Player FM - Internet Radio Done Right
Checked 9d ago
Ajouté il y a trois ans
Contenu fourni par W. Curtis Preston (Mr. Backup). Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par W. Curtis Preston (Mr. Backup) ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Player FM - Application Podcast
Mettez-vous hors ligne avec l'application Player FM !
Mettez-vous hors ligne avec l'application Player FM !
Podcasts qui valent la peine d'être écoutés
SPONSORISÉ
D
Decisions, Decisions
54:26
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
54:26Join Mandii B and Weezy WTF as they navigate the evolution of their podcasting journey in this candid and hilarious episode of “Decisions, Decisions.” Reflecting on nearly a decade of bold conversations, the duo opens up about the challenges and triumphs of rebranding their iconic show, previously known as “WHOREible Decisions.” Dive into their reasoning behind the name change, their growth as individuals, and the dynamics of creating space for nontraditional relationships and personal self-love. This episode features thought-provoking discussions on societal norms, reclaiming identity, and the complexities of managing a brand that champions inclusivity while addressing the limitations of media algorithms. From celibacy and creative reinvention to navigating life changes and unconventional lifestyles, Mandy and Weezy offer raw, unfiltered takes that will keep you engaged and inspired. Follow the hosts on social media Weezy @Weezywtf & Mandii B @Fullcourtpumps and follow the Decisions Decisions pages Instagram @_decisionsdecisions Don't forget to tag #decisionsdecisions or @ us to let us know what you think of this week's episode! Want more? Bonus episodes, merch and more Whoreible Decisions!! Become a Patron at Patreon.com/whoreibledecisions See omnystudio.com/listener for privacy information.…
The Backup Wrap-Up
Tout marquer comme (non) lu
Manage series 3332029
Contenu fourni par W. Curtis Preston (Mr. Backup). Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par W. Curtis Preston (Mr. Backup) ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from. His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others. A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe. That's why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware. If you'd like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you.
…
continue reading
283 episodes
Tout marquer comme (non) lu
Manage series 3332029
Contenu fourni par W. Curtis Preston (Mr. Backup). Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par W. Curtis Preston (Mr. Backup) ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from. His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others. A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe. That's why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware. If you'd like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you.
…
continue reading
283 episodes
Tous les épisodes
×1 DR Case Study: A first hand-account 52:46
52:46
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
52:46(For frequent listeners, I made a mistake with last week's episode. THIS is the episode I meant to publish last week. I know it has the same description. Sorry about that.) This disaster recovery case study takes you inside a real DR scenario when a hurricane devastated an island's data center. Our guest shares his firsthand experience managing recovery efforts with limited resources, no mainland connection, and countless unexpected challenges. (This is the on-the-ground account of the story we told last week with "Harry Potter.") Listen as we explore how basic DR assumptions fell apart, from authentication dependencies to satellite communication limits. Learn why sleeping on air mattresses and eating chicken and rice became part of this disaster recovery case study, and discover critical lessons about DR planning, testing, and documentation that could save your organization. This episode reveals the reality of disaster recovery when everything - including trees - gets stripped away.…
1 NetBackup Disaster: When Nature Strikes Back 44:54
44:54
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:54When a hurricane struck an island data center, one backup admin faced a NetBackup disaster that tested years of experience and planning. This episode reveals the real-world challenges of recovering from a catastrophic event that flooded one data center and disrupted access to Iron Mountain's offsite storage facility. Listen as our guest, a 20-year veteran backup administrator, shares his firsthand account of managing this NetBackup disaster. Learn about the critical decisions made during the three-week recovery process, the unexpected challenges they faced, and the valuable lessons learned about backup infrastructure, replication strategies, and disaster recovery planning. (This is part one of two parts. Next week you will hear from the person on the ground during this disaster.)…
1 Free NetBackup Reader: S2|DATA's Game-Changing Tool 26:47
26:47
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
26:47S2|DATA has released a free NetBackup reader that gives users complete control over their backup data without requiring a full NetBackup environment. This standalone application allows anyone to quickly catalog and restore data from NetBackup disk images, even if they no longer maintain their NetBackup infrastructure. CEO Brendan Sullivan joins the show to explain why they created this free tool and how it helps organizations maintain access to their legacy backup data. We discuss the challenges of vendor lock-in, the importance of data ownership, and why companies shouldn't have to keep paying for access to their own information. We also cover how S2|DATA offers a range of services for accessing all legacy backup data, not just NetBackup. Whether you're considering moving away from a backup product or simply want easier access to your backup data, this episode explains how this free NetBackup reader can help you take control of your data destiny. You can read about it here: https://s2data.com/libertas-free-backup-reader/…
1 Disaster Recovery Test Gone Wrong 57:01
57:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
57:01In this eye-opening episode, we examine a real-world disaster recovery test gone wrong from Kodiak Island, Alaska. Our guest Paul Van Dyke shares his story of intentionally taking down an entire server environment over a weekend, armed with only backup tapes and determination. This disaster recovery test example showcases both what not to do and valuable lessons learned. Paul walks us through his bold 2001 decision to reorganize storage across five servers by completely wiping them all at once. What was supposed to be a weekend project turned into a five-day marathon, including sleeping on his office floor to swap backup tapes. While he eventually succeeded in restoring everything, this disaster recovery test example demonstrates why proper testing and planning are crucial for any major infrastructure changes. Join us for this candid conversation about backup testing, restoration planning, and the unique challenges of managing IT infrastructure on a remote Alaskan island. Learn from Paul's experience so you don't have to learn these lessons the hard way!…
1 Disaster Recovery Testing: Start Small Before Going Big 37:40
37:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:40Ready to level up your disaster recovery testing game? This episode covers everything from basic restore testing to full-scale DR scenarios. Curtis and Prasanna share real-world experiences and practical advice for implementing effective disaster recovery testing strategies. Learn why starting small is crucial, how to define clear success criteria, and ways to test without risking your production environment. We discuss different infrastructure types, from physical servers to cloud platforms, and explain how each requires its own testing approach. Plus, get insights on creating effective runbooks and ensuring your team can execute recovery procedures without depending on specific individuals. Whether you're planning your first DR test or looking to improve existing procedures, this episode provides actionable guidance for building confidence in your recovery capabilities. BTW if you want to watch/listen to the Alaska DR story, I'm actually going to repost it next week.…
1 Detecting Ransomware Before It's Too Late 45:48
45:48
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:48WC continue =====================DESCRIPTION=============== Detecting ransomware requires more than just good antivirus software - it demands a comprehensive approach using multiple tools and techniques. In this episode of The Backup Wrap-up, security expert Mike Saylor breaks down the essential components of ransomware detection, from endpoint protection to network monitoring. Learn about the latest detection tools like XDR, EDR, and SOAR, and discover why many organizations might benefit from working with a managed security service provider. We discuss real-world examples of ransomware detection, including unusual signs that might indicate an attack in progress. Whether you're managing IT for a small business or an enterprise organization, this episode provides practical insights into detecting ransomware before it's too late.…
1 RTO vs RPO: The Foundations of Backup Design 40:22
40:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
40:22In this essential episode of The Backup Wrap-up, we dive deep into RTO vs RPO – the foundational concepts that drive backup and recovery system design. Curtis and Prasanna break down why these aren't just technical metrics, but crucial business decisions that should come from your stakeholders. Learn why different applications need different RTOs and RPOs, how these metrics influence your backup frequency and system design, and why getting them wrong can cost your company millions. We'll show you how to have productive conversations with stakeholders about recovery objectives, and why the common answer of "zero downtime" isn't always the right one. Whether you're new to backup or a seasoned pro, this episode will reshape how you think about recovery objectives.…
1 Backup from Hell: SMB vs 400TB 44:19
44:19
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:19Experience the backup from hell in this eye-opening episode of The Backup Wrap-up. What started as a straightforward 40TB backup spiraled into a months-long battle with 400TB of data, failing tape drives, and directories containing hundreds millions of files. Host W. Curtis Preston shares his first-hand account of tackling this backup from hell, including the challenges of dealing with SMB protocol limitations, tape drive failures, and the infamous "million file problem." Learn why backing up 99 million files in a single directory isn't just challenging - it's nearly impossible over standard protocols. Discover the solutions that finally worked, from switching to disk-based backup to implementing local tar backups. Whether you're a backup admin or IT professional, this episode offers valuable insights into handling extreme backup scenarios.…
1 Election Integrity 101: What Every Voter Should Know 1:03:40
1:03:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:03:40In this important episode, we tackle the crucial topic of election integrity. As a seasoned poll worker and site manager, I take you behind the scenes of our voting process, revealing the numerous safeguards and checks in place to ensure fair and accurate elections. We debunk common myths, explain the importance of paper ballots, and discuss how mail-in voting actually works. You'll learn about the rigorous signature verification process, the role of election observers, and why it's nearly impossible to commit large-scale voter fraud. Whether you're skeptical about our electoral system or simply curious, this episode provides valuable insights into how we maintain election integrity. Don't miss this chance to understand the nuts and bolts of our democratic process and why you can trust in the security of your vote.…
1 The Dark Side of Backup System Consolidation 43:06
43:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:06In this eye-opening episode of The Backup Wrap-up, we look at the dangers of the consolidating backup market, a trend that's reshaping the industry. We talk about recent major acquisitions like Cohesity's purchase of Veritas and Salesforce's takeover of OwnBackup, examining the implications for customers and the market at large. After covering each acquisition, we talk about the often-overlooked risks of keeping legacy backup systems operational post-consolidation, including security vulnerabilities and ongoing costs. We also address the challenges of data accessibility and the potential legal ramifications of retaining old backups. Whether you're a seasoned IT professional or new to the world of data protection, this episode offers valuable insights into navigating the complex landscape of backup market consolidation.…
1 Rogue Administrator Nightmare: Lessons from a Real-Life Attack 38:05
38:05
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
38:05In this episode of The Backup Wrap-up that proves Curtis right :) we look into the shocking case of a rogue administrator who held an entire company's IT infrastructure hostage. We explore how Daniel Rhyne, a core infrastructure engineer, managed to lock out his colleagues and demand a $750,000 ransom. This real-world example highlights the critical importance of safeguarding against insider threats. We look into practical strategies to prevent such incidents, including implementing least privilege access, enforcing "four eyes" principles for critical changes, and maintaining robust logging and auditing systems. The discussion also covers recovery options and the vital role of off-site immutable backups in mitigating damage from rogue administrators. Whether you're an IT professional or business leader, this episode provides essential insights into protecting your organization from the potentially devastating actions of trusted insiders gone rogue.…
1 Business Impact Analysis: Your Key to Resilient Operations 46:22
46:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:22In this episode of The Backup Wrap-up, we explore the critical process of a business impact analysis (BIA) and its importance for organizations of all sizes. Our expert guest, Dr. Mike Saylor, shares valuable insights on conducting effective BIAs, including why it's best to have a third party perform them. We discuss how business impact analysis informs disaster recovery plans, aligns IT with business needs, and helps justify crucial investments in resilient systems. You'll learn about the steps involved in a BIA, from stakeholder identification to financial impact assessment, and understand how this process can save your organization time, money, and headaches in the long run. Whether you're an IT professional or a business leader, this episode provides essential knowledge for protecting your organization's critical functions and ensuring business continuity.…
1 Building a Resilient Ransomware Backup Strategy 50:40
50:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
50:40In this essential episode of The Backup Wrap-up, we delve into the critical components of a robust ransomware backup strategy. We explore the concept of dwell time and its implications on backup retention periods, emphasizing the need for longer-term storage solutions. Our discussion covers the importance of frequent backups and designing systems with multiple recovery options. We examine the benefits of cutting-edge technologies like snapshots, replication, and cloud-based recovery solutions in crafting an effective ransomware backup strategy. The episode also tackles the nuances of database versus file system recovery and provides insights on evaluating the importance of encrypted data. Whether you're an IT professional or a business owner, this episode offers valuable guidance on fortifying your ransomware backup strategy to protect your critical data assets.…
1 Detecting Ransomware Before It's Too Late 45:25
45:25
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:25In this eye-opening episode of The Backup Wrap-up, we delve into the critical topic of detecting ransomware. Joined by cybersecurity expert Dr. Mike Sailor, we explore the subtle signs that could indicate a ransomware attack in progress. From slight performance degradation to unusual network behavior, we cover the early warning signs that every IT professional and digital asset owner should be aware of. Our discussion goes beyond just identifying threats. We examine the role of advanced security tools like SIEM and XDR in early ransomware detection, and why integrating these with endpoint protection is crucial for an effective defense strategy. We also stress the importance of having a solid incident response plan and the benefits of virtualization in recovery efforts. Whether you're looking to bolster your organization's cybersecurity or simply protect your personal data, this episode provides invaluable insights into detecting ransomware before it's too late.…
1 Tabletop Exercises: Your Secret Weapon Against Cyberattacks 47:32
47:32
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:32In this eye-opening episode of The Backup Wrap-up, we delve into the world of tabletop exercises and their crucial role in cybersecurity preparedness. Our guest expert, Mike Saylor from Black Swan Security, guides us through the ins and outs of planning and executing effective tabletop exercises. We explore why these simulations are essential for organizations of all sizes, and how they can dramatically improve incident response capabilities. Listeners will gain valuable insights into selecting the right scenarios, involving key stakeholders, and creating a safe environment for learning. We also discuss common pitfalls to avoid and the importance of regular practice. Whether you're new to tabletop exercises or looking to enhance your existing program, this episode provides practical advice for strengthening your organization's cyber resilience. Don't miss this opportunity to level up your incident response game!…
1 Fostering a Culture of Cybersecurity with Training 45:01
45:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:01In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions, we cover it all. Learn why rewarding vigilance is more effective than punishing mistakes, and how to foster a security-aware culture in your organization. We discuss the importance of relevant, interactive training methods, including simulated phishing tests, and how to train users to spot suspicious activity beyond just phishing attempts. Whether you're an IT professional or a business owner, this episode provides valuable insights to enhance your cybersecurity training efforts and strengthen your organization's digital defenses.…
1 Incident Response Plan 101: From BIA to Execution 37:00
37:00
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:00In this very dense episode of The Backup Wrap-up, we delve into the critical world of incident response plans, from the business impact analysis (BIA) to finalizing its creation. Our expert guest, Dr. Mike Saylor, CEO of Blackswan Security, shares invaluable insights on crafting and implementing effective incident response strategies. We explore the key components of a robust plan, from conducting a business impact analysis to creating scenario-specific playbooks. Learn why having an incident response plan is crucial in today's cyber threat landscape and how to design one that works for your organization. We discuss the importance of regular updates, secure storage, and testing through tabletop exercises. Whether you're an IT professional or a business leader, this episode provides practical advice on preparing for and managing potential security incidents. Don't miss this essential guide to strengthening your organization's cyber resilience through comprehensive incident response planning.…
1 Reducing Your Cyberattack Blast Radius: Expert Tips 37:51
37:51
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:51In this eye-opening episode of The Backup Wrap-up, we delve into the critical concept of minimizing the cyberattack blast radius. Joined by cybersecurity expert Dr. Mike Saylor, we explore practical strategies to significantly reduce the impact of a breach on your organization. We start by discussing the principle of least privilege access and its role in containing a cyberattack's blast radius. Next, we examine the importance of network segmentation in limiting the spread of an attack. The conversation then shifts to the often-overlooked aspect of controlling outbound traffic to prevent data exfiltration. Throughout the episode, we provide actionable insights and best practices that IT professionals and business owners can implement to enhance their cybersecurity posture. By focusing on minimizing the cyberattack blast radius, organizations can better protect their digital assets and mitigate potential damages in the event of a breach.…
1 Ransomware Forensics: Preserving Digital Evidence 45:10
45:10
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:10In this episode of The Backup Wrap-Up, we delve into the crucial world of ransomware forensics with cybersecurity expert Mike Saylor. We explore the essential steps and tools used in forensic analysis during a cyber attack, highlighting the importance of preserving evidence and navigating the complexities of both traditional and mobile device forensics. From log preservation to forensic imaging, we discuss how organizations can prepare for and respond to ransomware incidents. Mike shares insights on the different forensic tools available, their applications, and the challenges faced in modern cybersecurity investigations. We also touch on the importance of having a forensic response plan in place before an attack occurs. Whether you're an IT professional or simply interested in cybersecurity, this episode offers valuable knowledge about the forensic processes that help unravel cyber attacks and protect valuable data. Tune in to enhance your understanding of ransomware forensics and strengthen your organization's cyber defenses.…
1 The Cyber Insurance Playbook: What You Need to Know 50:02
50:02
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
50:02Dive into the world of cyber insurance with our latest episode featuring expert Mike Saylor. We explore the evolving landscape of cyber insurance policies and their crucial role in today's digital security strategies. Learn why cyber insurance is more than just a financial safeguard and how it can be a proactive tool in your cybersecurity arsenal. Mike shares invaluable insights on maximizing your cyber insurance benefits, from understanding policy nuances to leveraging your insurer's expertise. We discuss common misconceptions, the importance of pre-incident preparation, and strategies for effective incident response. Whether you're a small business owner or a corporate executive, this episode provides essential knowledge to navigate the complex terrain of cyber insurance and protect your digital assets.…
1 Advanced Ransomware Prevention 44:06
44:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:06In this important episode of "The Backup Wrap-Up," we continue our discussion on ransomware, and dive deeper into the world of ransomware prevention. We assume you've done the basics (password & patch management, and MFA), and want to do more. As cyber threats continue to evolve, it's more important than ever to stay ahead of potential attacks. We discuss a range of strategies to protect your organization, from application whitelisting to securing service accounts. Among other things, our conversation covers the importance of restricting risky network protocols, implementing multi-factor authentication, and employing reputable anti-malware software. We also explore the benefits of penetration testing and red team exercises. Additionally, we emphasize the significance of establishing relationships with blue teams and law enforcement resources before an attack occurs. Join us as we provide actionable insights on ransomware prevention, helping you build a robust defense against this pervasive cyber threat. Whether you're an IT professional or a business owner, this episode is packed with valuable information to enhance your cybersecurity posture.…
1 IT Security Audit Essentials: Protect Your Network 38:19
38:19
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
38:19In this episode of The Backup Wrap-Up, we delve into the critical world of IT security audits. We explore why these audits are essential for maintaining a robust cybersecurity posture and how they can help organizations identify and address potential vulnerabilities. Our discussion covers key elements of surviving an IT security audit, including user education, application whitelisting, and securing remote access protocols. We also touch on the importance of regular security assessments and proactive measures to stay ahead of cyber threats. Whether you're an IT professional or a business owner, this episode provides valuable insights into conducting thorough IT security audits and implementing best practices to protect your digital assets. Tune in to learn how you can strengthen your organization's defenses and become a cybersecurity hero.…
1 How to Stop Ransomware: 3 Essential Strategies 48:27
48:27
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
48:27Discover how to stop ransomware in its tracks with this informative episode of The Backup Wrap-up. Hosts W. Curtis Preston and Prasanna Malaiyandi look into three crucial strategies that can prevent 90% or more of ransomware attacks. Learn why patch management is your first line of defense and how to implement it effectively. Explore the world of password security and discover why a robust password management system is essential. Finally, uncover the power of multi-factor authentication in thwarting unauthorized access. Don't miss this opportunity to strengthen your cybersecurity defenses and stay one step ahead of cybercriminals.…
1 Immutable Backups: Your Ultimate Defense Against Ransomware 44:31
44:31
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:31In this episode, we delve into the world of immutable backups, a crucial component of modern data protection strategies. We explore why immutable backups have become increasingly important in the face of sophisticated cyber threats, especially ransomware attacks that target backup systems. The episode covers the evolution from tape backups to disk-based systems and cloud solutions, highlighting how this shift has introduced new security challenges. We discuss the spectrum of immutability in backup systems, from basic file system protections to fully immutable cloud storage options. The conversation touches on various implementations of immutable backups, their strengths, and potential vulnerabilities. We also address the importance of multi-factor authentication and awareness of emerging threats like AI-based voice impersonation.…
1 Protect Backups from Ransomware: Expert Strategies 34:50
34:50
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
34:50In this crucial episode, we delve into how to protect backups from ransomware, a critical concern for IT professionals and business owners alike. We explore why backup systems are prime targets for cybercriminals and the devastating consequences of a successful attack. Our discussion covers essential strategies to fortify your backups, including implementing immutable storage, using local accounts instead of Active Directory, and employing network segmentation. We also emphasize the importance of robust monitoring systems and regular patching. By understanding the risks and implementing these protective measures, you can significantly enhance your organization's resilience against ransomware attacks. Don't miss this vital information on how to protect backups from ransomware and secure your data's last line of defense.…
1 Ransomware 101: What is ransomware? 35:26
35:26
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:26This episode about what is ransomware is the first in a new series on the topic. The episode explores what it is, how it works, and why it has become such a significant threat to businesses and individuals alike. We discuss the evolution of ransomware attacks, from simple data encryption to sophisticated extortion schemes involving data exfiltration and direct attacks on backup systems. Our conversation highlights the importance of prevention and detection measures, such as robust access controls, limiting internet-facing systems, and monitoring for data exfiltration. We also emphasize the critical role of backup and recovery strategies, including offline and immutable backups, in mitigating the impact of ransomware attacks. Throughout the episode, we provide insights into the complex ransomware threat landscape and offer practical advice for organizations looking to protect their data and systems from this ever-evolving threat.…
1 XDR vs SIEM: Do you need to choose? 44:20
44:20
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:20In this episode, we explore the differences between XDR and SIEM, two crucial tools in the world of security monitoring. Our guest, Dez Rock, CEO of SIEMonster, shares her fascinating journey from professional hacker to building an affordable, scalable SIEM solution that encompasses SOAR and XDR capabilities. We discuss the importance of evaluating security tools based on their true capabilities rather than just market perception, and Dez provides real-world examples of how SIEMonster's SIEM/XDR tool automatically detected and shut down a ransomware attack at a large hospital client. Tune in to learn about the evolving security landscape, the pros and cons of XDR vs SIEM, and how you may not have to choose! Whether you're an IT professional or simply interested in the latest cybersecurity trends, this episode offers valuable insights into the future of security monitoring.…
1 Strengthening Your Cybersecurity Blue Team: Pro Tips 51:30
51:30
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
51:30In this episode, we explore the essential strategies and best practices for building and optimizing a blue team cybersecurity approach. Our guest, Mike Saylor, shares his expertise on how organizations can effectively prepare for and respond to cyber incidents. From establishing relationships with law enforcement to conducting tabletop exercises and understanding cyber insurance policies, Mike provides valuable insights to help companies strengthen their cybersecurity posture. Throughout the episode, we discuss the importance of focusing on detection and response capabilities, not just prevention, and how a well-prepared blue team can make all the difference in the face of a cyber threat. Mike also shares real-world stories that illustrate the key lessons and takeaways for organizations looking to enhance their cybersecurity efforts. Tune in to learn how you can better protect your company from cyber threats with a robust blue team approach.…
1 Thinking Like a Hacker: Red Team Cyber Security Strategies 56:24
56:24
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
56:24In this popular episode from last year, we explore the fascinating world of red team cyber security with Dwayne Laflotte, a seasoned expert in offensive cybersecurity. Dwayne shares his wealth of knowledge and experience, diving into the tactics and strategies employed by red teams to identify vulnerabilities and strengthen an organization's defenses. From exploiting backup systems to the importance of least privilege and strong passwords, this episode is a must-listen for anyone interested in bolstering their cybersecurity posture. Dwayne provides captivating examples of how red team cyber security professionals think outside the box to breach networks, emphasizing the need for constant vigilance and adaptability in the face of evolving threats. He also highlights the critical role of collaboration between red and blue teams, stressing the importance of a multi-layered approach to cybersecurity. Packed with practical insights and actionable advice, this episode is an invaluable resource for IT professionals and business leaders alike.…
1 Google Cloud Disaster Recovery: Lessons from UniSuper's Close Call 31:26
31:26
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
31:26In this episode, we delve into the critical importance of Google Cloud disaster recovery planning through the lens of UniSuper's recent brush with catastrophe. When Google accidentally deleted UniSuper's entire VMware environment, the Australian pension provider faced the terrifying prospect of losing access to $125 billion in assets and the data of over 600,000 members. Hosts W. Curtis Preston and Prasanna Malaiyandi dissect the incident, highlighting how UniSuper's adherence to the 3-2-1 backup rule and use of third-party backup solutions ultimately saved the day. They explore the key lessons learned from this Google Cloud disaster, including the importance of having isolated data copies, clear communication during outages, and a robust recovery strategy. This real-world case study serves as a stark reminder of the risks associated with relying solely on cloud providers for data protection and the necessity of comprehensive Google Cloud disaster recovery planning.…
1 Electronic Discovery tools that extract from backups 52:06
52:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
52:06In this episode, we explore the world of electronic discovery tools and how they're transforming the legal landscape. Our guest, Brendan Sullivan, shares his expertise on the challenges companies face when dealing with legacy data and the importance of using the right tools for eDiscovery. Learn how purpose-built software can greatly enhance efficiency, accuracy, and defensibility in the eDiscovery process. Brendan also discusses the growing need for data remediation and migration services, as well as the role of computer forensics and eDiscovery platforms in building strong legal cases. Whether you're a legal professional looking to streamline your workflow or simply interested in the intersection of technology and law, this episode is a must-listen.…
1 Cloud Disaster Recovery: Lessons from Failures 42:00
42:00
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
42:00Capping our series on cloud disasters is this one on cloud disaster recovery. In this episode, we review the lessons we learned from discussing 10 cloud disasters. We talk about the critical strategies and techniques to ensure your data is protected and recoverable in the event of a disaster in the cloud. From the basic 3-2-1 rule to the pitfalls of solely trusting your cloud provider for proper disaster recovery, we dive into real-world examples and expert insights to help you build a robust cloud disaster recovery plan for your cloud data. Discover the importance of regular testing, the role of third-party backup solutions, and the key considerations for choosing a reliable cloud provider. Whether you're a small business or a large enterprise, this episode provides actionable advice to enhance your cloud disaster recovery posture and maintain business continuity in the face of unexpected disruptions. Tune in now and learn how to safeguard your valuable data in the cloud era.…
1 Life Uncontained YouTube Channel Loses Month of Footage in Crash 41:41
41:41
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:41In this episode, we discuss the devastating crash experienced by the popular YouTube channel "Life Uncontained," which resulted in the loss of a month's worth of irreplaceable video footage. The Life Uncontained crash serves as a stark reminder of the importance of proper backup strategies for protecting valuable digital assets. We delve into the lessons learned from this unfortunate incident and explore the best practices for safeguarding your data from hardware failures and other potential disasters. From the 3-2-1 backup rule to the use of multiple storage media, we cover the essential steps you can take to minimize the risk of catastrophic data loss. Whether you're a content creator, business owner, or simply someone who values their digital memories, this episode provides crucial insights into the world of data protection and backup. Don't miss this opportunity to learn from the "Life Uncontained" story and fortify your own backup plan. https://www.youtube.com/watch?v=fQsTs3C0T-c&ab_channel=LifeUncontained…
1 The Disastrous Dedoose Crash: Lessons Learned 39:57
39:57
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
39:57In 2014, the cloud-based research platform Dedoose suffered a catastrophic crash, losing customer data and backups simultaneously. We examine the causes of the Dedoose crash, its impact on users, and crucial lessons for anyone relying on SaaS. Learn how subpar backup practices, like monthly-only backups and overwriting previous versions, can lead to disaster. Hear how Dedoose responded and key steps to prevent your own cloud data calamity. Links from this episode: https://www.informationweek.com/it-infrastructure/social-science-site-using-azure-loses-data#close-modal https://www.insidehighered.com/news/2014/05/16/dedoose-crash-shows-dangers-handing-data-cloud-services https://www.latimes.com/business/technology/la-fi-tn-dedoose-crash-academic-cloud-20140512-story.html https://www.chronicle.com/blogs/wiredcampus/hazards-of-the-cloud-data-storage-services-crash-sets-back-researchers https://web.archive.org/web/20230927112141/https://www.dedoose.com/blog/dedoose-update-significant-data-recovery-successful-how-to-save-a-project-locally https://web.archive.org/web/20140512214308/http://blog.dedoose.com/2014/05/dedooses-black-eye-crash-and-recovery-efforts/ https://www.dedoose.com/about/security…
1 StorageCraft Outage: Lessons from a Cloud Backup Disaster 34:35
34:35
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
34:35In this episode, we examine the StorageCraft outage that erased customer backup data during a botched cloud migration. We compare StorageCraft's response to Carbonite's in a similar incident and discuss the critical lessons for backup vendors and customers. Learn the importance of meticulous migration processes, potential backup resiliency strategies, and what to do if your cloud backups disappear. Don't miss these vital insights to avoid cloud backup disasters and ensure your data is always recoverable. Stories covering this outage: https://www.crn.com/slide-shows/storage/arcserve-ceo-storagecraft-backup-data-loss-not-acceptable https://www.techtarget.com/searchdisasterrecovery/news/252515647/StorageCraft-DRaaS-outage-highlights-layered-protection-need https://www.reddit.com/r/msp/comments/tgggey/just_got_a_call_from_storagecraft_cloud_data_is/ https://blocksandfiles.com/2022/03/22/arcserve-storagecraft-operation-has-lost-customer-data/ https://www.channele2e.com/news/arcserve-storagecraft-draas-suffers-cloud-data-protection-issues…
1 Rackspace Ransomware Attack: Lessons Learned 42:06
42:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
42:06In this episode, we examine the Rackspace ransomware attack that crippled the company's hosted exchange environment, affecting thousands of customers. We discuss the timeline of events, the importance of timely patching, and the challenges Rackspace faced in restoring customer data. Learn about the value of comprehensive disaster recovery plans and third-party backups in protecting your organization from similar attacks. Don't miss this opportunity to gain valuable insights from one of the most significant ransomware incidents in recent years.…
1 The Carbonite Lawsuit: A Cloud Backup Cautionary Tale 46:13
46:13
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:13In this episode, we uncover the troubled history of Carbonite, a once prominent cloud backup provider plagued by lawsuits. In one Carbonite lawsuit they were the plaintiff, in another they were the defendant. From using inadequate storage arrays to failing to protect customer data, Carbonite's story serves as a warning for backup customers. Learn the importance of thoroughly vetting backup vendors and the risks of blindly trusting marketing claims. Don't miss this deep dive into Carbonite's multi-million dollar legal battles and valuable lessons for anyone relying on cloud backup services. Stories discussed in this episode: https://backupcentral.com/carbonite-liar/ https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/ https://www.theregister.com/2009/03/23/carbonite_sues_promise/ https://www.backblaze.com/blog/carbonite-data-loss-reports-miss-the-point/ https://www.datacenterknowledge.com/archives/2009/03/23/carbonite-lawsuit-reveals-data-loss https://www.datacenterknowledge.com/archives/2009/03/25/more-on-carbonites-data-loss https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/ https://www.computerworld.com/article/2481289/carbonite-loses-7-500-customers--files--ouch-.html https://techcrunch.com/2009/01/03/journalspace-drama-all-data-lost-without-backup-company-deadpooled/ https://archive.nytimes.com/bits.blogs.nytimes.com/2008/09/11/carbonite-steps-up-the-competition-in-online-back-up/?scp=1&sq=mozy&st=cse&apage=2#comments https://www.cnet.com/tech/tech-industry/carbonite-sues-hardware-maker-reseller/ https://fingfx.thomsonreuters.com/gfx/legaldocs/byprkkkozve/01312024carbonite.pdf…
1 Salesforce.com's Permission Slip-Up (Another Cloud Disaster) 33:54
33:54
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
33:54In this episode of The Backup Wrap-Up, Curtis and his co-host dive into the chaos caused by Salesforce's accidental "modify all" permission change in 2019. They explore the fallout from this real-world SaaS disaster, including how Salesforce scrambled to restore proper permissions and the frustration felt by impacted customers. Curtis and his co-host discuss the crucial role third-party backups could have played in mitigating the impact of this incident, and why relying solely on a SaaS vendor's recovery capabilities can leave organizations vulnerable. They also share practical advice on how listeners can avoid similar cloud disasters by implementing a comprehensive backup strategy for their SaaS applications. Whether you're a Salesforce user, a SaaS enthusiast, or simply interested in the world of data protection, this episode offers valuable insights and entertaining anecdotes that will help you become a Cyber Recovery Hero. Tune in to learn, laugh, and discover how to safeguard your organization's critical data in the cloud. Links Original SF post: https://issues.salesforce.com/issue/a028c00000qQ53kAAC/user-profiles-and-permission-sets-related-to-pardot-licensed-orgs-were-modified-by-salesforce Second post: https://salesforce.stackexchange.com/questions/262830/salesforce-bug-enabled-modify-all Big deal: https://appomni.com/blog_post/2019-blog-modify-all/ SF follow up: https://help.salesforce.com/s/articleView?id=000384056&type=1…
1 KPMG Blunder Proves Microsoft 365 Needs Backup (Cloud Disasters) 40:56
40:56
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
40:56In this shocking episode of The Backup Wrap-up, we delve into the jaw-dropping data loss disaster that struck global consulting giant KPMG at the height of the 2020 pandemic. With one errant click, a Microsoft 365 admin accidentally wiped out months of critical Teams chat data for a staggering 145,000 employees. Join host W. Curtis Preston as he unravels this extraordinary tale of digital destruction and explores the crucial lessons it holds for organizations relying on Microsoft 365 and other SaaS platforms. Curtis breaks down the differences between retention policies and actual backups, exposes common misconceptions about cloud provider data protection responsibilities, and highlights the potential legal and compliance nightmares that can arise from such catastrophic data loss. If you're using Microsoft 365 or any SaaS application, you can't afford to miss this vital wake-up call. Tune in to discover why a robust third-party backup strategy is essential, no matter how big your company or how reliable your cloud provider seems. Learn from KPMG's misfortune and ensure your organization's critical data is always protected, in the cloud and beyond. Don't become the next cautionary tale – listen now and secure your SaaS data before it's too late!…
1 OVHCloud Dumpster Fire (Cloud Disasters) 36:52
36:52
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
36:52In this important episode of the Backup Wrap-up, W. Curtis Preston, AKA Mr. Backup, takes you on a deep dive into the shocking story of the OVHCloud data center fire of 2021. This catastrophic event left hundreds of customers scrambling to recover their precious data (often without backups), exposing the startling truth about OVHCloud's data center and backup practices and the devastating consequences of misplaced trust in cloud providers. As usual, Curtis is joined by co-host Prasanna Malaiyandi as they unravel the complex web of controversial decisions, legal battles, and hard lessons learned from this disastrous incident. They explore the factors contributing to the fire's severity, the staggering extent of the data loss, and the eye-opening revelations about OVHCloud's backup infrastructure. But this episode is more than just a cautionary tale. Curtis and Prasanna delve into the crucial questions every organization must ask their cloud provider to ensure their data is truly secure. They share invaluable insights and actionable advice to help you avoid falling victim to a similar fate. Whether you're an IT professional responsible for safeguarding your company's data or an individual looking to protect your digital life, this episode is a must-listen. You'll come away with a deeper understanding of the risks associated with cloud storage, the importance of robust backup strategies, and the steps you can take to become a cyber-recovery hero. Don't miss this opportunity to learn from one of the most significant cloud disasters in recent history. Tune in now and discover how you can keep your data out of the fire and emerge as an unsung hero in the world of backup and recovery. Articles covering this story: https://www.datacenterdynamics.com/en/news/ovh-fire-octave-klaba-says-ups-systems-were-ablaze/ https://www.datacenterdynamics.com/en/news/fire-could-cost-ovhcloud-105-million-ipo-filing-reveals/ https://www.datacenterdynamics.com/en/news/ovhcloud-ordered-to-pay-250k-to-two-customers-who-lost-data-in-strasbourg-data-center-fire/ https://www.datacenterdynamics.com/en/news/ovhcloud-fire-report-sbg2-data-center-had-wooden-ceilings-no-extinguisher-and-no-power-cut-out/ Election worker episode: https://www.backupwrapup.com/election-poll-site-manager-explains-us-election-systems/…
1 Cloud disasters: Musey deletes their own company! 26:13
26:13
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
26:13In this episode, we uncover the little-known but cautionary tale of Musey, a startup building an interior design app that catastrophically lost everything when an admin accidentally deleted their entire Google Workspace account. We dive deep into: How a single slip-up by an admin led to over $1.5 million of intellectual property stored in Google Drive getting instantly wiped out Musey's desperate attempts to get their data back by contacting Google and even filing a lawsuit How not even the cloud giants like Google have an obligation to restore customer data lost due to error or malfeasance Why you absolutley need independent backups of cloud data instead of blindly trusting sync and retention policies The devastating story of Musey serves as a sobering reminder that human error can still trump even the most resilient cloud platforms. Don’t miss this rare peek behind the curtain at a colossal cloud failure that very few people know about. Story: https://www.theregister.com/2019/07/05/musey_v_google_lawsuit/ Lawsuit filed: https://regmedia.co.uk/2019/07/05/musey_v_google.pdf Lawsuit pulled: https://dockets.justia.com/docket/california/candce/4:2019cv03864/344456 Museyapp.com 6/6/19 says “buy this domain”: https://web.archive.org/web/20190606022957/http://www.museyapp.com/…
1 Cloud catastrophes: Codespaces.com deleted out of existence 35:57
35:57
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:57In 2014, software-as-a-service company Code Spaces disappeared overnight after a devastating cyber attack. Thousands of coders lost access to their work when insufficient cloud backups failed under pressure. The company was forced to go out of business. Learn the tragic tale of how Code Spaces ignored standard data protection rules, putting their business and clients at risk. We’ll unpack what went wrong with their cloud architecture and backup systems, allowing a single hacker to destroy their SaaS company. Understand why you still need backup - even native cloud redundancy isn't enough. Our hosts explore the hard lessons from this cloud catastrophe and equip you with actionable advice around security, access controls, preparation, and backup policies. Safeguard your slice of the cloud and avoid the mistakes that ultimately shuttered Code Spaces. Articles covering this story: https://www.esecurityplanet.com/networks/code-spaces-destroyed-by-cyber-attack/ https://www.itgovernance.co.uk/blog/the-attack-that-forced-code-spaces-out-of-business-what-went-wrong https://www.breaches.cloud/incidents/codespaces/ https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/ https://thehackernews.com/2014/06/cyber-attack-on-code-spaces-puts.html https://www.csoonline.com/article/547518/disaster-recovery-code-spaces-forced-to-close-its-doors-after-security-incident.html https://blogs.manageengine.com/it-security/passwordmanagerpro/2014/08/20/code-spaces-aws-security-breach-a-sad-reminder-of-the-importance-of-cloud-environment-password-management.html…
1 Crafting the Perfect Disaster Recovery Runbook 39:56
39:56
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
39:56In this information-packed episode, backup guru W. Curtis Preston and expert guest Prasanna Malaiyandi explore the elements of crafting an effective disaster recovery (DR) runbook. They discuss how a properly structured runbook eliminates confusion during crises by clearly outlining responsibilities and contacts. From making runbooks accessible and absorbed to keeping them actionable with constant updates and tests, they share the 8 critical factors for DR success. Tune in to transform your backup admins into confident cyber recovery heroes with battle-tested runbooks.…
1 To DRaaS or Not to DRaaS? Comparing Disaster Recovery Approaches 39:01
39:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
39:01Disaster lurks around every corner - ransomware, natural disasters, human errors. Are you thinking about all the data and systems at risk. Is your organization prepared? In this episode, Curtis and Prasanna pull back the curtain on the disaster recovery decision - to build or to buy? They unpack the tradeoffs around cost, complexity, control, and even cybersecurity. Whether you're an anxious IT leader losing sleep over business continuity or just disaster recovery curious, you won't want to miss this episode. Will your DR strategy survive? Tune in now to find out!…
1 Hot, Warm, and Cold: DR Site Strategies 40:23
40:23
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
40:23Creating an effective DR strategy means understanding the critical differences between hot, warm, and cold recovery sites. Join backup guru W. Curtis Preston and his cohost Prasanna Malaiyandi for the latest Backup Wrap-Up as they outline real-world strategies to match your RTO, RPO, and budget. You’ll learn the unique benefits and challenges of using both primary for hot sites, and backup replication to cost-effectively create warm recovery sites. They also tackle the complexities of cloud DR for VMware environments. Can you do DR of VMware to AWS? What conversion hurdles do you need to plan for? Tune in to find out. Whether you're a scrappy SMB or an enterprise with serious SLAs, this tactical episode delivers actionable advice to advance your resilience game. Learn how to leverage the cloud's economies of scale and keep business running no matter what gets thrown your way. The backup wrap up turns unappreciated backup admins into cyber recovery heroes.…
1 Disaster Recovery Site: Build, Buy, or Cloud? 31:43
31:43
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
31:43When disaster strikes, you better have a solid plan for where you’ll recover your operations. Join me, W. Curtis Preston, and Prasanna Malaiyandi, as we explore the nitty-gritty details of your three main options for a disaster recovery site. We’ll dig into the pros, cons, risks, and costs associated with rolling your own DR site, hiring a third-party service, or leveraging the public cloud. Each path has its twists and turns. How do you keep a secondary site in sync? What if a regional disaster takes down your DR provider? Can the cloud flex to meet your recovery needs? Tune in for straight-shooting answers. This episode tackles the tough questions so you can make informed, bulletproof decisions on housing your failover infrastructure. As always, I’m drawing from decades of experience as a recovering backup admin, and I've designed this podcast just for pros like yourself. Batten down the hatches and prepare to take notes - it’s time to build a life raft for your data! For those interested in The Gobox Studio, here you go! https://goboxstudio.com/…
1 Disaster Recovery 101: Laying the Groundwork for a Good DR Plan 46:56
46:56
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:56Staying resilient in the face of disaster is crucial for any organization today. In this episode, we dive deep into crafting robust disaster recovery plans that help you outmaneuver outages. We discuss critical groundwork like taking inventory across environments and analyzing risk to determine what to prioritize recovering when the worst happens. Whether it's ransomware, natural disasters, or other threats taking systems down, smart preparation makes all the difference. Key highlights include: Figuring out what scenarios are most likely to impact your business based on risk profiles Making sure you have visibility into all areas – whether data centers, cloud, SaaS, or endpoints Tackling basic protections first before advanced options Understanding regional risks that may be unique to your geography Thinking through tests that validate your ability to recover when needed The right disaster recovery means being able to get back to business rapidly. By learning from unfortunate events others have endured, you can architect resilience that lets you bounce back better no matter the scenario.…
1 Disaster Recovery 101 - Back to the Fundamentals 37:45
37:45
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:45Are your backups collecting virtual dust rather than readying you for the next unavoidable disaster? Get back to basics on crafting an ironclad disaster recovery plan. We outline the essential infrastructure, applications, staffing, and execution steps often glossed over by the check-the-box enterprise crowd. Going beyond mere data recovery, we detail considerations around standing up replacement infrastructure, understanding system interdependencies, and restoring functionality faster with increased automation. Cloud's scaling and affordability make DR exercises less daunting these days if configured properly on the front-end. With major outages increasingly likely, the principles detailed could dictate whether your business emerges unscathed or shutters for good. We share tips for pragmatic preparation reflecting our scar tissue from failures past when lackadaisical DR rigor proved painful. Ever try troubleshooting recovery steps in the midst of a raging hurricane...or gotten that dreaded 2AM offline alert while welcoming your newborn? We have! Major takeaways: Start recovery documentation with manual steps, increase automation later Test often - the cloud enables cost-effective exercising at scale Availability outshines recovery - build resilient systems and staff cross-training Know precise RTOs and RPOs aligned to business priority and appetite Stay tuned as we separate the mavens from the mayhem when adverse events strike. Get your data DR ducks in order now before things migrate south! News articles from this episode: https://www.bleepingcomputer.com/news/security/50k-wordpress-sites-exposed-to-rce-attacks-by-critical-bug-in-backup-plugin/ https://jorgedelacruz.uk/2023/12/06/veeam-whats-new-in-veeam-backup-and-replication-v12-1-major-new-features/…
1 Backup Fails at Archive: Billion-Dollar eDiscovery Disasters 53:04
53:04
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
53:04In this episode, Curtis and Prasanna do a deep dive on the differences between data backup and data archiving. They thoroughly explain that while backup focuses on restoring systems and files to a prior point in time, archiving is all about being able to search and retrieve specific information for legal or regulatory purposes. Key reasons you'll want to tune in: Learn exactly why companies archive data and how regulatory compliance and legal eDiscovery requests require specialized archive capabilities. Understand the dangers of using your backup system as an archive for eDiscovery - lacking full search and exposing too much irrelevant data risks your legal case. Hear multiple real-world horror stories of companies failing legal cases due to lacking proper archives - to the tune of billions of dollars lost. Get clear examples of how continuous, comprehensive archiving captures all versions of files, emails, and data - including deleted and intermediate items. Get a life-line for those of you who are still using your backup system as an archive If you need to implement archiving or fix broken archive approaches that risk legal noncompliance, this episode delivers an excellent primer on how archive differs from backup and what genuine archive systems can do. https://support.google.com/drive/thread/245861992?sjid=15540859157109248518-NC https://support.google.com/drive/answer/14286582?sjid=8199341837463411967-NA https://blog.23andme.com/articles/addressing-data-security-concerns https://www.backupwrapup.com/what-is-archive-and-retrieve-backup-to-basics/ https://www.sullivanstrickler.com…
1 Backup to Basics: Traditional Data Sources 50:37
50:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
50:37We’re going back to basics in 2024! Our hosts revisit their smash hit episode from last year all about protecting those traditional data sources like physical servers, VMs, laptops, desktops, and mobile devices. From on-prem to mobile, should it all get backed up? How and why? Tune in as Curtis and Prasanna rehash their spirited debate over backup best practices across your infrastructure and walk through real-world examples of what can go wrong. It’s chock full of fundamental wisdom for data protection pros getting started and veterans alike. Whether you’re making big cloud migrations or maintaining legacy systems, don’t miss this special re-release dedicated to the building blocks of backup as we start the year on a backup to basics kick.…
1 Get Ready Before You Get Got: Ransomware Response Planning 48:52
48:52
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
48:52This timely episode features an in-depth discussion between cybersecurity expert Melissa Palmer (@vmiss) and hosts W. Curtis Preston and Prasanna Malaiyandi on the crucial role preparation and planning play in effectively responding to and recovering from the inevitable ransomware attack. They stress that flying by the seat of your pants without an incident response plan when ransomware hits leads to chaotic, inefficient efforts and substantially higher costs. Melissa outlines pragmatic steps organizations should take before an attack to develop and test response playbooks, have partnerships in place with response firms, coordinate across internal teams, bolster detection capabilities, and harden backup/recovery mechanisms. Curtis and Prasanna dive into real-world ransomware response scenarios to highlight the complexity organizations face in assessing the scope of damage from attacks and recalibrating restoration priorities. Melissa offers tips on creating robust processes to rebuild compromised environments quickly. They discuss table-top exercises as cost-efficient ways to uncover plan gaps and get stakeholders aligned on roles and timeline expectations. With Melissa's depth of experience assisting ransomware victims, she provides unique insights into preparation best practices often neglected until the worst happens. For IT/security leaders looking to build organizational resilience against ransomware threats, this engaging episode delivers actionable advice on architecting defense-in-depth capabilities tailored to your business requirements. Join us for a great episode!…
1 To Change or Not to Change Your Backup System 45:38
45:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:38Changing your organization's backup system is no easy task - it requires careful evaluation of requirements, risks, and capabilities. Many admins get stuck with backup environments they've outgrown or that lag on modern demands. On this episode, backup guru W. Curtis Preston and his cohost Prasanna Malaiyandi lend their expertise to help you determine if and when migrating your backup solution makes sense. You'll learn: Key indicators that your current system is no longer fitting your needs How to clearly define backup requirements and alignment to recovery objectives Ways to evaluate ease of use, security, and other qualitative factors Guidance on integrating specialized systems only when necessary The importance of prioritizing immutable storage and rapid recovery Change management best practices that curb instability With ransomware threats growing, the bar for backup keeps rising. Tune in as our two hosts cover everything you need to make backup system change decisions that balance innovation, budget, and risk - avoiding needless switches while still meeting evolving data protection demands. You'll gain real-world clarity that turns unappreciated backup admins into cyber recovery heroes.…
1 Why you should care about Copy Data Management 41:29
41:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:29After diving into the details of the recent Okta breach enabled by password manager vulnerabilities, Curtis and Prasanna tackle the growing issue of copy data sprawl. They define copy data management – the practice of tracking and governing all duplicated production data for backup, DR, development, analytics etc. What problems result from copy proliferation? How feasible is a single consolidated platform? What regulatory and cost implications exist? Tune in as our hosts break down best practices for cataloging, securing, reducing, and better leveraging your organization’s data copies. Specific topics covered include: Password manager risks exposed in Okta hack Copy data management 101 Storage cost, compliance, security issues Tools and solutions landscape Backup reuse considerations and cautions Cloud vs. data center copy management Join Curtis and Prasanna for another engaging combination of news commentary, frameworks, debates, warnings, and recommendations – this week with a data protection slant. Whether you’re a backup admin or IT leader grappling with copy sprawl, this insightful episode has something for you! Articles discussed in this week's episode: https://sec.okta.com/harfiles https://arstechnica.com/information-technology/2023/11/no-okta-senior-management-not-an-errant-employee-caused-you-to-get-hacked/ https://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.htmlhttps://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.html…
1 Snap, Replicate, & Protect: Leveraging Near CDP 40:06
40:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
40:06Tired of backup windows and 24-hour recovery point objectives? Then it's time to learn about how snapshots and replication work together to create near-continuous data protection, or near-CDP. In this episode, backup experts W. Curtis Preston and Prasanna Malaiyandi dive into leveraging snapshots for instant point-in-time recovery and replication for an offsite copy. By combining these technologies, you can achieve recovery point objectives measured in minutes rather than hours or days. Listen in to understand what near CDP is, how it differs from backup and true CDP, and the key capabilities it enables. Discover when to take crash-consistent vs application-consistent snapshots. Learn how near CDP integrates with backup software and how you can use replicated snapshots for automated recovery testing. If you need tighter RPOs and near-instant RTOs for your mission-critical systems, you can’t afford to miss this explanation of how snap and replicate delivers a high-frequency, budget-friendly data protection option. Tune in to become a hero by enabling your organization to recover quickly from data corruption, ransomware, and other threats!…
1 Reborn and Reimagined: Don't Write Off Tape Just Yet 51:10
51:10
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
51:10Ransomware attacks and data breaches dominate the headlines, but is your data protection strategy truly secure? This must-listen episode dives deep on an unsung hero of cyber resilience - tape. Tape may have been written off by some as a legacy technology, yet it offers unparalleled air gap protection that no hacker can penetrate. Top experts from Fujifilm and IBM (sponsors of this episode) reveal the major advances that make modern tape more scalable, reliable, and cost-effective than ever before. Learn how the pioneering capabilities of the newest LTO-9 drives and 50TB tape cartridges can economically safeguard tens or hundreds of petabytes. Hear the shocking sustainability advantage, with tape generating 97% less CO2 emissions and using drastically less power than comparable disk solutions. With powerful integrated encryption, quantum-safe algorithms on the horizon, and clever optimizations to tame growing data volumes, tape has been reborn as the undisputed information lifeline every organization needs. Don't let your backups remain exposed - get the insider intel on fortifying your last line of defense with tried and tested tape. Stories referenced in the episode: https://blocksandfiles.com/2023/11/03/backblaze-shard-stash-cache/ https://blocksandfiles.com/2023/11/06/cohesity-smartfiles-becomes-snowflake-analytics-playground/…
1 Virtually Air Gapped: Assessing Cloud Data Protection 50:27
50:27
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
50:27What does "air gap" really mean when it comes to backups? Curtis takes us back to the early days of offsite tape backups with Iron Mountain to explore the principles behind physical air gaps. We learn about barcode tracking, unmarked vans, and multi-factor delete authorization. How do modern "virtual air gaps" in the cloud compare? Are backup vendors misusing important security terms? Join us as we separate marketing hype from real backup protection and learn timeless lessons around alerting, access controls, and immutable data. After this episode, you'll know how to assess if your backups are following air gap principles - no matter what technology you use.…
1 Snapshots vs. Backups: Understanding the Difference 49:08
49:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
49:08In this episode of The Backup Wrap-Up, host W. Curtis Preston discusses the importance of understanding the difference between snapshots and backups. He emphasizes that storage snapshots should not be considered as true backups. The episode also covers the recent 1Password and Okta hack, highlighting the frustration of such incidents, especially for those who advocate for password managers and cloud technologies. Tune in to learn more about the risks and implications of relying solely on snapshots and the importance of proper backup strategies.…
1 CDP: The Next Great Thing in DR? 43:22
43:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:22In this episode of the Backup Wrap-Up, W. Curtis Preston and Prasanna Malaiyandi discuss Continuous Data Protection (CDP) and its potential as the next great thing in disaster recovery. They explore the concept of meeting an RTO and RPO of zero and question why CDP isn't used for all backups in DR. Tune in to learn more about CDP and its role in backup and disaster recovery. Article mentioned in the story: https://www.theregister.com/2023/10/10/ransomware_attacks_register_record_speeds…
1 The Role of Replication in Modern Data Protection systems 45:05
45:05
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:05In this episode, W. Curtis Preston, aka Mr. Backup, and Prasanna Malaiyandi discuss the fundamental technology of replication in data protection systems. They explore what replication is, how it differs from other methods, and why it's not used for everything. They also delve into the differences between synchronous and asynchronous replication and why it matters. The hosts also share news of a backup company called Alcion, which recently raised funding with support from Veeam, a backup company investing in Alcion's focus on Microsoft 365 backups for SMB customers. They also discuss a report from ESG about how cloud backup has evolved. The episode provides insights into the world of data protection and highlights the importance of replication in safeguarding valuable data. Articles discussed in this episode: https://www.techtarget.com/searchdatabackup/news/366552363/Veeam-leads-funding-round-for-SaaS-backup-provider-Alcion https://www.techtarget.com/searchdatabackup/feature/Cloud-backup-and-disaster-recovery-evolve-toward-maturity…
1 Is it a backup or just a copy? 46:52
46:52
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:52In this episode of the Backup Wrap-Up, host W. Curtis Preston discusses the importance of distinguishing between a copy and a backup to ensure the protection of valuable data. He also explores key backup concepts such as multiplexing, incremental backups, block-level incremental backups, and source-side deduplication. The episode kicks off with a discussion on the recent MGM hack, highlighting the significant impact it had on the hotel chain and the potential for personal information leaks. Tune in to learn how to safeguard your data effectively and become a backup hero. Articles mentioned in the episode: https://www.reddit.com/r/vegas/comments/16hxwj0/explain_like_i_am_5_mgm_hacking/ https://www.reversinglabs.com/blog/what-we-know-about-blackcat-and-the-mgm-hack…
1 The importance of backing up cloud resources 36:11
36:11
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
36:11In this episode of the Backup Wrap-up, we continue our Backup to Basics series by discussing the importance of protecting cloud infrastructure, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). We then dive into the differences between these various cloud services and highlight the need to back up various components of each. We also discuss a recent incident where a Danish hosting company lost a significant amount of customer data due to a ransomware attack, emphasizing the ongoing threat of ransomware and the vulnerability of service providers. Tune in to learn more about safeguarding your data in the cloud. Links to articles mentioned in the post: https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/ https://www.pcmag.com/how-to/how-to-back-up-restore-your-documents-in-windows-10…
1 The Importance of Backing Up IOT Devices 37:52
37:52
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:52In this episode of the Backup Wrap-Up, host W. Curtis Preston and co-host Prasanna Malaiyandi explore the topic of data protection in the Internet of Things (IoT) era. With the increasing number of IoT devices in our homes and organizations, it is crucial to understand how to back up and secure the data generated by these devices. They discuss the importance of knowing which devices create important data and where that data is being stored. They also discuss IBM's release of a 150 terabyte tape, which showcases advancements in data storage capacity, and a TechTarget ESG survey about the use of the cloud in data protection. Tune in to this informative episode for insights on safeguarding your IoT data.…
1 Hybrid Cloud Storage: Back it up or not? 27:33
27:33
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
27:33In this episode of the Backup Wrap-Up, host W. Curtis Preston, also known as Mr. Backup, and his co-host Prasanna Malaiyandi, discuss the importance (or not) of backing up data in hybrid cloud storage systems, with a possibly surprising answer. The episode begins with backup-related news, followed by a deep dive into a single area or lesson that can help protect against ransomware. The news segment includes a story about Toyota, where multiple manufacturing plants shut down during their production process. Tune in for the answer to the question about backing up hybrid storage systems, and to learn more about data backup and disaster recovery systems.…
This is a very short episode to explain our name change and a few other minor changes to the format. The show you know and love is getting better! (Prasanna and I aren't going anywhere.)
1 The Merging Worlds of Information Security and Data Protection 35:31
35:31
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:31In this episode of the Restore It All podcast, W. Curtis Preston, a.k.a. Mr. Backup, and Prasanna Malaiyandi are joined by Chris Groot and Stefan Voss from N-Able, a company specializing in backup, data protection and security systems. Nable focuses on serving the needs of managed service providers to deliver excellent service to small and medium-sized businesses. They discuss the importance of catering to the "Fortune 5 million," which includes businesses with 20 to 2000 employees, highlighting the significant role that small businesses play in our economy. Tune in to learn more about Nable's approach to the cloud data protection space and their goal of making backup admins indispensable.…
1 Why it's process, then people, then technology 35:30
35:30
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:30In this episode of Backup Central's Restore It All podcast, the host welcomes cyber expert Rick Mishka to discuss the three aspects of IT: process, people, and technology. They explore the misconception that a new piece of gear or software is always the solution to every problem, particularly in preventing data exfiltration. Rick also shares insights into his short-form podcast, Cyber Pros, where he covers cybersecurity topics in just nine minutes. Tune in to gain valuable perspectives on backup, DR, and data protection.…
1 The Unforeseen U-turn: Inside Microsoft 365's Backup Revolution 34:37
34:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
34:37In this episode of Restore it All, our hosts Curtis and Prasanna delve deep into the recent significant developments in the world of data backups, with a special spotlight on Microsoft 365's about-face on native user backups. They dissect Microsoft's sudden realization of its potential revenue streams and the ramifications of its new direction. The duo also discusses the intricacies of Microsoft's new backup APIs, sharing insights into the former approaches and the strategic changes aimed at enhancing backup efficiency. They traverse the landscapes of various vendors like AWS and Salesforce, drawing parallels and noting divergences in their backup strategies. Tune in as Curtis and Prasanna ponder the pros and cons of entrusting your backup with the same vendor, emphasizing the importance of not putting all eggs in one basket. The episode beckons listeners to contemplate crucial questions concerning data storage, protection, and ransomware attacks, urging for a meticulous evaluation of Microsoft's new offerings. As they navigate these shifts, the hosts can't help but say, "I told you so," emphasizing the dire need for backing up SaaS services. The conversation leaves listeners with pertinent questions and considerations, beckoning them to anticipate the forthcoming nuances in backup offerings from giants like Microsoft and Salesforce. Join us for an episode packed with expert analysis, predictions, and a little bit of gloating, as the world of data backup takes a turn no one saw coming but was perhaps desperately needed.…
1 Are password managers no longer an option? 39:37
39:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
39:37In this episode, we look at the latest Ransomware Trends Report from Veeam, which gives us a view into the sobering world of ransomware attacks and the critical lessons they teach us about cyber defense. Join W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi, as they break down the key insights from the report. We explore the ruthless tactics of ransomware operators, the eye-opening stats on recovery time, and the evolving strategies of cyber insurers. From the importance of robust password management and multi-factor authentication to the strategies for safeguarding your backup server, we lay out a battle plan to protect your digital fortress. Tune in to discover why ransomware isn't just a threat—it's a wake-up call for businesses everywhere to bolster their defenses and emerge stronger against the rising tide of cyber threats. Your data's future might just depend on it.…
1 Identity Orchestration: Simplifying Multi-Cloud Identity Management 49:51
49:51
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
49:51In this episode, W. Curtis Preston and Prasanna Malaiyandi are joined by Eric Olden, the CEO of Strata Identity. With over 25 years of experience in the cybersecurity industry, Eric sheds light on the concept of Identity Orchestration and how it addresses the complexities of modern identity management in multi-cloud environments. He discusses the evolution of technology consumption, the philosophy of "bought not sold," and the creation of a new product category in the world of identity management. Eric explains how Strata Identity's platform acts as an abstraction layer, allowing organizations to seamlessly integrate and switch between different identity providers without rewriting applications. He also shares insights on modernization, just-in-time provisioning, and the benefits of the open free IDQL standard. Don't miss this engaging discussion about identity orchestration and its role in simplifying the management of identities across diverse cloud ecosystems.…
1 Red team leader shares how to think like a hacker 1:04:35
1:04:35
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:04:35Our guest this week is a specialist at offensive cybersecurity; that is, they keep you safe by attacking you and showing you your vulnerabilities. They're a red team. We've got the leader of their red team, Duanne Laflotte, to help us understand how hackers think – and what we can do to stop them. He confirmed some of the recommendations we often make (Ahem: password managers good), but showed us some defenses aren't that helpful. A particularly relevant part to our backup audience is what he told us about the vulnerabilities of our backup system. At least one of them Mr. Backup had never thought of. Duanne is fun and scary all at the same time. I know this will be one of our top episodes this year.…
1 Blue team stories from the cyber attack trenches 57:48
57:48
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
57:48Nothing tells the story like a good story, right? This week we have Mike Saylor, the CEO of Black Swan, a cybersecurity company. Boy, has he been in the trenches. He tells some great stories about responding to cyber attacks. They're great stories and he's a great storyteller. We also learn about FBI Infragard, a partnership between the FBI and the private sector. We hope you enjoy the episode.…
1 Should you disclose your cyber attack? 55:15
55:15
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
55:15This week the SEC has made a new rule that publicly traded companies must disclose any cyber attacks within four days. What if you're not a publicly traded company in the US? Should you reveal what happened to you? We bring in a wireless cyber security expert, Scott Schober of Berkeley Varitronics Systems, to talk about this topic. Closely related is also what should you do when you personally make a big mistake. Should you tell your boss? What if you're a boss and someone makes a mistake? How should you respond? We get into all of this and more in the week's exciting episode.…
1 Backup security is abysmal, says backup security expert 45:53
45:53
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:53During this recording, Mr. Backup asked our guest how many backup systems that he had looked at had at least one critical security flaw, he said pretty much 100%. Holy. Cow. Doron Pinhas runs a company called Continuity Software, that does security assessments of storage and backup and recovery systems. They got the permission of some of their customers to anonymize and publish their findings, and the results were abysmal. (You can read the report yourself here .) He said it was extremely rare to find a backup environment that was properly configured from a security standpoint. He then went on to explain the kinds of things they look for, and how you can secure your storage and backup and recovery environments. He also explained how such environments are typically overlooked by most security scans! He said they have a lot of resources on their website to help you, and they also have automated tools that will ensure you stay secure once you zipped things up. If I were you, I'd check out those resources right now!…
1 Your backup product is probably lying to you 1:01:47
1:01:47
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:01:47Krista Macomber, analyst from the Futurum Group, joins us this week to talk about a number of things, but one thing really bubbled up to the top: co-opting of marketing terms. That is, it's probably using terms to describe their product, because they think you want to hear them. Two big ones these days are "air gapped" and "immutable." Krista and Mr. Backup talk about what these terms really mean – and whether or not your product should be using them to describe their product. You may not get any answers from this episode, but your darn sure will get some questions to back to your backup vendor with.…
1 Former Green Beret advises us on Cyber Security 1:02:54
1:02:54
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:02:54Today we are proud to have as our guest, Zach Fuller, a founding partner of the Silent Sector, a cybersecurity firm -- and a former Green Beret who served in combat. We talk a little about how his service made him the person he is today, and how it lead him ultimately into helping people protect their own data. We talk about his top few things he wishes people would do to secure their environments (in addition to Mr. Backup's usual suggestions of password management, MFA, and patch management). we found Zach a very engaging person, and we know you'll learn a lot.…
Bienvenue sur Lecteur FM!
Lecteur FM recherche sur Internet des podcasts de haute qualité que vous pourrez apprécier dès maintenant. C'est la meilleure application de podcast et fonctionne sur Android, iPhone et le Web. Inscrivez-vous pour synchroniser les abonnements sur tous les appareils.