From launching attacks through companies’ supply chain partners to targeting Internet of Things (IoT) devices added to corporate networks every day, hackers will take advantage of any weakness within an organization to gain access to critical systems. Nearly half of all breaches involved customer personal identifiable information (PII), which can include tax identification (ID) numbers, emails, phone numbers and home addresses.1 Intellectual property (IP) records came in a close second (43% of breaches).