What is Data Recovery?
Data recovery is the process of locating, accessing, and restoring files that have become unavailable due to accidental deletion, corruption, or device issues.

By Michael Hall, Chief Information Security Officer
Effective today, NIST’s Computer Security Division just updated their recommended guidelines by eliminating eleven SP 800 publications.
How would eliminating security recommendations be an improvement?
These eleven publications all reference technology that is out of date or no longer used, and implementations that have been improved since the original writing of these guidelines. Therefore, eliminating these old items clears some of the clutter and allows for easier access and implementation of more current and updated recommendations located in the remaining SP 800 publications.
Here are the sections removed and reasons why per NIST’s announcement:
The NIST update reminds us that, as technology becomes outdated and gets swapped out, so should parts of our security policy related to data and technology.
Company-owned devices often hold security-sensitive electronically stored information (ESI), including critical intellectual property (IP), financial databases, accounting files, e-mail exchanges, customer records, PCI, PII and PHI. When you factor in costs associated with a security breach resulting in theft or other unauthorized access, such as investigations, crisis management, notification of victims, legal expenses and loss of customers, the price tag that may result from a flaw in a company’s security protocol quickly adds up.
According to the Ponemon Institute, the average cost of a data breach in the United States in 2017 was $225 per record, averaging $7.35 million total organizational cost per breach. These costs were even higher for healthcare and financial institutions. In addition, the more records that were lost, the higher the cost of the data breach.
As technology changes approximately every ten months or less, it’s a good idea to regularly review your company security policy and make sure it is not referring to outdated technology and includes not only new technology but new security threats as well.
Here are some tips for staying on top of data security for your company.
Also known as “gap analysis” or “security risk assessment,” risk analysis is the first step towards both developing and updating a data security policy. Security risk assessments should be conducted annually, biannually or any time something changes, such as the purchase of new equipment or expansion of company services.
As part of conducting a risk analysis, there are a number of areas and methods to review for proper security, including physical areas. Access should be physically unavailable to anyone who is not authorized.
Read over your company data security policy and verify that it addresses all risks identified during your risk analysis. Add items that are not included and eliminate items that are no longer relevant.
Conduct background checks of all new employees. Third-party providers should also be vetted to make sure they follow documented security protocols identical to or more robust than those in place within your company. Particular attention should be paid to third-party vendors who have access to company computers, phones and can otherwise access company data, such as data recovery vendors.
The April 2018 Cybersecurity Report from DriveSavers highlights the overlooked risk in third-party data recovery and includes a security vetting checklist. The checklist is specific to vetting data recovery services; however, many of the items listed can apply to all third-party vendors and is a great resource when vetting companies you may start working with.
Hold mandatory security training and awareness programs, making sure to require signatures on mandatory reading materials. Enforce security policies and procedures through use of penalties. Education should always be part of both implementation and enforcement. This is absolutely the most important part of your company security and must be offered continuously.
Does your company hold any patents, have proprietary formulas or “secret recipes” that give it a competitive advantage? Does your company store any customer credit card information, social security numbers or other personal data that could impact them if it was stolen?
Think of what might happen if company data was accessed by the wrong person or persons. Follow NIST’s example. Keep your organization and customers safe by keeping the company security policy up to date and enforced.
Certified Secure Data Recovery
Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery
ITProPortal: Data Security Compliance – A Cheat Sheet for IT
DriveSavers Guarantees Data Security Compliance with Updated NIST Guidelines for Controlled Unclassified Information
NIST Addresses a Security Threat that Challenges Most Information Security Programs