RESTORING YOUR DIGITAL FOOTPRINT: RANSOMWARE DATA RECOVERY STRATEGIES