5 important tips to manage your next cybersecurity breach