the key to effective communication after a breach