Navigating the aftermath of security breaches lessons learned from real cases