Researchers may use public data to investigate and determine how the breach occurred. With this information readily available, researchers can go into the chart and study the patterns of the breaches, potentially finding a solution to stop a breach in that specific category.