What can you do to stop this low-tech, yet destructive type of data breaches? Do you not want to look at sensitive data...