Data Security Strategy for When You’re Already Compromised