Why Simple Breach Monitoring is No Longer Enough