Loading: How should you investigate a data breach?