Data Security: how to avoid an embarrassing breach