Episodes
Ready to level up your disaster recovery testing game? This episode covers everything from basic restore testing to full-scale DR scenarios. Curtis and Prasanna share real-world experiences and practical advice for implementing effective disaster recovery testing strategies.
Learn why starting small is crucial, how to define clear success criteria, and ways to test without risking your production environment. We discuss different infrastructure types, from physical servers to cloud platforms,...
Published 11/18/24
WC
continue
=====================DESCRIPTION===============
Detecting ransomware requires more than just good antivirus software - it demands a comprehensive approach using multiple tools and techniques. In this episode of The Backup Wrap-up, security expert Mike Saylor breaks down the essential components of ransomware detection, from endpoint protection to network monitoring.
Learn about the latest detection tools like XDR, EDR, and SOAR, and discover why many organizations might benefit...
Published 11/11/24
In this essential episode of The Backup Wrap-up, we dive deep into RTO vs RPO – the foundational concepts that drive backup and recovery system design. Curtis and Prasanna break down why these aren't just technical metrics, but crucial business decisions that should come from your stakeholders.
Learn why different applications need different RTOs and RPOs, how these metrics influence your backup frequency and system design, and why getting them wrong can cost your company millions. We'll show...
Published 11/04/24
Experience the backup from hell in this eye-opening episode of The Backup Wrap-up. What started as a straightforward 40TB backup spiraled into a months-long battle with 400TB of data, failing tape drives, and directories containing hundreds millions of files.
Host W. Curtis Preston shares his first-hand account of tackling this backup from hell, including the challenges of dealing with SMB protocol limitations, tape drive failures, and the infamous "million file problem." Learn why backing up...
Published 10/28/24
In this important episode, we tackle the crucial topic of election integrity. As a seasoned poll worker and site manager, I take you behind the scenes of our voting process, revealing the numerous safeguards and checks in place to ensure fair and accurate elections. We debunk common myths, explain the importance of paper ballots, and discuss how mail-in voting actually works. You'll learn about the rigorous signature verification process, the role of election observers, and why it's nearly...
Published 10/21/24
In this eye-opening episode of The Backup Wrap-up, we look at the dangers of the consolidating backup market, a trend that's reshaping the industry. We talk about recent major acquisitions like Cohesity's purchase of Veritas and Salesforce's takeover of OwnBackup, examining the implications for customers and the market at large.
After covering each acquisition, we talk about the often-overlooked risks of keeping legacy backup systems operational post-consolidation, including security...
Published 10/14/24
In this eye-opening episode of The Backup Wrap-up, we look at the dangers of the consolidating backup market, a trend that's reshaping the industry. We talk about recent major acquisitions like Cohesity's purchase of Veritas and Salesforce's takeover of OwnBackup, examining the implications for customers and the market at large.
After covering each acquisition, we talk about the often-overlooked risks of keeping legacy backup systems operational post-consolidation, including security...
Published 10/14/24
In this episode of The Backup Wrap-up that proves Curtis right :) we look into the shocking case of a rogue administrator who held an entire company's IT infrastructure hostage. We explore how Daniel Rhyne, a core infrastructure engineer, managed to lock out his colleagues and demand a $750,000 ransom. This real-world example highlights the critical importance of safeguarding against insider threats.
We look into practical strategies to prevent such incidents, including implementing least...
Published 10/07/24
In this episode of The Backup Wrap-up, we explore the critical process of a business impact analysis (BIA) and its importance for organizations of all sizes. Our expert guest, Dr. Mike Saylor, shares valuable insights on conducting effective BIAs, including why it's best to have a third party perform them. We discuss how business impact analysis informs disaster recovery plans, aligns IT with business needs, and helps justify crucial investments in resilient systems. You'll learn about the...
Published 09/30/24
In this essential episode of The Backup Wrap-up, we delve into the critical components of a robust ransomware backup strategy. We explore the concept of dwell time and its implications on backup retention periods, emphasizing the need for longer-term storage solutions. Our discussion covers the importance of frequent backups and designing systems with multiple recovery options. We examine the benefits of cutting-edge technologies like snapshots, replication, and cloud-based recovery solutions...
Published 09/23/24
In this eye-opening episode of The Backup Wrap-up, we delve into the critical topic of detecting ransomware. Joined by cybersecurity expert Dr. Mike Sailor, we explore the subtle signs that could indicate a ransomware attack in progress. From slight performance degradation to unusual network behavior, we cover the early warning signs that every IT professional and digital asset owner should be aware of.
Our discussion goes beyond just identifying threats. We examine the role of advanced...
Published 09/16/24
In this eye-opening episode of The Backup Wrap-up, we delve into the world of tabletop exercises and their crucial role in cybersecurity preparedness. Our guest expert, Mike Saylor from Black Swan Security, guides us through the ins and outs of planning and executing effective tabletop exercises. We explore why these simulations are essential for organizations of all sizes, and how they can dramatically improve incident response capabilities.
Listeners will gain valuable insights into...
Published 09/09/24
In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions, we cover it all.
Learn why rewarding vigilance is more effective than punishing mistakes, and how to foster a security-aware culture in your...
Published 09/02/24
In this very dense episode of The Backup Wrap-up, we delve into the critical world of incident response plans, from the business impact analysis (BIA) to finalizing its creation. Our expert guest, Dr. Mike Saylor, CEO of Blackswan Security, shares invaluable insights on crafting and implementing effective incident response strategies. We explore the key components of a robust plan, from conducting a business impact analysis to creating scenario-specific playbooks.
Learn why having an...
Published 08/26/24
In this eye-opening episode of The Backup Wrap-up, we delve into the critical concept of minimizing the cyberattack blast radius. Joined by cybersecurity expert Dr. Mike Saylor, we explore practical strategies to significantly reduce the impact of a breach on your organization.
We start by discussing the principle of least privilege access and its role in containing a cyberattack's blast radius. Next, we examine the importance of network segmentation in limiting the spread of an attack. The...
Published 08/19/24
In this episode of The Backup Wrap-Up, we delve into the crucial world of ransomware forensics with cybersecurity expert Mike Saylor. We explore the essential steps and tools used in forensic analysis during a cyber attack, highlighting the importance of preserving evidence and navigating the complexities of both traditional and mobile device forensics.
From log preservation to forensic imaging, we discuss how organizations can prepare for and respond to ransomware incidents. Mike shares...
Published 08/12/24
Dive into the world of cyber insurance with our latest episode featuring expert Mike Saylor. We explore the evolving landscape of cyber insurance policies and their crucial role in today's digital security strategies. Learn why cyber insurance is more than just a financial safeguard and how it can be a proactive tool in your cybersecurity arsenal.
Mike shares invaluable insights on maximizing your cyber insurance benefits, from understanding policy nuances to leveraging your insurer's...
Published 08/05/24
In this important episode of "The Backup Wrap-Up," we continue our discussion on ransomware, and dive deeper into the world of ransomware prevention. We assume you've done the basics (password & patch management, and MFA), and want to do more. As cyber threats continue to evolve, it's more important than ever to stay ahead of potential attacks. We discuss a range of strategies to protect your organization, from application whitelisting to securing service accounts.
Among other things,...
Published 07/29/24
In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions, we cover it all.
Learn why rewarding vigilance is more effective than punishing mistakes, and how to foster a security-aware culture in your...
Published 07/22/24
In this episode of The Backup Wrap-Up, we delve into the critical world of IT security audits. We explore why these audits are essential for maintaining a robust cybersecurity posture and how they can help organizations identify and address potential vulnerabilities. Our discussion covers key elements of surviving an IT security audit, including user education, application whitelisting, and securing remote access protocols. We also touch on the importance of regular security assessments and...
Published 07/15/24
Discover how to stop ransomware in its tracks with this informative episode of The Backup Wrap-up. Hosts W. Curtis Preston and Prasanna Malaiyandi look into three crucial strategies that can prevent 90% or more of ransomware attacks. Learn why patch management is your first line of defense and how to implement it effectively. Explore the world of password security and discover why a robust password management system is essential. Finally, uncover the power of multi-factor authentication in...
Published 07/08/24
In this episode, we delve into the world of immutable backups, a crucial component of modern data protection strategies. We explore why immutable backups have become increasingly important in the face of sophisticated cyber threats, especially ransomware attacks that target backup systems. The episode covers the evolution from tape backups to disk-based systems and cloud solutions, highlighting how this shift has introduced new security challenges.
We discuss the spectrum of immutability in...
Published 07/01/24
In this crucial episode, we delve into how to protect backups from ransomware, a critical concern for IT professionals and business owners alike. We explore why backup systems are prime targets for cybercriminals and the devastating consequences of a successful attack. Our discussion covers essential strategies to fortify your backups, including implementing immutable storage, using local accounts instead of Active Directory, and employing network segmentation. We also emphasize the...
Published 06/24/24
This episode about what is ransomware is the first in a new series on the topic. The episode explores what it is, how it works, and why it has become such a significant threat to businesses and individuals alike. We discuss the evolution of ransomware attacks, from simple data encryption to sophisticated extortion schemes involving data exfiltration and direct attacks on backup systems. Our conversation highlights the importance of prevention and detection measures, such as robust access...
Published 06/17/24