{"id":83286,"date":"2026-05-02T08:22:49","date_gmt":"2026-05-02T15:22:49","guid":{"rendered":"https:\/\/drivesaversdatarecovery.com\/?p=83286"},"modified":"2026-05-07T12:19:48","modified_gmt":"2026-05-07T19:19:48","slug":"pre-incident-planning-5-things-to-document-in-an-incident-response-plan","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/","title":{"rendered":"\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u767a\u751f\u524d\u306e\u8a08\u753b\uff1a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u8a08\u753b\u306b\u8a18\u8f09\u3059\u3079\u304d5\u3064\u306e\u9805\u76ee"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div id=\"case-study-image-and-title\" class=\"vc_section blog-header-top-padding vc_custom_1742716765886 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative wpex-vc_section-has-fill wpex-vc-reset-negative-margin\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t  <style>\n\n\n.blog-educational-image img {}\n\n.vcex-video.wpex-bg-black {\n  border-radius: 15px;\n  overflow: hidden;\n}\n\n.vcex-video-inner video {\n  border-radius: 15px;\n}\n\n.vcex-image vcex-image-img {\n  border-radius: 15px;\n}\n\n\n.case-study-video {\nborder-radius: 15px !important;\n}\n\n.cs-red-heading {\n      color: #EC0912;\nfont-weight: 600;\n    }\n.vcex-heading-inner {\nmargin-bottom:12px;\n}\n        .single-post-title {\n            display: none;\n        }\n    ul.meta {\n       display:none;\n        }\n\n.parent-div {\n  display: flex !important;       \/* Lay the items out in a row by default (desktop) *\/\n  flex-wrap: nowrap !important;   \/* Prevent wrapping on large screens *\/\n}\n\n\/* When the screen is below, say, 768px, wrap and make each child 50% width *\/\n@media (max-width: 768px) {\n  .parent-div {\n    flex-wrap: wrap !important;   \/* Allow wrapping on smaller screens (mobile) *\/\nfont-size: 15px !important;\n  }\n  .parent-div > div {\n    width: 50% !important;        \/* 2 columns (two items per row) *\/\n    box-sizing: border-box !important; \n  }\n.cs-quote-headshot {text-align: center;margin-bottom:13px;}\n.cs-quote-box {\n    margin-left: 30px;\n    margin-right: 30px;\n\n}\n.cs-quote-headshot-image {\nmax-width: 170px;\nmargin-bottom:13px;\nmargin: auto;\n}\n.cs-quote-nametitle {\ntext-align: center !important;\nalign-items: center !important;\n}\n\n}\n\n.cs-main-image-header .wpex-p-30 {\n    padding: 0 !important;\n    padding-left: 3% !important;\n    padding-bottom: 3% !important;\n}\n\n.cs-main-image-header .wpex-items-center {\n    align-items: end !important;\n}\n\n@media screen and (max-width: 1300px) {\n    .cs-main-image-header .vcex-ib-content .vcex-ib-title {\n        font-size: 3.5vw !important;\n    }\n\n    .cs-main-image-header .vcex-ib-content .vcex-ib-caption {\n        font-size: 5.5vw !important;\n    }\n}\n\n.cs-main-image-header .vcex-ib-content {\n text-shadow: 0 0 10px #000; \n}\n\n\/* \u2705 Normalize all watermark containers *\/\n[class*=\"blog-watermark-\"] .vcex-image-inner {\n    position: relative;\n    display: block !important;   \/* Force block layout to override wpex-inline-block *\/\n    width: 100%;\n    height: auto;\n    line-height: 0;              \/* Remove inline spacing *\/\n    text-align: left;\n    vertical-align: top;\n}\n\n\/* \u2705 Normalize the image itself *\/\n[class*=\"blog-watermark-\"] .vcex-image-img {\n    display: block;\n    width: 100%;\n    height: auto;\n}\n\n\/* \u2705 Bottom Right Watermark *\/\n.blog-watermark-low-right .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    bottom: 2%;\n    right: -5% !important;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 20%;\n    height: 20%;\n    pointer-events: none;\n    z-index: 10;\n}\n\n\/* \u2705 Bottom Left Watermark *\/\n.blog-watermark-low-left .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    bottom: 2%;\n    left: 2%;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 20%;\n    height: 20%;\n    pointer-events: none;\n    z-index: 10;\n}\n\n\/* \u2705 Top Right Watermark *\/\n.blog-watermark-up-right .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    top: 2%;\n    right: 2%;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 15%;\n    height: 15%;\n    pointer-events: none;\n    z-index: 10;\n}\n\n\/* \u2705 Top Left Watermark *\/\n.blog-watermark-up-left .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    top: 2%;\n    left: 2%;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 20%;\n    height: 20%;\n    pointer-events: none;\n    z-index: 10;\n}\n\n.blog-watermark-first .vcex-image-inner {\n    position: relative !important;\n    display: block !important;\n    width: 100% !important;\n    height: auto !important;\n    line-height: 0 !important;\n    text-align: left !important;\n    vertical-align: top !important;\n}\n\n\/* Optional: Fix the image itself too *\/\n.blog-watermark-first .vcex-image-img {\n    display: block !important;\n    width: 100% !important;\n    height: auto !important;\n}\n\n\/* Force the watermark position *\/\n.blog-watermark-first .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    bottom: 2%;\n    right: 2%;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 20% !important;\n    height: 20% !important;\n    pointer-events: none;\n    z-index: 10;\n}\n\n\n@media screen and (max-width: 768px) {\n  .cs-main-image-header .wpex-p-30 {\n    padding-bottom: 1% !important;\n  }\n}\n\n  <\/style>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative visible-phone no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 50px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1738079979763 wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-overlay-bg{background-color:#000000;opacity:0.5;}.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-title{color:#fefefe;font-size:60px;font-family:'DM Sans', sans-serif;font-weight:600;}.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-caption{color:#ffffff;font-size:45px;font-family:'DM Sans', sans-serif;font-weight:600;line-height:var(--wpex-leading-snug);}@media (max-width:1024px){.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-title{font-size:60px;}.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-caption{font-size:45px;}}@media (max-width:959px){.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-title{font-size:45px;}.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-caption{font-size:30px;}}@media (max-width:767px){.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-title{font-size:60px;}.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-caption{font-size:45px;}}@media (max-width:479px){.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-title{font-size:45px;}.vcex-image-banner.vcex_69fd1699d720f .vcex-ib-caption{font-size:30px;}}<\/style><div class=\"vcex-module vcex-image-banner wpex-flex wpex-flex-col wpex-w-100 wpex-justify-center wpex-relative wpex-overflow-hidden wpex-bg-gray-900 wpex-text-white wpex-hover-text-white wpex-text-left wpex-rounded-md vcex-has-img-tag cs-main-image-header vcex_69fd1699d720f\"><img  src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2026\/05\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-header2.png\" class=\"vcex-ib-img wpex-block wpex-transition-all wpex-duration-500\" alt=\"\"><div class=\"vcex-ib-content-wrap wpex-w-100 wpex-transition-all wpex-duration-500 wpex-absolute wpex-inset-0 wpex-flex wpex-items-center wpex-p-30\"><div class=\"vcex-ib-content wpex-flex-grow wpex-mr-auto\"><h3 class=\"vcex-ib-title wpex-heading\">Pre-Incident Planning:<\/h3><div class=\"vcex-ib-caption wpex-text-lg wpex-last-mb-0\">5 Things to Document in an Incident Response Plan<\/div><\/div><\/div><\/div>\n\t<div style=\"color:#ebebeb;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1778094284919\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>Because when it happens, you won\u2019t have time to look this up.<\/em><\/p>\n<p>Most IT security preparation guides focus on what to do after an attack starts. Isolate the infected devices. Contact your IR firm. Notify legal. All sound advice, but only useful if you already know who to call, where your backups live, and which systems the business cannot survive without.<\/p>\n<p>The problem is that the first hours of a ransomware incident are chaotic. Decisions that should take minutes take much longer when the information needed to make them is scattered across email threads, institutional memory, or systems that may now be inaccessible. That is not a technology failure. It is a documentation failure, and it is entirely preventable.<\/p>\n<p>What follows is not an incident response plan. It is something smaller and more immediately practical: five critical categories of information your team needs documented and accessible before an incident begins. Building this list will not take long. Not having it when you need it will cost far more time than it saves.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"case-study-blurb-and-scenario\" class=\"vc_section vc_custom_1737675848429 wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69fd1699d8813{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69fd1699d8813{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69fd1699d8813{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69fd1699d8813{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69fd1699d8813{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69fd1699d8813\"><span class=\"vcex-heading-inner wpex-inline-block\">1. <strong><span style=\"color: #e31f26\">Escalation <\/span><\/strong>Contacts<\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>When a security incident occurs, the first reaction is usually to pick up the phone. The problem is that many teams don\u2019t always know who they should call.<\/p>\n<p>Your escalation documentation should include contact information for your incident response team, lead contacts, and DFIR partner contacts. Also include the engagement process, contact information for your legal counsel (with data privacy experience), and your cyber insurance provider\u2019s claims contact, along with your policy number.<\/p>\n<p>The escalation documentation should contain key contacts and policy details necessary for an incident. Specifically, it needs:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1777731664853 vc_row-o-equal-height vc_row-flex wpex-relative wpex-vc-has-custom-column-spacing wpex-vc-column-spacing-0px no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-3 wpex-vc_col-has-fill\"><div style=\"border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1777731447846\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69fd1699d9a91{font-size:25px;}.vcex-icon.vcex_69fd1699d9a91 .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69fd1699d9a91\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fa fa-solid fa-people-group\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Incident Response Team and Leads<\/strong><\/p>\n<p>Contact information for your internal incident response team and their lead contacts.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 wpex-vc_col-has-fill\"><div style=\"border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1777731549860\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69fd1699da34c{font-size:25px;}.vcex-icon.vcex_69fd1699da34c .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69fd1699da34c\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fa fa-solid fa-user-shield\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;letter-spacing:var(--wpex-tracking-tight);text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>DFIR Partner<\/strong><\/p>\n<p>Contact details for your Digital Forensics and Incident Response (DFIR) partner, including their engagement process.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1777731463422\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69fd1699dabee{font-size:25px;}.vcex-icon.vcex_69fd1699dabee .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69fd1699dabee\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fa fa-solid fa-scale-balanced\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Legal Counsel<\/strong><\/p>\n<p>Contact information for your outside legal counsel, ensuring they have experience in data privacy.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 wpex-vc_col-has-fill\"><div style=\"border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1777731472225\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69fd1699db494{font-size:25px;}.vcex-icon.vcex_69fd1699db494 .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69fd1699db494\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fa fa-solid fa-shield-virus\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Cyber Insurance<\/strong><\/p>\n<p>The claims contact for your cyber insurance provider and your policy number.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>That last item is the one most often missing. Cyber insurance policies typically include specific notification windows, and missing them can create complications with your claim at exactly the moment you can least afford complications. Knowing your claims contact and policy number before an incident is a necessity.<\/p>\n<p>One final note on cyber insurance: store your policy securely and separate from your primary systems. Threat actors who have spent time in your network before launching encryption may have access to documents stored there. Your policy information should not be where they can find it.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1773244475958\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>When everything is moving fast, you do not want to be searching for a phone number.<\/em><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-inline:8%;border-color:#7a7a7a;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545700301 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative wpex-vc_section-has-fill wpex-vc-reset-negative-margin\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69fd1699dd544{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69fd1699dd544{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69fd1699dd544{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69fd1699dd544{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69fd1699dd544{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69fd1699dd544\"><span class=\"vcex-heading-inner wpex-inline-block\">2. Your <strong><span style=\"color: #e31f26\">Backup Architecture<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Threat actors target backups first. That is not speculation. It is a consistent pattern DriveSavers has observed across many ransomware incidents. Before encrypting production systems, attackers will often identify and compromise backup infrastructure to remove the victim\u2019s most straightforward recovery path. By the time encryption runs, the backups may already be gone.<\/p>\n<p>This shapes how you should think about backup documentation. It is not enough to know that backups exist. Your team needs to be able to quickly assess backup integrity under incident conditions, which means the architecture needs to be well-documented enough to support that assessment before anyone is under pressure.<\/p>\n<p>Document where backups live, covering on-site, off-site, and cloud, how backup jobs run and on what schedule, and step-by-step restore procedures.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1773244553340\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>Assume your backups may be compromised until you can verify otherwise.<\/em><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-inline:8%;border-color:#7a7a7a;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545710295 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69fd1699df56c{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69fd1699df56c{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69fd1699df56c{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69fd1699df56c{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69fd1699df56c{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69fd1699df56c\"><span class=\"vcex-heading-inner wpex-inline-block\">3. <strong><span style=\"color: #e31f26\">Critical<\/span><\/strong> Data List<\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins wpex-cols-right\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>In a security incident, you will not be able to restore everything at once. Decisions about what comes back first will be made quickly, under pressure, by people who may be running on very little sleep. Those decisions go significantly better when made in advance, without the pressure.<\/p>\n<p>Your critical data list should identify the systems the business cannot operate without, the datasets required for daily operations, and a clear priority order for restore: must-have versus nice-to-have.<\/p>\n<p>Be honest about what the business actually depends on versus what is merely important. That honesty is much harder to find in the middle of an active incident. Prioritize the must-restore datasets before chasing the nice-to-have. Not everything can come back first, and knowing that in advance is a significant operational advantage.<\/p>\n<p>In a security incident, recovery is not just about restoring data\u2014it\u2019s about restoring the right data first.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1777730708302\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>In a security incident, recovery is not just about restoring data\u2014it\u2019s about restoring the right data first.<\/em><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-inline:8%;border-color:#7a7a7a;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545726432 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative wpex-vc_section-has-fill wpex-vc-reset-negative-margin\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69fd1699e157f{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69fd1699e157f{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69fd1699e157f{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69fd1699e157f{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69fd1699e157f{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69fd1699e157f\"><span class=\"vcex-heading-inner wpex-inline-block\">4. Backup <strong><span style=\"color: #e31f26\">Ownership Paths<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>In most environments of meaningful size, backup infrastructure spans multiple locations. Ownership documentation should cover who owns each backup environment, access credentials for backups, snapshots, and replicas, and where secondary systems and copies may exist.<\/p>\n<p>Take into account that the same data frequently exists in multiple forms: a primary backup, a snapshot, a replica, an archived copy on tape or in a secondary cloud environment. In scenarios where primary backups have been compromised, knowing where else to look can make a significant difference.<\/p>\n<p>A thorough ownership map is, in practical terms, a map of your recovery surface. The more complete it is before an incident, the more options you have during one.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1777731156974\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>The same data often exists in multiple forms. Knowing where to look expands <\/em><em>the recovery options.<\/em><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-inline:8%;border-color:#7a7a7a;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545750569 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69fd1699e356b{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69fd1699e356b{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69fd1699e356b{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69fd1699e356b{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69fd1699e356b{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69fd1699e356b\"><span class=\"vcex-heading-inner wpex-inline-block\">5. Core <strong><span style=\"color: #e31f26\">Vendor Contacts<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Successful operational recovery following a cyberattack relies heavily on the vendors that provide the products and services that sustain your infrastructure. Because of this, it is essential to have their escalation paths and support channels documented before an incident occurs.<\/p>\n<p>The vendor contact list should include the vendors required to restore core operations, their support channels and escalation paths, and a data recovery partner for scenarios where backups and decryptors have failed.<\/p>\n<p>That third item is the one most organizations leave off entirely. Backup failure and decryptor failure are not rare edge cases. They are realistic outcomes of a well-executed cyberattack. Having a professional data recovery partner identified and documented before an incident means you are not evaluating vendors at the worst time of the year for your organization. It also means your IR team has a parallel recovery path to pursue rather than waiting on a single point of resolution.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1777731131490\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>Documenting these relationships in advance ensures that when recovery begins, your team is executing a plan\u2014not searching for one.<\/em><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-inline:8%;border-color:#7a7a7a;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_section wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative wpex-vc_section-has-fill wpex-vc-reset-negative-margin\" style=\"background-color:#f3ebeb!important;\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><style>.vcex-heading.vcex_69fd1699e568d{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69fd1699e568d{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69fd1699e568d{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69fd1699e568d{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69fd1699e568d{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div wpex-text-center vcex_69fd1699e568d\"><span class=\"vcex-heading-inner wpex-inline-block\">When Backups Fail, <strong><span style=\"color: #e31f26\">Options Still Exist<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1778174579758 wpex-relative wpex-vc_row-has-fill no-bottom-margins wpex-vc-reset-negative-margin\" style=\"border-color:#000000!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12 wpex-vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1760029818507\"><div class=\"wpb_wrapper\"><style>.vcex-icon-box.vcex_69fd1699e6584 .vcex-icon-box-content{color:#7a7a7a;}.vcex-icon-box.vcex_69fd1699e6584 .vcex-icon-box-icon{font-size:25px;color:#f60000;}<\/style><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left vc_custom_1778172870850 vcex_69fd1699e6584\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--icon wpex-flex-shrink-0 wpex-mr-20\"><div class=\"vcex-icon-box-icon wpex-items-center wpex-justify-center wpex-child-inherit-color wpex-text-center wpex-leading-none wpex-flex wpex-text-1\"><span class=\"wpex-flex wpex-icon--w fa fa-solid fa-clipboard-check\" aria-hidden=\"true\"><\/span><\/div><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>Pre-incident planning will remove a layer of friction that slows teams down when speed matters most. When your escalation contacts, backup architecture, critical data priorities, ownership paths, and vendor contacts are documented and accessible, your team can focus on responding rather than searching.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1778173289628 wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"color: #3e3d3e;\">Build It Before You Need It.<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1778174550699 wpex-relative wpex-vc_row-has-fill no-bottom-margins wpex-vc-reset-negative-margin\" style=\"border-color:#000000!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12 wpex-vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1760029818507\"><div class=\"wpb_wrapper\"><style>.vcex-icon-box.vcex_69fd1699e7973 .vcex-icon-box-content{color:#7a7a7a;}.vcex-icon-box.vcex_69fd1699e7973 .vcex-icon-box-icon{font-size:25px;color:#f60000;}<\/style><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left vc_custom_1778174210284 vcex_69fd1699e7973\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--icon wpex-flex-shrink-0 wpex-mr-20\"><div class=\"vcex-icon-box-icon wpex-items-center wpex-justify-center wpex-child-inherit-color wpex-text-center wpex-leading-none wpex-flex wpex-text-1\"><span class=\"wpex-flex wpex-icon--w fa fa-regular fa-handshake\" aria-hidden=\"true\"><\/span><\/div><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>If you find yourself in a security incident where backups have been compromised or decryptors have failed, data recovery may still be possible. DriveSavers works directly with incident response firms, DFIR partners, legal counsel, and insurance carriers, and has extensive experience recovering data when conventional data recovery is not an option.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1778181036911 wpex-relative no-bottom-margins tablet-fullwidth-columns\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_js\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<style>\n\/* ------------------------------------------------\n   FIX: Force full opacity for button + text\n   (works in Templatera)\n   ------------------------------------------------ *\/\n\n\/* Button itself (main text color \/ RGBA fix) *\/\n.button.button-Main-CTA-2025-Enterprise {\n  opacity: 1 !important;\n  color: #ffffff !important;\n  -webkit-text-fill-color: #ffffff !important;\n}\n\n\/* Main + secondary text *\/\n.button.button-Main-CTA-2025-Enterprise .button-text,\n.button.button-Main-CTA-2025-Enterprise .button-text *,\n.button.button-Main-CTA-2025-Enterprise .button-numbers,\n.button.button-Main-CTA-2025-Enterprise .button-numbers * {\n  opacity: 1 !important;\n  color: #ffffff !important;\n  -webkit-text-fill-color: #ffffff !important;\n}\n<\/style>\n\n\n<a href=\"\/contact-drivesavers-b2b\/\" target=\"_blank\" class=\"button button-Main-CTA-2025-Enterprise\">\n<img src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2026\/04\/phone_call.gif\" style=\"width:100px;height:100px;margin:-50px -20px -55px -50px;\" alt=\"Call animation\">\n\n  <span class=\"button-text\">\n    <span style=\"font-size: 20px;\">Call 24\/7 for an Evaluation<\/span>\n    <span class=\"button-numbers\" style=\"font-size:16px; font-weight:bold;\">\n      <span id=\"button-count\"><\/span>\n      \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n*03 6240 1895\n\n\n    <\/span> \n  <\/span>\n<\/a>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n<sub style=\"font-weight: 700; color: #fff; font-size: 12px; top: 0em;\" >Call today<\/sub>\n\n\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\u591a\u304f\u306eIT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30ac\u30a4\u30c9\u306f\u3001\u653b\u6483\u304c\u59cb\u307e\u3063\u305f\u5f8c\u306b\u4f55\u3092\u3059\u3079\u304d\u304b\u306b\u7126\u70b9\u3092\u5f53\u3066\u3066\u3044\u307e\u3059\u3002\u611f\u67d3\u3057\u305f\u30c7\u30d0\u30a4\u30b9\u3092\u9694\u96e2\u3059\u308b\u3002\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u4f01\u696d\u306b\u9023\u7d61\u3059\u308b\u3002\u6cd5\u52d9\u90e8\u9580\u306b\u901a\u77e5\u3059\u308b\u3002\u3044\u305a\u308c\u3082\u9069\u5207\u306a\u52a9\u8a00\u3067\u3059\u304c\u3001\u8ab0\u306b\u9023\u7d61\u3059\u3079\u304d\u304b\u3001\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u304c\u3069\u3053\u306b\u3042\u308b\u306e\u304b\u3001\u305d\u3057\u3066\u3069\u306e\u30b7\u30b9\u30c6\u30e0\u304c\u4e8b\u696d\u7d99\u7d9a\u306b\u4e0d\u53ef\u6b20\u306a\u306e\u304b\u3092\u4e8b\u524d\u306b\u628a\u63e1\u3057\u3066\u3044\u306a\u3051\u308c\u3070\u3001\u5b9f\u969b\u306b\u306f\u5f79\u306b\u7acb\u3061\u307e\u305b\u3093\u3002<\/p>","protected":false},"author":30,"featured_media":84083,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[221],"post_series":[],"class_list":["post-83286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-ransomware","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pre-Incident Planning: 5 Things to Document in an Incident Response Plan<\/title>\n<meta name=\"description\" content=\"Most IT security preparation guides focus on what to do after an attack starts. Isolate the infected devices. Contact your IR firm. Notify legal. All sound advice, but only useful if you already know who to call, where your backups live, and which systems the business cannot survive without.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pre-Incident Planning: 5 Things to Document in an Incident Response Plan\" \/>\n<meta property=\"og:description\" content=\"Most IT security preparation guides focus on what to do after an attack starts. Isolate the infected devices. Contact your IR firm. Notify legal. All sound advice, but only useful if you already know who to call, where your backups live, and which systems the business cannot survive without.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-02T15:22:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T19:19:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2026\/05\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"549\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michelle West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle West\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/\"},\"author\":{\"name\":\"Michelle West\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\"},\"headline\":\"Pre-Incident Planning: 5 Things to Document in an Incident Response Plan\",\"datePublished\":\"2026-05-02T15:22:49+00:00\",\"dateModified\":\"2026-05-07T19:19:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/\"},\"wordCount\":4718,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/\",\"name\":\"Pre-Incident Planning: 5 Things to Document in an Incident Response Plan\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png\",\"datePublished\":\"2026-05-02T15:22:49+00:00\",\"dateModified\":\"2026-05-07T19:19:48+00:00\",\"description\":\"Most IT security preparation guides focus on what to do after an attack starts. Isolate the infected devices. Contact your IR firm. Notify legal. All sound advice, but only useful if you already know who to call, where your backups live, and which systems the business cannot survive without.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png\",\"width\":1050,\"height\":549},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"DriveSavers\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pre-Incident Planning: 5 Things to Document in an Incident Response Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\",\"name\":\"Michelle West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"caption\":\"Michelle West\"},\"description\":\"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/west-michelle\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/ja-jp\\\/author\\\/michelle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u767a\u751f\u524d\u306e\u8a08\u753b\uff1a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u8a08\u753b\u306b\u8a18\u8f09\u3059\u3079\u304d5\u3064\u306e\u9805\u76ee","description":"\u591a\u304f\u306eIT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30ac\u30a4\u30c9\u306f\u3001\u653b\u6483\u304c\u59cb\u307e\u3063\u305f\u5f8c\u306b\u4f55\u3092\u3059\u3079\u304d\u304b\u306b\u7126\u70b9\u3092\u5f53\u3066\u3066\u3044\u307e\u3059\u3002\u611f\u67d3\u3057\u305f\u30c7\u30d0\u30a4\u30b9\u3092\u9694\u96e2\u3059\u308b\u3002\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u4f01\u696d\u306b\u9023\u7d61\u3059\u308b\u3002\u6cd5\u52d9\u90e8\u9580\u306b\u901a\u77e5\u3059\u308b\u3002\u3044\u305a\u308c\u3082\u9069\u5207\u306a\u52a9\u8a00\u3067\u3059\u304c\u3001\u8ab0\u306b\u9023\u7d61\u3059\u3079\u304d\u304b\u3001\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u304c\u3069\u3053\u306b\u3042\u308b\u306e\u304b\u3001\u305d\u3057\u3066\u3069\u306e\u30b7\u30b9\u30c6\u30e0\u304c\u4e8b\u696d\u7d99\u7d9a\u306b\u4e0d\u53ef\u6b20\u306a\u306e\u304b\u3092\u4e8b\u524d\u306b\u628a\u63e1\u3057\u3066\u3044\u306a\u3051\u308c\u3070\u3001\u5b9f\u969b\u306b\u306f\u5f79\u306b\u7acb\u3061\u307e\u305b\u3093\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/","og_locale":"ja_JP","og_type":"article","og_title":"Pre-Incident Planning: 5 Things to Document in an Incident Response Plan","og_description":"Most IT security preparation guides focus on what to do after an attack starts. Isolate the infected devices. Contact your IR firm. Notify legal. All sound advice, but only useful if you already know who to call, where your backups live, and which systems the business cannot survive without.","og_url":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2026-05-02T15:22:49+00:00","article_modified_time":"2026-05-07T19:19:48+00:00","og_image":[{"width":1050,"height":549,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2026\/05\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png","type":"image\/png"}],"author":"Michelle West","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"\u57f7\u7b46\u8005":"Michelle West","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"8\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/"},"author":{"name":"Michelle West","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c"},"headline":"Pre-Incident Planning: 5 Things to Document in an Incident Response Plan","datePublished":"2026-05-02T15:22:49+00:00","dateModified":"2026-05-07T19:19:48+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/"},"wordCount":4718,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2026\/05\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png","keywords":["ransomware"],"articleSection":["Blog"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/","name":"\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u767a\u751f\u524d\u306e\u8a08\u753b\uff1a\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u8a08\u753b\u306b\u8a18\u8f09\u3059\u3079\u304d5\u3064\u306e\u9805\u76ee","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2026\/05\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png","datePublished":"2026-05-02T15:22:49+00:00","dateModified":"2026-05-07T19:19:48+00:00","description":"\u591a\u304f\u306eIT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30ac\u30a4\u30c9\u306f\u3001\u653b\u6483\u304c\u59cb\u307e\u3063\u305f\u5f8c\u306b\u4f55\u3092\u3059\u3079\u304d\u304b\u306b\u7126\u70b9\u3092\u5f53\u3066\u3066\u3044\u307e\u3059\u3002\u611f\u67d3\u3057\u305f\u30c7\u30d0\u30a4\u30b9\u3092\u9694\u96e2\u3059\u308b\u3002\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u4f01\u696d\u306b\u9023\u7d61\u3059\u308b\u3002\u6cd5\u52d9\u90e8\u9580\u306b\u901a\u77e5\u3059\u308b\u3002\u3044\u305a\u308c\u3082\u9069\u5207\u306a\u52a9\u8a00\u3067\u3059\u304c\u3001\u8ab0\u306b\u9023\u7d61\u3059\u3079\u304d\u304b\u3001\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u304c\u3069\u3053\u306b\u3042\u308b\u306e\u304b\u3001\u305d\u3057\u3066\u3069\u306e\u30b7\u30b9\u30c6\u30e0\u304c\u4e8b\u696d\u7d99\u7d9a\u306b\u4e0d\u53ef\u6b20\u306a\u306e\u304b\u3092\u4e8b\u524d\u306b\u628a\u63e1\u3057\u3066\u3044\u306a\u3051\u308c\u3070\u3001\u5b9f\u969b\u306b\u306f\u5f79\u306b\u7acb\u3061\u307e\u305b\u3093\u3002","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2026\/05\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2026\/05\/Pre-incident-Planning-5-Things-to-Document-in-an-Incident-Response-Plan-.png","width":1050,"height":549},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/pre-incident-planning-5-things-to-document-in-an-incident-response-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"DriveSavers","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Pre-Incident Planning: 5 Things to Document in an Incident Response Plan"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers\u30c7\u30fc\u30bf\u5fa9\u5143\u30b5\u30fc\u30d3\u30b9","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers\u30c7\u30fc\u30bf\u5fa9\u5143","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c","name":"Michelle West","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","caption":"Michelle West"},"description":"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.","sameAs":["https:\/\/www.linkedin.com\/in\/west-michelle\/"],"url":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/author\/michelle\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/posts\/83286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/comments?post=83286"}],"version-history":[{"count":10,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/posts\/83286\/revisions"}],"predecessor-version":[{"id":84105,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/posts\/83286\/revisions\/84105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/media\/84083"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/media?parent=83286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/categories?post=83286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/tags?post=83286"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/post_series?post=83286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}