Demystifying Data Protection: Steps to Find, Monitor and Control without Chaos