The following chapters present case studies of information security breaches from all sectors of the economy, arranged by the size of the company affected.
Names and places have been changed to protect the identity of the victims.
The stories have been slightly dramatised to make them more readable, but all essential facts have remained unaltered, and took place as described.
The case studies contain a description of the events, followed by an in-depth explanation, and a separate section on lessons learned, where applicable.
All was well at Peter B’s computer repair shop, in this city of 2 million inhabitants, somewhere in Europe. His shop specialised ...