What Do You Do When Your Secure Research Facility Is Subject to a Data Breach?