{"id":44982,"date":"2014-08-31T22:51:30","date_gmt":"2014-08-31T22:51:30","guid":{"rendered":"http:\/\/drivesavers.cyberwalker.com\/?p=3040"},"modified":"2023-12-13T05:01:15","modified_gmt":"2023-12-13T13:01:15","slug":"trends-in-security-of-data-recovery-operations","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/trends-in-security-of-data-recovery-operations\/","title":{"rendered":"Trends in Security of Data Recovery Operations"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4><em>Using an Unscrupulous Data Recovery Vendor Can Result in Loss or Theft of Sensitive and Confidential Information<\/em><\/h4>\n<p><strong>(Novato, CA \u2013 January 10, 2012)<\/strong>\u00a0\u2013 DriveSavers Data Recovery, the worldwide leader in\u00a0<a href=\"\/en-ca\/\">data recovery<\/a>\u00a0services, announced today that the\u00a0Ponemon Institute, a privacy and information management research firm, identifies in its second annual study,\u00a0<em>Trends in Security of Data Recovery Operations<\/em>, new potential threats to the security of confidential and sensitive data when it is outsourced to third-party data recovery vendors. As businesses and government organizations increase their use of data recovery vendors, the potential for data breach during the data recovery process also increases if the vendor\u2019s security protocols are not properly vetted.<\/p>\n<p>\u201cWhile the need to recover data is often time sensitive, every effort must be made to ensure that the organization\u2019s confidential and sensitive data is protected during the recovery process,\u201d said Michael Hall, CISO at DriveSavers Data Recovery. \u201cThe consequence of using an unscrupulous data recovery vendor can lead to loss or theft of sensitive and confidential information. That could mean a major disruption in business, financial loss and in some cases, closure of the business.\u201d<\/p>\n<p>Ponemon interviewed 769 IT security and IT support practitioners in US healthcare, financial and government organizations, most of who report to CIOs and CISOs. Here are the study highlights:<\/p>\n<ul>\n<li><strong>Increased Use of Third-Party Data Recovery Vendors (as often as once a week)<\/strong>\u00a0\u2013 Eighty-five percent of the respondents report their organizations have used or will continue to use a third-party data recovery service provider to recover lost data. This is an increase from 79 percent in the previous study. In fact, 39 percent say they use third parties at least once each week or more.<\/li>\n<li><strong>Loss of Business-critical Data Drives Use of Data Recovery Vendors<\/strong>\u00a0\u2013 Organizations most often use third-party data recovery vendors when intellectual property, financial information and customer\/patient data files have been lost. IT desktop and helpdesk support managers typically select data recovery service providers. Mandated to close job tickets fast, speed ranks higher than security in their selection criterion according to the study.<\/li>\n<li><strong>IT Security Often Excluded from Data Recovery Vendor Selection Process<\/strong>\u00a0\u2013 Fifty-four percent of respondents confirmed that IT security is excluded from selecting third-party data recovery providers, which could play a role in IT support\u2019s placement of speed over security. Organizations admit that they need to improve their due diligence for vetting third-party vendors and their\u00a0<a href=\"\/en-ca\/why-us\/choosing-a-data-recovery-company-wisely\/\">data recovery certification<\/a>.<\/li>\n<li><strong>Data Breaches on the Rise at Data Recovery Vendors<\/strong>\u00a0\u2013 Of the 87 percent of respondents who experienced a data breach in the past two years, 21 percent say the breach occurred when a drive was in the possession of a data recovery vendor. This is an increase from the previous Ponemon study. Many respondents who experienced a data breach during the data recovery process point to the vendor\u2019s lack of security protocols.<\/li>\n<li><strong>Unknown Whether Cloud Service Providers Would Report a Data Loss\/Recovery Incident<\/strong>\u00a0\u2013 More than half of the surveyed organizations use a cloud storage service provider. While 69 percent of the respondents feel notification from the cloud provider should be required if their servers crash and drives are outsourced for data recovery, only a small percent (less than 10 percent) are confident that their service provider would notify them if they engaged the services of a data recovery provider. Fifty-seven percent are not confident that they would be informed at all.<\/li>\n<li><strong>Leading Security Guidelines are not Considered When Selecting a Data Recovery Provider<\/strong>\u00a0\u2013 According to the study, 54 percent of respondents do not require third-party data recovery vendors to comply with leading security guidelines such\u00a0<a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Institute of Standards and Technology<\/a>\u00a0(NIST) and\u00a0<a href=\"https:\/\/www.iso.org\/home.html\" target=\"_blank\" rel=\"noopener noreferrer\">International Organization of Standards for Business, Government and Society<\/a>\u00a0(ISO).<\/li>\n<\/ul>\n<p>Based on the Ponemon findings, organizations should have policy and guidelines in place for selecting and using a data recovery service provider. In addition, organizations need to address potential new threats to the security of data during the data recovery process, including business associate agreements for cloud storage providers that outline the need for notification should a data loss occur and the services of a data recovery vendor be engaged. Respondents of the Ponemon studies developed a\u00a0<a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/why-us\/choosing-a-data-recovery-company-wisely\/\">Data Security Checklist<\/a>\u00a0for vetting third-party data recovery service providers.<\/p>\n<p>Healthcare organizations, government agencies and financial organizations are required by law to meet the most stringent\u00a0<a href=\"\/en-ca\/why-us\/certified-secure-data-recovery\/\">data security guidelines<\/a>\u00a0and are now requiring third-party data recovery vendors to meet these same guidelines. DriveSavers adheres to the Gramm-Leach-Bliley Act Data Security Rule (GLBA), the Data at Rest mandate (DAR), the Sarbanes-Oxley Act (SOX) and Health Insurance Portability and Accountability Act (HIPAA).<\/p>\n<h3>About DriveSavers<\/h3>\n<p>DriveSavers Data Recovery, the worldwide leader in data recovery services, provides the fastest, most reliable and only certified secure data recovery service in the industry. As the only data recovery company to post proof of annual, company-wide\u00a0<a href=\"\/en-ca\/why-us\/certified-secure-data-recovery\/annual-soc-2-type-ii-audit\/\">SOC 2 Type II audit<\/a><span style=\"text-decoration: underline;\">s<\/span>\u00a0and its\u00a0<a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/why-us\/certified-secure-data-recovery\/hipaa-security-compliance\/\">HIPAA data security compliance<\/a>, DriveSavers services meet the security protocols for financial, government, corporate and healthcare industries. DriveSavers also adheres to U.S. Government security protocols, the Gramm-Leach-Bliley Act Data Security Rule (GLBA), the Data at Rest mandate (DAR) and the Sarbanes-Oxley Act (SOX). Known for its technologically advanced\u00a0Certified ISO Class 5\u00a0Cleanroom, the company is authorized to open storage devices by all major storage device manufacturers without voiding the warranty. DriveSavers engineers are trained and certified in all leading encryption and forensic technologies. Satisfied customers include:\u00a0 Bank of America, Google, Lucasfilm, NASA, Harvard University, St. Jude Children\u2019s Research Hospital, U.S. Army and Sandia National Laboratories.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Using an Unscrupulous Data Recovery Vendor Can Result in Loss or Theft of Sensitive and Confidential Information (Novato, CA \u2013 January 10, 2012)\u00a0\u2013 DriveSavers Data Recovery, the worldwide leader in\u00a0data recovery\u00a0services, announced today that the\u00a0Ponemon Institute, a privacy and information management research firm, identifies in its second annual study,\u00a0Trends in Security of Data Recovery Operations,&hellip;","protected":false},"author":8,"featured_media":48325,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[59,143],"post_series":[],"class_list":["post-44982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-data-recovery","tag-security","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Trends in Security of Data Recovery Operations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/trends-in-security-of-data-recovery-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trends in Security of Data Recovery Operations\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/trends-in-security-of-data-recovery-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-31T22:51:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-13T13:01:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2014\/08\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1046\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sandia Castro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sandia Castro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/\"},\"author\":{\"name\":\"Sandia Castro\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/6658e575077d08bddb1f31546e2676f0\"},\"headline\":\"Trends in Security of Data Recovery Operations\",\"datePublished\":\"2014-08-31T22:51:30+00:00\",\"dateModified\":\"2023-12-13T13:01:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/\"},\"wordCount\":931,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg\",\"keywords\":[\"data recovery\",\"security\"],\"articleSection\":[\"DriveSavers Blog\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/\",\"name\":\"Trends in Security of Data Recovery Operations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg\",\"datePublished\":\"2014-08-31T22:51:30+00:00\",\"dateModified\":\"2023-12-13T13:01:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg\",\"width\":2000,\"height\":1046},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/trends-in-security-of-data-recovery-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trends in Security of Data Recovery Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/6658e575077d08bddb1f31546e2676f0\",\"name\":\"Sandia Castro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f0f234f9c9e9052898f9e4423250276f4867ee1361581d9b07ebdf070de64ca4?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f0f234f9c9e9052898f9e4423250276f4867ee1361581d9b07ebdf070de64ca4?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f0f234f9c9e9052898f9e4423250276f4867ee1361581d9b07ebdf070de64ca4?s=96&d=blank&r=g\",\"caption\":\"Sandia Castro\"},\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/en-ca\\\/author\\\/sandiac\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Trends in Security of Data Recovery Operations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/trends-in-security-of-data-recovery-operations\/","og_locale":"en_US","og_type":"article","og_title":"Trends in Security of Data Recovery Operations","og_url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/trends-in-security-of-data-recovery-operations\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2014-08-31T22:51:30+00:00","article_modified_time":"2023-12-13T13:01:15+00:00","og_image":[{"width":2000,"height":1046,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2014\/08\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg","type":"image\/jpeg"}],"author":"Sandia Castro","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Written by":"Sandia Castro","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/"},"author":{"name":"Sandia Castro","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/6658e575077d08bddb1f31546e2676f0"},"headline":"Trends in Security of Data Recovery Operations","datePublished":"2014-08-31T22:51:30+00:00","dateModified":"2023-12-13T13:01:15+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/"},"wordCount":931,"commentCount":0,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2014\/08\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg","keywords":["data recovery","security"],"articleSection":["DriveSavers Blog"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/","name":"Trends in Security of Data Recovery Operations","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2014\/08\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg","datePublished":"2014-08-31T22:51:30+00:00","dateModified":"2023-12-13T13:01:15+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2014\/08\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2014\/08\/DB-TRENDS-IN-SECURITY-OF-DATA-RECOVERY-OPERATIONS-scaled-e1696338903216.jpg","width":2000,"height":1046},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/trends-in-security-of-data-recovery-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Trends in Security of Data Recovery Operations"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers Data Recovery Services","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Data Recovery","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/6658e575077d08bddb1f31546e2676f0","name":"Sandia Castro","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/f0f234f9c9e9052898f9e4423250276f4867ee1361581d9b07ebdf070de64ca4?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f0f234f9c9e9052898f9e4423250276f4867ee1361581d9b07ebdf070de64ca4?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0f234f9c9e9052898f9e4423250276f4867ee1361581d9b07ebdf070de64ca4?s=96&d=blank&r=g","caption":"Sandia Castro"},"url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/author\/sandiac\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/44982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/comments?post=44982"}],"version-history":[{"count":0,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/44982\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media\/48325"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media?parent=44982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/categories?post=44982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/tags?post=44982"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/post_series?post=44982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}