Check out our companion blog!

Videos

Oct. 27, 2025

The Truth About Ransomware Detection

Ransomware detection requires the right tools and expertise—but where do you start? In this episode, cybersecurity expert Mike Saylor reveals what really works. Think your organization is safe from ransomware? Think again. The average small to medium-sized business faces constant threats from sophisticated attackers who know exactly how to slip…

View more
Oct. 20, 2025

ArcGIS Hack: 12 Months of Hidden Malware in Your Backups

An ArcGIS hack by Flax Typhoon went undetected for 12 months by hiding malware in legitimate extensions. We break down how it happened and how to prevent it. In this episode of The Backup Wrap-up, we dissect one of the most troubling security incidents of the year: a sophisticated ArcGIS…

View more
Oct. 6, 2025

Stop Deepfake Attacks – They're Worse Than You Think

Deepfake attacks are the fastest-growing threat to business security. Learn how to defend against AI-powered voice cloning and video fraud before your company loses millions. Nearly 50% of businesses have already been targeted by deepfake attacks, and the numbers are only getting worse. In this episode, Curtis and Prasanna break…

View more
Sept. 29, 2025

Cyber Attack Notification - Mr. Robot Season One Finale

Cyber attack notification can make or break your company's response to a security incident. Learn why transparency beats secrecy and how poor communication amplifies breach damage. In this episode of The Backup Wrap-Up, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi break down the critical cyber attack notification strategies every…

View more
Sept. 22, 2025

How Insider Threats Bypass Your Security (And How to Stop Them)

Insider threats are responsible for some of the most devastating data breaches - learn the 3 types you need to protect against and how immutable backups can save your company when traditional security fails. In this episode, we break down the insider threat problem using examples from Mr. Robot Season…

View more
Sept. 15, 2025

Adavanced persistent threat

While you're here, Here's some great episodes from this year: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s https://www.youtube.com/watch?v=ov834MWoBXg&t=2s This YouTube channel is also available as an audio podcast! https://www.backupwrapup.com We also have a blog that I've been running for over 20 years! https://www.backupcentral.com I've also written four O'Reilly books! My latest: https://www.amazon.com/Modern-Data-Protection-Recoverability-Workloads-ebook/dp/B093TQTBC3

View more
Sept. 8, 2025

Cybersecurity Situational Awareness: Mr. Robot Prison Break

Cybersecurity situational awareness fails spectacularly in Mr. Robot's prison break episode - learn what went wrong and how to prevent real attacks. Curtis Preston (Mr. Backup) and Prasanna break down the cybersecurity situational awareness failures that made Elliot's prison break possible. From USB stick social engineering to Bluetooth car hacking,…

View more
Sept. 1, 2025

How Honeypot Servers Catch Hackers: Mr. Robot Cybersecurity Analysis

Discover how honeypot servers can transform your cybersecurity strategy! This episode breaks down everything you need to know about implementing effective honeypots for threat detection. What exactly is a honeypot server? It's a deceptive system designed to look valuable to attackers but contains no real business data. The beauty lies…

View more
Aug. 25, 2025

Privilege Escalation Attacks Explained: Mr. Robot Cybersecurity

Privilege escalation attacks turn small security breaches into complete network compromises. Learn how hackers climb permission ladders to access critical systems. Cybersecurity expert Curtis Preston breaks down privilege escalation through real-world examples and Mr. Robot analysis. This video covers vertical attacks that exploit system vulnerabilities, horizontal attacks that spread through…

View more
Aug. 18, 2025

Physical Security Fails: Cybersecurity in the Workplace

Cybersecurity in the workplace fails when social engineering targets your employees. This Mr Robot breakdown shows exactly how attackers infiltrate secure facilities. Ever wonder how secure your workplace really is? In this episode, we dissect Mr. Robot's "Exploits" episode to reveal shocking cybersecurity vulnerabilities that exist in real workplaces today.…

View more
Aug. 11, 2025

Social Engineering Attacks: Mr. Robot Cybersecurity Lessons

Social engineering attacks are a big way hackers breach organizations today. Learn the tactics they use and how to stop them from Mr. Robot analysis. Ever wonder how hackers actually get into companies? It's not always through sophisticated technical exploits - most of the time, it's through social engineering. In…

View more
Aug. 4, 2025

Reconnaissance in Cyber Security: Mr. Robot's Evil Corp Attack

Reconnaissance in cyber security isn't random network scans - it's months of studying YOUR organization. We analyze Mr. Robot episode 2 to reveal how real --- I'm gonna tell you something that might keep you up at night: if a sophisticated threat actor wants to take down your company, they're…

View more
July 21, 2025

Insider Threat Prevention: Real Cases & Defense Strategies

Learn how to protect against insider threat attacks from cybersecurity expert Curtis Preston. Real cases from Coinbase, Apple & more. Discover the 3 types of insider threats & proven defense strategies. 83% of companies hit in 2024 - don't be next! 🔒 While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec…

View more
July 14, 2025

Mission Impossible Teaches REAL Cyber Security Lessons!

Discover real cyber security lessons hidden in Mission: Impossible! We analyze how Hollywood got AI threats, immutable backups, and air-gapped storage surprisingly right. Learn practical data protection strategies from Tom Cruise's latest adventure, including 3-2-1 backup rules and hash verification. While you're here, Here's some great episodes from this year:…

View more
June 30, 2025

Is your Backup Air Gapped?

Learn what air gap backup really means! Curtis Preston explains true vs virtual air gap, from original tape-based systems to modern immutable storage. Discover why most "air gapped" solutions aren't really air gapped and how to evaluate vendor claims. Critical for ransomware protection! 🔒 While you're here, Here's some other…

View more
June 23, 2025

Largest Data Breach in History: Protect Yourself

The largest data breach in history exposed 16B credentials! Security experts break down this massive infostealer attack, reveal dangerous browser habits, and share critical protection steps. Learn why this isn't one breach but many, how malware steals your data, and what to do NOW to stay safe. Essential viewing! While…

View more
June 16, 2025

How to make a snapshot backup

Learn snapshot backup fundamentals! Curtis Preston breaks down copy-on-write vs redirect-on-write, explains why AWS snapshots are different, and shows how to turn snapshots into real backups following 3-2-1 rule. Perfect for IT pros managing NetApp, VMware, or cloud storage systems. 🔒💾' While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s…

View more
June 9, 2025

Human error: The #2 reason we back up

Human error now causes more data loss than hardware failures. Join backup expert Curtis Preston as he shares real war stories of IT disasters caused by people, not machines. Learn about directory deletions, tape library incidents, and insider threats. Discover why your backup strategy must account for human mistakes to…

View more
June 2, 2025

How to Get Real ROI from Backup Infrastructure

Discover how to achieve real ROI from backups beyond disaster recovery! Curtis & Prasanna reveal proven strategies for extracting business value from backup data through test/dev, security monitoring & AI analytics. Transform backup costs into profits with these practical techniques. While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s https://www.youtube.com/watch?v=ov834MWoBXg&t=2s…

View more
May 19, 2025

We finally cover World Backup Day

World Backup Day falls on March 31st - the day before April Fool's Day because not backing up your data is no joke. In this episode, hosts W. Curtis Preston and Prasanna Malaiyandi discuss alarming statistics about data loss and why proper backup strategies are essential for business survival. The…

View more
May 5, 2025

Ransomware Targets VMware ESXi: Protect Your Infrastructure

Discover why ransomware targets VMware ESXi environments and how to protect your virtualization infrastructure. Security expert Melissa Palmer (@vmiss) explains how attackers compromise vCenter and ESXi hosts to quickly encrypt entire VM clusters. Learn essential security practices to safeguard your critical VMware environment from ransomware attacks. While you're here, Here's…

View more
April 28, 2025

Veeamon 2025

Mr. Backup breaks down the biggest VeeamOn announcements from the 2025 conference, including their game-changing Linux appliance, AI search integration, and enhanced security features. Essential viewing for backup admins looking to strengthen their ransomware defense strategy. While you're here, Here's some great episodes to check out: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s https://www.youtube.com/watch?v=ov834MWoBXg&t=2s This…

View more
April 21, 2025

Could DOGE & GSA Save $1M in tape?

DOGE and GSA claim saving $1M yearly by converting old tapes to digital records. Is this possible? Backup experts analyze nine-track tape tech, storage costs, and what 14,000 legacy tapes really mean. Plus: Curtis shares his epic mainframe emergency power button fail! While you're here, Here's some great episodes from…

View more
April 14, 2025

Tape Backup for SMBs?

Discover if tape backup for small business makes sense in 2025. We examine Mag Store's new Thunderbolt tape drive and calculate if the $6,000 investment pays off against cloud options. Perfect for content creators or SMBs concerned about ransomware and wanting true offline protection. While you're here, Here's some great…

View more