Strategies in the course of the data breach