Aug. 11, 2025

Social Engineering Attacks: Lessons from Mr. Robot Episode 3

Social Engineering Attacks: Lessons from Mr. Robot Episode 3

Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social engineering to impersonate employees and reset passwords. We break down the hospital hacking scene, revealing how underfunded IT departments create vulnerabilities that social engineering attacks exploit. The episode also covers email security, backup system risks, and the Sony hack parallels shown in the series. Learn how to protect your organization from social engineering by understanding what information to keep private, how to properly fund cybersecurity, and why your backup systems need protection from social engineering tactics.

Speaker:

you found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we look at social engineering tactics in our analysis

Speaker:

of the Mr. Robot Series persona, and I will break down how one character

Speaker:

uses Instagram stalking, personal information gathering, and even

Speaker:

sleeping with somebody to compromise their phone and steal sensitive emails.

Speaker:

We also talk about, uh, how cybersecurity budgets, low ones, like the $7,000 budget

Speaker:

they talk about in the show, create vulnerabilities that hackers will exploit.

Speaker:

We look at how social engineering attacks work, what you can do to

Speaker:

protect yourself and your organization.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery for over 30 years.

Speaker:

Ever since.

Speaker:

I had to tell my boss that there were no backups of that database we just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated backup admins into cyber recovery heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the show.

Speaker:

Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy who

Speaker:

is also celebrating the return of the Tesla Prasanna Malaiyandi How's it going?

Speaker:

Prasanna,

Speaker:

I was like, what am I celebrating?

Speaker:

It's, I'm

Speaker:

return of the Tesla, it's all back.

Speaker:

you got it back and then you had to put it back and then you got it back again.

Speaker:

I did, I had to put it back.

Speaker:

Or give

Speaker:

uh.

Speaker:

say.

Speaker:

Yeah, the, the hood, the hood was slightly misaligned and then, and

Speaker:

then, and there was some, some clear, clear coat over spray on a

Speaker:

completely different part of the car.

Speaker:

So like, it was, I guess the wind or something took some that was, that was

Speaker:

not, I wasn't very happy about that.

Speaker:

I,

Speaker:

be spraying outdoors just saying.

Speaker:

So today we're gonna

Speaker:

Yeah,

Speaker:

series on Mr. Robot,

Speaker:

Mr. Robots.

Speaker:

and we are today on.

Speaker:

Episode three, which is

Speaker:

1.2.

Speaker:

1.2, according to their naming, labeled debug M kv.

Speaker:

Yeah.

Speaker:

me about the numbering, but it all gets confusing, so

Speaker:

it all starts at zero.

Speaker:

Yeah.

Speaker:

So normal people call it episode three.

Speaker:

Uh, that's why I'm saying episode 1.2.

Speaker:

He wakes up in hospital after being dumped off the pier, uh, from Mr. Robot.

Speaker:

And, uh, you know, he's obviously, uh, uh, upset.

Speaker:

Angela shows up with his psychiatrist,

Speaker:

Right, right.

Speaker:

is like, I'm not gonna let you go because you're the one who called

Speaker:

me and said, come, come, come.

Speaker:

Yeah.

Speaker:

And she's like, are you using, I need you to get a drug test every

Speaker:

two weeks or whatever it is to make sure you're not still using,

Speaker:

Yeah.

Speaker:

gonna sign you out.

Speaker:

Yeah.

Speaker:

And he agrees to do that.

Speaker:

But by drug test, what he means is I'm gonna hack the hospital and

Speaker:

And,

Speaker:

Yeah,

Speaker:

how he has like, he tells someone, and then you have like the inner voice Go on.

Speaker:

yeah, yeah, yeah.

Speaker:

And he is like, this is the whole reason I chose this hospital.

Speaker:

Right.

Speaker:

Because there's a guy that, um.

Speaker:

You know, the IT guy, he says, I, I heard $7,000 a year, but I think it was seven.

Speaker:

I think you're right.

Speaker:

It's $70,000 a year.

Speaker:

Um, and he, and he, he's not that impressed with the guy's skills.

Speaker:

And,

Speaker:

Um, or the budget, I guess he said.

Speaker:

95, I

Speaker:

Yeah, yeah.

Speaker:

Something like that.

Speaker:

yeah.

Speaker:

And, um, so he, so he gets outta the hospital and, um, he tries

Speaker:

to go back to what he, normal and then he goes, he gets invited to,

Speaker:

uh, a dinner party with his boss.

Speaker:

Um, and he, he brings the girl that he kind of rescued from drugs or

Speaker:

sort of rescued Yeah, his neighbor, uh, as his girlfriend, although they

Speaker:

don't, they're not really girlfriend to boyfriend to this dinner party.

Speaker:

And he's at the dinner party?

Speaker:

What,

Speaker:

asked her two

Speaker:

what he, he, yeah, I guess.

Speaker:

I guess.

Speaker:

Yeah.

Speaker:

Um, and, um.

Speaker:

Really awkward seeing when they ask him how long he's been,

Speaker:

how long they've been together.

Speaker:

He goes, uh, today

Speaker:

Yeah.

Speaker:

and

Speaker:

did you see Angela just like pour the rest of the bottle

Speaker:

yeah.

Speaker:

Yeah.

Speaker:

She just, so clearly Angela has feelings for him as well, or maybe concern.

Speaker:

I don't know.

Speaker:

We, we just don't know.

Speaker:

But anyway, uh, and then you have the boss, which is Gideon.

Speaker:

And the bosses.

Speaker:

The bosses, he, he still wasn't sure.

Speaker:

Yeah.

Speaker:

About what happened.

Speaker:

So he looked into what happened, and he came up with a story as to

Speaker:

why he didn't tell 'em about the, the, you know, the, uh, that file.

Speaker:

And then he hugs him.

Speaker:

Um, and, but then the, the, the end of the episode is the episode.

Speaker:

There's this big email hack.

Speaker:

And the Terry Kolby is revealed to be behind and, and an Evil

Speaker:

Corp is behind revealed to be behind this big toxic waste spill.

Speaker:

Toxic waste, toxic waste spill,

Speaker:

Yep.

Speaker:

um, that ultimately resulted in the deaths of his dad and her mom.

Speaker:

Um.

Speaker:

That's actually when they finally say that's how the two of them met.

Speaker:

Because the

Speaker:

Right.

Speaker:

how do these two know each other?

Speaker:

Why are they, yeah.

Speaker:

Why are they so close?

Speaker:

And, yeah.

Speaker:

Yeah.

Speaker:

I think you're also missing one part.

Speaker:

What part am I missing?

Speaker:

happened in the this episode.

Speaker:

Right?

Speaker:

Because didn't Terrell find out information, right?

Speaker:

yeah.

Speaker:

Terrell, t. T, Terrell, Ty, Tyrell, I think it's Tyrell, right.

Speaker:

Finds out that he's not going to be the CTO, right?

Speaker:

Is that what you're talking about?

Speaker:

And he basically, so I think that's an important part, right?

Speaker:

Because as he's waiting, right, so he's supposed to have a meeting with the CEO.

Speaker:

Yeah.

Speaker:

And as he's like all pumped and ready to go, he goes into the

Speaker:

CEO's like waiting area and the CEO comes out and says, I'm busy.

Speaker:

I

Speaker:

I.

Speaker:

we have a good candidate for the CTO.

Speaker:

And you just look at his face just like

Speaker:

Yeah.

Speaker:

all dejected.

Speaker:

Now as you leave, I

Speaker:

And,

Speaker:

if you notice this, but he like to the assistant

Speaker:

and he tells him to send the email to him directly.

Speaker:

an email to him directly

Speaker:

Why is it, why is that relevant?

Speaker:

later in the episode.

Speaker:

Because he got the email, he got the name of the person and

Speaker:

then he starts looking him up.

Speaker:

He tracked him on Instagram.

Speaker:

He figured out where he was going to be.

Speaker:

He showed up at the club and the dude's like, Hey, I didn't know you're into this.

Speaker:

He's like, I'm not, I'm here just for you.

Speaker:

ends up taking the guy home, right,

Speaker:

So he sleeps with the guy to get, to get access to his phone, and

Speaker:

it does appear that he's straight,

Speaker:

Yep.

Speaker:

we, we don't have any other evidence that he's not, and he sleeps with a guy to get

Speaker:

access to his phone, which I'm gonna say.

Speaker:

Is commitment,

Speaker:

Yeah.

Speaker:

Well, and he

Speaker:

right?

Speaker:

wife, right?

Speaker:

He's like, I have business to go take

Speaker:

Yeah, yeah.

Speaker:

Yeah.

Speaker:

He lies, lies to his wife.

Speaker:

He had business, he had business.

Speaker:

All right.

Speaker:

Uh, so yeah.

Speaker:

So I'm gonna, you know, I'll, I'll applaud him for his level of commitment

Speaker:

and then, what he does is when the guy's out of the room, he basically steals

Speaker:

the guy's phone, and then from there he basically installs a root kit on it.

Speaker:

He makes it such that the phone can be remotely accessed and he later on uses

Speaker:

that to be able to read all the emails.

Speaker:

And this is the one thing I was surprised about right, is.

Speaker:

Hopefully today most people have either biometrics or pins or something on

Speaker:

their phones, so then when they are not available or around that, someone

Speaker:

Yeah.

Speaker:

open up their phone and start using it.

Speaker:

Right.

Speaker:

Well, he literally opens up his phone, right?

Speaker:

opens up the back of his phone.

Speaker:

Yes.

Speaker:

Yeah.

Speaker:

I'm gonna say number one.

Speaker:

I'm gonna say that's an Android phone, not an iPhone.

Speaker:

You're not opening up iPhones like that,

Speaker:

Yeah.

Speaker:

and you're not opening up most Android phones like that either.

Speaker:

That's a cheap Android phone.

Speaker:

To be able to do that.

Speaker:

Um, he could have just swapped the SIM card, but that wouldn't

Speaker:

have been as cool, I suppose.

Speaker:

Right.

Speaker:

Uh, you're also not swapping the sim card in a, in an iPhone easily, right?

Speaker:

and most of 'em don't even have sim cards.

Speaker:

Well, they, I think they have 'em, but they're internal, right?

Speaker:

most

Speaker:

No.

Speaker:

They're all eims now.

Speaker:

Yep.

Speaker:

Oh, okay.

Speaker:

All right.

Speaker:

What do I know?

Speaker:

And this is where he finds out, okay, who is in the running for the CTO?

Speaker:

He finds out it's this woman's husband who is in the office with the CEO earlier.

Speaker:

Right?

Speaker:

And you could kind of see like the wheels turning in his head.

Speaker:

And then later at the very end of the episode, right.

Speaker:

His wife is like, we need to make sure that we sort of

Speaker:

invite them over to dinner.

Speaker:

Right.

Speaker:

And you could already see like the wheels turning between the two of 'em.

Speaker:

Right?

Speaker:

In

Speaker:

Yeah.

Speaker:

where they're like, yes, we have to figure out how to sabotage this so that

Speaker:

other guy doesn't get the CTO role.

Speaker:

And you do.

Speaker:

Yeah, so, you know, when we think about that again, once again, especially if.

Speaker:

If you're in a sensitive role, caution the level of personal

Speaker:

information that you put out there.

Speaker:

This is where I'm going to dinner.

Speaker:

Yep.

Speaker:

is where I'm going out.

Speaker:

Um, these are the kind of places that I like to go.

Speaker:

Um, here's a, here's a picture of me that if you download, you're

Speaker:

gonna get all kinds of metadata.

Speaker:

It'll tell you exactly where this is.

Speaker:

Right.

Speaker:

The two generations following me, um, I think you're, you're

Speaker:

in the other generation, right?

Speaker:

You're, yeah.

Speaker:

Um, the two generations following me are much more.

Speaker:

You know, used to putting that kind of information out quite

Speaker:

a bit, like all day long.

Speaker:

Like, here's what I had for breakfast and here's the club that I'm at,

Speaker:

and whoa, look at here are the seven different pictures of the seven

Speaker:

different clubs I went to and win.

Speaker:

Yeah,

Speaker:

Um, and just realize that that can be, uh, used against you.

Speaker:

And it's not even just like.

Speaker:

He was important.

Speaker:

It's the fact that he was working in an important role where he was managing the

Speaker:

CEO's calendar and other things like that.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Let's go back to the beginning of the episode and talk about that hospital.

Speaker:

I think it's interesting that he chose a hospital.

Speaker:

I mean, he says, I chose this hospital because of its lack of

Speaker:

cybersecurity because he, he knew, he knew sort of what was gonna happen.

Speaker:

He knew that, that he was gonna get busted for the morphine

Speaker:

and the, and the, and that

Speaker:

matter

Speaker:

at some point, and, uh, that he, he knew that based on.

Speaker:

What he knew about the the guy that, that runs the thing.

Speaker:

And that's, I mean, that's it.

Speaker:

When you look at somebody who's an actual hacker, right?

Speaker:

The level of information that they can get about you, especially once they

Speaker:

started doing reconnaissance, right?

Speaker:

He's good at sort of, you know, poking in and figuring stuff out and, and, and

Speaker:

he definitely got enough information on this guy to know that he would be able

Speaker:

to easily get in and change the, the hospital records to make it look like

Speaker:

he was clean when clearly he was not.

Speaker:

You know what though?

Speaker:

That's, that's like very thoughtful,

Speaker:

Yeah, he's a super smart dude.

Speaker:

You know, he's a super smart dude.

Speaker:

He's troubled, he's clearly addicted to drugs.

Speaker:

Um, and, um, yeah, but, but he, but he's super smart, right?

Speaker:

I, I'd, I'd call him a high functioning, a high functioning drug addict.

Speaker:

but some parts of me thinks like he kind of like starts going

Speaker:

along like the white hat line.

Speaker:

Right.

Speaker:

Yeah, yeah,

Speaker:

Right.

Speaker:

Where he's

Speaker:

yeah,

Speaker:

for ethical reasons.

Speaker:

yeah.

Speaker:

Not the hacking of the,

Speaker:

Yeah.

Speaker:

not the hacking of the hospital, but, yeah.

Speaker:

But yeah, so the, the, just the topic to discuss there is just think

Speaker:

about the people that work for you, and if these people are responsible

Speaker:

for cybersecurity in any way.

Speaker:

Uh, you should think twice about underpaying them.

Speaker:

Just a thought, right?

Speaker:

and then I think the other thing they also mentioned is the guy had no budget.

Speaker:

Hmm.

Speaker:

like, I think it was like $10,000 a year to spend on it.

Speaker:

Security.

Speaker:

Maybe that's the number that I was hearing.

Speaker:

$7,000 a year is the number that I heard.

Speaker:

Maybe that's the number I was hearing

Speaker:

and so

Speaker:

yeah.

Speaker:

especially a hospital or anything of value that you put the same budget towards

Speaker:

things like security, data protection, resiliency, that you are for other aspects

Speaker:

Yeah, I remember when I go all the way back to, um, you know, my first

Speaker:

job with backups, and this was abs

Speaker:

back in the day.

Speaker:

Um, I remember how much money we would spend for the new sexy server, right?

Speaker:

We bought, um, there was.

Speaker:

I, I think it was called a T 500.

Speaker:

It was an HP HPUX server.

Speaker:

It was a T 500, and this thing was, um, huge.

Speaker:

It was a hundred gigabytes.

Speaker:

It was huge.

Speaker:

Um, now, like I have this,

Speaker:

Yeah.

Speaker:

this, this is a x, you know.

Speaker:

card

Speaker:

Yeah.

Speaker:

An XSD card, micro SD card, and it's 256.

Speaker:

Um, but yeah, it was a hundred gigabytes.

Speaker:

And what I remember was there was zero discussion about backup

Speaker:

infrastructure for this thing.

Speaker:

And we were using DDS drives, which were two gigabytes, uh oh.

Speaker:

I think it had a DDS two, which meant it was four gigabytes.

Speaker:

And I was like, so I'm gonna have to swap tapes 25 times.

Speaker:

I remember having that discussion and that was how we, that was how luckily we

Speaker:

bought our, our first, um, tape library.

Speaker:

But, uh, yeah, it, it, it's very common for things that aren't directly

Speaker:

related to revenue, like cybersecurity and data protection to how to be,

Speaker:

you know, budgeted down the, and it's your job as a cybersecurity or a

Speaker:

backup professional disaster recovery.

Speaker:

It is your job to.

Speaker:

Bring that stuff out into the forefront.

Speaker:

so I remember this was a while ago that in it, there was a study done,

Speaker:

I think they said people spend one to 2% of their IT budget data protection.

Speaker:

Yeah, that sounds about right.

Speaker:

and this was a while ago, but I think though if you now throw in security,

Speaker:

cybersecurity and just given everything that's happening in the world these days,

Speaker:

Yeah.

Speaker:

think, I hope that that number has shifted upwards.

Speaker:

Uh, yeah, I think it has, but, but maybe not enough.

Speaker:

You know, it depend, it depends on the company.

Speaker:

It just, it, I, I've been at companies where like, I can remember a, a

Speaker:

meeting where we were discussing the fact that this company didn't have a

Speaker:

DR plan, and this was a big company.

Speaker:

This was a company that you would absolutely know the name of.

Speaker:

Okay.

Speaker:

And.

Speaker:

Uh, the, the comment was made by a senior manager.

Speaker:

Well, like, 'cause it was like, well what happens if a big earthquake comes?

Speaker:

'cause this was a Southern California company.

Speaker:

What happens if the big earthquake comes?

Speaker:

Well, if that happens, if an earthquake that big happens,

Speaker:

I'm probably gonna be dead.

Speaker:

I won't care.

Speaker:

Right.

Speaker:

You know, if you, if you have somebody who's like, who's convinced that like.

Speaker:

Raid is backup, or we don't need backup or whatever, you know, maybe

Speaker:

it's time to wash your hands and walk away right at, at a minimum it's time

Speaker:

to very much, very loudly in writing.

Speaker:

This is what I think we should be doing and, and what we're

Speaker:

currently doing is, is beyond ill advised, you need to do that right.

Speaker:

To make your case.

Speaker:

And if they ignore you, then maybe it's time to, it's time to move on.

Speaker:

Right.

Speaker:

Yeah.

Speaker:

Um, so all right, so then let's talk about.

Speaker:

The

Speaker:

Email, right?

Speaker:

So this huge, uh, f society, which by the way, I'm basically

Speaker:

likening, I I, I hadn't mentioned this in the previous two episodes.

Speaker:

I'm basically likening them to anonymous, right?

Speaker:

Anonymous uses, um, a um, Guy Faulkes mask.

Speaker:

This guy uses this weird looking mask.

Speaker:

what.

Speaker:

What,

Speaker:

Even around anymore, I think they got shut down

Speaker:

uh, I don't know.

Speaker:

or, or they got

Speaker:

I think I haven't, I haven't heard much about him yet.

Speaker:

So I think when Mr. Robot was made, whichever, what was

Speaker:

like six, seven years ago?

Speaker:

Six years

Speaker:

Mm-hmm.

Speaker:

Mm-hmm.

Speaker:

time anonymous was very prevalent,

Speaker:

Right, right,

Speaker:

think since then they've either been shut down or rebranded

Speaker:

to one of the other groups.

Speaker:

Right.

Speaker:

Whatever it is.

Speaker:

And that's why you may not know about it as much,

Speaker:

, I haven't seen any videos of anyone like.

Speaker:

Yeah.

Speaker:

Posting videos of like the stuff that, that they were doing there.

Speaker:

But what we have is they, we have this email hack, which,

Speaker:

and an email dump, right?

Speaker:

We have an email dump of really embarrassing corporate emails that, that,

Speaker:

you know, prove essentially that you know, that they did some really bad stuff.

Speaker:

do.

Speaker:

As I was watching this episode, I remember thinking back, I don't know

Speaker:

if you remember Curtis, the Sony hack,

Speaker:

Oh, yeah.

Speaker:

Sony had their emails compromised and published, and there was some

Speaker:

embarrassing information that executives

Speaker:

Yeah, they were trash talking talent.

Speaker:

Channing Tatum was somebody that, that I was just, I was just looking at it.

Speaker:

Channing Tatum apparently got some, some emails about him read, you know?

Speaker:

Hmm.

Speaker:

Yeah,

Speaker:

I think that is kind of what they modeled this

Speaker:

yeah, yeah.

Speaker:

And.

Speaker:

but so

Speaker:

And similar to that, basically this was just released.

Speaker:

It was like, you know, and so, you know, you wonder wh why, what

Speaker:

was the, um, why did Mr. Robot essentially release this email?

Speaker:

Yep.

Speaker:

And I'd say it was obviously to completely discredit Terry Colby,

Speaker:

Yeah.

Speaker:

The previous CTO, um, and to just to continue to muck up the waters right.

Speaker:

Well, I, I think it was also because until this point, Elliot's

Speaker:

kind of on the fence, right?

Speaker:

He's like, I want nothing to do with you.

Speaker:

I'm stepping away from you guys.

Speaker:

Right?

Speaker:

And this is kind of like.

Speaker:

The nail in the coffin for Elliot, right?

Speaker:

Where he's like, screw this.

Speaker:

Let's go guns a blazing and go after these guys.

Speaker:

Because until that

Speaker:

Yeah.

Speaker:

he was like,

Speaker:

Oh

Speaker:

think so.

Speaker:

yeah.

Speaker:

Okay.

Speaker:

So you're, I see what you're saying.

Speaker:

This, this was, he wanted Elliot, um, you know, to, to do the thing.

Speaker:

And, um, he, he and he, and he, he wants, he wants him to do it willingly.

Speaker:

He wants him to come along and he does believe Elliot, as he says, multiply him.

Speaker:

El Elliot is the key to this whole thing.

Speaker:

The other thing too that I was wondering as I watched this episode

Speaker:

was, it's interesting how like Elliot and Allsafe and all the investigations

Speaker:

they did, they didn't notice all these emails being exfiltrated.

Speaker:

Well, so, so that's a, that's interesting.

Speaker:

So there is a, there is a possible reason for that.

Speaker:

And we, you know, I, I literally, so I'm, I'm currently, uh, editing my book, right?

Speaker:

So the, you know, the, we finished the rough draft and we're editing it,

Speaker:

and I was just, it's called learning ransomware response and recovery.

Speaker:

Thank you very much.

Speaker:

And I, I was just editing the part where just realized that the

Speaker:

backup system, not only is it.

Speaker:

Um, it's not an attack.

Speaker:

Like, it's not the, it's not just the thing that they want

Speaker:

to attack because they want to take it out of the mix, right?

Speaker:

They want to, they want to take it away from you as a tool to be

Speaker:

used after the ransomware attack.

Speaker:

It is also the, the kingdom, right, is the key.

Speaker:

I had an interesting, um, conversation with one of the, one of, one of the tech

Speaker:

editors and, and I was saying that if you had control of the backup system, that you

Speaker:

could restore an image of a vm and then you could do things like a brute force

Speaker:

attack against the password file without anybody noticing because you restored it

Speaker:

like outside the control of everybody.

Speaker:

And he's like, why would you do that?

Speaker:

And I, I was listening this as like additional reconnaissance

Speaker:

that you could do and he, um.

Speaker:

And he said, why would you do that?

Speaker:

And I said, well, to be able to hack that server.

Speaker:

He's like, why?

Speaker:

You have the server, you have the vm, right?

Speaker:

And I'm like, yeah, I guess you have the keys to the kingdom

Speaker:

if you've got the backups.

Speaker:

He goes, no, you have the kingdom.

Speaker:

Like he's like, you've got everything.

Speaker:

And so it's quite possible that one of the reasons that they didn't notice an

Speaker:

exfiltration is that the exfiltration was done via the backup system,

Speaker:

Hmm.

Speaker:

right?

Speaker:

Email backups.

Speaker:

I, I, it's a double-edged sword.

Speaker:

You should be backing up your emails.

Speaker:

You should be backing up Microsoft 365 or Gmail or whatever it is that you're using.

Speaker:

But the double-edged sword is if you're backing up your emails, um, then tho

Speaker:

those are a valuable tool for forensics.

Speaker:

So for E Discovery and things like that.

Speaker:

And in this case, you know, you could very easily restore, um, you know,

Speaker:

all these emails and then, you know, uh, find out what you're looking for.

Speaker:

Yeah,

Speaker:

Yeah.

Speaker:

is true.

Speaker:

Yeah.

Speaker:

And it is a possible thing.

Speaker:

It was just one thing that I just felt that they missed.

Speaker:

Right.

Speaker:

Just given how much

Speaker:

Oh, just talking about it.

Speaker:

Yeah.

Speaker:

Yeah, because that in general, you, you're right.

Speaker:

That, that they, what, who's they?

Speaker:

Is they the writers of the show or the or, or, uh, all safe.

Speaker:

All safe slash Elliot?

Speaker:

Okay.

Speaker:

Okay.

Speaker:

Yeah, yeah.

Speaker:

We'll, we'll, uh, we'll put this in the IMDB category of

Speaker:

mistakes made by characters.

Speaker:

Right?

Speaker:

I dunno if you've ever looked at the goofs.

Speaker:

No.

Speaker:

Um, I, I love, uh, looking at, I'm a big movie and TV fan, and I love looking

Speaker:

on, I mdb love looking at the goofs.

Speaker:

And, um, if you're, if you're an Uber nerd on a particular topic.

Speaker:

Like cybersecurity, um, you can go in and put this kind of stuff in there.

Speaker:

So, all right, so be careful about, so be careful what you put in email.

Speaker:

Be careful and be, make sure to protect the backups of your email, right?

Speaker:

We talk so much about the cybersecurity of, of, of the, the environment.

Speaker:

Make sure about the cybersecurity of your backups.

Speaker:

Make sure they're not easily, um

Speaker:

also the social engineering aspect.

Speaker:

mm.

Speaker:

Right.

Speaker:

I don't know if people are aware, but there's like this ransomware

Speaker:

group called Scattered Spider going around and popping a bunch of,

Speaker:

uh, I think banks and airlines and

Speaker:

Mm-hmm.

Speaker:

Mm-hmm.

Speaker:

one of their first ways of getting in is they pretend to be an employee

Speaker:

asking for their password to be reset.

Speaker:

Yeah.

Speaker:

No bueno.

Speaker:

Yes.

Speaker:

So be

Speaker:

Yeah.

Speaker:

you post out there about where you work, what you're doing,

Speaker:

and other things like that.

Speaker:

'cause that may be used against you.

Speaker:

Yeah.

Speaker:

That's why I tell people I work at Inn Out.

Speaker:

Oh,

Speaker:

I don't even, I don't even like inn out.

Speaker:

I, I mean, I mean, I don't hate it.

Speaker:

Okay.

Speaker:

I know that's like sacrilege here in California, but

Speaker:

No.

Speaker:

There's now an uproar.

Speaker:

I don't know if you've heard about this.

Speaker:

what

Speaker:

CEO moved to Tennessee.

Speaker:

Oh, really

Speaker:

Yeah.

Speaker:

She took the company and left.

Speaker:

interesting.

Speaker:

Interesting.

Speaker:

Um, yeah, we'll see.

Speaker:

But like my daughter, she, you know, the mo if she, whenever she leaves

Speaker:

California, the first thing she does literally on her way home from

Speaker:

the airport is getting in and out.

Speaker:

I'm like, I don't get it.

Speaker:

she get a four by four fries and a shake?

Speaker:

Uh, no, I don't think so.

Speaker:

I don't think so.

Speaker:

Me, I'm a five guys person, but you know, that's just me.

Speaker:

All right.

Speaker:

Well, another fun episode.

Speaker:

Look forward to episode four, aka 1.3 next week.

Speaker:

Yes, I am.

Speaker:

Then I will now have to go watch it before then, and uh, hopefully

Speaker:

you will not spoil it for me.

Speaker:

There's computers in it.

Speaker:

Curtis, why,

Speaker:

All right, well thanks.

Speaker:

Thanks, Prasanna.

Speaker:

It's been fun.

Speaker:

Likewise, Curtis.

Speaker:

And thanks to our listeners.

Speaker:

You are why we do this.

Speaker:

Hope you enjoyed the episode.

Speaker:

Hope you learned a thing or two.

Speaker:

That is a wrap.

Speaker:

The backup wrap up is written, recorded, and produced by me w Curtis Preston.

Speaker:

If you need backup or Dr. Consulting content generation or expert witness

Speaker:

work, check out backup central.com.

Speaker:

You can also find links from my O'Reilly Books on the same website.

Speaker:

Remember, this is an independent podcast and any opinions that

Speaker:

you hear are those of the speaker and not necessarily an employer.

Speaker:

Thanks for listening.