Home SecurityData Breach Minimizing damage from a data breach: A checklist