Check out our companion blog!

Videos

Dec. 22, 2025

Can AI Help Secure Your Backups? #shorts

Can AI Help Secure Your Backups? #shorts

Could Claude or ChatGPT help you secure your backup system? They're powerful and useful, but are they smart enough to give tailored security advice? Interesting ideas about AI and data protection. #AISecurity #BackupSystem #DataProtection #ClaudeAI

View more
Dec. 22, 2025

Secure Your Backups: Hire a Blue Team Now! #shorts

Secure Your Backups: Hire a Blue Team Now! #shorts

Don't wait until it's too late! Contract a blue team to audit your backups and ensure they're functional and secure. A backup expert can identify vulnerabilities you might miss. #BackupSecurity #MSSP #DataProtection #Cybersecurity #BlueTeam

View more
Dec. 22, 2025

Is a cyber security team expensive? #shorts

Is a cyber security team expensive? #shorts

Ransomware attacks can cause costs to skyrocket. Cyber insurance can help organizations defer and absorb these costs. Discover how cyber insurance has evolved to play a crucial role in mitigating financial risks. #CyberInsurance #Ransomware #Cybersecurity #DataProtection

View more
Dec. 22, 2025

Hire a red team to attack your backups! #shorts

Hire a red team to attack your backups! #shorts

Want to know how secure your immutable backup system is? Hire a red team! These ethical hackers find vulnerabilities so you can fix them before the real attacks begin. #RedTeam #Cybersecurity #BackupSystem #EthicalHacking

View more
Dec. 22, 2025

Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance

Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance

Building a cyber security team isn't optional anymore; it's the difference between recovering from ransomware and going out of business. In this episode, Curtis and Prasanna explain why hardening your backup infrastructure is only half the battle. You need professionals who know how to configure XDR systems without drowning you…

View more
Dec. 22, 2025

How To Build Your Cyber Security Team

How To Build Your Cyber Security Team

Building the right cyber security team is the missing piece in your ransomware defense strategy. Learn why professionals matter and how to assemble your team. You've hardened your backup system. You've got immutable backups. You're following the 3-2-1 rule. Great! But here's what I learned writing my new book with…

View more
Dec. 22, 2025

Is Your Backup System ACTUALLY Working? Check THIS! #shorts

Is Your Backup System ACTUALLY Working? Check THIS! #shorts

The 3-2-1 rule is table stakes for data backup. If you're not conforming, you don't have backups! Schedule, manage, monitor—basic, everyday tasks for a robust backup system. #DataBackup #BackupStrategy #321Rule #DataManagement

View more
Dec. 18, 2025

Human Error: The REAL Weakest Link in Security & Backups! #shorts

Human Error: The REAL Weakest Link in Security & Backups! #shorts

The biggest problem with your backup system isn't tech. It's almost always human error. No system is perfect, and people often overlook critical steps. Check out the Backup Wrap-Up podcast. #BackupSystem #DataSecurity #HumanError #Podcast

View more
Dec. 17, 2025

Is Active Directory/Entra ID REALLY Secure? #shorts

Is Active Directory/Entra ID REALLY Secure?  #shorts

Is typing in a username and password really that bad? What about Active Directory and other enterprise solutions? Let's explore password managers and authentication! #PasswordManager #ActiveDirectory #Authentication #Cybersecurity

View more
Dec. 17, 2025

10 Essential Backup System Features You NEED NOW! #shorts

10 Essential Backup System Features You NEED NOW! #shorts

Missed our deep dive? Here's a lightning-fast recap: The 3-2-1-1-0 rule, automated backups, recovery testing, defined RTO/RPO, isolating your system, SaaS data backup, documentation, retention policies, monitoring, and endpoint protection. #DataBackup #BackupStrategy #DataRecovery #RTO #RPO #Cybersecurity

View more
Dec. 17, 2025

Backups Security: What is Multi-Factor Authentication (MFA)? #shorts

Backups Security: What is Multi-Factor Authentication (MFA)? #shorts

Logging in locally with just a username and password? Big problem. The primary fix: multi-factor authentication (MFA). Secure your accounts! #MultiFactorAuthentication #MFA #Cybersecurity #PasswordSecurity

View more
Dec. 17, 2025

Why Your Passwords Are TRASHED! Software HACKED! #shorts

Why Your Passwords Are TRASHED! Software HACKED! #shorts

Why is the username/password combo failing us? Stolen passwords, no rotation, and easy-to-remember phrases leave us vulnerable. What's the solution? #Passwords #Cybersecurity #DataProtection #PasswordSecurity

View more
Dec. 17, 2025

STOP Using Just Passwords! Secure Your Backups NOW! #shorts

STOP Using Just Passwords! Secure Your Backups NOW! #shorts

Local logins are risky! MFA adds layers of security. SMS is good, app-based MFA is better, token-based is best. Email? Skip it! Protect your backups! #MFA #MultiFactorAuthentication #CyberSecurity #DataProtection

View more
Dec. 17, 2025

Do You Need a Managed Service Provider for Security or Backups? #shorts

Do You Need a Managed Service Provider for Security or Backups? #shorts

Strengthen your backup defenses! Consider a dedicated service provider like an MSSP (e.g., Black Swan Security) or SaaS-based data protection. Ensure they're reliable, trusted, and prioritize security above all. #BackupSecurity #MSSP #DataProtection #CyberSecurity

View more
Dec. 16, 2025

RBAC & 4-Eyes Authentication: Boost Your Backup Security #shorts

RBAC & 4-Eyes Authentication: Boost Your Backup Security #shorts

Role-based administration divides backup duties. Grant abilities to run backups, configure them, or do restores separately, increasing trust and security in larger companies. #RoleBasedAdmin #BackupConfiguration #DataRestores #Cybersecurity

View more
Dec. 16, 2025

Unlock 4-Eyes Authentication: Backup Security for Critical Functions #shorts

Unlock 4-Eyes Authentication: Backup Security for Critical Functions #shorts

Stop rogue admins! 2-person authentication safeguards destructive restores & backup config changes. Prevent malicious actors from altering crucial settings & retention policies. #BackupSecurity #DataProtection #Cybersecurity #RogueAdmin

View more
Dec. 16, 2025

BACKUP ADMINS have ULTIMATE power - Don't give to juniors! #shorts

BACKUP ADMINS have ULTIMATE power - Don't give to juniors! #shorts

RBAC ensures access is based on roles, not individuals, aligning with the principle of least privilege. Control access and limit potential damage from the most powerful position in the company. #RBAC #AccessControl #DataSecurity #LeastPrivilege #Cybersecurity

View more
Dec. 16, 2025

Why are we phasing out MFA? #shorts

Why are we phasing out MFA? #shorts

SMS OTP isn't the best security. MFA is better, but has a challenge: MFA fatigue. Repeated notifications can lead to accidental approvals, as seen in the Okta hack. #MFASecurity #Cybersecurity #OktaHack #Authentication

View more
Dec. 16, 2025

MFA Explained: Why SMS is 'Good' But Not 'Best'! #shorts

MFA Explained: Why SMS is 'Good' But Not 'Best'! #shorts

This video breaks down Multi-Factor Authentication (MFA) tiers, revealing crucial security differences. From basic to bulletproof, understand where SMS falls short in protecting your accounts. #MFA #CyberSecurity #Authentication #SecurityTips

View more
Dec. 16, 2025

Disable RDP NOW! More vulnerabilities than advantages! #shorts

Disable RDP NOW! More vulnerabilities than advantages! #shorts

RDP is a major security risk! Hackers exploit flaws to deploy ransomware, granting full system access. Ditch the Remote Desktop Protocol. Much more secure remote access alternatives exist. #RDP #Cybersecurity #Ransomware #RemoteAccess #SecurityTips

View more
Dec. 15, 2025

Your Backups Are INSANELY Vulnerable! Here's How to Fix It #shorts

Your Backups Are INSANELY Vulnerable! Here's How to Fix It #shorts

Conventional backup systems face severe security risks. Enhanced authentication and strong password management are crucial to prevent devastating data breaches. Protect your data! #DataSecurity #BackupSystems #Cybersecurity #PasswordManagement

View more
Dec. 15, 2025

Ransomware Attacks: Why Backup Tapes Are Still Essential! #shorts

Ransomware Attacks: Why Backup Tapes Are Still Essential! #shorts

Jaguar Land Rover and Asahi Brewing still struggle after cyberattacks. Why backup tapes are making a comeback for data protection, even in the age of petabytes and exabytes. Is tape the answer? #CyberSecurity #DataBackup #Ransomware #DataRecovery

View more
Dec. 15, 2025

Ransomware: The REAL Reason You Need Data Restoration! #shorts

Ransomware: The REAL Reason You Need Data Restoration! #shorts

Forget hardware failure or accidental deletion. The #1 reason for data restoration today? Ransomware. Stay protected with smart backups. #Ransomware #DataBackup #Cybersecurity #DataProtection

View more
Dec. 15, 2025

Building an immutable backup system

Building an immutable backup system

Want to know how to build an immutable backup system protected from ransomware attacks? In this episode, Curtis and Prasanna go beyond the basics to discuss four critical security features every modern backup system needs. Building on feedback from their previous episode about backup fundamentals, they cover multi-factor authentication (and…

View more