How To Identify A Security Breach