Detect Ransomware Before It Destroys Your Business
Ransomware detection is more complex than most organizations realize. In this episode, cybersecurity expert Mike Saylor breaks down the real-world signs of ransomware attacks—from users complaining about slow computers to smart devices acting strangely. We explore polymorphic malware that changes based on its target, the risks posed by managed service providers using shared credentials, and why milliseconds matter in ransomware detection and response. Mike explains the difference between EDR, XDR, SIEM, and SOAR tools, helping you understand which security solutions you actually need. We also discuss why 24/7 monitoring is non-negotiable and how even small businesses can afford proper ransomware detection capabilities. If you're trying to protect your organization without breaking the bank, this episode offers practical guidance on building your security stack and knowing when to call in expert help.
You found the backup wrap up, your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:Got a little something different for you.
Speaker:Uh, Mike and I have been, um, Mike Saylor and I have been working really hard on.
Speaker:Finishing the book for you, the, the upcoming ransomware book.
Speaker:And we did, um, that's the good news.
Speaker:The bad news is we didn't have enough time to record another, an episode.
Speaker:So I reached back into the archives and found, this is, uh, a recording from
Speaker:Mike when he, uh, came on the podcast to talk about, uh, detecting ransomware.
Speaker:And, uh, I'm, I'm trying something different here.
Speaker:Let's see how it goes.
Speaker:What I actually did was I tightened up the episode, uh, looked through and I
Speaker:just grabbed really the, you know, the, the really relevant parts of this piece.
Speaker:So it's a tighter episode than the original recording.
Speaker:Should be around a half hour instead of the 45 minutes.
Speaker:It's something I'm gonna try.
Speaker:I really wanna know what you think about it.
Speaker:So whether you're watching this on YouTube or on, uh, you know, the, uh, uh, backup
Speaker:wrap up.com, I, I'd love to hear from you as to what you think of this tighter
Speaker:format and specifically the one here where I took a longer show and, uh, tightened it
Speaker:up to make it a little bit more, um, you know, I don't know, easier to listen to.
Speaker:This is the backup wrap up.
Speaker:Welcome to the show.
Speaker:I am w Curtis Preston, AKA, Mr. Backup, and I have with me Prasanna Malaiyandi.
Speaker:How's it going?
Speaker:Prasanna.
Speaker:I am good, Curtis.
Speaker:It's time to bring on our, uh, our guest.
Speaker:Once again, our resident cybersecurity expert, CEO of Black Swan Security.
Speaker:Mike Saylor.
Speaker:How's it going, Mike?
Speaker:It is going well guys.
Speaker:Thanks for having me.
Speaker:We're talking about ransomware.
Speaker:So this week I wanted to talk about.
Speaker:The actual phase or you know, whatever the things that we need to
Speaker:do in order to detect ransomware.
Speaker:And I remember talking about this a little bit with you before, but can
Speaker:you, um, aside from like a, a SEIM/SOAR tool, sort of going off and noticing
Speaker:something, can you think of weird things that have happened in people's
Speaker:environments where it ended up being.
Speaker:The ultimate thing was they were actually under a ransomware attack.
Speaker:You know what I'm saying?
Speaker:Like, like for some reason the, you know, the company dishwasher stopped working
Speaker:and uh, you have weird stories like that.
Speaker:Uh, I, I do.
Speaker:And so there, there are, there are, there's malware.
Speaker:There's a category of malware called polymorphic.
Speaker:So it, it, it changes.
Speaker:Uh, some of that change depends on what the malware
Speaker:has identified as, as its host.
Speaker:And so there, there is a strain.
Speaker:There are strains of malware that are specific to certain, you know, they're,
Speaker:they're targeting specific, uh, devices.
Speaker:Um, we saw this with stuck net.
Speaker:Uh, we saw it with, uh, point of sale specific malware.
Speaker:Uh, and now there's ransomware that is looking for specific.
Speaker:Uh, specific hosts.
Speaker:It doesn't want to trigger the ransomware on, on an invaluable host.
Speaker:Like, I don't care if that's got ransomware, just throw it out the window.
Speaker:Uh, but, and then tip, its, tip its cards to what it, you know,
Speaker:the, the attackers are doing.
Speaker:They don't want to trigger the alarms before the, the, the jewels are stolen.
Speaker:So there, there are kind of your, your.
Speaker:Your analogy to the dishwasher's not working anymore.
Speaker:If it's a smart dishwasher, it could very well start to malfunction or perform
Speaker:poorly if malware is interrogating it to determine if it's its target.
Speaker:Uh, there's even malware, uh, the ransomware that,
Speaker:that cleans up after itself.
Speaker:So maybe it gets to the dishwasher and decides, well, this is a
Speaker:dishwasher and it moves on.
Speaker:Well, as it moves on, it deletes.
Speaker:Its, you know, it cleans up after itself.
Speaker:So when you go look at the, at the dishwasher, you, you're like, I
Speaker:don't, I don't know what caused that.
Speaker:But,
Speaker:Seems to be working fine now.
Speaker:more, more often than not, it's, it's user feedback about, you
Speaker:know, complaining about their.
Speaker:their computer running slowly, or, you know, I can't watch
Speaker:Netflix at lunch anymore.
Speaker:Um,
Speaker:Dexter.
Speaker:No Dexter at lunch.
Speaker:right.
Speaker:So it it's usually it's system, you know, performance degradation or, or.
Speaker:Um, just weird stuff.
Speaker:Symptoms, uh, weird symptomatic stuff that usually get, uh, you get
Speaker:notifications on to determine, well, that's weird, but then you go look
Speaker:at it and there's nothing there.
Speaker:Well, it's, well forensically you can still see some stuff, but at
Speaker:the, you know, kind of the, the surface level, you're like, I
Speaker:don't, there's no malware here.
Speaker:Um.
Speaker:but in that case though, like I'm guessing that that user would call
Speaker:their IT help desk and the IT TA person would probably take a look and
Speaker:be like, oh yeah, nothing happened.
Speaker:And then they'd probably just close it and move on.
Speaker:Right.
Speaker:Very like does, how often does it really get escalated?
Speaker:Be like, Hey, that seems weird.
Speaker:Let's figure out like, is there a security issue or something else?
Speaker:It, it, the, the frequency or the, or I guess the likelihood that that
Speaker:gets escalated is, is almost directly related to whether or not they've
Speaker:had to deal with it in the past.
Speaker:So if you've had ransomware, you're a little more diligent and
Speaker:suspicious of weird stuff happening.
Speaker:Like, all right, well we've had, we don't wanna go through that again.
Speaker:Uh, I'm gonna, I'm gonna take every call about weird stuff happening as
Speaker:if it might be ransomware or some other malware versus an environment
Speaker:where maybe they haven't had the, put a fire out or go through that.
Speaker:They're, they're, they're a little more skeptical about, you
Speaker:know, that's just user error.
Speaker:Or, you know, it's, it's Tuesday.
Speaker:Uh.
Speaker:do and do anybody, um, does anybody ever report actually seeing, like
Speaker:someone taking over their desktop?
Speaker:Like they're, they happen to see mouses moving around or
Speaker:windows opening and closing?
Speaker:Do they see that?
Speaker:We have, we have worked a few, there's other cases, and
Speaker:this is actually a a what.
Speaker:In, in the, in a corporate environment, we don't see it as often.
Speaker:Uh, but small businesses and individuals often get scammed into the hole.
Speaker:You've got a virus call this phone number, we then remote access into your
Speaker:machine and then, you know, their access persists or, or something else happened
Speaker:to, to drive that, that weird behavior.
Speaker:The other problem is managed service providers.
Speaker:So you've got this one company that, that supports the, you
Speaker:know, technology to some degree.
Speaker:Whether it's everything, uh, servers and workstations and
Speaker:help desk is all outsourced.
Speaker:Or it's some something specific like a, like a core processing server
Speaker:that does your financials if you're a credit union at, so you have
Speaker:this one, one to many relationship.
Speaker:You've got this one company that supports many clients and.
Speaker:Uh, just human nature.
Speaker:We wanna make sure that that's as easy as possible.
Speaker:So what we found were what we call cons, uh, coincidental passwords.
Speaker:So this one vendor uses the same credentials to log
Speaker:into all of their clients.
Speaker:And so what we've seen recently is, yeah, there's this remote control
Speaker:stuff going on because that vendor was compromised and they didn't know it.
Speaker:But now bad guys have access to the environments of all
Speaker:the clients they support.
Speaker:So, so what we've been talking about so far is sort of.
Speaker:Users noticing something odd happening, calling in, right,
Speaker:getting in, troubleshooting.
Speaker:But I'm guessing though that users aren't always the best people to recognize
Speaker:when things go wrong, and they're probably not always at their desk
Speaker:when the bad actor is doing something.
Speaker:So what happens for all those other scenarios?
Speaker:So there's, there's other things that we do in a corporate environment that
Speaker:we hopefully would notice weird things, our backups, our network bandwidth.
Speaker:Um.
Speaker:And there, there's tons of places that you can set up alerts and triggers,
Speaker:uh, firewall, uh, weird IP addresses, different protocols, uh, unexpected
Speaker:data going out, different ports.
Speaker:Um.
Speaker:There's a lot of things we could look at and, and, and it's, it's a pretty
Speaker:lengthy list, but humanly possible.
Speaker:Like, is there one person that's gonna go down this whole checklist every
Speaker:day, you know, several times a day?
Speaker:Uh, that's just not, that's not feasible.
Speaker:Uh, and so you've really gotta roll that up into a tool that can automate it and
Speaker:just give you a dashboard view of things.
Speaker:Um.
Speaker:The, the, the secret, the, the key is how many things, how
Speaker:much visibility do we have?
Speaker:Finding tools and the data sources and the use cases that all line up.
Speaker:Like there's a, there's a ransomware use case.
Speaker:All right?
Speaker:So from ran, if, if we're, if, if our focus or objective
Speaker:is to identify ransomware.
Speaker:Then working backwards from that objective, we've gotta find the data
Speaker:sources that would give us the indicators.
Speaker:Uh, then we've gotta have the technology that can consume or
Speaker:connect and consume that data source.
Speaker:Uh, then we've gotta have some policy procedure around the source of that data.
Speaker:Like, what is it?
Speaker:Is it a server?
Speaker:You know, uh, firewall, how's it configured?
Speaker:How do we patch it?
Speaker:How do we update it?
Speaker:How do we back it up?
Speaker:Uh, so that playbook is, is fairly extensive, but the, the detection
Speaker:part of that is all about visibility.
Speaker:Um, and, well, I guess fundamentally too, understanding how ransomware works.
Speaker:Um, 'cause I mean, your, your smart dishwasher probably isn't gonna
Speaker:get infected with, with ransomware.
Speaker:Uh.
Speaker:Hmm.
Speaker:Not yet.
Speaker:So when we start talking about this, we've got to start talking about some
Speaker:sort of tools that are, and there's three tools that I'm aware of and, um, you
Speaker:know, which would be XDR, sim and soar.
Speaker:SOAR is more about the response, right?
Speaker:But XDR and SIM tools are about the actual detection.
Speaker:Did I, did I get that right?
Speaker:So the, the XDR is, is the platform that you would, um, consolidate
Speaker:all of your alerts and data sources from different other tools.
Speaker:So it's kind of like the top, the top of your security stack.
Speaker:Okay.
Speaker:And then the, the sim is, is kind of below that.
Speaker:So SIM is one of the.
Speaker:One of the feeds into your XDR platform, EDR, you know, your anti malware endpoint
Speaker:stuff, that's another data source.
Speaker:Um, and, and so.
Speaker:I just thought all the, all the EDR tools were calling themselves XDR tools.
Speaker:That
Speaker:that's
Speaker:And, and they're really not.
Speaker:Um,
Speaker:the evolution of EDR into more of a managed service is still
Speaker:missing the network layer.
Speaker:So the, the eds like CrowdStrike that say that they, they do XDR, they're
Speaker:still missing the, the east, west, you know, network traffic, net flow,
Speaker:Okay.
Speaker:EDR would be endpoint detection response, which typically what we're
Speaker:talking about there is, is like desktops and laptops and things like that.
Speaker:Not so much servers.
Speaker:Would that be right?
Speaker:Well servers too.
Speaker:I mean, you can, you can put EDR on, on servers for sure.
Speaker:But not necessarily networks, like network
Speaker:it, it, uh, CrowdStrike doesn't do network analysis.
Speaker:And so, you know, even before, you know, the, the first, the first kind
Speaker:of acronym was NDR Network Layer stuff.
Speaker:So that's like extra hop, uh, you know, net flow, uh, your, your router.
Speaker:XDR, the extended detect is that we can plug anything into our console.
Speaker:So that's our sim, that's an anti malware, uh, NetFlow, uh, and even
Speaker:like some XDR platforms can do like physical security devices, like
Speaker:badges and motion cameras, and, um.
Speaker:I, OT things, uh, like, hey, my dishwasher's throwing errors a bunch.
Speaker:Uh, you know, you can, I guess if there's a use case for that.
Speaker:Um, so XD the idea with XDR, uh, and even, even broader than that, is an
Speaker:open XDR uh, platform that just about anything you can imagine can be fed into
Speaker:this thing, uh, to correlate events and, and if it's capable, develop behavioral
Speaker:baselines and some other cool stuff.
Speaker:So then, um, does Soar fit into that, all of that?
Speaker:So SOAR is also not a new term.
Speaker:Uh, so SOAR is security orchestration and automated response.
Speaker:Uh, so the idea with SOAR is that we have this playbook, and historically
Speaker:it's been a manual playbook, right?
Speaker:We get out the book and we look through it and say, this is what we're gonna
Speaker:do in response to whatever this.
Speaker:Thing is, so it could be an incident, it could be a, a malware, it could
Speaker:be a stolen laptop, whatever.
Speaker:You've got this playbook and, and the idea with playbooks is you assess
Speaker:yourself, like our company does these things and we have these assets, and
Speaker:what is the most likely impact to us?
Speaker:Ransomware's at the top should be at the top of everybody's list these
Speaker:days, if you're connected to the internet and have users, uh, ransomware
Speaker:is just statistically more likely than a lot of other things these
Speaker:days, but it could be other stuff.
Speaker:You should have a playbook on, uh, denial of service if your company
Speaker:relies on internet connectivity, um, for revenue and communications.
Speaker:You, if you have a, a large remote workforce and they have laptops that have.
Speaker:Company data on it that you should have a playbook on stolen laptops.
Speaker:Is this similar to the incident response plan stuff we talked about
Speaker:a couple or many episodes ago?
Speaker:it is, and, uh, however, uh, soar, uh, traditionally and, and I was kind of,
Speaker:I was getting to that the, the Soar traditionally was more broadly defined.
Speaker:So you could have something that might not be considered an incident yet.
Speaker:Um, so, so, so back in the day also incorporated, well,
Speaker:how do we analyze this event?
Speaker:Hmm.
Speaker:Uh, and then we, and then we started to developing more technical incident
Speaker:response plans and programs that said, all right, that playbook is now part
Speaker:of our plan, and here are the more technical, tactical things we need to do.
Speaker:Well then the evolution of Soar, uh, from a platform or technology
Speaker:perspective is, all right, how do we automate some of this stuff?
Speaker:Yeah.
Speaker:And so there are, there are third party tools that are, so our sim, our
Speaker:XDR platform, identified this stuff.
Speaker:Uh, let's integrate this automation tool or, or we have this tool now that's,
Speaker:that we can then go and, and use to say, we need to handle this, this incident.
Speaker:So as an example, could it be something like, I've detected some random
Speaker:network traffic on this particular client that doesn't look right.
Speaker:The SOAR detects it and maybe it shuts off the network port.
Speaker:Yes.
Speaker:And so in the Soar you would, you would again, define these playbooks
Speaker:when this happens, do these things.
Speaker:And so with ransomware as an example, if, uh, user account experiences, several
Speaker:failed logins and then a successful login.
Speaker:And then service, you know, anti malware is shut off on the endpoint and
Speaker:there is internet traffic to geo, you know, whatever IP address, uh, around
Speaker:the world do these things, right?
Speaker:Disabled user revoke, MFA tokens, uh, uh, shun or, or quarantine
Speaker:that, that endpoint, you know, take it off the, you know, um, uh.
Speaker:Block its IP address, uh, notify whoever and do these things,
Speaker:and you can automate that.
Speaker:Um, and it can be as, as detailed as that.
Speaker:It, it could be, uh, and any variation of that.
Speaker:So yeah, those, those, that's a great example of how that, that
Speaker:tool and it, and it would do it so quick, like milliseconds versus the,
Speaker:the human version of that is, um.
Speaker:You know, your sim tool pops up and says, you know, you've
Speaker:got something to look into.
Speaker:An analyst takes 15 to 20 minutes to verify it.
Speaker:Uh, we have a valid thing.
Speaker:Let me escalate it to level two.
Speaker:Level two looks at it, you know, another 15, 20 minutes.
Speaker:Now we're looking at other, other data sources like the firewall and some stuff.
Speaker:We've now validated that then we, we escalate that to the client if it's
Speaker:an MSP version, uh, or, or the, the business owner or the stakeholder
Speaker:in a, in a corporate environment.
Speaker:Uh.
Speaker:And we're waiting for a response from them to determine what to do next.
Speaker:And so now that that millisecond soar automated response has turned into at a
Speaker:minimum hour and a half, two hours, and who knows what, you know, that malware
Speaker:is, especially the ones that, that, uh, can run autonomously, is our, they've
Speaker:already done reconnaissance to look at what else this thing has access to.
Speaker:And I've already spread and done other stuff.
Speaker:Time is of the essence.
Speaker:yeah.
Speaker:Yeah.
Speaker:So all, all right.
Speaker:So let, let's say, let's say I'm a company, I'm an organization that
Speaker:has none of these tools, right?
Speaker:Just, and I'm, I'm listening to this episode, I'm like, holy crap.
Speaker:Like, how many things do I need to buy and where should I start?
Speaker:Um, I, I think that's.
Speaker:I think that's where the average person might be right now.
Speaker:Um, and that's where I am.
Speaker:Um, I'm like, wow, that's a, that's an awful lot of tools where, you know, and,
Speaker:and, and each of them thinks they're, they're, you know, well, you gotta have
Speaker:this, you gotta have MDR, you gotta have XDR, you gotta have sim, you gotta have,
Speaker:so you gotta have all these things.
Speaker:And I'm sure there's an acronyms that we haven't got to, um, where,
Speaker:where does, you know, I'm worried that I'm gonna get ransomware where.
Speaker:Do I start with all these tools?
Speaker:There's a lot of different, uh, approaches to the problem and understanding.
Speaker:The problem is, is fundamentally economics, right?
Speaker:I can't afford.
Speaker:The people or the, the software or the whatever it is to, to
Speaker:truly, um, improve my, my odds.
Speaker:And that's really what it is.
Speaker:I mean, you can invest everything you have in protecting yourself and
Speaker:you're still a statistic at some point.
Speaker:'cause bad guys are gonna figure out how to get to you.
Speaker:Um, but remember that ransomware is malware.
Speaker:And all malware requires user, user interaction in order to infect your thing.
Speaker:So your computer, um, if it's not connected to the internet and you're not
Speaker:looking at email and going to websites, you're, you're, you're good, right?
Speaker:Or you're, you know, 99% there.
Speaker:Uh, you also have to disable all your USB ports and Bluetooth
Speaker:and all that other stuff too.
Speaker:Um, which means you really can't use your, your computer for anything.
Speaker:Um.
Speaker:So then, but, but if you start there, all right.
Speaker:If my computer's not connected to anything, what can I do?
Speaker:Well, I can't do much.
Speaker:Well, I need to do this thing.
Speaker:Well, what do I need to do that thing?
Speaker:Well, I need internet to get to this website so I can log in to do my work.
Speaker:Okay, well then can we exclude the majority of other things
Speaker:that you don't need to do?
Speaker:Yeah.
Speaker:All right.
Speaker:So let's, we can write policy about that.
Speaker:That's okay.
Speaker:Well, what else do you need?
Speaker:Oh, I need email.
Speaker:I need email to be able to send and receive files and talk to people.
Speaker:Okay.
Speaker:Well, are there ways of restricting email's ability to, to present me with
Speaker:things that, that could be a risk?
Speaker:Well, yeah, that's, you know, email filtering and spam
Speaker:filtering and stuff of that stuff.
Speaker:Some of those tools, some of the, some of that stuff that I've
Speaker:mentioned is, are probably already a capability of what you've purchased.
Speaker:Like Office 365 comes with some good stuff.
Speaker:They just don't do a real good job at teaching you how to,
Speaker:how to use it and configure it.
Speaker:And us as consumers are really poor at, at reading the manual.
Speaker:Um.
Speaker:comes with some other stuff that, but they do charge quite a, quite a bit for it,
Speaker:They do.
Speaker:And so,
Speaker:um, but you know, going back to how many tools do I need to
Speaker:buy, that's another decision.
Speaker:Do I, do I buy more licensing and, and capabilities from this one tool?
Speaker:Or do I look at, you know, what other things can I bolt
Speaker:on and, and add to, to this?
Speaker:Maybe it's more cost effective, but now you've got a, now you've
Speaker:got overhead and having to spend more time doing these other tools,
Speaker:well then all.
Speaker:So you've, you've been somewhat diligent.
Speaker:You've, you're, you're using your computer responsibly and you, you've
Speaker:figured out how to use what you paid for, uh, to do, you know, what,
Speaker:what you can with what you have.
Speaker:Mm-Hmm.
Speaker:Then it all comes down to just be being aware and, and you know that that email
Speaker:but, you know, kind of at the end of the day, and, and maybe getting
Speaker:back to your, your original question with, well, how do, how does the
Speaker:average person protect themself?
Speaker:It starts with just being diligent.
Speaker:Just take a minute and, and think through the, you know, rationale of whatever
Speaker:it is that you're, you were gonna do.
Speaker:Click on something, open something, download something, go to a website,
Speaker:scan a QR code with your phone.
Speaker:Um.
Speaker:These are all things that you maybe just, just take a minute
Speaker:and, and really think through.
Speaker:Do I need to do that?
Speaker:Was I expecting that?
Speaker:Could there be something, you know, malicious or, or, uh,
Speaker:wrong with whatever this is?
Speaker:And it never hurts to phone a friend.
Speaker:Um.
Speaker:And, and, you know, making friends is important in this, in, in cyber.
Speaker:'cause you know, as, as a individ, as an individual, you, you're
Speaker:probably not gonna be exposed to or experience a lot of things.
Speaker:Um, and then the more people you talk to about what you see and and your questions,
Speaker:the more likely you're gonna get somebody that's probably already made that mistake
Speaker:and can help you not make it yourself.
Speaker:Yeah.
Speaker:And Mike, just on that last point, I think it's a great thing, and I
Speaker:know we did an entire discussion about like cyber insurance,
Speaker:right?
Speaker:And how they're like a trusted advisor.
Speaker:You should talk to them because I'm sure they could give you good advice on sort
Speaker:of how to shore up your defenses and be able to detect and protect yourself
Speaker:against ransomware and other malware.
Speaker:And there's a couple of, a couple of real quick, uh, like things to consider
Speaker:if, if you think you've got ransomware or malware, just turn your computer off.
Speaker:Power it off, take the battery out, unplug it.
Speaker:'cause that, that stuff needs power to do its job.
Speaker:And if, if you really think, you know, I've got my critical, my
Speaker:whole life is on this computer and I think I have malware, shut it off.
Speaker:Unplug it.
Speaker:Take the battery out and find somebody that can help you get your data
Speaker:off of it and make sure it's clean.
Speaker:Um, and that way at least you've got a backup.
Speaker:Backups are, are critical with ransomware.
Speaker:Um, but yeah, don't.
Speaker:Don't just sit there.
Speaker:It's kind of like, you know, especially guys, and I'm, I'm definitely guilty.
Speaker:I'm a little hardheaded when it comes to illness and health.
Speaker:If you've got symptoms, call the doctor.
Speaker:Right.
Speaker:Don't, don't sit there and go, oh, I'll give it.
Speaker:I'll give it another day.
Speaker:Or maybe I just need a nap.
Speaker:Yeah.
Speaker:Yeah, I, um.
Speaker:Which brings up, and, and this is a giant tee up, and, uh, but you know, it would
Speaker:seem to me that this is too important for you to try to figure it out yourself.
Speaker:Like if you, if you're not a cybersecurity specialist, if you, if you, if
Speaker:you're not living your life, this thing, it's kinda like backup, right?
Speaker:Where it's like, it's way more difficult than you think it is.
Speaker:Right.
Speaker:Um, and that, and that's why MSPs exist, right?
Speaker:And so it would seem to me that I. Rather than try to figure out which of
Speaker:10 different, you know, I mean, somebody showed me a, um, it was like the, it was
Speaker:like the, one of those things where they have just company logos and it was like
Speaker:the cybersecurity landscape and there were like just hundreds of these logos up there
Speaker:of products and services that I could buy.
Speaker:And, and it would seem to me that what I need, I need two things.
Speaker:I need.
Speaker:Tools that work, right, that, that, that do the things that I need.
Speaker:And more importantly, I need somebody that knows how to use those tools.
Speaker:'cause it doesn't do any good if I buy this great.
Speaker:You know, uh, detection tool to find, you know, what's going on and, but I
Speaker:don't know how to configure it so that it works and I don't know what to do.
Speaker:And of course, one of the most common things is that I configured it such
Speaker:a way that I get a whole bunch of false positives and then very quickly
Speaker:it, it just ends up becoming ignored.
Speaker:Right.
Speaker:So I, I think that's where the, where the MSSP and obviously I'm, I'm, I'm
Speaker:teeing it up for you, but I, I. I don't know what else, what else would
Speaker:be right for, for a small organization or even a medium sized organization
Speaker:that has never done this before.
Speaker:No, I appreciate that.
Speaker:Uh, and, and you're right.
Speaker:Um, going back to kind of the initial comments of, uh, you know, just good
Speaker:visibility if you wanna do it yourself, make sure you have the fundamentals.
Speaker:Good anti vi, anti malware.
Speaker:Um, that gives you consolidated, a consolidated view of all your assets.
Speaker:You know, you don't have to go to every computer and see if there's an infection.
Speaker:It needs to report up to a, a console that you can log into and, and get real
Speaker:updates and know where the problems are.
Speaker:Um, the, the other, the other gap, I mean, you, you managed, I mean, you
Speaker:mentioned needing someone that knows the technology and you know, an expert.
Speaker:To expand on that, it needs to be someone that's available 24 hours a day.
Speaker:'cause bad guys aren't gonna go, oh, you know, they're probably still
Speaker:at work working on the computer now is a good time to attack them.
Speaker:No, it's, it's when you're asleep and you're in middle of the
Speaker:night, uh, you know, Thur Thursday morning or Thursday after midnight
Speaker:is when they're gonna hit you.
Speaker:And, and because they also know that you're not gonna wanna,
Speaker:uh, be at work over the weekend.
Speaker:So they, for whatever reason, all right, they're, they're not gonna make it.
Speaker:Uh, uh, easy for you.
Speaker:Uh, and, and in a lot of cases, that's also because they're, they're
Speaker:overseas in a different time zone anyway, so the fundamentals are good.
Speaker:Endpoint protection, the, uh, good visibility across your environment.
Speaker:Um, good firewall, uh, cloud, uh, office 365, Google AWS, whatever
Speaker:you got, whatever's being used.
Speaker:Um.
Speaker:And then someone that, that you can call or someone that is looking
Speaker:at your stuff 24 hours a day.
Speaker:And there are some service providers where, you know, maybe you do have a
Speaker:staff during the day, uh, and so you just need nights and weekends and holidays.
Speaker:And so there are some providers like us that, that are flexible
Speaker:in that, in that regard.
Speaker:So that does help with, uh, cost and the economics.
Speaker:Um.
Speaker:But at the end of the day, absolutely, um, make friends with some experts,
Speaker:uh, that you can call for nothing else.
Speaker:Uh, if nothing else, just to ask questions.
Speaker:But ideally, uh, someone that can help you identify the right
Speaker:solutions, uh, to give you the right visibility and the right coverage.
Speaker:Uh, and again, I it's gotta be 24 hours a day.
Speaker:Yeah, so Mike, most of these organizations, right, they
Speaker:don't have unlimited budget.
Speaker:Right.
Speaker:Cost is always a concern in terms of priority.
Speaker:Right.
Speaker:I know you talked about endpoint, you talked about XDR,
Speaker:you talked about sim, right?
Speaker:You talked about all these things.
Speaker:If they're looking for sort of what is the first thing that they should
Speaker:go after and try to protect or detect ransomware on or malware on, what
Speaker:is, what is sort of like the most important thing in their environment
Speaker:that they should be concerned with?
Speaker:It depends.
Speaker:So you've really got back to understanding yourself before you
Speaker:can understand your, your enemy.
Speaker:'cause your enemy's gonna probably know you better than you.
Speaker:You do.
Speaker:In order to be successful, uh, you've really gotta understand your business.
Speaker:And so again, if your business is, uh, highly driven by your workforce and your
Speaker:workforce is out, you know, on the, on the, you know, they're road warriors or
Speaker:they're working from home, absolutely.
Speaker:Endpoint protection is a priority because they're prob, they
Speaker:probably have company data on that.
Speaker:Device or they're using that device to log into, you know, VPN or, or your cloud.
Speaker:And so if that device is compromised, then your, your
Speaker:production network, your production environment may be compromised also.
Speaker:But what if, what if you're, you're a data center and you don't have, all
Speaker:your endpoints are servers, right?
Speaker:Uh, and then so, but then there also.
Speaker:Co, uh, co-managed, they're, they're not yours.
Speaker:You, you own the hardware, but you don't own the, the, the, the virtual
Speaker:machines or, or, or what have you.
Speaker:So now your, your focus is your perimeter
Speaker:and your connectivity.
Speaker:Uh, so I think those are two extreme, you know, one, one end of the other.
Speaker:Uh, but truly understand your environment first, uh, and where you're.
Speaker:Your critical assets are, and your data and your use cases, uh, and what's
Speaker:most likely impacting your business.
Speaker:Uh, and then from that, uh, derive your priorities.
Speaker:And,
Speaker:Hmm
Speaker:and there are some, there are some organizations that fit smack dab
Speaker:in the middle, and you just have to have good hygiene across all of it.
Speaker:There's a lot of organizations that aren't real familiar, uh, or
Speaker:real accurate with all the things they need to protect anyway.
Speaker:Similar to backups.
Speaker:You know, I can, yeah, I can run back up.
Speaker:But I can only back up what I know about, uh, and ideally even, even more
Speaker:so to the next level, how important, how do I prioritize those backups?
Speaker:Security is the same.
Speaker:Uh, I can only secure what I know.
Speaker:And if, if there's stuff on the network and there's stuff in the cloud and
Speaker:there's people working from home that I don't know, then I can't protect that.
Speaker:And if I am gonna protect it, how do I protect it?
Speaker:You know that, that visibility part.
Speaker:How do I get the data from those things, those tools?
Speaker:To know if there's a problem and how to respond to it.
Speaker:Is it automated?
Speaker:Is it a person?
Speaker:Um, and then all of that is going to kind of bubble up to what are my options and
Speaker:what does it cost and what do I need?
Speaker:Is that, is that something I can do on my own?
Speaker:Is that, uh, opportunity to bring in a managed service provider?
Speaker:Um, and I think real quick on, on, on the, the cost, I think
Speaker:there's a big misconception that.
Speaker:Yeah, I'm a small company.
Speaker:I can't afford cybersecurity.
Speaker:Uh, that is a huge misconception.
Speaker:There are, there are a number of providers out there like us that, that
Speaker:are flexible and scalable and I mean, our, our smallest we have, we have
Speaker:clients that just have two employees and they work out of their garage.
Speaker:But they are, they've determined, uh, from an analysis of themselves that
Speaker:they, they are, they have a huge cyber risk and they need that protection.
Speaker:And so, uh, it, it can be affordable, um, if we know what we're protecting and,
Speaker:and what the, what the playbooks are.
Speaker:Well, hey Mike, it's been great talking to you again.
Speaker:And Prasanna, thanks for, thanks for, uh, being here as, as always.
Speaker:This was fun.
Speaker:And Mike, it's been great chatting.
Speaker:It's been a while.
Speaker:So glad to have you back on.
Speaker:For sure I missed you.
Speaker:Yeah.
Speaker:And, uh, thanks to the, uh, our listeners, uh, we'd be nothing without you.
Speaker:That is a wrap.
Speaker:The backup wrap up is written, recorded and produced by me w Curtis Preston.
Speaker:If you need backup or Dr. Consulting content generation or expert witness
Speaker:work, check out backup central.com.
Speaker:You can also find links from my O'Reilly Books on the same website.
Speaker:Remember, this is an independent podcast and any opinions that you
Speaker:hear are those of the speaker.
Speaker:And not necessarily an employer.
Speaker:Thanks for listening.