{"id":10634,"date":"2023-01-05T08:23:26","date_gmt":"2023-01-05T16:23:26","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=10634"},"modified":"2026-03-05T05:26:46","modified_gmt":"2026-03-05T13:26:46","slug":"white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/en-ca\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/","title":{"rendered":"Cybersecurity Report:<br>The Overlooked Risk in Third-party Data Recovery"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"\/wp-content\/uploads\/2023\/02\/CybersecurityWhitePaper_23.01.25.pdf\" target=\"_blank\" rel=\"noopener\">Download the printable white paper.<\/a><\/p>\n<blockquote><p>\nRobust risk management is a must in today\u2019s challenging environment of mounting digital attacks on vital company assets and the regulated data they are entrusted to protect.\n<\/p><\/blockquote>\n<p>This white paper addresses an often undetected or unattended internal and contractual risk\u2014data recovery.<\/p>\n<ul>\n<li>2021-2022 Data Breach Statistics<\/li>\n<li>Security Standards and Protocols for Data Recovery<\/li>\n<li>Points to Consider<\/li>\n<li>Security Vetting Checklist<\/li>\n<\/ul>\n<h2>Introduction<\/h2>\n<p>Robust risk management is a must in today\u2019s challenging environment of mounting digital attacks on vital company assets and the regulated data they are entrusted to protect. Most organizations have a dynamic layered security practice incorporating multiple security controls to protect this sensitive data. The reputational and financial consequences of lost or corrupted data make this a requirement. This white paper addresses an often undetected or unattended internal and contractual risk\u2014data recovery\u2014that appears to be an exception in an otherwise strong-layered security practice.<\/p>\n<figure id=\"attachment_62863\" aria-describedby=\"caption-attachment-62863\" style=\"width: 375px\" class=\"wp-caption alignleft\"><a href=\"\/wp-content\/uploads\/2018\/04\/sensitive-esi.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-62863\" src=\"\/wp-content\/uploads\/2018\/04\/sensitive-esi-561x1024.png\" alt=\"Sensitive electronically stored information (ESI)\" width=\"375\" height=\"685\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/sensitive-esi-561x1024.png 561w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/sensitive-esi-164x300.png 164w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/sensitive-esi-768x1403.png 768w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/sensitive-esi-841x1536.png 841w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/sensitive-esi.png 918w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/><\/a><figcaption id=\"caption-attachment-62863\" class=\"wp-caption-text\">Click to enlarge in new tab<\/figcaption><\/figure>\n<p>If a storage device fails, resulting in lost or corrupted digital data, few organizations have the internal resources to recover that data\u2014especially in the case of physical damage or electromechanical failure. The device must be sent to a third-party data recovery vendor. Company-owned devices often hold security-sensitive electronically stored information (ESI), including critical intellectual property (IP), financial databases, accounting files, email exchanges, customer records, PCI, PII, and PHI. Most of the data recovery industry does not meet best practice standards to ensure data protection through cybersecurity; therefore, data recovery service providers must be classified as high-risk vendors. If a corporation does not perform due diligence before engaging the services of a data recovery vendor, it runs the risk of a data breach that will result in significant financial and reputational damage. Inevitably, there will also be a loss of productivity.<\/p>\n<p>When C-level executives and board members have not properly planned for this exception, IT personnel are left on their own to make problem-solving decisions. Without specific protocols in place to handle the data loss scenario, IT personnel may not be aware of the high-risk issue associated with this process, nor understand the critical impact of the data leaving the layered security of the corporate facility and potentially becoming subjected to negligence, fraud or abuse. Such an action could easily cost an organization millions of dollars in fines.<\/p>\n<p>The good news is that changes to internal policies and procedures, combined with contractual changes with third-party businesses handling an organization\u2019s data, will mitigate the risk posed by this exception that has been allowed to fall outside of otherwise robust layered cybersecurity protections:<\/p>\n<ul>\n<li>Vetting a data recovery vendor should be mentioned in the organization\u2019s business continuity plan, disaster recovery plan, or incident response plan.<\/li>\n<li>Organizations should have vetting policies and guidelines in place for selecting a data recovery service provider.<\/li>\n<li>The most important practices to include in the policy are presented as a vetting checklist later in this report.<\/li>\n<\/ul>\n<p>In addition, organizations need to address potential new threats to the security of data during the data recovery process. This includes making sure that if a cloud service provider uses a data recovery service provider, it should be required to notify the organization. While the need to recover data may be time-sensitive, it is crucial that every effort is made to ensure that the organization\u2019s confidential and sensitive data is protected during the recovery process.<\/p>\n<p>This paper provides a roadmap for mitigating the potential risk of using third-party data recovery providers. The solution to this high-impact risk only requires low-cost policy and procedural changes. It ensures that the confidentiality, integrity, and availability of the organization\u2019s sensitive information are maintained during the data recovery process.<\/p>\n<h2>2021\u20132022 Data Breach Statistics<\/h2>\n<p>Data breaches may originate from malicious attacks, ranging from ransomware to social engineering, system glitches, or simple human negligence. A data breach can occur through internal security flaws, through a third-party vendor or a supply channel vendor.<\/p>\n<p>In a <a href=\"https:\/\/www.ibm.com\/resources\/cost-data-breach-report-2022\" target=\"_blank\" rel=\"noopener\">July 2022 study<\/a>, the Ponemon Institute interviewed members of 550 organizations who had experienced a data breach between March 2021 and March 2022. Malicious attacks that resulted in data loss included ransomware (11%), destructive attacks (17%), and compromised business partners (19%). Unintentional breaches caused by negligent actions of employees or contractors resulted in 21% of data breaches.<\/p>\n<p>According to the Ponemon Institute, the worldwide average cost of a data breach during this period was $4.35 million, with the United States at the top of the chart, averaging $9.44 million for a single data breach. These costs were even higher for healthcare and financial institutions. In addition, the more records that were lost, the higher the cost of the data breach.<\/p>\n<p>The following list includes costs associated with a data breach, which should be considered when developing a cybersecurity plan:<\/p>\n<ul>\n<li>\n<figure id=\"attachment_62865\" aria-describedby=\"caption-attachment-62865\" style=\"width: 400px\" class=\"wp-caption alignright\"><a href=\"\/wp-content\/uploads\/2018\/04\/costs-data-breach-1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-62865\" src=\"\/wp-content\/uploads\/2018\/04\/costs-data-breach-1-749x1024.png\" alt=\"Costs associated with a data breach\" width=\"400\" height=\"547\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/costs-data-breach-1-749x1024.png 749w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/costs-data-breach-1-219x300.png 219w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/costs-data-breach-1-768x1050.png 768w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/costs-data-breach-1.png 918w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><figcaption id=\"caption-attachment-62865\" class=\"wp-caption-text\">Click to enlarge in new tab<\/figcaption><\/figure><\/p>\n<p>A data breach will cost a company the unexpected and unplanned loss of existing customers. Consider implementing programs that preserve customer trust and loyalty to help reduce the number of lost business\/customers in case of a data breach.<\/li>\n<li>Negative publicity and deteriorated company reputation will lead to the diminished acquisition of new customers.<\/li>\n<li>The cost of a data breach depends on the size of the breach or the number of records lost or stolen\u2014the more records lost, the higher the cost.<\/li>\n<li>Cost will increase with the time it takes to identify and contain a data breach. The faster the data breach can be identified and contained, the lower the costs. Disruptive technologies, access to cloud-based applications and data, and the use of mobile devices increase the complexity of dealing with IT security risks and data breaches.<\/li>\n<li>Costs associated with the detection and escalation of the data breach incident: forensic and investigative activities, assessment and audit services, crisis team management, and communications to executive management and the board of directors.<\/li>\n<li>After a data breach, a business must notify and accommodate victims. Associated costs include help desk activities, inbound communications, special investigative activities, remediation, legal expenditures, product discounts, identity protection services, and regulatory interventions. There may also be fines associated with data security compliance inefficiencies.<\/li>\n<\/ul>\n<h2>Security Standards and Protocols<br \/>\nfor Data Recovery<\/h2>\n<p>Governments around the globe are demanding that organizations monitor and take responsibility for the security of regulated data and the actions of their third-party vendors handling that data. Examples of published standards, best practices, reasonable practices and regulations include SOX, GLBA, PCI, PII, HIPAA, FERPA, and guidelines and directives from FDIC, FFIEC, and the FCPA.<\/p>\n<p>However, only a few specifically deal with data recovery vendors. Two examples are listed here: the first from the National Institute of Standards and Technology (NIST) and the latter from the Shared Assessments Groups.<\/p>\n<h4>NIST SP#800.34 Rev. 1-Section 5.1.3, Paragraph #5 reads:<\/h4>\n<blockquote><p>\n&#8220;Organizations may use third-party vendors to recover data from failed storage devices. Organizations should consider the security risk of having their data handled by an outside company and ensure that proper security vetting of the service provider is conducted before turning over equipment. The service provider and employees should sign non-disclosure agreements, be properly bonded, and adhere to organization-specific security policies.&#8221;\n<\/p><\/blockquote>\n<h4>Shared Assessments Group -SIG Risk Assessment Tool -Version 6 -Section G. Communications and Operations Management Section reads as follows:<\/h4>\n<blockquote><p>\nG.4 Do third-party vendors (backup vendors, service providers, equipment support maintenance, software maintenance vendors, data recovery vendors, etc.) have access to scoped systems and data? If so, is there:<\/p>\n<p style=\"padding-left: 30px;\">G.4.1 security review prior to engaging in their services (logical, physical, other corporate controls);<\/p>\n<p style=\"padding-left: 30px;\">G.4.2 security review at least annually, on an ongoing basis;<\/p>\n<p style=\"padding-left: 30px;\">G.4.3 risk assessment or review;<\/p>\n<p style=\"padding-left: 30px;\">G.4.4 confidentiality and\/or Non-Disclosure Agreement requirements; and<\/p>\n<p style=\"padding-left: 30px;\">G.4.5 requirement to notify of changes that might affect services rendered?<\/p>\n<\/blockquote>\n<h4>SSAE 18 SOC 2 Type II<\/h4>\n<p>Compliance with auditing standards, such as the Statement on Standards for Attestation Engagements (SSAE) and Service Organization Control (SOC), assures that every aspect of the facility and network is secure and will protect personal and confidential data from being compromised.<\/p>\n<p>Certified, control-oriented professionals, who have experience in accounting, auditing and information security, conduct an audit of a service provider\u2019s data hosting control objectives, activities and related processes measured over a period of time (typically 6-12 months). The audit focuses on identifying and validating control standards that are deemed most critical to existing and prospective clients of the service provider, and it covers all aspects of security in the facility, both network and physical.<\/p>\n<p>Since the introduction of the 2002 Sarbanes Oxley Act (Section 404) following the Enron debacle, the SOC audit has become the Corporate Industry Standard for an overall control structure. While a SOC Type I audit verifies the \u201cdescription\u201d of controls and safeguards that a service organization claims to have in place, the SOC Type II audit verifies that all data hosting controls and objectives are actually in place, suitably designed, enforced, and operating effectively to achieve all desired security control objectives.<\/p>\n<p>In 2017, the American Institute of Certified Public Accountants (AICPA)enacted updated attestation standards for SOC 1 and 2. All service organizations who wish to certify as maintaining security measures compliant with these protocols must pass Statement on Standards for Attestation Engagements (SSAE) No. 18, otherwise known as SSAE 18, rather than the previous standard, SSAE 16.<\/p>\n<p>The new standards are meant to converge the varying degrees of compliance standards that previously existed and bring all U.S. standards up to international standards of compliance. New requirements by these regulations include regular risk assessment and detailed reporting of the security practices of third-party services used by a company.<\/p>\n<table style=\"border: 1px solid black;\" cellpadding=\"5px\">\n<tbody style=\"hyphens: none;\">\n<tr style=\"background-color: #e31f26; color: white;\">\n<td style=\"width: 130px; border: 1px solid black;\"><strong>SSAE 16<\/strong><\/td>\n<td style=\"width: 130px; border: 1px solid black;\"><strong>SSAE 18<\/strong><\/td>\n<td style=\"width: 130px; border: 1px solid black;\"><strong>SOC I<\/strong><\/td>\n<td style=\"width: 130px; border: 1px solid black;\"><strong>SOC II<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;\">Previous protocol did not address company risk assessment or consider security of third-party services used by a company<\/td>\n<td style=\"border: 1px solid black;\">New protocol requires regular risk assessment and detailed reporting of security practices by third-party services used by a company<\/td>\n<td style=\"border: 1px solid black;\">Review of company documentation; verifies documentation of security protocols<\/td>\n<td style=\"border: 1px solid black;\">Review of company security systems in place; physical on-site review of security protocols<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>General Data Protection Regulation (GDPR) for the European Union (EU)<\/h4>\n<p>Organizations based in the EU that handle data from customers must comply with the General Data Protection Regulation (GDPR), which went into effect on May 25, 2018. The regulation is designed to ensure the security and confidentiality of personal data.<\/p>\n<p>The GDPR not only applies to organizations located within the EU but will also apply to organizations located outside of the EU if they offer goods or services to or monitor the behavior of EU data subjects. It applies to all companies processing and holding the personal data of data subjects residing in the European Union, regardless of the company\u2019s location.<\/p>\n<p>The GDPR standards are meant to converge the varying degrees of compliance standards that previously existed and bring all U.S. standards up to international standards of compliance. Requirements by these regulations include regular risk assessment and detailed reporting of the security practices of third-party services used by a company.<\/p>\n<p>According to the GDPR, organizations must:<\/p>\n<ul>\n<li>Only process data for authorized purposes<\/li>\n<li>Ensure data accuracy and integrity<\/li>\n<li>Minimize subjects\u2019 identity exposure<\/li>\n<li>Implement data security measures<\/li>\n<\/ul>\n<h2>Points to Consider:<\/h2>\n<p>Before engaging the services of a third-party data recovery vendor, organizations must improve their due diligence in order to mitigate the risk of a data breach. Here are some questions to consider:<\/p>\n<ol>\n<li>How does your organization measure the security, reliability, and expertise of third-party data recovery services?<\/li>\n<li>With respect to the protection of sensitive or confidential data during data recovery, how would you rate your company\u2019s vetting process for selecting a secure third-party data recovery service provider?<\/li>\n<li>Does your organization conduct a risk assessment of third-party data recovery services before selecting them?<\/li>\n<\/ol>\n<h2>Conclusion<\/h2>\n<p>Data recovery service providers still play a large role in the organization\u2019s information lifecycle, as the number and complexity of devices increase to facilitate the flow of information.<\/p>\n<p>Board members and C-level executives, in conjunction with senior IT directors, must work together to close the policy and security gap posed by the organization\u2019s need to engage third-party data recovery service providers.<\/p>\n<p>The policy must address the internal guidelines and procedures first and then push them down through contractual modifications to all third-party vendors who handle the corporation\u2019s sensitive data.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-62866 size-full\" src=\"\/wp-content\/uploads\/2018\/04\/Security-Vetting-Checklist-23.01.03.png\" alt=\"vetting checklist\" width=\"925\" height=\"1333\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/Security-Vetting-Checklist-23.01.03.png 925w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/Security-Vetting-Checklist-23.01.03-208x300.png 208w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/Security-Vetting-Checklist-23.01.03-711x1024.png 711w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/04\/Security-Vetting-Checklist-23.01.03-768x1107.png 768w\" sizes=\"auto, (max-width: 925px) 100vw, 925px\" \/>About DriveSavers<\/h2>\n<p>DriveSavers is the worldwide leader in data recovery, with a solid reputation built on outstanding customer service, consistently high success rates, and the fastest Standard Service turnaround time in the business.<\/p>\n<p>For over 40 years, DriveSavers has performed data recovery on every kind of storage device, including hard disk drives (HDDs), solid-state drives (SSDs), smartphones such as iPhone and android phones, tablets, USB flash drives, camera cards and enterprise-level RAID, NAS, and SAN servers.<\/p>\n<p>The company handles every kind of data loss situation, including mechanical failure, physical, water and fire damage, data corruption, file deletions, head crashes, and more.<\/p>\n<p>DriveSavers conducts HDD data recoveries, including hermetically sealed helium drives and other advanced HDD technology, inside a Certified ISO Class 5 Cleanroom that is dust-free and static-free\u2014the most technologically advanced data recovery cleanroom in the industry.<\/p>\n<p>The flash device recovery team includes some of the industry&#8217;s best minds and most skillful microsolderers. This is the type of data storage that is experiencing the most rapid change and advancement, and DriveSavers repeatedly recovers data that others have deemed unrecoverable. The talented data recovery engineers at DriveSavers were the first in the world to recover data from Apple M1 and T2 logic boards that were catastrophically damaged beyond repair.<\/p>\n<p>With annual SOC 2 Type II certification, DriveSavers provides customers with the highest degree of security available in the data recovery industry today. In addition, DriveSavers data recovery engineers are experts in encryption and encrypted data storage technology.<\/p>\n<p>You can view all DriveSavers authorizations and certifications on our website at <a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/why-us\/choosing-a-data-recovery-company-wisely\/\">www.drivesavers.com\/proof<\/a>.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2023\/02\/CybersecurityWhitePaper_23.01.25.pdf\" target=\"_blank\" rel=\"noopener\">Download the printable white paper.<\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Download the printable white paper. Robust risk management is a must in today\u2019s challenging environment of mounting digital attacks on vital company assets and the regulated data they are entrusted to protect. This white paper addresses an often undetected or unattended internal and contractual risk\u2014data recovery. 2021-2022 Data Breach Statistics Security Standards and Protocols for&hellip;","protected":false},"author":25,"featured_media":62893,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[264,54],"tags":[143],"post_series":[],"class_list":["post-10634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-white-papers","tag-security","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Report:The Overlooked Risk in Third-party Data Recovery<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Report:The Overlooked Risk in Third-party Data Recovery\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-05T16:23:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T13:26:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/01\/CS-Report-2023.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Cobb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Cobb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/\"},\"author\":{\"name\":\"Mike Cobb\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\"},\"headline\":\"Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery\",\"datePublished\":\"2023-01-05T16:23:26+00:00\",\"dateModified\":\"2026-03-05T13:26:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/\"},\"wordCount\":2304,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/CS-Report-2023.jpg\",\"keywords\":[\"security\"],\"articleSection\":[\"DriveSavers Blog\",\"White Papers\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/\",\"name\":\"Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/CS-Report-2023.jpg\",\"datePublished\":\"2023-01-05T16:23:26+00:00\",\"dateModified\":\"2026-03-05T13:26:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/CS-Report-2023.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/CS-Report-2023.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/white-papers\\\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Report:The Overlooked Risk in Third-party Data Recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\",\"name\":\"Mike Cobb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"caption\":\"Mike Cobb\"},\"description\":\"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.\",\"sameAs\":[\"http:\\\/\\\/\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/en-ca\\\/author\\\/mikecobb\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Report:The Overlooked Risk in Third-party Data Recovery","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/en-ca\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Report:The Overlooked Risk in Third-party Data Recovery","og_url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2023-01-05T16:23:26+00:00","article_modified_time":"2026-03-05T13:26:46+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/01\/CS-Report-2023.jpg","type":"image\/jpeg"}],"author":"Mike Cobb","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Written by":"Mike Cobb","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/"},"author":{"name":"Mike Cobb","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6"},"headline":"Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery","datePublished":"2023-01-05T16:23:26+00:00","dateModified":"2026-03-05T13:26:46+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/"},"wordCount":2304,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/01\/CS-Report-2023.jpg","keywords":["security"],"articleSection":["DriveSavers Blog","White Papers"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/","url":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/","name":"Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/01\/CS-Report-2023.jpg","datePublished":"2023-01-05T16:23:26+00:00","dateModified":"2026-03-05T13:26:46+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/01\/CS-Report-2023.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/01\/CS-Report-2023.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/white-papers\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Report:The Overlooked Risk in Third-party Data Recovery"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers Data Recovery Services","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Data Recovery","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6","name":"Mike Cobb","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","caption":"Mike Cobb"},"description":"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.","sameAs":["http:\/\/\/"],"url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/author\/mikecobb\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/10634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/comments?post=10634"}],"version-history":[{"count":1,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/10634\/revisions"}],"predecessor-version":[{"id":83198,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/10634\/revisions\/83198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media\/62893"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media?parent=10634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/categories?post=10634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/tags?post=10634"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/post_series?post=10634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}