Crime ❯ Cyber Crime ❯ Hacking ❯ Methods of Breach
The regulator says most breaches were low-tech, exploiting weak passwords alongside lax data practices.