{"id":67413,"date":"2023-12-06T18:46:02","date_gmt":"2023-12-07T02:46:02","guid":{"rendered":"https:\/\/drivesaversdatarecovery.com\/?p=67413"},"modified":"2026-02-25T06:31:52","modified_gmt":"2026-02-25T14:31:52","slug":"ransomware-recovery-outsmarting-criminal-minds","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/en-gb\/blog\/ransomware-recovery-outsmarting-criminal-minds\/","title":{"rendered":"Ransomware Recovery: Outsmarting Criminal Minds"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1680720666470 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-10 vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative no-bottom-margins tablet-fullwidth-columns\"><div class=\"wpb_column vc_column_container vc_col-sm-3 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"800\" height=\"800\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" decoding=\"async\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide.png 800w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide-300x300.png 300w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide-150x150.png 150w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide-768x768.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/div><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Since the digital age began, the term &#8220;ransom&#8221; has taken on a whole new meaning. Ransomware, a malicious software often perceived as infiltrating and permanently compromising entire computer systems or networks to hold data hostage, poses a persistent threat in today&#8217;s interconnected world.<\/p>\n<p>In this article, we explore the captivating world of ransomware and reveal the DriveSavers secret weapon that can rescue an organization from the clutches of cybercriminals\u2014data recovery.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"1200\" height=\"627\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"data governance and maintenance includes data deletion\" decoding=\"async\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13.png 1200w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13-300x157.png 300w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13-1024x535.png 1024w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13-768x401.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/div><\/figure><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665009131074 vc_rtl-columns-reverse vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h2\"><span class=\"vcex-heading-inner wpex-inline-block\">How Ransomware Sneaks In<\/span><\/h2><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>A ransomware infection is a digital kidnapping where attackers encrypt your data and demand a ransom for its release.<\/p>\n<p>Ransomware attackers don\u2019t always stop at making an organization\u2019s data inaccessible; they may also threaten to expose private or protected information, adding another sinister twist to the ordeal. The primary objective, however, is simple: they want money.<\/p>\n<p>So, how does this nefarious software find its way into a computer, server, or multiple devices? Cybercriminals have found multiple ways to infiltrate digital fortresses and install ransomware through various cunning means:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ol>\n<li><strong>Phishing Emails:<\/strong> One of the most common entry points for ransomware is deceptive emails. An employee clicks a seemingly innocent link or attachment, and bam! Files throughout the connected system are taken hostage.<\/li>\n<li><strong>Compromised Websites:<\/strong> Visiting the wrong website can spell trouble. Some websites harbor ransomware, just waiting to pounce on unsuspecting visitors.<\/li>\n<li><strong>Exploiting Vulnerabilities:<\/strong> Outdated software and unpatched systems are like open doors for ransomware. Attackers exploit these weaknesses to infiltrate a digital domain.<\/li>\n<\/ol>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h2\"><span class=\"vcex-heading-inner wpex-inline-block\">The Ransomware Riddle<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>One day you discover that all your files, photos, and documents are locked. In a digital vault. And the only key is in the hands of a cybercriminal, who is asking you to pay them to get your data back. What do you do? Do you have to pay them? Are there options?<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h2\"><span class=\"vcex-heading-inner wpex-inline-block\">Enter DriveSavers Data Recovery: The Hero of the Hour<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Now that you know the enemy, it&#8217;s time to meet the hero\u2014data recovery. When ransomware strikes, panic often sets in. But remember, all hope is not lost. Here&#8217;s how DriveSavers, the ransomware solution champion, can save the day:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:10px;\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul>\n<li><strong>Repairing Structural Damage:<\/strong> The engineers are able to repair structural damage caused by encryption.<\/li>\n<li><strong>Post-Decryption Repairs:<\/strong> DriveSavers can fix files left in a corrupted state after decryption.<\/li>\n<li><strong>Seeking Unaffected Versions:<\/strong> Data recovery engineers scour for older, deleted, or other versions of your data that remain untouched by the ransomware&#8217;s grip.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul>\n<li><strong>Alternative Data Sources:<\/strong> DriveSavers can hunt for data in alternative sources that have not been encrypted by ransomware for file recovery, like data backup tapes and cloud assets.<\/li>\n<li><strong>Decryptor Magic:<\/strong> DriveSavers data recovery engineers have the expertise to reverse the damage done by the threat actor by using or modifying decryptors.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h2\"><span class=\"vcex-heading-inner wpex-inline-block\">Tips for Ransomware Protection<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Of course, prevention is the best medicine. Here are some effective data protection methods for an organization to keep ransomware at bay:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-list_item.vcex_69dea09525d47 .vcex-list-item-icon-inner{color:#e31f26;}<\/style><div class=\"vcex-list_item vcex-module wpex-m-0 wpex-max-w-100 wpex-mb-5 vcex_69dea09525d47\"><div class=\"vcex-list-item-inner wpex-inline-flex wpex-flex-no-wrap\"><div class=\"vcex-list-item-icon wpex-mr-10\"><div class=\"vcex-list-item-icon-inner vcex-icon-wrap wpex-inline-flex wpex-justify-center wpex-items-center wpex-leading-none wpex-child-inherit-color\"><span class=\"wpex-icon--w wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M64 80c-8.8 0-16 7.2-16 16V416c0 8.8 7.2 16 16 16H384c8.8 0 16-7.2 16-16V96c0-8.8-7.2-16-16-16H64zM0 96C0 60.7 28.7 32 64 32H384c35.3 0 64 28.7 64 64V416c0 35.3-28.7 64-64 64H64c-35.3 0-64-28.7-64-64V96zM337 209L209 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L303 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/div><\/div><div class=\"vcex-list-item-text vcex-content wpex-flex-grow\"><strong>Disable Remote Desktop:<\/strong> Make it a policy with employees to shut down their remote desktops when they aren\u2019t using them.<\/div><\/div><\/div><style>.vcex-list_item.vcex_69dea09526632 .vcex-list-item-icon-inner{color:#e31f26;}<\/style><div class=\"vcex-list_item vcex-module wpex-m-0 wpex-max-w-100 wpex-mb-5 vcex_69dea09526632\"><div class=\"vcex-list-item-inner wpex-inline-flex wpex-flex-no-wrap\"><div class=\"vcex-list-item-icon wpex-mr-10\"><div class=\"vcex-list-item-icon-inner vcex-icon-wrap wpex-inline-flex wpex-justify-center wpex-items-center wpex-leading-none wpex-child-inherit-color\"><span class=\"wpex-icon--w wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M64 80c-8.8 0-16 7.2-16 16V416c0 8.8 7.2 16 16 16H384c8.8 0 16-7.2 16-16V96c0-8.8-7.2-16-16-16H64zM0 96C0 60.7 28.7 32 64 32H384c35.3 0 64 28.7 64 64V416c0 35.3-28.7 64-64 64H64c-35.3 0-64-28.7-64-64V96zM337 209L209 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L303 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/div><\/div><div class=\"vcex-list-item-text vcex-content wpex-flex-grow\"><strong>Regular Software Updates:<\/strong> Keep security software, applications, and operating systems up to date on all company storage devices. Unpatched systems are like open doors for hackers.<\/div><\/div><\/div><style>.vcex-list_item.vcex_69dea09526eaf .vcex-list-item-icon-inner{color:#e31f26;}<\/style><div class=\"vcex-list_item vcex-module wpex-m-0 wpex-max-w-100 wpex-mb-5 vcex_69dea09526eaf\"><div class=\"vcex-list-item-inner wpex-inline-flex wpex-flex-no-wrap\"><div class=\"vcex-list-item-icon wpex-mr-10\"><div class=\"vcex-list-item-icon-inner vcex-icon-wrap wpex-inline-flex wpex-justify-center wpex-items-center wpex-leading-none wpex-child-inherit-color\"><span class=\"wpex-icon--w wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M64 80c-8.8 0-16 7.2-16 16V416c0 8.8 7.2 16 16 16H384c8.8 0 16-7.2 16-16V96c0-8.8-7.2-16-16-16H64zM0 96C0 60.7 28.7 32 64 32H384c35.3 0 64 28.7 64 64V416c0 35.3-28.7 64-64 64H64c-35.3 0-64-28.7-64-64V96zM337 209L209 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L303 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/div><\/div><div class=\"vcex-list-item-text vcex-content wpex-flex-grow\"><strong>Firewalls and Antivirus:<\/strong> Always install updates as soon as they are available on all company devices.<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-list_item.vcex_69dea095279d7 .vcex-list-item-icon-inner{color:#e31f26;}<\/style><div class=\"vcex-list_item vcex-module wpex-m-0 wpex-max-w-100 wpex-mb-5 vcex_69dea095279d7\"><div class=\"vcex-list-item-inner wpex-inline-flex wpex-flex-no-wrap\"><div class=\"vcex-list-item-icon wpex-mr-10\"><div class=\"vcex-list-item-icon-inner vcex-icon-wrap wpex-inline-flex wpex-justify-center wpex-items-center wpex-leading-none wpex-child-inherit-color\"><span class=\"wpex-icon--w wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M64 80c-8.8 0-16 7.2-16 16V416c0 8.8 7.2 16 16 16H384c8.8 0 16-7.2 16-16V96c0-8.8-7.2-16-16-16H64zM0 96C0 60.7 28.7 32 64 32H384c35.3 0 64 28.7 64 64V416c0 35.3-28.7 64-64 64H64c-35.3 0-64-28.7-64-64V96zM337 209L209 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L303 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/div><\/div><div class=\"vcex-list-item-text vcex-content wpex-flex-grow\"><strong>Beware of Malicious Emails:<\/strong> Train employees to be suspicious of all unexpected emails and attachments (even from people they know), to be vigilant about suspicious links, and how to recognize phishing emails. It\u2019s beneficial to hire a security training service, such as <a href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\" rel=\"noopener\">KnowBe4<\/a>.<\/div><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 5px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><style>.vcex-list_item.vcex_69dea0952848f .vcex-list-item-icon-inner{color:#e31f26;}<\/style><div class=\"vcex-list_item vcex-module wpex-m-0 wpex-max-w-100 wpex-mb-5 vcex_69dea0952848f\"><div class=\"vcex-list-item-inner wpex-inline-flex wpex-flex-no-wrap\"><div class=\"vcex-list-item-icon wpex-mr-10\"><div class=\"vcex-list-item-icon-inner vcex-icon-wrap wpex-inline-flex wpex-justify-center wpex-items-center wpex-leading-none wpex-child-inherit-color\"><span class=\"wpex-icon--w wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M64 80c-8.8 0-16 7.2-16 16V416c0 8.8 7.2 16 16 16H384c8.8 0 16-7.2 16-16V96c0-8.8-7.2-16-16-16H64zM0 96C0 60.7 28.7 32 64 32H384c35.3 0 64 28.7 64 64V416c0 35.3-28.7 64-64 64H64c-35.3 0-64-28.7-64-64V96zM337 209L209 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L303 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/div><\/div><div class=\"vcex-list-item-text vcex-content wpex-flex-grow\"><strong>IP Address Restrictions:<\/strong>Limit access to trusted networks only.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h2\"><span class=\"vcex-heading-inner wpex-inline-block\">Ransomware: The Final Showdown<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>In the unfortunate event of a ransomware attack, disconnect from the internet and other devices immediately. And don&#8217;t despair\u2014DriveSavers is a proven solution. We have the expertise to outsmart these criminal minds and retrieve your valuable data from ransomware.<\/p>\n<p>Before contacting the attackers, get in touch with DriveSavers. Our solutions might recover more data than you&#8217;d ever get by paying the ransom. Plus, we ensure no further damage or malware access while in our lab. If you have already contacted the threat actor, still call us. DriveSavers can help before, after, or concurrent to any action you take. We will collaborate with security professionals and incident response teams to help your organization recover from the cyberattack.<\/p>\n<p>With almost 40 years of experience and cutting-edge data recovery techniques, DriveSavers is your ultimate business continuity ally in the battle against ransomware attacks. So, stay vigilant, keep your systems updated, and remember, when ransomware locks you out, DriveSavers Data Recovery can help you get back in!<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><div class=\"vcex-multi-buttons wpex-flex wpex-flex-wrap wpex-items-center wpex-gap-10 wpex-justify-center\"><a href=\"https:\/\/drivesaversdatarecovery.com\/en-gb\/ransomware-data-recovery\/\" title=\"Data Erasure Verification Service\" class=\"theme-button outline wpex-text-center  wpb_animate_when_almost_visible wpb_bounceIn bounceIn vcex-count-1\">Ransomware Data Recovery Service<\/a><a href=\"https:\/\/drivesaversdatarecovery.com\/en-gb\/partner-programs\/business\/\" title=\"Business Partner Program\" class=\"theme-button outline wpex-text-center vcex-count-2\">Business Partner Program<\/a><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Since the digital age began, the term \"ransom\" has taken on a whole new meaning. Ransomware, a malicious software often perceived as infiltrating and permanently compromising entire computer systems or networks to hold data hostage, poses a persistent threat in today's interconnected world. In this article, we explore the captivating world of ransomware and reveal&hellip;","protected":false},"author":25,"featured_media":67416,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[221],"post_series":[],"class_list":["post-67413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-ransomware","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware Recovery: Outsmarting Criminal Minds<\/title>\n<meta name=\"description\" content=\"Explore the captivating world of ransomware and the weapon that can rescue an organization from the clutches of cybercriminals\u2014data recovery.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/en-gb\/blog\/ransomware-recovery-outsmarting-criminal-minds\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Recovery: Outsmarting Criminal Minds\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/en-gb\/blog\/ransomware-recovery-outsmarting-criminal-minds\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-07T02:46:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T14:31:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mike Cobb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Cobb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/\"},\"author\":{\"name\":\"Mike Cobb\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\"},\"headline\":\"Ransomware Recovery: Outsmarting Criminal Minds\",\"datePublished\":\"2023-12-07T02:46:02+00:00\",\"dateModified\":\"2026-02-25T14:31:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/\"},\"wordCount\":1373,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/DriveSavers-Thumbnails-2023-13.png\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"DriveSavers Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/\",\"name\":\"Ransomware Recovery: Outsmarting Criminal Minds\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/DriveSavers-Thumbnails-2023-13.png\",\"datePublished\":\"2023-12-07T02:46:02+00:00\",\"dateModified\":\"2026-02-25T14:31:52+00:00\",\"description\":\"Explore the captivating world of ransomware and the weapon that can rescue an organization from the clutches of cybercriminals\u2014data recovery.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/DriveSavers-Thumbnails-2023-13.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/DriveSavers-Thumbnails-2023-13.png\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/ransomware-recovery-outsmarting-criminal-minds\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Recovery: Outsmarting Criminal Minds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\",\"name\":\"Mike Cobb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"caption\":\"Mike Cobb\"},\"description\":\"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.\",\"sameAs\":[\"http:\\\/\\\/\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/en-gb\\\/author\\\/mikecobb\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware Recovery: Outsmarting Criminal Minds","description":"Explore the captivating world of ransomware and the weapon that can rescue an organisation from the clutches of cybercriminals\u2014data recovery.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/en-gb\/blog\/ransomware-recovery-outsmarting-criminal-minds\/","og_locale":"en_GB","og_type":"article","og_title":"Ransomware Recovery: Outsmarting Criminal Minds","og_url":"https:\/\/drivesaversdatarecovery.com\/en-gb\/blog\/ransomware-recovery-outsmarting-criminal-minds\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2023-12-07T02:46:02+00:00","article_modified_time":"2026-02-25T14:31:52+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13.png","type":"image\/png"}],"author":"Mike Cobb","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Written by":"Mike Cobb","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/"},"author":{"name":"Mike Cobb","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6"},"headline":"Ransomware Recovery: Outsmarting Criminal Minds","datePublished":"2023-12-07T02:46:02+00:00","dateModified":"2026-02-25T14:31:52+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/"},"wordCount":1373,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13.png","keywords":["ransomware"],"articleSection":["DriveSavers Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/","name":"Ransomware Recovery: Outsmarting Criminal Minds","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13.png","datePublished":"2023-12-07T02:46:02+00:00","dateModified":"2026-02-25T14:31:52+00:00","description":"Explore the captivating world of ransomware and the weapon that can rescue an organisation from the clutches of cybercriminals\u2014data recovery.","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2023\/12\/DriveSavers-Thumbnails-2023-13.png","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/ransomware-recovery-outsmarting-criminal-minds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware Recovery: Outsmarting Criminal Minds"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers Data Recovery Services","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Data Recovery","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6","name":"Mike Cobb","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","caption":"Mike Cobb"},"description":"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.","sameAs":["http:\/\/\/"],"url":"https:\/\/drivesaversdatarecovery.com\/en-gb\/author\/mikecobb\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/posts\/67413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/comments?post=67413"}],"version-history":[{"count":1,"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/posts\/67413\/revisions"}],"predecessor-version":[{"id":82763,"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/posts\/67413\/revisions\/82763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/media\/67416"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/media?parent=67413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/categories?post=67413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/tags?post=67413"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-gb\/wp-json\/wp\/v2\/post_series?post=67413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}