“To get illegal access, you will have to break into the system from the outside. Or there may be an insider that’s not supposed to be doing that,” Sardina said.