Exfiltration: Once the data is prepared the insider will choose an option for exfiltration out of the organization; either transmit the data through some communication protocol smtp, http, ftp), access the data remotely through vpn or remote email gateway, physically walk the paper or removable media out of the facility for transmission, or take a laptop or other mobile computing device that conta