Check out our companion blog!

Videos

April 29, 2026

Living Off The Land: Hacker's Secret Data Exploitation Tactics #shorts

Living Off The Land: Hacker's Secret Data Exploitation Tactics #shorts

Discover 'living off the land' in cybersecurity. Attackers exploit existing data and tools on compromised systems to escalate privileges and gather intel. Learn how they use reconnaissance and shadow copies to achieve their goals. #Cybersecurity #Hacking #InfoSec #TechExplained

View more
April 29, 2026

Shadow Copy vs. Backup: What's the Real Difference? #shorts

Shadow Copy vs. Backup: What's the Real Difference? #shorts

Shadow copy isn't a backup. It fails the 3-2-1 rule: 3 copies, 2 media, 1 offsite. It lacks true redundancy and distinct risk profiles, making it insufficient for reliable data protection. #DataBackup #CyberSecurity #ITPro #TechTips

View more
April 29, 2026

Shadow Copies: Not a Backup, Cyber Attack Target! #shorts

Shadow Copies: Not a Backup, Cyber Attack Target! #shorts

Think your Shadow Copies are a backup? Think again. Cyber attackers can delete them, leaving you with nothing. Real backups follow the 3-2-1 rule. Don't get caught unprepared. #CyberSecurity #DataBackup #VSSAdmin #TechTips #Infosec

View more
April 28, 2026

10 Ways to Sabotage Your Backup System (Are You Doing Them?) #shorts

10 Ways to Sabotage Your Backup System (Are You Doing Them?) #shorts

A consultant reveals how a major American manufacturing company, despite making everyday products, managed to implement every single backup system failure. The main culprit? One influential person actively fighting change. #ITFailures #BusinessDisasters #TechProblems #BackupSaga

View more
April 28, 2026

Culture vs. Security: Who Really Wins? #shorts

Culture vs. Security: Who Really Wins? #shorts

Does user base drive company culture, or does leadership dictate it? Explore the tug-of-war between workforce rebellion and top-down mandates, and who ultimately caves. #CompanyCulture #Leadership #Workforce #Management

View more
April 28, 2026

Cybersecurity: Detecting Anomalies with Admin Rights #shorts

Cybersecurity: Detecting Anomalies with Admin Rights #shorts

Even with admin access, detecting unusual behavior is key. Understanding normal vs. abnormal actions helps identify threats, especially when standard controls are insufficient. Proper account management is crucial. #Cybersecurity #AdminRights #AnomalyDetection #ITSecurity #TechTips

View more
April 28, 2026

Cybersecurity: Train EDR for 'Living Off the Land' Threats #shorts

Cybersecurity: Train EDR for 'Living Off the Land' Threats #shorts

Train your EDR tools to detect threats by establishing a baseline of normal activity. Understanding your environment is key to identifying anomalies and protecting against living-off-the-land attacks. #Cybersecurity #EDR #ThreatDetection #SecurityAwareness

View more
April 28, 2026

EDR Configuration: Training Tools for Threat Detection #shorts

EDR Configuration: Training Tools for Threat Detection #shorts

Configure your EDR by training tools and people to understand normal activity. Establish a baseline by monitoring processes like VSS Admin, then build a wiki of normal operations. This context is key to detecting true anomalies. #CyberSecurity #EDR #NetworkSecurity #AnomalyDetection #ITSecurity

View more
April 28, 2026

VSS Snapshots: The Performance Killer You Need to Know! #shorts

VSS Snapshots: The Performance Killer You Need to Know! #shorts

Using VSS as a backup app tanks your system performance due to copy-on-write snapshots. Explore the significant performance hit this causes. #VSSBackup #SystemPerformance #TechTips #DiskManagement

View more
April 27, 2026

VSS Snapshots: The Performance Killer You Need to Know! #shorts

VSS Snapshots: The Performance Killer You Need to Know! #shorts

Using VSS as a backup app? You might be tanking your system's performance. Copy-on-write snapshots can significantly slow things down. Learn why. #VSS #BackupSolutions #SystemPerformance #TechTips #ITPro

View more
April 27, 2026

VSS Writers: Backup App Integration Explained #shorts

VSS Writers: Backup App Integration Explained #shorts

Discover how VSS streamlined application support. Developers plugged into VSS writers, enabling seamless backup and integration for every app. A world of connected possibilities. #VSS #ApplicationIntegration #SoftwareDevelopment #TechExplained

View more
April 27, 2026

VSS Backup App: Why It's a TERRIBLE Idea #shorts

VSS Backup App: Why It's a TERRIBLE Idea #shorts

Using VSS as a backup app is a bad idea due to its copy-on-write snapshot mechanism. This can significantly degrade system performance over time. #VSS #Backup #TechTips #SystemPerformance #DataBackup

View more
April 27, 2026

VSS Backup: Stable Images & Snapshots Explained #shorts

VSS Backup: Stable Images & Snapshots Explained #shorts

Don't use VSS to *make* backups. Use it to *facilitate* them by creating stable images. Storing multiple VSS shadow copies directly on your system is a bad idea. #VSS #BackupTips #DataProtection #TechExplained

View more
April 27, 2026

Stop Using VSS as a Backup Before Ransomware Deletes Your Shadow Copies

Stop Using VSS as a Backup Before Ransomware Deletes Your Shadow Copies

Stop Using VSS as a Backup Before Ransomware Deletes Your Shadow Copies Ransomware deletes shadow copies using your own built-in Windows tools against you — and if VSS was your backup plan, you just found out the hard way that it wasn't. In this episode, W. Curtis Preston (Mr. Backup),…

View more
April 27, 2026

Your Shadow Copies Are Not a Backup (And Ransomware Knows It)

Your Shadow Copies Are Not a Backup (And Ransomware Knows It)

Ransomware deletes shadow copies using your own Windows tools against you — and if VSS was your backup plan, you never had one. W. Curtis Preston (Mr. Backup), Prasanna Malaiyandi, and Dr. Mike Saylor break down the VSS trap that IT teams keep falling into, and what you can do…

View more
April 27, 2026

Undeletable Backups: WORM Storage Explained #shorts

Undeletable Backups: WORM Storage Explained #shorts

Rethink your backup strategy. Standard snapshots are easily deleted. Explore WORM (Write Once, Read Many) storage for truly immutable data protection. Secure your critical systems. #DataSecurity #BackupSolutions #Cybersecurity #WORM #IT

View more
April 24, 2026

Ransomware Attack? Paying Bitcoin is HARD! Get Insurance! #shorts

Ransomware Attack? Paying Bitcoin is HARD! Get Insurance! #shorts

Companies struggle to acquire large Bitcoin sums for ransoms. This highlights the critical need for robust cybersecurity insurance as a primary defense against digital extortion. #Bitcoin #Cybersecurity #Ransomware #CorporateSecurity #Insurance

View more
April 24, 2026

Hackers KNEW Your Insurance?! Ransom Demands Revealed! #shorts

Hackers KNEW Your Insurance?! Ransom Demands Revealed! #shorts

Negotiating a ransomware attack when the attackers know your insurance coverage better than you do. The company claimed low coverage, but the attackers countered, 'Yeah, you do.' #Ransomware #Cybersecurity #Negotiation #BusinessContinuity

View more
April 24, 2026

Immutable Backups? I Have Questions! #shorts

Immutable Backups? I Have Questions! #shorts

Don't be fooled by 'immutable' backups. If they can be deleted with a simple authentication or root access, they're not truly secure. True immutability means even YOU can't delete it. #ImmutableBackups #Cybersecurity #Ransomware #DataProtection #TechExplained

View more
April 23, 2026

Ransomware: Why Proof of Decryption is KEY! #shorts

Ransomware: Why Proof of Decryption is KEY! #shorts

Kidnappers demand money, but can they prove their captive is alive? Similarly, ransomware gangs encrypt your data—but can they decrypt it? Paying up without proof is a gamble, especially when critical blueprints are at stake. #Ransomware #Cybersecurity #DataBreach #Tech

View more
April 23, 2026

Ransomware Payments: Illegal Fines or Jail Time? #shorts

Ransomware Payments: Illegal Fines or Jail Time? #shorts

Paying ransom isn't a simple yes or no. It could be illegal, depending on the organization and sanctions. One wrong move can lead to hefty fines or even jail time. Think twice before paying. #RansomPayments #CyberSecurity #LegalRisks #Sanctions

View more
April 23, 2026

Lazarus Group: Tracking Bitcoin Wallets for Digital Footprints! #shorts

Lazarus Group: Tracking Bitcoin Wallets for Digital Footprints! #shorts

The Lazarus Group isn't an entity, but a sanctioned label for specific Bitcoin wallets. Consistent wallet usage creates a behavioral baseline for tracking. #LazarusGroup #BitcoinTracking #CyberSecurity #CryptoAnalysis #Blockchain

View more
April 23, 2026

Don't Pay Ransoms! HUGE Fines for Sanctioned Transactions #shorts

Don't Pay Ransoms! HUGE Fines for Sanctioned Transactions #shorts

Transacting with sanctioned entities carries extreme financial penalties and legal repercussions. Understand the dire consequences and prioritize compliance to avoid funding illegal operations. #Sanctions #Compliance #FinancialCrime #LegalConsequences #IllicitOrganizations

View more
April 23, 2026

Immutable: Not Marketing Fluff, It's Binary! #shorts

Immutable: Not Marketing Fluff, It's Binary! #shorts

Immutable backups: not a marketing term, but a binary state. Can you delete them, even if you want to? If not, they're truly immutable. Anything less raises questions. #ImmutableBackups #Cybersecurity #DataProtection #Ransomware

View more