Strategies at the time of the information and knowledge breach