Limiting damage after a data breach