Skip to main content
Back to Home

Other types of data involved in policy violations include: intellectual property (16%), source code (13%), passwords and keys (11%), and encrypted data (1%).

January 1, 2025

Other types of data involved in policy violations include: intellectual property (16%), source code (13%), passwords and keys (11%), and encrypted data (1%). — This cybersecurity statistic was published by Netskope in January 2025. The original data appears in Cloud and Threat Report: 2025. For the full methodology and detailed findings, refer to the original report.

Source

View Original Report

Published on 1/1/2025

Share or Copy this stat

Frequently Asked Questions

What does this statistic say?

Other types of data involved in policy violations include: intellectual property (16%), source code (13%), passwords and keys (11%), and encrypted data (1%). This data was published by Netskope.

Where does this data come from?

This statistic comes from Cloud and Threat Report: 2025, published by Netskope on January 1, 2025. You can view the original report at https://www.netskope.com/netskope-threat-labs/cloud-threat-report/cloud-and-threat-report-2025.

What cybersecurity topics does this cover?

This statistic was published by Netskope. Browse more statistics from Netskope.

Want More Statistics Like This?

Get the latest cybersecurity stats delivered to your inbox every week

Stay Ahead of Cyber Threats

Join 1,000+ security professionals getting weekly insights