Artwork

Player FM - Internet Radio Done Right
Checked 6d ago
Ajouté il y a trois ans
Contenu fourni par W. Curtis Preston (Mr. Backup). Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par W. Curtis Preston (Mr. Backup) ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Player FM - Application Podcast
Mettez-vous hors ligne avec l'application Player FM !
icon Daily Deals

Why it's process, then people, then technology

35:30
 
Partager
 

Manage episode 377271981 series 3332029
Contenu fourni par W. Curtis Preston (Mr. Backup). Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par W. Curtis Preston (Mr. Backup) ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.

In this episode of Backup Central's Restore It All podcast, the host welcomes cyber expert Rick Mishka to discuss the three aspects of IT: process, people, and technology. They explore the misconception that a new piece of gear or software is always the solution to every problem, particularly in preventing data exfiltration. Rick also shares insights into his short-form podcast, Cyber Pros, where he covers cybersecurity topics in just nine minutes. Tune in to gain valuable perspectives on backup, DR, and data protection.

  continue reading

310 episodes

Artwork
iconPartager
 
Manage episode 377271981 series 3332029
Contenu fourni par W. Curtis Preston (Mr. Backup). Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par W. Curtis Preston (Mr. Backup) ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.

In this episode of Backup Central's Restore It All podcast, the host welcomes cyber expert Rick Mishka to discuss the three aspects of IT: process, people, and technology. They explore the misconception that a new piece of gear or software is always the solution to every problem, particularly in preventing data exfiltration. Rick also shares insights into his short-form podcast, Cyber Pros, where he covers cybersecurity topics in just nine minutes. Tune in to gain valuable perspectives on backup, DR, and data protection.

  continue reading

310 episodes

Tous les épisodes

×
 
The insider threat represents one of the most dangerous and overlooked cybersecurity challenges facing organizations today. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna explore the three distinct types of insider threats that can devastate your organization from within. From malicious employees seeking revenge to careless workers who fall for social engineering, insider threats come in many forms. The hosts examine real-world cases including the Coinbase breach through compromised contractors, Apple's lawsuit against an employee who stole Vision Pro secrets, and the infamous logic bomb attack that destroyed an entire company's data. Learn practical strategies for implementing least privilege access, immutable backup protection, and multi-person authentication controls. Discover why 83% of companies experienced some form of insider threat attack in 2024, and get actionable advice on security training, vendor management, and incident response planning to protect your organization's most critical assets.…
 
This episode explores surprising cyber security lessons hidden within Mission: Impossible's latest blockbuster. We analyze how Hollywood's depiction of AI threats, immutable backups, and air-gapped storage actually reflects real-world data protection challenges. Curtis and Prasanna dissect the movie's central premise: an AI entity altering digital reality, making it impossible to distinguish truth from fiction. The solution? An underwater Doomsday Vault containing an immutable, offline backup of the original source code. We discuss how this fictional scenario mirrors actual cybersecurity best practices, from 3-2-1 backup strategies to cryptographic hash verification. Key topics include the spectrum of immutability, why truly offline storage matters for ransomware protection, and how insider threats can compromise even the most secure systems. We also cover practical applications like object storage, SHA-256 hashing, and the human vulnerabilities that often undermine technical security measures. Whether you're a backup professional or just curious about data protection, this episode proves that sometimes the best cyber security lessons come from the most unexpected places.…
 
The EU cloud exit movement is reshaping how European organizations think about data storage and sovereignty. Companies across Europe are moving away from US-based cloud providers like Microsoft 365, AWS, and Google Workspace due to concerns about the Cloud Act and data privacy regulations. In this episode, Curtis and Prasanna explore the backup implications of this major shift. They discuss the challenges of replacing comprehensive platforms like Microsoft 365 with multiple EU-based providers, the complexities of bringing services back in-house, and why the 3-2-1 backup rule becomes even more critical during these transitions. Whether organizations choose local providers or decide to self-host their infrastructure, data protection remains paramount. The hosts share real-world examples of failed backup strategies, including the Rackspace Exchange disaster and OVH's data center fire, to illustrate why third-party backup solutions are necessary regardless of your hosting choice.…
 
Air gap has become one of the most overused and misunderstood terms in backup and recovery. In this episode, W. Curtis Preston and Prasanna explore what air gap really means, tracing its origins from the days when everyone used tape storage to modern virtual implementations. They discuss how true air gap required physical separation - tapes stored offsite at facilities like Iron Mountain - and why this gold standard is nearly impossible to achieve with today's connected backup systems. The conversation covers modern alternatives including immutable storage, IAM-based protection, and simulated air gaps that disconnect network connections when not actively replicating. Curtis and Prasanna explain why ransomware has made air gap more important than ever, and provide practical guidance for evaluating vendor claims about air gap capabilities in cloud and hybrid environments.…
 
The largest data breach in recent memory has exposed 16 billion login credentials across multiple databases, and we're here to help you understand what it means for your security. This massive exposure involves data stolen primarily through infostealer malware rather than a single company breach. Join W. Curtis Preston, Dr. Mike Saylor, and Prasanna Malaiyandi as they break down this complex security incident. Learn why this largest data breach is actually a compilation of stolen credentials from various sources, how infostealer malware works, and why your browsing habits might be putting you at risk. The team discusses practical security measures including proper browser hygiene, multi-factor authentication best practices, and password management strategies. Mike shares eye-opening insights about session security and why having multiple browser tabs open during sensitive activities could compromise your accounts. Get actionable advice on protecting yourself from the fallout of this massive credential exposure.…
 
This episode breaks down snapshot backup fundamentals, covering the key differences between traditional storage snapshots and cloud-based approaches. Curtis and Prasanna explain copy-on-write versus redirect-on-write methods, performance implications, and why some snapshot systems can degrade performance by up to 50%. Learn about NetApp's redirect-on-write innovation, VMware's unique approach, and how AWS "snapshots" are actually more like traditional backups. The hosts discuss critical concepts like read-only snapshot properties, storage space management, and the importance of copying snapshots to create true backups that follow the 3-2-1 rule. Whether you're managing traditional storage arrays or cloud infrastructure, this episode provides practical guidance on turning snapshots into effective backup strategies. Topics include performance optimization, immutable storage considerations, and real-world implementation challenges that every IT professional faces.…
 
Human error has replaced hardware failures as the primary driver of data loss and restore operations in modern IT environments. This episode explores real-world examples of how both end users and administrators create the need for backup and recovery operations through accidental deletions, configuration mistakes, and poor processes. W. Curtis Preston shares war stories from his decades in the industry, including incidents involving accidental directory deletions, source code stored in temporary folders, and tape library disasters. The discussion covers how technology improvements like RAID and solid-state drives have made hardware more reliable, shifting the focus to human-related incidents. The hosts also examine insider threats and the importance of implementing proper controls around privileged access. Learn why understanding human error patterns is critical for designing effective backup and recovery strategies that account for the reality of how data actually gets lost.…
 
Learn how to extract measurable ROI from your backups beyond traditional disaster recovery. Curtis and Prasanna explore proven strategies for extracting business value from backup infrastructure through test and development environments, security monitoring, compliance checking, and AI-powered analytics. Discover why the shift from tape to disk storage created new opportunities for ROI from backups, including instant restore capabilities and data mining applications. The hosts share real-world examples of organizations using backup data for threat detection, regulatory compliance, and business intelligence. From Veeam's AI integration to copy data management techniques, this episode reveals practical approaches to transform backup systems from cost centers into value generators. Whether you're struggling to justify backup expenses or seeking ways to leverage existing investments, these ROI from backups strategies can help extract maximum value from your stored data.…
 
World Backup Day falls on March 31st - the day before April Fool's Day because not backing up your data is no joke. In this episode, hosts W. Curtis Preston and Prasanna Malaiyandi discuss alarming statistics about data loss and why proper backup strategies are essential for business survival. The hosts break down the famous 3-2-1 backup rule and how it applies to both consumers and enterprises. They examine the growing threat of ransomware, including double extortion attacks where criminals not only encrypt your data but threaten to publish it. With 94% of companies that suffer major data loss failing to recover, and 70% of small businesses closing within a year of significant data loss, World Backup Day serves as a crucial reminder to implement robust backup strategies that include immutable storage and protection for often-overlooked SaaS applications. Stories from this episode: https://www.forbes.com/sites/tomcoughlin/2025/03/31/march-31-is-world-backup-day/ https://objectfirst.com/blog/world-backup-day-2025/ https://www.backupwrapup.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast/…
 
You've found The Backup Wrap-up, your go-to podcast for all things backup, recovery, and cyber-recovery. In this episode, we tackle one of the scariest threats out there - ransomware targeting VMware ESXi environments. I'm joined by Prasanna Malaiyandi and our special guest Melissa Palmer, also known as @vmiss, who's an independent technology analyst and ransomware resiliency architect. We get into why virtualization environments are such juicy targets for attackers, how they're specifically going after vCenter and ESXi hosts, and why your backup strategy is probably missing some critical components. If you've got a virtualized environment, you need to listen to this. Melissa brings her unique perspective from both the virtualization and security worlds to help you protect your most critical infrastructure. So buckle up - this is an episode you can't afford to miss if you want to keep your VMware environment safe from ransomware attacks.…
 
In this episode of The Backup Wrap-up, W. Curtis Preston breaks down the key VeeamON announcements from the VeeamON 2025 conference in San Diego. He highlights Veeam's focus on security and ransomware defense, including their new CrowdStrike integration and data resilience maturity model developed with McKinsey and MIT. Curtis shares his excitement about Veeam's long-awaited Linux-based software appliance, which addresses a critical security vulnerability in Windows-based backup systems. He also discusses other major VeeamON announcements like their Anthropic partnership for AI-powered backup content search, Microsoft Intra ID support, and the ability to recover backups to Azure in under five minutes. Whether you're a Veeam customer or just interested in backup technology trends, this episode provides valuable insights into these significant VeeamOn announcements.…
 
DOGE and GSA recently made headlines with a tweet claiming $1 million annual savings by converting 14,000 magnetic tapes to "permanent modern digital records." In this episode, W. Curtis Preston and Prasanna Malaiyandi analyze whether this claim is possible – although they cannot actually validate it due to lack of information. They discuss that DOGE and GSA's claim is possible given the significant costs of maintaining legacy systems, the migration process would also likely take months and involve substantial upfront expenses. Curtis also shares a humorous story about accidentally pressing an emergency power button during a critical mainframe recovery.…
 
Tape backup for small business might sound like old tech, but Mag Store's new Thunderbolt-compatible tape drive could change that perception. In this episode, we discuss how this new offering potentially opens tape technology to a wider market of SMBs and content creators looking for ransomware protection and cost-effective long-term storage. Curtis and Prasanna dive into the specifics of when tape backup makes financial sense for small business data protection, particularly for companies generating large amounts of data or concerned about cloud security. They explore the $6,000 upfront investment against the long-term benefits of $90 tape cartridges that hold 45TB compressed. Perfect for SMBs with on-premises data or YouTube creators needing affordable archive solutions that are truly air-gapped from ransomware threats.…
 
In this episode of The Backup Wrap-Up, Curtis and Prasanna explore how forever incremental backup technology revolutionized the data protection industry. They discuss the evolution from traditional backup methods to modern approaches that eliminate the need for regular full backups, dramatically reducing network traffic, storage requirements, and backup windows. The hosts examine the technical foundations of forever incremental backups, from block-level incremental tracking to backend storage innovations that make multiple recovery points possible without redundant data transfers. They compare older approaches like synthetic fulls with true forever incremental implementations, highlighting the critical differences and benefits. Whether you're still using legacy backup tools or evaluating modern solutions, this episode provides essential insights into why forever incremental has become the standard for efficient, reliable backup systems.…
 
In this episode of The Backup Wrap-Up, we look at the cloud vs tape debate for active archives. The conversation was sparked by a LinkedIn post claiming tape libraries are the only robots not making things easier in 2025, suggesting cloud is superior to tape for active archives. We challenge this premise by pointing out that cloud vs tape is a false dichotomy since many cloud storage vendors use tape for their lowest-cost tiers. We examine key considerations including cost (where tape wins by orders of magnitude), data integrity (where tape actually outperforms disk), and access times (where expectations should align with use cases). For organizations running on-premises infrastructure, we also highlight the often-overlooked egress costs and transfer times associated with cloud storage. Whether you're managing secondary storage or planning an archive strategy, this candid discussion cuts through the marketing hype. Here's the LinkedIn post that sparked the discussion: https://www.linkedin.com/feed/update/urn:li:activity:7300167312144322561/ Here's a recent episode about how tape is not dead: https://www.backupwrapup.com/is-tape-backup-dead-why-it-still-matters/…
 
Loading …

Bienvenue sur Lecteur FM!

Lecteur FM recherche sur Internet des podcasts de haute qualité que vous pourrez apprécier dès maintenant. C'est la meilleure application de podcast et fonctionne sur Android, iPhone et le Web. Inscrivez-vous pour synchroniser les abonnements sur tous les appareils.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Guide de référence rapide

Écoutez cette émission pendant que vous explorez
Lire