Check out our companion blog!

Episodes

New Research Exposes Password Manager Vulnerabilities in LastPass, Bitwarden & Dashlane
March 9, 2026

New Research Exposes Password Manager Vulnerabilities in LastPass, Bi…

Password manager vulnerabilities aren't just about bad code — and a new research paper out of Zurich just proved it. Researchers analyzed three of the most popular password managers and found fundamental design flaws baked in...

Listen to the Episode
What Is an Initial Access Broker — and Why Should You Care?
March 2, 2026

What Is an Initial Access Broker — and Why Should You Care?

What is an initial access broker — and why does it matter to your organization? In this episode, W. Curtis Preston and Prasanna Malaiyandi are joined by Dr. Mike Saylor of Black Swan Cybersecurity to break down the role of th...

Listen to the Episode
Ransomware as a Service: How Anyone Can Buy a Cyberattack
Feb. 23, 2026

Ransomware as a Service: How Anyone Can Buy a Cyberattack

Ransomware as a service has turned cybercrime into a franchise business — and in this episode, Dr. Mike Saylor and I break down exactly how it works, who's buying, and why the buyer might end up as the patsy. If you thought r...

Listen to the Episode
The CryptoLocker Virus and the Birth of Modern Ransomware
Feb. 16, 2026

The CryptoLocker Virus and the Birth of Modern Ransomware

The cryptolocker virus was the attack that turned ransomware from a nuisance into a full-blown criminal industry — and in this episode of The Backup Wrap-up, we break down exactly how that happened. W. Curtis Preston (Mr. Bac...

Listen to the Episode
A Brief History of Ransomware
Feb. 9, 2026

A Brief History of Ransomware

A history of ransomware is more than just dates and names—it's the story of how criminals evolved from mailing infected floppy disks in 1989 to running billion-dollar enterprises that cripple entire organizations. On this epi...

Listen to the Episode
How Ransomware Works: The Five Objectives of Every Attack
Feb. 2, 2026

How Ransomware Works: The Five Objectives of Every Attack

Understanding how ransomware works is critical for anyone responsible for protecting their organization's data. In this episode of The Backup Wrap-up, we examine the five core objectives that drive nearly every ransomware att...

Listen to the Episode
Disk Backup Security - Disk Make Things Worse?
Jan. 26, 2026

Disk Backup Security - Disk Make Things Worse?

Disk backup security is the weak link that ransomware attackers exploit every day—and most backup admins don't even realize it. In this episode, Curtis and Prasanna examine how the move from tape to disk-based backups created...

Listen to the Episode
What Is Ransomware and Why Should You Care?
Jan. 19, 2026

What Is Ransomware and Why Should You Care?

What is ransomware, and why does it remain the number one threat to businesses of all sizes? In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi break down the fundamentals of ransomware attacks a...

Listen to the Episode
Backup TCO: The Costs Nobody Talks About
Jan. 12, 2026

Backup TCO: The Costs Nobody Talks About

What's your real backup TCO? Most organizations focus on software licenses, hardware, and cloud storage when budgeting for backup infrastructure. But those are just the visible costs. The true backup TCO includes something fa...

Listen to the Episode
Why Ransomware Attacks on Backups Should Terrify You
Jan. 5, 2026

Why Ransomware Attacks on Backups Should Terrify You

Ransomware attacks on backups have reached epidemic levels, with 96% of attacks now targeting backup infrastructure. In this episode of The Backup Wrap-up, Curtis Preston and Prasanna Malaiyandi break down the alarming statis...

Listen to the Episode
Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance
Dec. 22, 2025

Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber I…

Building a cyber security team isn't optional anymore; it's the difference between recovering from ransomware and going out of business. In this episode, Curtis and Prasanna explain why hardening your backup infrastructure is...

Listen to the Episode
Building an immutable backup system
Dec. 15, 2025

Building an immutable backup system

Want to know how to build an immutable backup system protected from ransomware attacks? In this episode, Curtis and Prasanna go beyond the basics to discuss four critical security features every modern backup system needs. B...

Listen to the Episode
10 Must-Have Features of Any Backup System
Dec. 8, 2025

10 Must-Have Features of Any Backup System

Every backup system needs certain design elements to actually work when disaster strikes. In this episode of The Backup Wrap-up, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi break down the 10 non-negotiable componen...

Listen to the Episode
The Death of the 3-2-1 Rule: Enter 3-2-1-1-0
Dec. 1, 2025

The Death of the 3-2-1 Rule: Enter 3-2-1-1-0

The 3-2-1 rule is dead. Long live 3-2-1-1-0. For decades, the 3-2-1 rule has been the gold standard for backup strategies - three copies of your data, on two different media, with one copy somewhere else. But ransomware kille...

Listen to the Episode
How to Set Realistic Recovery Point Objective (RPO) Goals
Nov. 24, 2025

How to Set Realistic Recovery Point Objective (RPO) Goals

Want to know how much data you're really willing to lose? We're breaking down recovery point objective RPO - the agreement about how much data loss you can accept, measured in time. Most organizations have RPOs that are pure ...

Listen to the Episode
Recovery Time Objective vs Reality: Closing the Gap
Nov. 17, 2025

Recovery Time Objective vs Reality: Closing the Gap

Most IT teams can't meet their recovery time objective—and they don't even know it. In this episode of The Backup Wrap-up, Curtis and Prasanna explain why your RTO is probably fantasy, who should actually be setting it (hint:...

Listen to the Episode
Microsoft 365 backup is NOT an option - It's mandatory
Nov. 10, 2025

Microsoft 365 backup is NOT an option - It's mandatory

Many organizations believe that Microsoft 365 backup is handled by Microsoft. That's a dangerous misconception. In this episode, W. Curtis Preston (Mr. Backup) and Microsoft 365 expert Vanessa Toves explain why you own your d...

Listen to the Episode
Detect Ransomware Before It Destroys Your Business
Oct. 27, 2025

Detect Ransomware Before It Destroys Your Business

Ransomware detection is more complex than most organizations realize. In this episode, cybersecurity expert Mike Saylor breaks down the real-world signs of ransomware attacks—from users complaining about slow computers to sma...

Listen to the Episode
The ArcGIS Hack That Turned Backups Into a Malware Repository
Oct. 20, 2025

The ArcGIS Hack That Turned Backups Into a Malware Repository

This episode examines a sophisticated ArcGIS hack that remained undetected for 12 months. The threat group Flax Typhoon compromised an ArcGIS server by exploiting weak credentials and deploying a malicious Java extension that...

Listen to the Episode
Deepfake Attacks: The Growing Threat to Enterprise Security
Oct. 6, 2025

Deepfake Attacks: The Growing Threat to Enterprise Security

Deepfake attacks are exploding, and your company is probably not ready. In this episode of The Backup Wrap-up, we dive into how cybercriminals are using AI to clone voices and create fake videos to authorize fraudulent wire t...

Listen to the Episode
Cyber Attack Notification - Final Lessons from Mr. Robot Season One
Sept. 29, 2025

Cyber Attack Notification - Final Lessons from Mr. Robot Season One

When cyber attack notification goes wrong, companies face a disaster worse than the original breach. This episode dives deep into the critical mistakes organizations make when communicating about security incidents - and why ...

Listen to the Episode
Insider Threats and the Power of Least Privilege Access
Sept. 22, 2025

Insider Threats and the Power of Least Privilege Access

Insider threats represent one of the most dangerous cybersecurity risks facing organizations today - and they're way more common than you think. In this episode of The Backup Wrap-up, we explore the three main types of inside...

Listen to the Episode
Advanced Persistent Threats Explained Through Mr. Robot
Sept. 15, 2025

Advanced Persistent Threats Explained Through Mr. Robot

Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended peri...

Listen to the Episode
Cybersecurity Situational Awareness Lessons from Mr. Robot
Sept. 8, 2025

Cybersecurity Situational Awareness Lessons from Mr. Robot

This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hack...

Listen to the Episode