Many of the breached systems were not properly equipped with tools that recorded network activity, making it harder to ...