How Long Is Too Long to Detect a Breach?