To Whack or Not to Whack — Incident Response and Breach Mitigation