6 Steps to Protect Against a Data Breach