THE SINGLE BEST STRATEGY TO USE FOR PERSONAL INFORMATION COMPROMISED