4: Case Studies
50
Although the data is still in circulation, the
company’s actions meant it was rendered useless for
the thieves. The only negative effect remaining is
that spam filters have to include all those new mails
generated by spam providers that think this data is
still worth anything.
While it is always hard to apprehend the actual data
thieves, a company needs to have the most relevant
and important elements of an ISMS in place to avoid
situations like this. It was, indeed, rather easy to
handle from a business perspective, but still there is
an aftertaste of this data having been stolen in the
first place. Thankfully, the press did not notice.
(3) Stolen laptops (generic)
We will keep this one brief and generic as nowadays ...