Data Breach Damage Control: Avoid These Pitfalls