"It's unfortunately very easy to go out and download hacking tools off the internet for free and have automated systems, computers that are just sitting there testing IP addresses trying to break into sites and when they find a vulnerability they'll log it and then someone comes back later and looks at the log and says OK I got one," Hatter said.