Premium: Anatomy of a security incident