Real-world Case Study Of A Compromised Company And Critical Security Controls