Player FM - Internet Radio Done Right
Checked 3d ago
Added six years ago
Content provided by W. Curtis Preston (Mr. Backup). All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by W. Curtis Preston (Mr. Backup) or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED
<
<div class="span index">1</div> <span><a class="" data-remote="true" data-type="html" href="/series/the-final-flight-of-captain-forrester">The Final Flight of Captain Forrester</a></span>


A woman’s search for her father—a pilot who disappeared during a mission in Vietnam—collides with the fight over what we owe those who never returned from war. From the producers of "America's Girls," and hosted by Texas Monthly writer Josh Alvarez, the show debuts April 2025. Texas Monthly Audio subscribers get early access to the show, plus bonus episodes and more subscriber-only audio. Visit texasmonthly.com/audio to learn more.
The Backup Wrap-Up
Mark all (un)played …
Manage series 2521414
Content provided by W. Curtis Preston (Mr. Backup). All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by W. Curtis Preston (Mr. Backup) or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from. His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others. A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe. That's why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware. If you'd like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you.
…
continue reading
300 episodes
Mark all (un)played …
Manage series 2521414
Content provided by W. Curtis Preston (Mr. Backup). All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by W. Curtis Preston (Mr. Backup) or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from. His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others. A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe. That's why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware. If you'd like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you.
…
continue reading
300 episodes
All episodes
×T
The Backup Wrap-Up

1 Breaking Down the VeeamOn Announcements for Backup Admins 45:24
45:24
Play Later
Play Later
Lists
Like
Liked45:24
In this episode of The Backup Wrap-up, W. Curtis Preston breaks down the key VeeamON announcements from the VeeamON 2025 conference in San Diego. He highlights Veeam's focus on security and ransomware defense, including their new CrowdStrike integration and data resilience maturity model developed with McKinsey and MIT. Curtis shares his excitement about Veeam's long-awaited Linux-based software appliance, which addresses a critical security vulnerability in Windows-based backup systems. He also discusses other major VeeamON announcements like their Anthropic partnership for AI-powered backup content search, Microsoft Intra ID support, and the ability to recover backups to Azure in under five minutes. Whether you're a Veeam customer or just interested in backup technology trends, this episode provides valuable insights into these significant VeeamOn announcements.…
T
The Backup Wrap-Up

1 DOGE and GSA Claim $1M Savings by Ditching Old Tape Tech 46:17
46:17
Play Later
Play Later
Lists
Like
Liked46:17
DOGE and GSA recently made headlines with a tweet claiming $1 million annual savings by converting 14,000 magnetic tapes to "permanent modern digital records." In this episode, W. Curtis Preston and Prasanna Malaiyandi analyze whether this claim is possible – although they cannot actually validate it due to lack of information. They discuss that DOGE and GSA's claim is possible given the significant costs of maintaining legacy systems, the migration process would also likely take months and involve substantial upfront expenses. Curtis also shares a humorous story about accidentally pressing an emergency power button during a critical mainframe recovery.…
T
The Backup Wrap-Up

1 Why Tape Backup for Small Business Makes Sense Against Ransomware 38:03
38:03
Play Later
Play Later
Lists
Like
Liked38:03
Tape backup for small business might sound like old tech, but Mag Store's new Thunderbolt-compatible tape drive could change that perception. In this episode, we discuss how this new offering potentially opens tape technology to a wider market of SMBs and content creators looking for ransomware protection and cost-effective long-term storage. Curtis and Prasanna dive into the specifics of when tape backup makes financial sense for small business data protection, particularly for companies generating large amounts of data or concerned about cloud security. They explore the $6,000 upfront investment against the long-term benefits of $90 tape cartridges that hold 45TB compressed. Perfect for SMBs with on-premises data or YouTube creators needing affordable archive solutions that are truly air-gapped from ransomware threats.…
T
The Backup Wrap-Up

1 How Forever Incremental Backup Changed the World 43:46
43:46
Play Later
Play Later
Lists
Like
Liked43:46
In this episode of The Backup Wrap-Up, Curtis and Prasanna explore how forever incremental backup technology revolutionized the data protection industry. They discuss the evolution from traditional backup methods to modern approaches that eliminate the need for regular full backups, dramatically reducing network traffic, storage requirements, and backup windows. The hosts examine the technical foundations of forever incremental backups, from block-level incremental tracking to backend storage innovations that make multiple recovery points possible without redundant data transfers. They compare older approaches like synthetic fulls with true forever incremental implementations, highlighting the critical differences and benefits. Whether you're still using legacy backup tools or evaluating modern solutions, this episode provides essential insights into why forever incremental has become the standard for efficient, reliable backup systems.…
T
The Backup Wrap-Up

1 Cloud vs Tape Throwdown: Which is Better for Archiving? 36:14
36:14
Play Later
Play Later
Lists
Like
Liked36:14
In this episode of The Backup Wrap-Up, we look at the cloud vs tape debate for active archives. The conversation was sparked by a LinkedIn post claiming tape libraries are the only robots not making things easier in 2025, suggesting cloud is superior to tape for active archives. We challenge this premise by pointing out that cloud vs tape is a false dichotomy since many cloud storage vendors use tape for their lowest-cost tiers. We examine key considerations including cost (where tape wins by orders of magnitude), data integrity (where tape actually outperforms disk), and access times (where expectations should align with use cases). For organizations running on-premises infrastructure, we also highlight the often-overlooked egress costs and transfer times associated with cloud storage. Whether you're managing secondary storage or planning an archive strategy, this candid discussion cuts through the marketing hype. Here's the LinkedIn post that sparked the discussion: https://www.linkedin.com/feed/update/urn:li:activity:7300167312144322561/ Here's a recent episode about how tape is not dead: https://www.backupwrapup.com/is-tape-backup-dead-why-it-still-matters/…
T
The Backup Wrap-Up

1 Disaster Recovery Lessons from 9/11 and Beyond 35:54
35:54
Play Later
Play Later
Lists
Like
Liked35:54
In this eye-opening episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi unpack crucial disaster recovery lessons from major events like 9/11. They discuss how companies lost both primary and backup data centers when both World Trade Center towers fell, highlighting why geographic separation is non-negotiable. The hosts break down the technical aspects of disaster recovery, comparing hot sites versus cold sites, and the realities of synchronous versus asynchronous replication across distances. Beyond the technical, Curtis and Prasanna share often-overlooked disaster recovery lessons about human factors—where recovery teams will sleep, eat, and work during extended outages when infrastructure is destroyed. They examine a real case from a hurricane-stricken island where teams converted conference rooms to sleeping quarters and relied on satellite communications. Whether you're planning for natural disasters, power outages, or ransomware attacks, these disaster recovery lessons will help ensure your organization can recover when—not if—disaster strikes.…
T
The Backup Wrap-Up

1 How to Choose the Best Password Manager: Security Features That Matter 41:08
41:08
Play Later
Play Later
Lists
Like
Liked41:08
In this episode of The Backup Wrap-up, Curtis and Prasanna discuss how to choose the best password manager in light of recent security breaches. They examine the LastPass hack that resulted in $150 million of stolen cryptocurrency and what that teaches us about password manager security. The hosts break down the critical security features to look for in the best password manager, including encryption strength, iteration counts, multi-factor authentication options, and passkey support. They emphasize that even with the LastPass breach, using a password manager is still far safer than not using one at all. This episode provides practical guidance on evaluating password manager security beyond the standard feature comparisons, with specific recommendations for cryptocurrency users and insights into the technical aspects of password vault protection. Here are some references for today's episode: https://www.rubrik.com/blog/company/25/rubrik-information-security-team-update https://www.bleepingcomputer.com/news/security/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/ https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/ https://krebsonsecurity.com/2025/03/feds-link-150m-cyberheist-to-2022-lastpass-hacks/…
T
The Backup Wrap-Up

1 Is Tape Backup Dead? Why This Technology Still Matters 56:25
56:25
Play Later
Play Later
Lists
Like
Liked56:25
Tape backup isn't dead – but it's glory days are gone. In this episode, W. Curtis Preston and Prasanna Malaiyandi discuss why tape backup remains relevant despite its diminished role in operational backups. They reveal how cloud giants have become the biggest consumers of tape technology while explaining common misconceptions about tape's performance. The hosts break down four core advantages tape backup still maintains: unbeatable cost (one to two orders of magnitude cheaper than alternatives), superior speed for bulk transfers, better data integrity with lower bit error rates, and built-in protection against ransomware through true immutability. Whether you're considering your disaster recovery strategy or looking for cost-effective long-term storage, this episode offers valuable insights into why tape backup continues to play a crucial role in modern data protection architectures. Here are some related episodes we talk about in the show: https://www.backupwrapup.com/ovhs-backup-service-didnt-work/ https://www.backupwrapup.com/back-in-my-day-backups-were-really-hard/ https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/…
T
The Backup Wrap-Up

In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi discuss critical strategies for securing your backup disk against cyber threats. They explain why the default configuration of storing backups in easily accessible directories makes your backup disk vulnerable to threat actors who specifically target backup systems before launching attacks. The conversation covers several effective methods to protect your backup disk, including using proprietary protocols like OST and Boost, implementing Virtual Tape Libraries (VTLs), leveraging dedicated backup appliances, and utilizing object storage both on-premises and in the cloud. Curtis emphasizes that keeping your backup disk out of user space is essential for maintaining security against increasingly sophisticated attackers. This episode provides practical advice for anyone using disk-based backup systems who wants to ensure their backup disk remains secure and recoverable when needed most.…
T
The Backup Wrap-Up

1 Your 4-Hour Recovery Time Objective is Fantasy 38:40
38:40
Play Later
Play Later
Lists
Like
Liked38:40
Ever wonder why your recovery time objective seems impossible to meet? In this episode, we challenge the common assumption that a four-hour RTO is achievable for most organizations. Host W. Curtis Preston and guest Prasanna Malaiyandi discuss why these aggressive recovery time objectives often exist only on paper. From ransomware attacks to natural disasters, we examine the real-world factors that make rapid recovery more complex than most realize. We break down the differences between recovery time objectives (RTOs) and actual recovery times (RTAs), exploring why organizations need to be more realistic about their recovery capabilities. Whether you're managing backups, planning disaster recovery, or responsible for business continuity, this episode will help you understand what's actually possible when disaster strikes. Check out these older episodes about how a real disaster unfolds: https://www.backupwrapup.com/real-life-hurricane-disaster-recover-story/ https://www.backupwrapup.com/disaster-recovery-after-a-hurricane-a-first-hand-account/…
T
The Backup Wrap-Up

1 Passwords vs Passkeys: The Future of Backup Security 43:14
43:14
Play Later
Play Later
Lists
Like
Liked43:14
In this eye-opening episode about passwords vs passkeys, W. Curtis Preston and Prasanna Malaiyandi expose why traditional password protection isn't enough for your backup systems anymore. They break down the evolution from basic passwords to MFA, and explain why passkeys and FIDO compliance represent the next level in security. Learn why hackers target backup systems first, how they exploit password vulnerabilities, and why even multi-factor authentication has its weak points. Discover why there hasn't been a single successful attack against FIDO-compliant systems, and why you should be pushing your backup vendors to support passkeys. Whether you're using a traditional backup system or a SaaS solution, this episode gives you the knowledge you need to better protect your last line of defense. We talked about this previous episode: https://www.backupwrapup.com/how-do-you-authenticate-with-all-new-hardware/…
T
The Backup Wrap-Up

Understanding your backup window is crucial for effective data protection, but there's a twist - it's not just about backup speed. In this episode, we explore why focusing solely on backup speed misses the point entirely. The real measure of success? Your recovery capabilities. Join W. Curtis Preston and Prasanna Malaiyandi as they share war stories about backup windows gone wrong, including a memorable tale involving tape drives that could write but couldn't read. Learn why traditional backup windows have evolved, how modern technologies have changed the game, and most importantly, why your recovery testing matters more than your backup speed. We also dive into deduplication taxes, recovery groups, and why instant recovery capabilities might be your best friend in a crisis. This is the recovery failure we alluded to w/our friend Stuart Liddle: https://www.backupwrapup.com/laptop-restore-nightmare-900gb/…
T
The Backup Wrap-Up

1 Artificial Intelligence: The Future of Backup? 43:06
43:06
Play Later
Play Later
Lists
Like
Liked43:06
Artificial intelligence in backup isn't just marketing hype - it's changing how we protect our data. In this episode, W. Curtis Preston and Prasanna Malaiyandi break down the practical applications of AI in backup systems, from intelligent scheduling to ransomware detection. Learn how artificial intelligence helps with capacity planning, especially with deduplication systems where predicting storage needs gets tricky. We discuss AI's role in asset discovery, anomaly detection, and even creating better disaster recovery plans. Plus, find out why backing up AI models themselves might become your next big challenge. This no-nonsense look at AI in backup cuts through the confusion and focuses on what really matters - making your backups better.…
T
The Backup Wrap-Up

1 Disaster Recovery Testing: The Execution Phase 33:11
33:11
Play Later
Play Later
Lists
Like
Liked33:11
In part two of our disaster recovery testing series, we explore the critical steps of executing a DR test. From coordinating teams and documenting issues to maintaining communication channels during the test, this episode covers everything you need to know about running an effective DR test. Host W. Curtis Preston and co-host Prasanna Malaiyandi share practical advice from their extensive experience with disaster recovery testing. They discuss the importance of having backup communication methods, maintaining detailed documentation, and conducting thorough post-test analysis. Learn why testing your DR plan regularly is crucial and how to build a recovery mindset across your organization. Whether you're planning your first DR test or looking to improve your existing testing procedures, this episode provides valuable insights to help ensure your disaster recovery testing success.…
T
The Backup Wrap-Up

1 Choosing the Best Cloud Backup for Your Small Business 41:36
41:36
Play Later
Play Later
Lists
Like
Liked41:36
Looking for the best cloud backup for small business? This episode cuts straight to what matters. Host W. Curtis Preston and Prasanna Malaiyandi share their expert insights on choosing the right cloud backup solution for your small business needs. They break down the critical features every small business should look for in a cloud backup service, including true immutability, proper implementation of the 3-2-1 rule, and transparent pricing. The discussion covers why cloud backup makes sense for small businesses, how to avoid common pitfalls, and what questions to ask potential providers. Whether you're currently shopping for a backup solution or want to verify your existing setup, this episode provides practical, actionable advice from industry veterans who understand what small businesses really need.…
T
The Backup Wrap-Up

In this eye-opening episode of The Backup Wrap-up, we delve into the critical topic of detecting ransomware. Joined by cybersecurity expert Dr. Mike Sailor, we explore the subtle signs that could indicate a ransomware attack in progress. From slight performance degradation to unusual network behavior, we cover the early warning signs that every IT professional and digital asset owner should be aware of. Our discussion goes beyond just identifying threats. We examine the role of advanced security tools like SIEM and XDR in early ransomware detection, and why integrating these with endpoint protection is crucial for an effective defense strategy. We also stress the importance of having a solid incident response plan and the benefits of virtualization in recovery efforts. Whether you're looking to bolster your organization's cybersecurity or simply protect your personal data, this episode provides invaluable insights into detecting ransomware before it's too late.…
T
The Backup Wrap-Up

1 Tabletop Exercises: Your Secret Weapon Against Cyberattacks 47:32
47:32
Play Later
Play Later
Lists
Like
Liked47:32
In this eye-opening episode of The Backup Wrap-up, we delve into the world of tabletop exercises and their crucial role in cybersecurity preparedness. Our guest expert, Mike Saylor from Black Swan Security, guides us through the ins and outs of planning and executing effective tabletop exercises. We explore why these simulations are essential for organizations of all sizes, and how they can dramatically improve incident response capabilities. Listeners will gain valuable insights into selecting the right scenarios, involving key stakeholders, and creating a safe environment for learning. We also discuss common pitfalls to avoid and the importance of regular practice. Whether you're new to tabletop exercises or looking to enhance your existing program, this episode provides practical advice for strengthening your organization's cyber resilience. Don't miss this opportunity to level up your incident response game!…
T
The Backup Wrap-Up

1 Fostering a Culture of Cybersecurity with Training 45:01
45:01
Play Later
Play Later
Lists
Like
Liked45:01
In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions, we cover it all. Learn why rewarding vigilance is more effective than punishing mistakes, and how to foster a security-aware culture in your organization. We discuss the importance of relevant, interactive training methods, including simulated phishing tests, and how to train users to spot suspicious activity beyond just phishing attempts. Whether you're an IT professional or a business owner, this episode provides valuable insights to enhance your cybersecurity training efforts and strengthen your organization's digital defenses.…
T
The Backup Wrap-Up

1 Incident Response Plan 101: From BIA to Execution 37:00
37:00
Play Later
Play Later
Lists
Like
Liked37:00
In this very dense episode of The Backup Wrap-up, we delve into the critical world of incident response plans, from the business impact analysis (BIA) to finalizing its creation. Our expert guest, Dr. Mike Saylor, CEO of Blackswan Security, shares invaluable insights on crafting and implementing effective incident response strategies. We explore the key components of a robust plan, from conducting a business impact analysis to creating scenario-specific playbooks. Learn why having an incident response plan is crucial in today's cyber threat landscape and how to design one that works for your organization. We discuss the importance of regular updates, secure storage, and testing through tabletop exercises. Whether you're an IT professional or a business leader, this episode provides practical advice on preparing for and managing potential security incidents. Don't miss this essential guide to strengthening your organization's cyber resilience through comprehensive incident response planning.…
T
The Backup Wrap-Up

1 Reducing Your Cyberattack Blast Radius: Expert Tips 37:51
37:51
Play Later
Play Later
Lists
Like
Liked37:51
In this eye-opening episode of The Backup Wrap-up, we delve into the critical concept of minimizing the cyberattack blast radius. Joined by cybersecurity expert Dr. Mike Saylor, we explore practical strategies to significantly reduce the impact of a breach on your organization. We start by discussing the principle of least privilege access and its role in containing a cyberattack's blast radius. Next, we examine the importance of network segmentation in limiting the spread of an attack. The conversation then shifts to the often-overlooked aspect of controlling outbound traffic to prevent data exfiltration. Throughout the episode, we provide actionable insights and best practices that IT professionals and business owners can implement to enhance their cybersecurity posture. By focusing on minimizing the cyberattack blast radius, organizations can better protect their digital assets and mitigate potential damages in the event of a breach.…
T
The Backup Wrap-Up

1 Ransomware Forensics: Preserving Digital Evidence 45:10
45:10
Play Later
Play Later
Lists
Like
Liked45:10
In this episode of The Backup Wrap-Up, we delve into the crucial world of ransomware forensics with cybersecurity expert Mike Saylor. We explore the essential steps and tools used in forensic analysis during a cyber attack, highlighting the importance of preserving evidence and navigating the complexities of both traditional and mobile device forensics. From log preservation to forensic imaging, we discuss how organizations can prepare for and respond to ransomware incidents. Mike shares insights on the different forensic tools available, their applications, and the challenges faced in modern cybersecurity investigations. We also touch on the importance of having a forensic response plan in place before an attack occurs. Whether you're an IT professional or simply interested in cybersecurity, this episode offers valuable knowledge about the forensic processes that help unravel cyber attacks and protect valuable data. Tune in to enhance your understanding of ransomware forensics and strengthen your organization's cyber defenses.…
T
The Backup Wrap-Up

1 The Cyber Insurance Playbook: What You Need to Know 50:02
50:02
Play Later
Play Later
Lists
Like
Liked50:02
Dive into the world of cyber insurance with our latest episode featuring expert Mike Saylor. We explore the evolving landscape of cyber insurance policies and their crucial role in today's digital security strategies. Learn why cyber insurance is more than just a financial safeguard and how it can be a proactive tool in your cybersecurity arsenal. Mike shares invaluable insights on maximizing your cyber insurance benefits, from understanding policy nuances to leveraging your insurer's expertise. We discuss common misconceptions, the importance of pre-incident preparation, and strategies for effective incident response. Whether you're a small business owner or a corporate executive, this episode provides essential knowledge to navigate the complex terrain of cyber insurance and protect your digital assets.…
T
The Backup Wrap-Up

In this important episode of "The Backup Wrap-Up," we continue our discussion on ransomware, and dive deeper into the world of ransomware prevention. We assume you've done the basics (password & patch management, and MFA), and want to do more. As cyber threats continue to evolve, it's more important than ever to stay ahead of potential attacks. We discuss a range of strategies to protect your organization, from application whitelisting to securing service accounts. Among other things, our conversation covers the importance of restricting risky network protocols, implementing multi-factor authentication, and employing reputable anti-malware software. We also explore the benefits of penetration testing and red team exercises. Additionally, we emphasize the significance of establishing relationships with blue teams and law enforcement resources before an attack occurs. Join us as we provide actionable insights on ransomware prevention, helping you build a robust defense against this pervasive cyber threat. Whether you're an IT professional or a business owner, this episode is packed with valuable information to enhance your cybersecurity posture.…
T
The Backup Wrap-Up

1 IT Security Audit Essentials: Protect Your Network 38:19
38:19
Play Later
Play Later
Lists
Like
Liked38:19
In this episode of The Backup Wrap-Up, we delve into the critical world of IT security audits. We explore why these audits are essential for maintaining a robust cybersecurity posture and how they can help organizations identify and address potential vulnerabilities. Our discussion covers key elements of surviving an IT security audit, including user education, application whitelisting, and securing remote access protocols. We also touch on the importance of regular security assessments and proactive measures to stay ahead of cyber threats. Whether you're an IT professional or a business owner, this episode provides valuable insights into conducting thorough IT security audits and implementing best practices to protect your digital assets. Tune in to learn how you can strengthen your organization's defenses and become a cybersecurity hero.…
T
The Backup Wrap-Up

1 How to Stop Ransomware: 3 Essential Strategies 48:27
48:27
Play Later
Play Later
Lists
Like
Liked48:27
Discover how to stop ransomware in its tracks with this informative episode of The Backup Wrap-up. Hosts W. Curtis Preston and Prasanna Malaiyandi look into three crucial strategies that can prevent 90% or more of ransomware attacks. Learn why patch management is your first line of defense and how to implement it effectively. Explore the world of password security and discover why a robust password management system is essential. Finally, uncover the power of multi-factor authentication in thwarting unauthorized access. Don't miss this opportunity to strengthen your cybersecurity defenses and stay one step ahead of cybercriminals.…
T
The Backup Wrap-Up

1 Immutable Backups: Your Ultimate Defense Against Ransomware 44:31
44:31
Play Later
Play Later
Lists
Like
Liked44:31
In this episode, we delve into the world of immutable backups, a crucial component of modern data protection strategies. We explore why immutable backups have become increasingly important in the face of sophisticated cyber threats, especially ransomware attacks that target backup systems. The episode covers the evolution from tape backups to disk-based systems and cloud solutions, highlighting how this shift has introduced new security challenges. We discuss the spectrum of immutability in backup systems, from basic file system protections to fully immutable cloud storage options. The conversation touches on various implementations of immutable backups, their strengths, and potential vulnerabilities. We also address the importance of multi-factor authentication and awareness of emerging threats like AI-based voice impersonation.…
T
The Backup Wrap-Up

1 Protect Backups from Ransomware: Expert Strategies 34:50
34:50
Play Later
Play Later
Lists
Like
Liked34:50
In this crucial episode, we delve into how to protect backups from ransomware, a critical concern for IT professionals and business owners alike. We explore why backup systems are prime targets for cybercriminals and the devastating consequences of a successful attack. Our discussion covers essential strategies to fortify your backups, including implementing immutable storage, using local accounts instead of Active Directory, and employing network segmentation. We also emphasize the importance of robust monitoring systems and regular patching. By understanding the risks and implementing these protective measures, you can significantly enhance your organization's resilience against ransomware attacks. Don't miss this vital information on how to protect backups from ransomware and secure your data's last line of defense.…
T
The Backup Wrap-Up

This episode about what is ransomware is the first in a new series on the topic. The episode explores what it is, how it works, and why it has become such a significant threat to businesses and individuals alike. We discuss the evolution of ransomware attacks, from simple data encryption to sophisticated extortion schemes involving data exfiltration and direct attacks on backup systems. Our conversation highlights the importance of prevention and detection measures, such as robust access controls, limiting internet-facing systems, and monitoring for data exfiltration. We also emphasize the critical role of backup and recovery strategies, including offline and immutable backups, in mitigating the impact of ransomware attacks. Throughout the episode, we provide insights into the complex ransomware threat landscape and offer practical advice for organizations looking to protect their data and systems from this ever-evolving threat.…
T
The Backup Wrap-Up

In this episode, we explore the differences between XDR and SIEM, two crucial tools in the world of security monitoring. Our guest, Dez Rock, CEO of SIEMonster, shares her fascinating journey from professional hacker to building an affordable, scalable SIEM solution that encompasses SOAR and XDR capabilities. We discuss the importance of evaluating security tools based on their true capabilities rather than just market perception, and Dez provides real-world examples of how SIEMonster's SIEM/XDR tool automatically detected and shut down a ransomware attack at a large hospital client. Tune in to learn about the evolving security landscape, the pros and cons of XDR vs SIEM, and how you may not have to choose! Whether you're an IT professional or simply interested in the latest cybersecurity trends, this episode offers valuable insights into the future of security monitoring.…
T
The Backup Wrap-Up

1 Strengthening Your Cybersecurity Blue Team: Pro Tips 51:30
51:30
Play Later
Play Later
Lists
Like
Liked51:30
In this episode, we explore the essential strategies and best practices for building and optimizing a blue team cybersecurity approach. Our guest, Mike Saylor, shares his expertise on how organizations can effectively prepare for and respond to cyber incidents. From establishing relationships with law enforcement to conducting tabletop exercises and understanding cyber insurance policies, Mike provides valuable insights to help companies strengthen their cybersecurity posture. Throughout the episode, we discuss the importance of focusing on detection and response capabilities, not just prevention, and how a well-prepared blue team can make all the difference in the face of a cyber threat. Mike also shares real-world stories that illustrate the key lessons and takeaways for organizations looking to enhance their cybersecurity efforts. Tune in to learn how you can better protect your company from cyber threats with a robust blue team approach.…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.