Practices during the information breach