Foreword to the case studies

The following chapters present case studies of information security breaches from all sectors of the economy, arranged by the size of the company affected.

Names and places have been changed to protect the identity of the victims.

The stories have been slightly dramatised to make them more readable, but all essential facts have remained unaltered, and took place as described.

The case studies contain a description of the events, followed by an in-depth explanation, and a separate section on lessons learned, where applicable.

The stolen backup

All was well at Peter B’s computer repair shop, in this city of 2 million inhabitants, somewhere in Europe. His shop specialised ...

Get Managing Information Security: Studies from real life now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.