Personalized invoices, receipts, hotel reservation confirmations, special credit card promotions, and more can all be found online without ever entering a username or password. These vulnerabilities originate from an insecure method of hosting and communicating sensitive information. This presentation will go over how you may already be a victim of this blatant information disclosure, how the leaked information can be exploited, and who some of the offenders are. The presentation will also go over some of the methods to avoid these vulnerabilities in the first place, and what to do once you discover that your company is already vulnerable.