Strategies for Dealing With Data Breaches