13 steps through a data breach

Here is what an organization should do after a security breach occurs.