Hidden risks to sensitive data and how to detect them