What technique was used by the Kiley Innovators employee to send information to the rival marketing company?
Where should a security tester be looking for information that could be used by an attacker against an organization?