A CISO-ready guide to evaluating ransomware recovery service vendors — what to demand, how to avoid shortcuts, and how enterprise-grade recovery really works.