Identify actions key members of a company would take when securing operations resulting from a data breach.