When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person’s computer, that the hacker gains access to.

– John McAfee