T-Mobile hack: How to protect your personal information after a data breach