Case Studies: How a security breach can impact your research