{"id":11811,"date":"2018-08-01T11:34:07","date_gmt":"2018-08-01T18:34:07","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=11811"},"modified":"2026-03-09T07:24:12","modified_gmt":"2026-03-09T14:24:12","slug":"nist-computer-security-division-updates-effective-today-is-your-security-up-to-date","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/","title":{"rendered":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>By Michael Hall, Chief Information Security Officer<\/em><\/p>\n<p>Effective today, <a href=\"https:\/\/csrc.nist.gov\/\" target=\"_blank\" rel=\"noopener\">NIST\u2019s Computer Security Division<\/a> just updated their recommended guidelines by eliminating eleven SP 800 publications.<\/p>\n<h2>Adding by Subtracting<\/h2>\n<p>How would eliminating security recommendations be an improvement?<br \/>\nThese eleven publications all reference technology that is out of date or no longer used, and implementations that have been improved since the original writing of these guidelines. Therefore, eliminating these old items clears some of the clutter and allows for easier access and implementation of more current and updated recommendations located in the remaining SP 800 publications.<br \/>\nHere are the sections removed and reasons why per <a href=\"https:\/\/csrc.nist.gov\/News\/2018\/NIST-to-Withdraw-Eleven-Outdated-SP-800-Pubs\" target=\"_blank\" rel=\"noopener\">NIST\u2019s announcement<\/a>:<\/p>\n<ul>\n<li><em>SP 800-13 (October 1995), Telecommunications Security Guidelines for Telecommunications Management Network:<\/em>\n<ul>\n<li><em>Describes technologies that are out of date.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-17 (February 1998), Modes of Operation Validation System (MOVS): Requirements and Procedures:<\/em>\n<ul>\n<li><em>This validation system is for algorithms that have been deprecated (e.g., DES, Skipjack). For information on current algorithm validation systems, see the Cryptographic Algorithm Validation Program (CAVP).<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-19 (October 1999), Mobile Agent Security:<\/em>\n<ul>\n<li><em>Today\u2019s environment and technologies are significantly more complex than the environment treated in this publication.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-23 (August 2000), Guidelines to Federal Organizations on Security Assurance and Acquisition\/Use of Tested\/Evaluated Products:<\/em>\n<ul>\n<li><em>Pre-dates many relevant laws, regulations, and executive directives, and does not reflect NIST\u2019s current validation programs, Risk Management Framework, or the Cybersecurity Framework. For a current overview, see SP 800-12 Rev. 1, An Introduction to Information Security.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-24 (April 2001), PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does:<\/em>\n<ul>\n<li><em>Does not address newer technologies, such as Voice Over IP (VOIP); includes references to \u201csecurity controls\u201d that pre-date SP 800-53.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-33 (December 2001), Underlying Technical Models for Information Technology Security:<\/em>\n<ul>\n<li><em>Describes a model that pre-dates the Risk Management Framework and Cybersecurity Framework.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-36 (October 2003), Guide to Selecting Information Technology Security Products:<\/em>\n<ul>\n<li><em>Does not reflect current security product types, and references are outdated.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-43 (November 2002), Systems Administration Guidance for Securing Windows 2000 Professional System:<\/em>\n<ul>\n<li><em>This operating system is no longer supported.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-65 (January 2005), Integrating IT Security into the Capital Planning and Investment Control Process:<\/em>\n<ul>\n<li><em>Pre-dates important NIST guidance such as SP 800-53 Rev. 4, SP 800-53A Rev. 4, and the Cybersecurity Framework.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-68 Rev. 1 (October 2008), Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist:<\/em>\n<ul>\n<li><em>This operating system is no longer supported.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><em>SP 800-69 (September 2006), Guidance for Securing Microsoft\u00a0<\/em><em>Windows XP Home Edition: A NIST Security Configuration Checklist:<\/em>\n<ul>\n<li><em>This operating system is no longer supported.<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Is Your Security Policy Up to Date?<\/h2>\n<p>The NIST update reminds us that, as technology becomes outdated and gets swapped out, so should parts of our security policy related to data and technology.<br \/>\nCompany-owned devices often hold security-sensitive electronically stored information (ESI), including critical intellectual property (IP), financial databases, accounting files, e-mail exchanges, customer records, PCI, PII and PHI. When you factor in costs associated with a security breach resulting in theft or other unauthorized access, such as investigations, crisis management, notification of victims, legal expenses and loss of customers, the price tag that may result from a flaw in a company\u2019s security protocol quickly adds up.<br \/>\nAccording to the Ponemon Institute, the average cost of a data breach in the United States in 2017 was $225 per record, averaging $7.35 million total organizational cost per breach. These costs were even higher for healthcare and financial institutions. In addition, the more records that were lost, the higher the cost of the data breach.<br \/>\nAs technology changes approximately every ten months or less, it\u2019s a good idea to regularly review your company security policy and make sure it is not referring to outdated technology and includes not only new technology but new security threats as well.<\/p>\n<h2>How to Be Prepared and Stay Prepared<\/h2>\n<p>Here are some tips for staying on top of data security for your company.<\/p>\n<h3>Conduct a Risk Analysis<\/h3>\n<p>Also known as \u201cgap analysis\u201d or \u201csecurity risk assessment,\u201d risk analysis is the first step towards both developing and updating a data security policy. Security risk assessments should be conducted annually, biannually or any time something changes, such as the purchase of new equipment or expansion of company services.<\/p>\n<h3>Review Access and Authorization<\/h3>\n<p>As part of conducting a risk analysis, there are a number of areas and methods to review for proper security, including physical areas. Access should be physically unavailable to anyone who is not authorized.<\/p>\n<h3>Update the Company Data Security Policy<\/h3>\n<p>Read over your company data security policy and verify that it addresses all risks identified during your risk analysis. Add items that are not included and eliminate items that are no longer relevant.<\/p>\n<h3>Verify Staff and Third-party Providers<\/h3>\n<p>Conduct background checks of all new employees. Third-party providers should also be vetted to make sure they follow documented security protocols identical to or more robust than those in place within your company. Particular attention should be paid to third-party vendors who have access to company computers, phones and can otherwise access company data, such as data recovery vendors.<\/p>\n<p>The April 2018 Cybersecurity Report from DriveSavers highlights the overlooked risk in third-party data recovery and includes a security vetting checklist. The checklist is specific to vetting data recovery services; however, many of the items listed can apply to all third-party vendors and is a great resource when vetting companies you may start working with.<\/p>\n<h3>Educate and Enforce<\/h3>\n<p>Hold mandatory security training and awareness programs, making sure to require signatures on mandatory reading materials. Enforce security policies and procedures through use of penalties. Education should always be part of both implementation and enforcement. This is absolutely the most important part of your company security and must be offered continuously.<\/p>\n<h2>What Do You Have to Lose?<\/h2>\n<p>Does your company hold any patents, have proprietary formulas or \u201csecret recipes\u201d that give it a competitive advantage? Does your company store any customer credit card information, social security numbers or other personal data that could impact them if it was stolen?<\/p>\n<p>Think of what might happen if company data was accessed by the wrong person or persons. Follow NIST\u2019s example. Keep your organization and customers safe by keeping the company security policy up to date and enforced.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"By Michael Hall, Chief Information Security Officer Effective today, NIST\u2019s Computer Security Division just updated their recommended guidelines by eliminating eleven SP 800 publications. Adding by Subtracting How would eliminating security recommendations be an improvement? These eleven publications all reference technology that is out of date or no longer used, and implementations that have been&hellip;","protected":false},"author":30,"featured_media":45272,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[143],"post_series":[],"class_list":["post-11811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-security","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-01T18:34:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T14:24:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1046\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\"},\"author\":{\"name\":\"Michelle West\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\"},\"headline\":\"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?\",\"datePublished\":\"2018-08-01T18:34:07+00:00\",\"dateModified\":\"2026-03-09T14:24:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\"},\"wordCount\":1053,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/nist-security1-scaled-e1698757371792.jpg\",\"keywords\":[\"security\"],\"articleSection\":[\"DriveSavers Blog\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\",\"name\":\"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/nist-security1-scaled-e1698757371792.jpg\",\"datePublished\":\"2018-08-01T18:34:07+00:00\",\"dateModified\":\"2026-03-09T14:24:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/nist-security1-scaled-e1698757371792.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/nist-security1-scaled-e1698757371792.jpg\",\"width\":2000,\"height\":1046},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\",\"name\":\"Michelle West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"caption\":\"Michelle West\"},\"description\":\"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/west-michelle\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/en-ca\\\/author\\\/michelle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/","og_locale":"en_US","og_type":"article","og_title":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?","og_url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2018-08-01T18:34:07+00:00","article_modified_time":"2026-03-09T14:24:12+00:00","og_image":[{"width":2000,"height":1046,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","type":"image\/jpeg"}],"author":"Michelle West","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Written by":"Michelle West","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/"},"author":{"name":"Michelle West","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c"},"headline":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?","datePublished":"2018-08-01T18:34:07+00:00","dateModified":"2026-03-09T14:24:12+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/"},"wordCount":1053,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","keywords":["security"],"articleSection":["DriveSavers Blog"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/","name":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","datePublished":"2018-08-01T18:34:07+00:00","dateModified":"2026-03-09T14:24:12+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/08\/nist-security1-scaled-e1698757371792.jpg","width":2000,"height":1046},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-computer-security-division-updates-effective-today-is-your-security-up-to-date\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"NIST Computer Security Division Updates Effective Today \u2013 Is Your Security Up to Date?"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers Data Recovery Services","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Data Recovery","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c","name":"Michelle West","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","caption":"Michelle West"},"description":"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.","sameAs":["https:\/\/www.linkedin.com\/in\/west-michelle\/"],"url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/author\/michelle\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/11811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/comments?post=11811"}],"version-history":[{"count":2,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/11811\/revisions"}],"predecessor-version":[{"id":83269,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/11811\/revisions\/83269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media\/45272"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media?parent=11811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/categories?post=11811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/tags?post=11811"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/post_series?post=11811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}