How to detect a cyber security breach?