Surveying the RAG Attack Surface and Defenses: Protecting Sensitive Company Data | IEEE Conference Publication | IEEE Xplore