There are plenty of reasons and opportunities for hackers to break into the digital BURG and steal data. They gain access through phishing, malware, locks that are easy to crack and inappropriate file storage.

There are plenty of reasons and opportunities for hackers to break into the digital BURG and steal data. They gain access through phishing, malware, locks that are easy to crack and inappropriate file storage.
Hackers have different intentions:
Access to personal data
Identity theft is a crime where attackers abuse the personal data of their victims, often at the victim's cost. Criminals steal data from online accounts and use their victim's identity to use their credit card or take out credits in their name, for example.
Access to research, projects, collaborations
Valuable intellectual property from teaching and research or from collaboration partners is at risk.
Access to funds
Universities manage large amounts of money in form of tuition fees, funding or donations and are therefore a great source of money.
Access to networks
Access to the BURG system enables access to other connected systems, computers and institutions.
Damaging reputation
Sensitive data can be published or manipulated and published. Not only a victim's data is used. Also threatening a victim with publishing information is a way to get blackmail money.
Symptoms of being hacked:
If these symptoms appear, the following steps should be taken:
If access to the account or device is not possible
Further tips:
The website "Have I Been Pwned"” [https://haveibeenpwned.com] allows you to check if you have an account on a website whose data has been published due to a security problem.