Going With the (Work)Flow After a Data Breach