disaster recovery exploits computer repair vulnerability alerts backup computer hosting business continuity vulnerabilities data recovery security file recovery data traq hacking