Check out our companion blog!

Videos

Sept. 8, 2025

Cybersecurity Situational Awareness: Mr. Robot Prison Break

Cybersecurity situational awareness fails spectacularly in Mr. Robot's prison break episode - learn what went wrong and how to prevent real attacks. Curtis Preston (Mr. Backup) and Prasanna break down the cybersecurity situational awareness failures that made Elliot's prison break possible. From USB stick social engineering to Bluetooth car hacking,…

View more
Sept. 1, 2025

How Honeypot Servers Catch Hackers: Mr. Robot Cybersecurity Analysis

Discover how honeypot servers can transform your cybersecurity strategy! This episode breaks down everything you need to know about implementing effective honeypots for threat detection. What exactly is a honeypot server? It's a deceptive system designed to look valuable to attackers but contains no real business data. The beauty lies…

View more
Aug. 25, 2025

Privilege Escalation Attacks Explained: Mr. Robot Cybersecurity

Privilege escalation attacks turn small security breaches into complete network compromises. Learn how hackers climb permission ladders to access critical systems. Cybersecurity expert Curtis Preston breaks down privilege escalation through real-world examples and Mr. Robot analysis. This video covers vertical attacks that exploit system vulnerabilities, horizontal attacks that spread through…

View more
Aug. 18, 2025

Physical Security Fails: Cybersecurity in the Workplace

Cybersecurity in the workplace fails when social engineering targets your employees. This Mr Robot breakdown shows exactly how attackers infiltrate secure facilities. Ever wonder how secure your workplace really is? In this episode, we dissect Mr. Robot's "Exploits" episode to reveal shocking cybersecurity vulnerabilities that exist in real workplaces today.…

View more
Aug. 11, 2025

Social Engineering Attacks: Mr. Robot Cybersecurity Lessons

Social engineering attacks are a big way hackers breach organizations today. Learn the tactics they use and how to stop them from Mr. Robot analysis. Ever wonder how hackers actually get into companies? It's not always through sophisticated technical exploits - most of the time, it's through social engineering. In…

View more
Aug. 4, 2025

Reconnaissance in Cyber Security: Mr. Robot's Evil Corp Attack

Reconnaissance in cyber security isn't random network scans - it's months of studying YOUR organization. We analyze Mr. Robot episode 2 to reveal how real --- I'm gonna tell you something that might keep you up at night: if a sophisticated threat actor wants to take down your company, they're…

View more
July 21, 2025

Insider Threat Prevention: Real Cases & Defense Strategies

Learn how to protect against insider threat attacks from cybersecurity expert Curtis Preston. Real cases from Coinbase, Apple & more. Discover the 3 types of insider threats & proven defense strategies. 83% of companies hit in 2024 - don't be next! 🔒 While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec…

View more
July 14, 2025

Mission Impossible Teaches REAL Cyber Security Lessons!

Discover real cyber security lessons hidden in Mission: Impossible! We analyze how Hollywood got AI threats, immutable backups, and air-gapped storage surprisingly right. Learn practical data protection strategies from Tom Cruise's latest adventure, including 3-2-1 backup rules and hash verification. While you're here, Here's some great episodes from this year:…

View more
June 30, 2025

Is your Backup Air Gapped?

Learn what air gap backup really means! Curtis Preston explains true vs virtual air gap, from original tape-based systems to modern immutable storage. Discover why most "air gapped" solutions aren't really air gapped and how to evaluate vendor claims. Critical for ransomware protection! 🔒 While you're here, Here's some other…

View more
June 23, 2025

Largest Data Breach in History: Protect Yourself

The largest data breach in history exposed 16B credentials! Security experts break down this massive infostealer attack, reveal dangerous browser habits, and share critical protection steps. Learn why this isn't one breach but many, how malware steals your data, and what to do NOW to stay safe. Essential viewing! While…

View more
June 16, 2025

How to make a snapshot backup

Learn snapshot backup fundamentals! Curtis Preston breaks down copy-on-write vs redirect-on-write, explains why AWS snapshots are different, and shows how to turn snapshots into real backups following 3-2-1 rule. Perfect for IT pros managing NetApp, VMware, or cloud storage systems. 🔒💾' While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s…

View more
June 9, 2025

Human error: The #2 reason we back up

Human error now causes more data loss than hardware failures. Join backup expert Curtis Preston as he shares real war stories of IT disasters caused by people, not machines. Learn about directory deletions, tape library incidents, and insider threats. Discover why your backup strategy must account for human mistakes to…

View more
June 2, 2025

How to Get Real ROI from Backup Infrastructure

Discover how to achieve real ROI from backups beyond disaster recovery! Curtis & Prasanna reveal proven strategies for extracting business value from backup data through test/dev, security monitoring & AI analytics. Transform backup costs into profits with these practical techniques. While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s https://www.youtube.com/watch?v=ov834MWoBXg&t=2s…

View more
May 19, 2025

We finally cover World Backup Day

World Backup Day falls on March 31st - the day before April Fool's Day because not backing up your data is no joke. In this episode, hosts W. Curtis Preston and Prasanna Malaiyandi discuss alarming statistics about data loss and why proper backup strategies are essential for business survival. The…

View more
May 5, 2025

Ransomware Targets VMware ESXi: Protect Your Infrastructure

Discover why ransomware targets VMware ESXi environments and how to protect your virtualization infrastructure. Security expert Melissa Palmer (@vmiss) explains how attackers compromise vCenter and ESXi hosts to quickly encrypt entire VM clusters. Learn essential security practices to safeguard your critical VMware environment from ransomware attacks. While you're here, Here's…

View more
April 28, 2025

Veeamon 2025

Mr. Backup breaks down the biggest VeeamOn announcements from the 2025 conference, including their game-changing Linux appliance, AI search integration, and enhanced security features. Essential viewing for backup admins looking to strengthen their ransomware defense strategy. While you're here, Here's some great episodes to check out: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s https://www.youtube.com/watch?v=ov834MWoBXg&t=2s This…

View more
April 21, 2025

Could DOGE & GSA Save $1M in tape?

DOGE and GSA claim saving $1M yearly by converting old tapes to digital records. Is this possible? Backup experts analyze nine-track tape tech, storage costs, and what 14,000 legacy tapes really mean. Plus: Curtis shares his epic mainframe emergency power button fail! While you're here, Here's some great episodes from…

View more
April 14, 2025

Tape Backup for SMBs?

Discover if tape backup for small business makes sense in 2025. We examine Mag Store's new Thunderbolt tape drive and calculate if the $6,000 investment pays off against cloud options. Perfect for content creators or SMBs concerned about ransomware and wanting true offline protection. While you're here, Here's some great…

View more
April 7, 2025

how Forever Incremental Backup changed the world

Discover how forever incremental backup transformed the industry by eliminating full backups. Curtis & Prasanna explain this technology that dramatically reduces storage costs, network traffic, and backup windows while improving restore times. Essential viewing for backup pros and IT admins. While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s https://www.youtube.com/watch?v=ov834MWoBXg&t=2s…

View more
March 31, 2025

The REAL Truth About Cloud vs Tape in 2025

Are you choosing between cloud vs tape for archiving? This debate tackles what cloud providers don't tell you - their cheapest tiers probably use tape! We break down cost (tape wins big), data integrity, access times, and the hidden costs of cloud. Perfect for anyone planning storage strategies beyond the…

View more
March 10, 2025

Is Tape Backup Dead? The Surprising Truth About Tape

Discover why tape backup isn't dead but thriving in cloud datacenters! W. Curtis Preston explains why hyperscalers love tape, how it's superior for ransomware protection, and why the "tape is slow" myth is backwards—it's actually TOO FAST for some backup systems. Learn the four reasons tape still dominates for cost,…

View more
March 3, 2025

Hide your backup disk!

Your backup disk is often the first target in a cyberattack. In this episode, W. Curtis Preston and Prasanna discuss why you shouldn't store backups in obvious locations and provide practical alternatives to keep your backup disk secure from threat actors. Learn why "D:\backups" is the worst place for your…

View more
Feb. 24, 2025

Your 4-Hour RTO is Fantasy®

Think you can recover in 4 hours? Think again. This episode exposes why your recovery time objective might be unrealistic. Learn what actually happens during disaster recovery, why most RTOs are fantasy, and how to set achievable recovery goals. Essential viewing for IT pros and backup admins. While you're here,…

View more
Feb. 17, 2025

Passwords or Passkeys for your backup system?

In this interesting episode about passwords vs passkeys, W. Curtis Preston and Prasanna Malaiyandi expose why traditional password protection isn't enough for your backup systems anymore. They break down the evolution from basic passwords to MFA, and explain why passkeys and FIDO compliance represent the next level in security. Learn…

View more