Prevention of information loss: an overview of what can happen and some simple guidance on how to prevent it
This paper shows how easily in today's information-technology society, private, personal or sensible information can be obtained, indicating the most commonly found ways in which an eavesdropping attack may take place. Exotic or very costly penetrations are beyond the present scope. Further, some simple methods are described to combat such information compromise/theft. While basic attacks can be solved with these methods, someone suspecting a serious information leak in his environment should approach a security specialist to solve this problem. The field is extremely complex and substantial knowledge is required in order to control successfully a professional eavesdropping approach.