Check out our companion blog!

Episodes

Dec. 8, 2025

10 Must-Have Features of Any Backup System

Every backup system needs certain design elements to actually work when disaster strikes. In this episode of The Backup Wrap-up, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi break down the 10 non-negotiable componen...

Listen to the Episode
Dec. 1, 2025

The Death of the 3-2-1 Rule: Enter 3-2-1-1-0

The 3-2-1 rule is dead. Long live 3-2-1-1-0. For decades, the 3-2-1 rule has been the gold standard for backup strategies - three copies of your data, on two different media, with one copy somewhere else. But ransomware kille...

Listen to the Episode
Nov. 24, 2025

How to Set Realistic Recovery Point Objective (RPO) Goals

Want to know how much data you're really willing to lose? We're breaking down recovery point objective RPO - the agreement about how much data loss you can accept, measured in time. Most organizations have RPOs that are pure ...

Listen to the Episode
Nov. 17, 2025

Recovery Time Objective vs Reality: Closing the Gap

Most IT teams can't meet their recovery time objective—and they don't even know it. In this episode of The Backup Wrap-up, Curtis and Prasanna explain why your RTO is probably fantasy, who should actually be setting it (hint:...

Listen to the Episode
Nov. 10, 2025

Microsoft 365 backup is NOT an option - It's mandatory

Many organizations believe that Microsoft 365 backup is handled by Microsoft. That's a dangerous misconception. In this episode, W. Curtis Preston (Mr. Backup) and Microsoft 365 expert Vanessa Toves explain why you own your d...

Listen to the Episode
Oct. 27, 2025

Detect Ransomware Before It Destroys Your Business

Ransomware detection is more complex than most organizations realize. In this episode, cybersecurity expert Mike Saylor breaks down the real-world signs of ransomware attacks—from users complaining about slow computers to sma...

Listen to the Episode
Oct. 20, 2025

The ArcGIS Hack That Turned Backups Into a Malware Repository

This episode examines a sophisticated ArcGIS hack that remained undetected for 12 months. The threat group Flax Typhoon compromised an ArcGIS server by exploiting weak credentials and deploying a malicious Java extension that...

Listen to the Episode
Oct. 6, 2025

Deepfake Attacks: The Growing Threat to Enterprise Security

Deepfake attacks are exploding, and your company is probably not ready. In this episode of The Backup Wrap-up, we dive into how cybercriminals are using AI to clone voices and create fake videos to authorize fraudulent wire t...

Listen to the Episode
Sept. 29, 2025

Cyber Attack Notification - Final Lessons from Mr. Robot Season One

When cyber attack notification goes wrong, companies face a disaster worse than the original breach. This episode dives deep into the critical mistakes organizations make when communicating about security incidents - and why ...

Listen to the Episode
Sept. 22, 2025

Insider Threats and the Power of Least Privilege Access

Insider threats represent one of the most dangerous cybersecurity risks facing organizations today - and they're way more common than you think. In this episode of The Backup Wrap-up, we explore the three main types of inside...

Listen to the Episode
Sept. 15, 2025

Advanced Persistent Threats Explained Through Mr. Robot

Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended peri...

Listen to the Episode
Sept. 8, 2025

Cybersecurity Situational Awareness Lessons from Mr. Robot

This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hack...

Listen to the Episode
Sept. 1, 2025

Honeypot Server Best Practices - From Mr. Robot to Reality

Learn the ins and outs of honeypot server deployment and management in this episode of The Backup Wrap-up. We break down the cybersecurity concept using examples from Mr. Robot episodes 1.6 and 1.7, showing how these deceptiv...

Listen to the Episode
Aug. 25, 2025

Privilege Escalation Explained: Mr. Robot Cybersecurity Lessons

Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileg...

Listen to the Episode
Aug. 18, 2025

Mr Robot Lessons: Cybersecurity in the Workplace

This episode examines cybersecurity in the workplace through the lens of Mr. Robot's "Exploits" episode, where social engineering takes center stage. Curtis Preston and Prasanna break down how Elliot infiltrates Steel Mountai...

Listen to the Episode
Aug. 11, 2025

Social Engineering Attacks: Lessons from Mr. Robot Episode 3

Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, f...

Listen to the Episode
Aug. 4, 2025

Reconnaissance in Cyber Security: Lessons from Mr. Robot ep 1.1

Reconnaissance in cyber security isn't just about scanning networks; it's about understanding your entire attack surface, including the human element. In this episode, Curtis and Prasanna analyze Mr. Robot season one, episode...

Listen to the Episode
July 28, 2025

Social Engineering Lessons from Mr. Robot Episode 1

Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercrim...

Listen to the Episode
July 21, 2025

Insider Threat Prevention: Protecting Your Backups from Within

The insider threat represents one of the most dangerous and overlooked cybersecurity challenges facing organizations today. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna explore the three distinct type...

Listen to the Episode
July 14, 2025

Mission Impossible Movie Teaches Real Cyber Security Lessons

This episode explores surprising cyber security lessons hidden within Mission: Impossible's latest blockbuster. We analyze how Hollywood's depiction of AI threats, immutable backups, and air-gapped storage actually reflects r...

Listen to the Episode
July 7, 2025

The EU Cloud Exit - Backup Strategies for Digital Sovereignty

The EU cloud exit movement is reshaping how European organizations think about data storage and sovereignty. Companies across Europe are moving away from US-based cloud providers like Microsoft 365, AWS, and Google Workspace ...

Listen to the Episode
June 30, 2025

What Is an Air Gap Backup? Real Protection vs Marketing

Air gap has become one of the most overused and misunderstood terms in backup and recovery. In this episode, W. Curtis Preston and Prasanna explore what air gap really means, tracing its origins from the days when everyone us...

Listen to the Episode
June 23, 2025

Largest Data Breach in History: What You Need to Know

The largest data breach in recent memory has exposed 16 billion login credentials across multiple databases, and we're here to help you understand what it means for your security. This massive exposure involves data stolen pr...

Listen to the Episode
June 16, 2025

How do you make a snapshot backup?

This episode breaks down snapshot backup fundamentals, covering the key differences between traditional storage snapshots and cloud-based approaches. Curtis and Prasanna explain copy-on-write versus redirect-on-write methods,...

Listen to the Episode