It’s not hard to believe that company insiders are largely responsible for the majority of cyber-enabled thefts of intellectual property. Methods varied widely, but the top three methods used were email from work, removable media, and remote network access.

Knowledge is the key to mitigating these threats. It is critical that all levels of management recognize and acknowledge the risks posed by their current and former employees, contractors, and business partners.