How New Technology Increases Chance of Breach and Avoiding Detection