Fallout from a Breach