My background is information security and within my job I have to study numerous standards, policies and guidance documents.
whilst reading a few cloud security documents I came accross this article which is an eye opener!

I'd be happy to suggest a few ways to avoid getting into this situation if required but it requires some organisation!

Have a read.

Tone

http://www.wired.com/gadgetlab/2012/...rd-hacker/all/