Security Breaches: How Do They Occur?