An apparatus and a corresponding method provide for real-time recovery of
compromised information in a computer network. The method includes
analyzing data objects in the computer network to determine data objects
that comprise minimal essential information, collecting the minimal
essential information, and storing the minimal essential information. To
limit potential exposure of the minimal essential information, the stored
minimal essential information is hidden in the computer network.