data loss malware hard drive recovery strong authentication anti-virus virus file recovery security 2-factor 2 factor spyware authentication data recovery 3-factor authentication endpoint security usb tokens storage encryption antivirus internet security