ABSTRACT

It’s everywhere. It’s saved blatantly on the desktop of a coworker’s unattended computer, just waiting to hop onto the next flash drive and head out of the company. It lingers just a click away, ready to be uploaded and e-mailed to a competing company. It lies nakedly on a manager’s desk, eager to be picked up by criminal hands. It lurks in an unsecured network drive, hoping to be discovered by someone with malicious intentions. It’s unstructured data and it’s demanding attention.