IMLA Cyberattack Simulation: Lessons for Data Breach Preparedness and Response