Fortifying Against Data Breaches: Legal and Technical Strategies