Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
1
The Dark Side of Backup System Consolidation
42:31
42:31
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
42:31
In this eye-opening episode of The Backup Wrap-up, we look at the dangers of the consolidating backup market, a trend that's reshaping the industry. We talk about recent major acquisitions like Cohesity's purchase of Veritas and Salesforce's takeover of OwnBackup, examining the implications for customers and the market at large. After covering each…
…
continue reading
1
Rogue Administrator Nightmare: Lessons from a Real-Life Attack
38:05
38:05
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
38:05
In this episode of The Backup Wrap-up that proves Curtis right :) we look into the shocking case of a rogue administrator who held an entire company's IT infrastructure hostage. We explore how Daniel Rhyne, a core infrastructure engineer, managed to lock out his colleagues and demand a $750,000 ransom. This real-world example highlights the critica…
…
continue reading
1
Business Impact Analysis: Your Key to Resilient Operations
46:22
46:22
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
46:22
In this episode of The Backup Wrap-up, we explore the critical process of a business impact analysis (BIA) and its importance for organizations of all sizes. Our expert guest, Dr. Mike Saylor, shares valuable insights on conducting effective BIAs, including why it's best to have a third party perform them. We discuss how business impact analysis in…
…
continue reading
1
Building a Resilient Ransomware Backup Strategy
50:40
50:40
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
50:40
In this essential episode of The Backup Wrap-up, we delve into the critical components of a robust ransomware backup strategy. We explore the concept of dwell time and its implications on backup retention periods, emphasizing the need for longer-term storage solutions. Our discussion covers the importance of frequent backups and designing systems w…
…
continue reading
1
Detecting Ransomware Before It's Too Late
45:25
45:25
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
45:25
In this eye-opening episode of The Backup Wrap-up, we delve into the critical topic of detecting ransomware. Joined by cybersecurity expert Dr. Mike Sailor, we explore the subtle signs that could indicate a ransomware attack in progress. From slight performance degradation to unusual network behavior, we cover the early warning signs that every IT …
…
continue reading
1
Tabletop Exercises: Your Secret Weapon Against Cyberattacks
47:32
47:32
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
47:32
In this eye-opening episode of The Backup Wrap-up, we delve into the world of tabletop exercises and their crucial role in cybersecurity preparedness. Our guest expert, Mike Saylor from Black Swan Security, guides us through the ins and outs of planning and executing effective tabletop exercises. We explore why these simulations are essential for o…
…
continue reading
1
Fostering a Culture of Cybersecurity with Training
45:01
45:01
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
45:01
In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions…
…
continue reading
1
Incident Response Plan 101: From BIA to Execution
37:00
37:00
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
37:00
In this very dense episode of The Backup Wrap-up, we delve into the critical world of incident response plans, from the business impact analysis (BIA) to finalizing its creation. Our expert guest, Dr. Mike Saylor, CEO of Blackswan Security, shares invaluable insights on crafting and implementing effective incident response strategies. We explore th…
…
continue reading
1
Reducing Your Cyberattack Blast Radius: Expert Tips
37:51
37:51
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
37:51
In this eye-opening episode of The Backup Wrap-up, we delve into the critical concept of minimizing the cyberattack blast radius. Joined by cybersecurity expert Dr. Mike Saylor, we explore practical strategies to significantly reduce the impact of a breach on your organization. We start by discussing the principle of least privilege access and its …
…
continue reading
1
Ransomware Forensics: Preserving Digital Evidence
45:10
45:10
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
45:10
In this episode of The Backup Wrap-Up, we delve into the crucial world of ransomware forensics with cybersecurity expert Mike Saylor. We explore the essential steps and tools used in forensic analysis during a cyber attack, highlighting the importance of preserving evidence and navigating the complexities of both traditional and mobile device foren…
…
continue reading
1
The Cyber Insurance Playbook: What You Need to Know
50:02
50:02
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
50:02
Dive into the world of cyber insurance with our latest episode featuring expert Mike Saylor. We explore the evolving landscape of cyber insurance policies and their crucial role in today's digital security strategies. Learn why cyber insurance is more than just a financial safeguard and how it can be a proactive tool in your cybersecurity arsenal. …
…
continue reading
In this important episode of "The Backup Wrap-Up," we continue our discussion on ransomware, and dive deeper into the world of ransomware prevention. We assume you've done the basics (password & patch management, and MFA), and want to do more. As cyber threats continue to evolve, it's more important than ever to stay ahead of potential attacks. We …
…
continue reading
1
IT Security Audit Essentials: Protect Your Network
38:19
38:19
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
38:19
In this episode of The Backup Wrap-Up, we delve into the critical world of IT security audits. We explore why these audits are essential for maintaining a robust cybersecurity posture and how they can help organizations identify and address potential vulnerabilities. Our discussion covers key elements of surviving an IT security audit, including us…
…
continue reading
1
How to Stop Ransomware: 3 Essential Strategies
48:27
48:27
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
48:27
Discover how to stop ransomware in its tracks with this informative episode of The Backup Wrap-up. Hosts W. Curtis Preston and Prasanna Malaiyandi look into three crucial strategies that can prevent 90% or more of ransomware attacks. Learn why patch management is your first line of defense and how to implement it effectively. Explore the world of p…
…
continue reading
1
Immutable Backups: Your Ultimate Defense Against Ransomware
44:31
44:31
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
44:31
In this episode, we delve into the world of immutable backups, a crucial component of modern data protection strategies. We explore why immutable backups have become increasingly important in the face of sophisticated cyber threats, especially ransomware attacks that target backup systems. The episode covers the evolution from tape backups to disk-…
…
continue reading
1
Protect Backups from Ransomware: Expert Strategies
34:50
34:50
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
34:50
In this crucial episode, we delve into how to protect backups from ransomware, a critical concern for IT professionals and business owners alike. We explore why backup systems are prime targets for cybercriminals and the devastating consequences of a successful attack. Our discussion covers essential strategies to fortify your backups, including im…
…
continue reading
This episode about what is ransomware is the first in a new series on the topic. The episode explores what it is, how it works, and why it has become such a significant threat to businesses and individuals alike. We discuss the evolution of ransomware attacks, from simple data encryption to sophisticated extortion schemes involving data exfiltratio…
…
continue reading
In this episode, we explore the differences between XDR and SIEM, two crucial tools in the world of security monitoring. Our guest, Dez Rock, CEO of SIEMonster, shares her fascinating journey from professional hacker to building an affordable, scalable SIEM solution that encompasses SOAR and XDR capabilities. We discuss the importance of evaluating…
…
continue reading
1
Strengthening Your Cybersecurity Blue Team: Pro Tips
51:30
51:30
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
51:30
In this episode, we explore the essential strategies and best practices for building and optimizing a blue team cybersecurity approach. Our guest, Mike Saylor, shares his expertise on how organizations can effectively prepare for and respond to cyber incidents. From establishing relationships with law enforcement to conducting tabletop exercises an…
…
continue reading
1
Thinking Like a Hacker: Red Team Cyber Security Strategies
56:24
56:24
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
56:24
In this popular episode from last year, we explore the fascinating world of red team cyber security with Dwayne Laflotte, a seasoned expert in offensive cybersecurity. Dwayne shares his wealth of knowledge and experience, diving into the tactics and strategies employed by red teams to identify vulnerabilities and strengthen an organization's defens…
…
continue reading
1
Google Cloud Disaster Recovery: Lessons from UniSuper's Close Call
31:26
31:26
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:26
In this episode, we delve into the critical importance of Google Cloud disaster recovery planning through the lens of UniSuper's recent brush with catastrophe. When Google accidentally deleted UniSuper's entire VMware environment, the Australian pension provider faced the terrifying prospect of losing access to $125 billion in assets and the data o…
…
continue reading
1
Electronic Discovery tools that extract from backups
52:06
52:06
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
52:06
In this episode, we explore the world of electronic discovery tools and how they're transforming the legal landscape. Our guest, Brendan Sullivan, shares his expertise on the challenges companies face when dealing with legacy data and the importance of using the right tools for eDiscovery. Learn how purpose-built software can greatly enhance effici…
…
continue reading
1
Cloud Disaster Recovery: Lessons from Failures
42:00
42:00
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
42:00
Capping our series on cloud disasters is this one on cloud disaster recovery. In this episode, we review the lessons we learned from discussing 10 cloud disasters. We talk about the critical strategies and techniques to ensure your data is protected and recoverable in the event of a disaster in the cloud. From the basic 3-2-1 rule to the pitfalls o…
…
continue reading
1
Life Uncontained YouTube Channel Loses Month of Footage in Crash
41:41
41:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
41:41
In this episode, we discuss the devastating crash experienced by the popular YouTube channel "Life Uncontained," which resulted in the loss of a month's worth of irreplaceable video footage. The Life Uncontained crash serves as a stark reminder of the importance of proper backup strategies for protecting valuable digital assets. We delve into the l…
…
continue reading
1
The Disastrous Dedoose Crash: Lessons Learned
39:57
39:57
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
39:57
In 2014, the cloud-based research platform Dedoose suffered a catastrophic crash, losing customer data and backups simultaneously. We examine the causes of the Dedoose crash, its impact on users, and crucial lessons for anyone relying on SaaS. Learn how subpar backup practices, like monthly-only backups and overwriting previous versions, can lead t…
…
continue reading