CHAPTER 7: CASE STUDIES FROM SMALL COMPANIES

Foreword to the case studies

The following chapters present case studies of information security breaches from all sectors of the economy, arranged by the size of the company affected.

Names and places have been changed to protect the identity of the victims.

The stories have been slightly dramatised to make them more readable, but all essential facts have remained unaltered, and took place as described.

The case studies contain a description of the events, followed by an in-depth explanation, and a separate section on lessons learned, where applicable.

The stolen backup

All was well at Peter B’s computer repair shop, in this city of 2 million inhabitants, somewhere in Europe. His shop specialised ...

Get Managing Information Security: Studies from real life now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.