Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance
Building a cyber security team isn't optional anymore; it's the difference between recovering from ransomware and going out of business. In this episode, Curtis and Prasanna explain why hardening your backup infrastructure is only half the battle. You need professionals who know how to configure XDR systems without drowning you in false positives, blue teams to defend your environment, and red teams to test whether your defenses actually work. They cover the role of MSSPs, incident response planning, cyber insurance requirements, and why attempting ransomware response on your own is like those old TV warnings: "Don't try this at home." If you've been following their series on backup basics and system hardening, this episode ties it all together with the human element that makes or breaks your recovery plan.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we're talking about how you can't do this alone.
Speaker:We've been talking the last few episodes, you know, about, uh, hardening your
Speaker:backup systems against ransomware.
Speaker:But remember that much of that tech is only as good as
Speaker:the team that configured it.
Speaker:This is why Prasanna and I will talk about how you need professionals on your side.
Speaker:Uh, we talk about blue teams and red teams, what they actually do, how
Speaker:cyber insurance fits into all of this.
Speaker:Let's talk about building your cybersecurity team.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for
Speaker:over 30 years, ever since.
Speaker:I had to tell my boss that there were no backups.
Speaker:Of the production database that we had just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated backup admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy
Speaker:whose hair I'm continually jealous of.
Speaker:Prasanna Malaiyandi, how's it going?
Speaker:Prasanna,
Speaker:I'm good.
Speaker:Curtis, come on.
Speaker:What's there to be jealous of?
Speaker:you know what's there, and I'm telling you that long.
Speaker:You know what, what, what does Steven call you?
Speaker:Goldilocks.
Speaker:Oh.
Speaker:Um, yeah, so, uh, what are we talking about today?
Speaker:Today we are talking about more about or more details about a previous episode
Speaker:where we covered sort of 10 things you should be aware of to make your backup
Speaker:or for your backup infrastructure
Speaker:Yeah, the, it started with the 10 basic things.
Speaker:These were like table stakes.
Speaker:Like if you don't have these things.
Speaker:Don't even tell me you have a backup system.
Speaker:Right.
Speaker:'cause you don't.
Speaker:Right.
Speaker:Um,
Speaker:me you don't have, you have a backup.
Speaker:yeah.
Speaker:Yeah.
Speaker:I'm telling you.
Speaker:Right.
Speaker:Um, and then we, and then we, um, you know, we got some, uh, some
Speaker:critique on that, like suggesting we had left things out and.
Speaker:I, I don't think we did.
Speaker:I just think that, um, these were like literally table stakes.
Speaker:Like if you don't, if you don't conform to the 3, 2, 1 rule, like, uh, you
Speaker:don't actually have backups, right?
Speaker:If you're not, if you're not scheduling them, if you're not managing them,
Speaker:if you're not monitoring them.
Speaker:Like these are basic everyday things that you need to have in your backup system.
Speaker:But then the last episode, we, um, talked about hardening that backup system, right?
Speaker:And, um, we talked about, um.
Speaker:Uh, you know, some sort of modern password management system, right?
Speaker:We talked about MFA or pass keys.
Speaker:We talked about disabling or severely restricting RDP, otherwise known as
Speaker:the ransomware deployment protocol.
Speaker:protocol.
Speaker:whatever, uh, allegedly.
Speaker:And we talked about role-based access controls.
Speaker:Uh, and um, and then finally we talked about potentially considering using
Speaker:a service provider of some sort, everything from a service provider
Speaker:to help manage and make your current system, uh, you know, more secure
Speaker:to actually going with, uh, a full.
Speaker:Uh, a fully SaaS based data protection system where they're
Speaker:responsible for the security.
Speaker:one thing that popped to mind since the last episode,
Speaker:Yeah.
Speaker:I wonder if you went, because Claude and OpenAI chat GT and everything else, right?
Speaker:They're getting all powerful
Speaker:and very useful.
Speaker:I wonder if anyone's actually tried to be like, Hey, here's my backup system.
Speaker:Tell me what I need to do to secure this.
Speaker:Yeah.
Speaker:You know, that would be interesting.
Speaker:Claude.
Speaker:Claude is pretty dang smart.
Speaker:I use Claude quite a bit, right.
Speaker:I'm literally reading right off of Claude right now.
Speaker:I use Claude quite a bit.
Speaker:I and Claude is pretty knowledgeable, not perfect.
Speaker:You, you, you have to verify like when you're gonna use it to.
Speaker:Make recommendations for your life.
Speaker:Like
Speaker:it definitely hallucinates, right?
Speaker:Um, but it, it's pretty decent in terms of discussing backup, um,
Speaker:infrastructure, uh, with it, right?
Speaker:Um, backup security and, uh, suggestions and things like that.
Speaker:I, I think that's actually a really interesting idea.
Speaker:I like that.
Speaker:Um, so.
Speaker:The, the next phase here is that, alright, so you, you've,
Speaker:you've, you've got the 10 things.
Speaker:You've hardened your backup system in order to, uh, one
Speaker:of which is immutable backups.
Speaker:Immutable backups.
Speaker:Immutable backups.
Speaker:Right?
Speaker:So that was really what the last one was about, was, you know, I, I
Speaker:said in the, in the 10 things, one of the 10 things was you need to
Speaker:have an immutable backup system.
Speaker:And then the last time we talked about just basically continuing
Speaker:to harden that system so that.
Speaker:No matter what happens, you will have a copy of your data
Speaker:that you can use to restore.
Speaker:So now let's talk about what we can do to prepare to be able to use that system.
Speaker:Right?
Speaker:is it even to just prepare for what could eventually happen and make
Speaker:sure, is your system truly immutable?
Speaker:Yeah.
Speaker:Uh, no, no, I don't, I don't know what
Speaker:Yeah, because blue teaming and red teaming,
Speaker:Yeah.
Speaker:Okay.
Speaker:Alright.
Speaker:Alright.
Speaker:Um, yeah, that's, yeah, that is true.
Speaker:At least one of these things is, is, is a way to ensure that the things you did.
Speaker:The last episode are, uh, actually work.
Speaker:So the first thing that I wanna talk about, one could, you know, we just
Speaker:finished, um, I literally got yesterday, I dunno if I told you this, but yesterday
Speaker:evening I was sent the, uh, the QC one, which is the quality control
Speaker:one copy of, uh, learning ransomware, um, response and recovery, right?
Speaker:Which
Speaker:Which is, your new
Speaker:Which is my new book with, uh, uh, Dr. Mike Saylor, uh,
Speaker:friend of the pod, obviously.
Speaker:Uh, and one of the consistent things that I got was that.
Speaker:I think that to a certain degree you can harden your backup system without
Speaker:a ton of professional, uh, help, right?
Speaker:Meaning that you can just make sure you, you go with certain vendors and
Speaker:certain features, make sure that you have those features immutability,
Speaker:real immutability being one of them.
Speaker:But the more I worked with Mike on.
Speaker:Actually when we need to use the system, and not just a backup system, but our
Speaker:overall IT system and security system to actually respond to a ransomware attack,
Speaker:the more I began to develop the feeling that this is really not something that you
Speaker:should be trying to attempt on your own.
Speaker:This is what, what were those old.
Speaker:The, you know, the, the events on this show are done by a professional sunriver.
Speaker:Oh yeah,
Speaker:Please do not, attempt them at home.
Speaker:Right.
Speaker:Uh, I don't remember what that was from, but that's where I, and so when
Speaker:we talk about getting a, a company to help you to do this, what term
Speaker:do we use to refer to that company?
Speaker:So normally we call them the blue team.
Speaker:Yeah.
Speaker:Yeah.
Speaker:We're gonna talk about it the other team in a, in a minute.
Speaker:Right?
Speaker:But I really think that.
Speaker:Before you need one, it's time to contract a blue team.
Speaker:Right?
Speaker:So they can go through the checklist that we talked about, uh, everything that we
Speaker:just talked about in, in the previous episodes of making sure that your,
Speaker:your backup system is, is functional.
Speaker:I do think someone like me, I'm not the only one out there, but someone like me.
Speaker:Who is backup system security specific?
Speaker:Uh, there are things about your backup system that only a backup expert will
Speaker:be able to help you, uh, look for, but then to take the overall security of
Speaker:your entire environment and make sure that you have the, the defensive tools.
Speaker:Tools like XDR, SIEM, SOAR tools.
Speaker:Right.
Speaker:Um, to have those things in place.
Speaker:And then let me ask you a question Prasanna.
Speaker:What good is an improperly configured XDR system?
Speaker:Uh, you might as well not have one.
Speaker:Exactly right.
Speaker:Um, I would say the biggest issue with an improperly configured XDR
Speaker:system will be, uh, false positives.
Speaker:Yeah, why?
Speaker:Why, why is that a problem?
Speaker:Why is that worse than not having one at all?
Speaker:Yeah, because what'll happen is you'll keep getting all these
Speaker:alerts and then you'll be like, oh, I'm just gonna turn it off.
Speaker:And then you just shut down the entire system, which means you
Speaker:might as well not have had anything
Speaker:Yeah.
Speaker:Your, your, your alerting system basically becomes Henny Penny.
Speaker:Do you know who Henny Penny is?
Speaker:I was gonna say the boy who cried wolf, but
Speaker:Henny Penney's the story of the person who kept saying the sky is falling.
Speaker:Oh
Speaker:Um, and uh, then when this guy actually was falling, nobody, nobody believed him.
Speaker:Same thing, I think with the boy who cried Wolf.
Speaker:Yeah.
Speaker:Um,
Speaker:the, the, so I know you talked about tools
Speaker:like the Blue team can help you with
Speaker:that, I think, and we'll maybe cover this in more detail a bit later,
Speaker:but in addition to tools, they can also help you around processes
Speaker:and other things
Speaker:yes,
Speaker:yes, Because you know, people, process and technology, right?
Speaker:Technology is the last one, right?
Speaker:Because if you, if you don't have those processes down, what
Speaker:will we do when we get alert?
Speaker:What will we do when we get.
Speaker:When there's something that is suggested that, um, you know, that it looks like
Speaker:we've got some sort of actual attack, what do we do when we have a new system?
Speaker:What do we do when we have a new person?
Speaker:What is our onboarding procedure?
Speaker:What is our offboarding procedure?
Speaker:There are.
Speaker:Uh, um, security reasons to look into that.
Speaker:There are legal reasons to look into that, right?
Speaker:What is your offboarding process?
Speaker:So, um, yeah.
Speaker:And they can help you with all of that.
Speaker:Help you develop your runbooks, uh, to, to make sure that you have the procedures
Speaker:and your playbooks to go into the individual, um, procedures so a blue team
Speaker:can come in a couple of different flavors.
Speaker:You can have sort of a one time, which I think would be a really, again,
Speaker:better than nothing, but security is kind of like backup, is it?
Speaker:If you just do the one time thing, uh, it's very easily for that, for
Speaker:the configuration to waver over time and for you to be less secure than
Speaker:you were, uh, at that magical moment.
Speaker:Right?
Speaker:Or the people and processes change over time and
Speaker:now you're, you have gaps.
Speaker:Yeah.
Speaker:Your processes change as your company changes, as the, what you do for a company
Speaker:or, you know, what you do for a business.
Speaker:Uh, changes.
Speaker:I actually think back to, uh, there was this company, um, I'll just say it was
Speaker:a, it was a company that made things.
Speaker:They actually.
Speaker:If I said what they actually were like, there's like one company that's like
Speaker:this, that it, it would really, but they, they actually made something, a physical
Speaker:thing that you may have actually had in your house and they were using, um.
Speaker:The, you go back, this is again, this is gonna date this story of course, but
Speaker:you remember BCVs, you remember EMC and BCVs, and then there were off host backups
Speaker:using like, so if, if you had, at this time it was net backup, and you could
Speaker:actually, you could split the BCV, which was a business continuance volume, and
Speaker:then you could back that up directly, uh, and, and so you could back up your volume
Speaker:both like offline and, well, not offline, but disconnected from the primary system
Speaker:and in a way that didn't affect the, the performance of the primary system.
Speaker:It was a really cool thing back in the day, but it was complicated and I
Speaker:had it configured and it was amazing.
Speaker:And then I left and like a month later it didn't work anymore.
Speaker:And they were like, he didn't configure it right.
Speaker:I'm like, I'm sorry, but I have videos of it actually, uh, working.
Speaker:So, yeah.
Speaker:So I do think that what you should be doing is having a regular relationship
Speaker:with an MSSP who can help you, if nothing else, just regularly look at
Speaker:what you are doing and make sure that you're doing things in the, the most
Speaker:secure way that your budget can afford.
Speaker:Can you define what an MSSP is for people?
Speaker:we did that already, but I will do that again.
Speaker:Managed security service provider.
Speaker:Right.
Speaker:And again, uh, you know, this is sound like I'm shilling from a friend
Speaker:there, from my co-author, but, you know, like black Swan Cybersecurity,
Speaker:which is, uh, Mike Saylor's company.
Speaker:So, um.
Speaker:I think that's you need, even if all you do is create the relationship
Speaker:now, vet your vendors now so that when you get attacked, and I'm
Speaker:gonna say when you get attacked, you can then just call them in, right?
Speaker:You, you get a $0 purchase order.
Speaker:All of those things.
Speaker:So that you could just call them.
Speaker:But definitely what's better is to have them, um, you know, part
Speaker:of the, the day-to-day routine.
Speaker:And also, especially if you're a smaller company, they could potentially bring
Speaker:in, they probably have volume pricing with things like XDR tools and SIEM/SOAR
Speaker:tools, uh, by the way, so that's, uh, extended detection and response, SIM is
Speaker:security information and event management.
Speaker:A SOAR tool, a security orchestration and response, right?
Speaker:Um, and they potentially have, they most certainly have volume discounts
Speaker:with tools that they know, they know how to use, they know how to configure
Speaker:it properly, and you could potentially get a good tool through them, properly
Speaker:configured for less money than you could potentially go buy a very similar
Speaker:tool, uh, and improperly configure it.
Speaker:So, yeah, so big fan of getting an MSSP, uh, to, uh, to learn how to
Speaker:defend against, a ransomware attack.
Speaker:And going back to sort of the people and process, so you just touched on the tools.
Speaker:One of the things MSSPs also bring to the table.
Speaker:No pun intended is tabletop exercises.
Speaker:Right.
Speaker:And Curtis, do you wanna talk about a little about what a tabletop exercise is?
Speaker:Yeah.
Speaker:So basically we literally sit around a table and we define a scenario, right?
Speaker:You know, of like, you know, you just, you just got, um, you know, you just
Speaker:got attacked by this kind of ransomware.
Speaker:This system did this, this system did this.
Speaker:Now what do you do?
Speaker:And, oh, by the way, Curtis got hit by a bus.
Speaker:So Curtis isn't available.
Speaker:What do you do?
Speaker:Right?
Speaker:And because your, your, uh, your runbooks and playbooks need to have
Speaker:all of these scenarios in there.
Speaker:Good.
Speaker:I think a good, uh, MSSP will be good at coming up with these
Speaker:scenarios because they've been in the middle of those scenarios.
Speaker:Mm-hmm.
Speaker:Yep.
Speaker:Yeah,
Speaker:they're down in the trenches
Speaker:and they understand what these look like.
Speaker:Yeah.
Speaker:And, and a good, uh, I think a good tabletop should be fun, should
Speaker:not be, uh, the degree to which sometimes a DR test can be not so fun.
Speaker:Right.
Speaker:This is something you could do much more often.
Speaker:You by creating, we, we talk about creating an environment or
Speaker:a culture of, of recovery, right?
Speaker:And so this is something so that you keep cybersecurity and ransomware
Speaker:protection, uh, front of mind, right?
Speaker:And closely related to tabletops is actually the next
Speaker:level, which is an actual.
Speaker:Recovery test.
Speaker:Right.
Speaker:How, how is that different than, than the tabletop?
Speaker:Well, because a tabletop, you're just sort of.
Speaker:Talking through how you would go about addressing, say you got hit by
Speaker:ransomware versus a DR test, you're actually doing some of these actions and
Speaker:actually, uh, implementing and executing on your runbooks and playbooks to
Speaker:make sure yes, when this thing happens, will it actually work?
Speaker:It's like we talk about with restore testing, right?
Speaker:It's, Hey, I created these runbooks playbooks.
Speaker:Is it gonna work when I need it?
Speaker:Yeah.
Speaker:And, and you, you need to be, I, I think this is, I think this is possibly the best
Speaker:argument for a cloud-based backup system because so many of them have this idea
Speaker:of an automated, uh, disaster recovery.
Speaker:Uh, process, right?
Speaker:That you can literally push a button and fail over and, um, you just need to
Speaker:pick your recovery point and fail over.
Speaker:I, I will say that ransomware breaks a lot of that, right?
Speaker:Breaks a lot of automation, but that doesn't mean we can't like, use
Speaker:that for, for a ransomware attack.
Speaker:But at the same time, I think you need to.
Speaker:Remember that recovering data is just a small portion of the overall
Speaker:ransomware recovery scenario, and
Speaker:so
Speaker:you need to make sure that yes, you might be able to fail over
Speaker:and test your data recovery, but what about all the other things
Speaker:? Yeah.
Speaker:So much.
Speaker:Right.
Speaker:I'm glad you brought that up because, and, and, and I think this, to go
Speaker:back to what I was just saying, right.
Speaker:At least make sure that you know how to restore.
Speaker:Right?
Speaker:Right.
Speaker:Make sure that your DR system works because it will be the easiest part, or it
Speaker:should be the easiest part of recovering from a ransomware attack because it will
Speaker:take days to weeks to months to isolate.
Speaker:What actually needs to be restored, right?
Speaker:This is where all of these tools and, you know, and, and different backup
Speaker:systems have different capabilities here, uh, is to figure out what
Speaker:actually needs to be restored.
Speaker:So once you've done that, you should be able to just push a
Speaker:button and restore that thing and bring that thing back online.
Speaker:Um, and so I'm guess, so what I'm saying is it can't all
Speaker:just be tabletop exercises.
Speaker:We need to actually do recovery testing Now, I don't think.
Speaker:I, I think this would be a great one to, to bring Mike on and talk about.
Speaker:I think there is the concept of using in a isolated environment, actually introducing
Speaker:real ransomware and seeing what it does that's like next level, right?
Speaker:Um, but, uh, but it again.
Speaker:The restore should be the easiest part.
Speaker:So at least make sure that you have that down cold right?
Speaker:Because you are a hundred percent right that,
Speaker:um, it's gonna be the, well, it'll be the easiest part, right?
Speaker:Uh, it's gonna take you a long time.
Speaker:Well, and even for the restore piece, it's.
Speaker:Right.
Speaker:We've talked about this on the podcast before.
Speaker:It's how do I know what is a good valid restore point that I can actually
Speaker:recover from?
Speaker:Yeah.
Speaker:That, that's gonna be, that's gonna be your, uh, and we do, we
Speaker:do talk about that in the book.
Speaker:Um, but, uh, but like I said, once you decide what that is, you
Speaker:should be able to push a button and magic should just happen.
Speaker:So what about, uh, people that are gonna prove you wrong?
Speaker:Oh yes.
Speaker:So we talked about the blue team.
Speaker:Right.
Speaker:They're here, they're helping you, but you have this immutable backup system that's
Speaker:been hardened, and you want to figure out how hardened is it and are there gaps?
Speaker:And this is where you go and you hire a red team,
Speaker:Yeah,
Speaker:and these are people who are going to attack your system.
Speaker:They're on your side, don't worry,
Speaker:yeah.
Speaker:right?
Speaker:But they're gonna look for flaws.
Speaker:It kind of reminds me of white collar where Peter hire hires Neil
Speaker:Caffrey.
Speaker:Yep,
Speaker:to kind of do the same sort of thing.
Speaker:It's like, Hey, what are the vulnerabilities in the security
Speaker:system or in this thing so we can identify, fix 'em
Speaker:before the bad guys come.
Speaker:Yeah, exactly.
Speaker:It also reminds me of course of sneakers, right?
Speaker:Which, if you haven't seen sneakers, go see sneakers.
Speaker:That is really a red team that is specifically attacking cybersecurity.
Speaker:I mean, some of the stuff in there is a little silly, but it
Speaker:really goes into things like, um.
Speaker:Uh, social engineering and things like that.
Speaker:Right.
Speaker:So, um, the, and we had Dwayne LaFlotte on here and, uh, hopefully
Speaker:I can put a link down in the show description if you haven't listened
Speaker:to that episode about Red Team.
Speaker:And do you remember what he said about backup systems?
Speaker:It's his favorite source to attack.
Speaker:Yeah.
Speaker:He is like, I love it when they have a good backup system.
Speaker:Right.
Speaker:Actually was so fascinated by that exchange that I actually
Speaker:quoted it directly in the book.
Speaker:I actually put it directly in the book.
Speaker:And, um, yeah.
Speaker:So a good red team, this is something that you use occasionally to, you
Speaker:know, you think, you, you, you, you, blue team does the thing.
Speaker:You've, you've hardened everything.
Speaker:And then the red team goes and finds out, you know, they shows you that you put in
Speaker:the wrong TV in your, um, in your lobby.
Speaker:And then, uh, they used it to hack your environment.
Speaker:Yep.
Speaker:The things that you'd never think about.
Speaker:Um, so yeah, so I, I, I do think the idea of red teaming your backup infrastructure,
Speaker:I think is a really good idea.
Speaker:And we are talking all about.
Speaker:Process tools, right?
Speaker:Um, we've also talked about, uh, red teams and blue teams, but all of these
Speaker:things must be super expensive, and when you get hit by ransomware, your
Speaker:bills are probably going to skyrocket.
Speaker:So is there anything com organizations can do to sort of help 'em defer
Speaker:or absorb some of these costs?
Speaker:Yeah.
Speaker:And, and that's really where cyber insurance comes into play, right?
Speaker:If we go back in time, um, cyber insurance, well, this isn't that long ago.
Speaker:This is like five years ago, right?
Speaker:There was a time where the only role cyber insurance played was paying the ransom.
Speaker:You're seeing that becoming less and less the case and that the role that the
Speaker:cyber insurance company is playing is basically part of your blue team, right?
Speaker:They're helping you to build the defenses.
Speaker:They're giving you a checklist of things that you're going down to
Speaker:make sure that you are doing these things in order to be as resilient
Speaker:against ransomware as you can.
Speaker:Um, and yes, they, uh, are the company that then.
Speaker:Funds, the, you know, the, you know, the, the actual process of hiring the,
Speaker:the blue team to bring them in, right.
Speaker:The incident response team, because that will be very expensive, right?
Speaker:Um, and the incident response team, the, the blue team also, they're
Speaker:going to know, and the re the, um, the cyber insurance people, uh, as
Speaker:well are going to have access to, uh, essentially hostage negotiators, right?
Speaker:Um, and so they, they actually, uh, what do you call it?
Speaker:Um.
Speaker:Negotiating with ransomware threat actors is a thing.
Speaker:Right.
Speaker:Um, and, uh, I mean, I still don't like the idea.
Speaker:Right.
Speaker:But depending on the scenario that you're in, you may have no
Speaker:other choice either, uh, do the thing or, or go out of business.
Speaker:Any, any thoughts on that?
Speaker:you probably need to get cyber insurance if you don't have it already
Speaker:today.
Speaker:And then also make sure you are strictly abiding by the terms
Speaker:of what's in there and that you are actually doing what you say you are doing.
Speaker:Because the last thing you wanna do is pay insurance and then them finding
Speaker:that, oh, you didn't do X, Y, and Z
Speaker:and therefore now they're not paying out.
Speaker:Yeah.
Speaker:Yeah.
Speaker:That would be, that would not be a very good day.
Speaker:Right.
Speaker:Well, sort of a summary statement, the recurring theme in the book was
Speaker:these things that you need to do and, and this goes back to the past
Speaker:three episodes, including this one.
Speaker:They're really easy, most of them, they're really easy to do.
Speaker:Um, they might not be free.
Speaker:Well, they, they won't be free, but they're not, there was nothing that
Speaker:I recommended in the book that was like, oh my God, it is just gonna
Speaker:be near impossible to do this right.
Speaker:Near impossible.
Speaker:I mean, possibly from a backup and recovery and
Speaker:disaster recovery perspective.
Speaker:Possibly the most difficult thing is, is some automated system.
Speaker:To recover your data.
Speaker:Right.
Speaker:Um, we, we did cover in the book how that, I think that the better way to
Speaker:do like a full scale restore because of how difficult it is to wipe.
Speaker:Um, because it, it's very easy for the system, a system that you're
Speaker:backing up to get infected before.
Speaker:You know that it's infected, so restoring it from a backup from
Speaker:yesterday will just reinfect it.
Speaker:Right?
Speaker:So as much as a fan, as I, as much of a fan as I am of backup, I, I think that
Speaker:the idea of like re-imaging systems from a golden copy that you had from, you
Speaker:know, the last time you reconfigured the OS at all, and then just restoring the
Speaker:database, the applications, and the data.
Speaker:Individually or separately from the backup system.
Speaker:I, I think that's a much stronger, um, you know, thing.
Speaker:And I think we could probably have an episode just on that.
Speaker:Yeah.
Speaker:And I agree it's probably stronger, but it may take significantly more time
Speaker:Absolutely right.
Speaker:There's no may about it.
Speaker:It will take it, it's definitely a. I don't think it's a situation of
Speaker:throw out the baby with the bathwater.
Speaker:But it's definitely a significant change in infrastructure, right?
Speaker:If you're not used to doing golden images, if you're not
Speaker:used to doing that sort of thing.
Speaker:And again, you need a process there because every time you update
Speaker:the operating system, you need to update the golden image, right?
Speaker:Um, and, but it, it's, it's another one of these things where
Speaker:that, if you get good at that.
Speaker:Um, again, you can just push a button, right?
Speaker:Um, but it's, it's, it is totally doable.
Speaker:But what I, where I was going with just a few minutes ago was that all
Speaker:of these things are, they're doable.
Speaker:They will definitely not be free, but they're doable with
Speaker:time and effort and concern.
Speaker:They all have to be done in advance,
Speaker:Yes.
Speaker:It, it does, it is like, one of the jokes I continually make is remember,
Speaker:it doesn't matter when you invent a time machine, but it matters very much when
Speaker:you implement a good backup system, when you implement a good cybersecurity system.
Speaker:Right?
Speaker:It, it doesn't, you know, it's sort of like, uh, you know, vaccines only work if
Speaker:you take them before you get sick, right?
Speaker:Uh, yeah.
Speaker:Very
Speaker:and just the one thing I wanted to add to that is you don't need to implement
Speaker:everything we've talked about day one.
Speaker:Good
Speaker:You can, right?
Speaker:We've been talking throughout this, these last three episodes.
Speaker:Good, better, best, right?
Speaker:You're on this journey to get to the best, right?
Speaker:Or to better wherever,
Speaker:based on cost and other things like that for your organization.
Speaker:But you need to start somewhere, right?
Speaker:So just start the journey.
Speaker:You will eventually get there, and you'll be much better than where you are today.
Speaker:Yeah, really good point.
Speaker:Prasanna, it might take you a year.
Speaker:It could take you longer than a year to get from where you're
Speaker:at to where you want to be.
Speaker:This is again, where I think professionals can be very helpful
Speaker:because they can help you prioritize.
Speaker:Right.
Speaker:Like if I looked at your backup system and I saw that you, you weren't doing
Speaker:3, 2, 1, I'd be like, dude, you gotta at least get another copy off the system.
Speaker:And I would also say, if you're not currently doing immutable backups, that's
Speaker:like number two, number 1, 3, 2, 1.
Speaker:Number two would be immutable backups if you, and actually immutable, not just
Speaker:something that's branded as immutable.
Speaker:Right.
Speaker:And then I would help you understand, well, what, and I'd be like, I'd
Speaker:help you look at the product and go, well, when they say immutable.
Speaker:They don't really mean the same thing.
Speaker:I mean, right.
Speaker:And then the same thing with, uh, an MSSP can help you do that, and then
Speaker:once you get to a certain level, or maybe, maybe you start with the red
Speaker:team, you have the red team hack you and you know, and go and, and just,
Speaker:you just know how bad things are.
Speaker:And then, you get a, a hit list of what you need to what, where
Speaker:you need to, uh, start, right?
Speaker:Yeah.
Speaker:Uh, it, it, it's a process and it's a, it's an iterative process.
Speaker:It's a never ending process.
Speaker:Um, now the, the theme song from never ending story is now on my head.
Speaker:So I hope it put it in everybody else's head.
Speaker:And, uh, I want to thank you, Prasanna.
Speaker:It's been another great episode.
Speaker:I enjoyed this one.
Speaker:I, I like these sort of quick hits where it's like, Hey, let's
Speaker:focus on a couple areas and figure out what to do, how to help
Speaker:people.
Speaker:Yeah, me too.
Speaker:Uh, hope, hope you folks enjoyed it.
Speaker:Uh, I'm sure we'll hear in the comments if you didn't, um, and what we left out.
Speaker:Uh, and uh, you know, that's why this is also an iterative process that is a wrap.