Check out our companion blog!

Videos

Nov. 18, 2025

Backup & Recovery: Realistic RTO Strategies for Finance #shorts

Backup & Recovery: Realistic RTO Strategies for Finance #shorts

Financial firms must quantify downtime costs—like $1 billion per hour. This data empowers backup/DR teams to enhance systems. Realistic RTO targets & iterative improvements are key. #FinancialTrading #Banking #DataRecovery #RTO #DowntimeCosts

View more
Nov. 17, 2025

RTO: Why Backup Admin Does NOT Determine Recovery Time #shorts

RTO: Why Backup Admin Does NOT Determine Recovery Time #shorts

The backup admin doesn't decide the Recovery Time Objective (RTO)—the business unit does. Downtime costs money or reputation. RTO calculations? Management's job, not yours. #RTO #BackupAdmin #SysAdmin #DataRecovery

View more
Nov. 17, 2025

RTO Truth: Why Most Organizations Fail Recovery #shorts

RTO Truth: Why Most Organizations Fail Recovery #shorts

Don't trust RTO documentation! If you haven't tested your recovery plan, you can't meet it. Why are most organizations unable to recover in time? Testing, testing, testing! #RTO #RecoveryTime #DataRecovery #BackupAdmin

View more
Nov. 17, 2025

Automated Testing & DR Drills: Enhance Cybersecurity Resilience #shorts

Automated Testing & DR Drills: Enhance Cybersecurity Resilience #shorts

Automated testing is key for success. Regular, small tests are preferred over infrequent, large ones. DR drills and chaos engineering help catch changes and dependencies. Keep a recovery mindset! #AutomatedTesting #DRDrills #ChaosEngineering #Cybersecurity

View more
Nov. 17, 2025

Recovery Time Objective vs Reality: Closing the Gap

Recovery Time Objective vs Reality: Closing the Gap

Most IT teams can't meet their recovery time objective—and they don't even know it. In this episode of The Backup Wrap-up, Curtis and Prasanna explain why your RTO is probably fantasy, who should actually be setting it (hint: not you), and what recovery time actual really means. We cover the…

View more
Nov. 17, 2025

Why Your Recovery Time Objective Is a Complete Fantasy

Why Your Recovery Time Objective Is a Complete Fantasy

Your recovery time objective is probably a lie, and here's how to fix it. Most organizations can't meet their stated RTO because they've never actually tested it. In this episode of The Backup Wrap-up, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi break down the hard truth about recovery time…

View more
Oct. 27, 2025

The Truth About Ransomware Detection

The Truth About Ransomware Detection

Ransomware detection requires the right tools and expertise—but where do you start? In this episode, cybersecurity expert Mike Saylor reveals what really works. Think your organization is safe from ransomware? Think again. The average small to medium-sized business faces constant threats from sophisticated attackers who know exactly how to slip…

View more
Oct. 20, 2025

ArcGIS Hack: 12 Months of Hidden Malware in Your Backups

ArcGIS Hack: 12 Months of Hidden Malware in Your Backups

An ArcGIS hack by Flax Typhoon went undetected for 12 months by hiding malware in legitimate extensions. We break down how it happened and how to prevent it. In this episode of The Backup Wrap-up, we dissect one of the most troubling security incidents of the year: a sophisticated ArcGIS…

View more
Oct. 6, 2025

Stop Deepfake Attacks – They're Worse Than You Think

Stop Deepfake Attacks – They're Worse Than You Think

Deepfake attacks are the fastest-growing threat to business security. Learn how to defend against AI-powered voice cloning and video fraud before your company loses millions. Nearly 50% of businesses have already been targeted by deepfake attacks, and the numbers are only getting worse. In this episode, Curtis and Prasanna break…

View more
Sept. 29, 2025

Cyber Attack Notification - Mr. Robot Season One Finale

Cyber Attack Notification - Mr. Robot Season One Finale

Cyber attack notification can make or break your company's response to a security incident. Learn why transparency beats secrecy and how poor communication amplifies breach damage. In this episode of The Backup Wrap-Up, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi break down the critical cyber attack notification strategies every…

View more
Sept. 22, 2025

How Insider Threats Bypass Your Security (And How to Stop Them)

How Insider Threats Bypass Your Security (And How to Stop Them)

Insider threats are responsible for some of the most devastating data breaches - learn the 3 types you need to protect against and how immutable backups can save your company when traditional security fails. In this episode, we break down the insider threat problem using examples from Mr. Robot Season…

View more
Sept. 15, 2025

Adavanced persistent threat

Adavanced persistent threat

While you're here, Here's some great episodes from this year: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s https://www.youtube.com/watch?v=ov834MWoBXg&t=2s This YouTube channel is also available as an audio podcast! https://www.backupwrapup.com We also have a blog that I've been running for over 20 years! https://www.backupcentral.com I've also written four O'Reilly books! My latest: https://www.amazon.com/Modern-Data-Protection-Recoverability-Workloads-ebook/dp/B093TQTBC3

View more
Sept. 8, 2025

Cybersecurity Situational Awareness: Mr. Robot Prison Break

Cybersecurity Situational Awareness: Mr. Robot Prison Break

Cybersecurity situational awareness fails spectacularly in Mr. Robot's prison break episode - learn what went wrong and how to prevent real attacks. Curtis Preston (Mr. Backup) and Prasanna break down the cybersecurity situational awareness failures that made Elliot's prison break possible. From USB stick social engineering to Bluetooth car hacking,…

View more
Sept. 1, 2025

How Honeypot Servers Catch Hackers: Mr. Robot Cybersecurity Analysis

How Honeypot Servers Catch Hackers: Mr. Robot Cybersecurity Analysis

Discover how honeypot servers can transform your cybersecurity strategy! This episode breaks down everything you need to know about implementing effective honeypots for threat detection. What exactly is a honeypot server? It's a deceptive system designed to look valuable to attackers but contains no real business data. The beauty lies…

View more
Aug. 25, 2025

Privilege Escalation Attacks Explained: Mr. Robot Cybersecurity

Privilege Escalation Attacks Explained: Mr. Robot Cybersecurity

Privilege escalation attacks turn small security breaches into complete network compromises. Learn how hackers climb permission ladders to access critical systems. Cybersecurity expert Curtis Preston breaks down privilege escalation through real-world examples and Mr. Robot analysis. This video covers vertical attacks that exploit system vulnerabilities, horizontal attacks that spread through…

View more
Aug. 18, 2025

Physical Security Fails: Cybersecurity in the Workplace

Physical Security Fails: Cybersecurity in the Workplace

Cybersecurity in the workplace fails when social engineering targets your employees. This Mr Robot breakdown shows exactly how attackers infiltrate secure facilities. Ever wonder how secure your workplace really is? In this episode, we dissect Mr. Robot's "Exploits" episode to reveal shocking cybersecurity vulnerabilities that exist in real workplaces today.…

View more
Aug. 11, 2025

Social Engineering Attacks: Mr. Robot Cybersecurity Lessons

Social Engineering Attacks: Mr. Robot Cybersecurity Lessons

Social engineering attacks are a big way hackers breach organizations today. Learn the tactics they use and how to stop them from Mr. Robot analysis. Ever wonder how hackers actually get into companies? It's not always through sophisticated technical exploits - most of the time, it's through social engineering. In…

View more
Aug. 4, 2025

Reconnaissance in Cyber Security: Mr. Robot's Evil Corp Attack

Reconnaissance in Cyber Security: Mr. Robot's Evil Corp Attack

Reconnaissance in cyber security isn't random network scans - it's months of studying YOUR organization. We analyze Mr. Robot episode 2 to reveal how real --- I'm gonna tell you something that might keep you up at night: if a sophisticated threat actor wants to take down your company, they're…

View more
July 21, 2025

Insider Threat Prevention: Real Cases & Defense Strategies

Insider Threat Prevention: Real Cases & Defense Strategies

Learn how to protect against insider threat attacks from cybersecurity expert Curtis Preston. Real cases from Coinbase, Apple & more. Discover the 3 types of insider threats & proven defense strategies. 83% of companies hit in 2024 - don't be next! 🔒 While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec…

View more
July 14, 2025

Mission Impossible Teaches REAL Cyber Security Lessons!

Mission Impossible Teaches REAL Cyber Security Lessons!

Discover real cyber security lessons hidden in Mission: Impossible! We analyze how Hollywood got AI threats, immutable backups, and air-gapped storage surprisingly right. Learn practical data protection strategies from Tom Cruise's latest adventure, including 3-2-1 backup rules and hash verification. While you're here, Here's some great episodes from this year:…

View more
June 30, 2025

Is your Backup Air Gapped?

Is your Backup Air Gapped?

Learn what air gap backup really means! Curtis Preston explains true vs virtual air gap, from original tape-based systems to modern immutable storage. Discover why most "air gapped" solutions aren't really air gapped and how to evaluate vendor claims. Critical for ransomware protection! 🔒 While you're here, Here's some other…

View more
June 23, 2025

Largest Data Breach in History: Protect Yourself

Largest Data Breach in History: Protect Yourself

The largest data breach in history exposed 16B credentials! Security experts break down this massive infostealer attack, reveal dangerous browser habits, and share critical protection steps. Learn why this isn't one breach but many, how malware steals your data, and what to do NOW to stay safe. Essential viewing! While…

View more
June 16, 2025

How to make a snapshot backup

How to make a snapshot backup

Learn snapshot backup fundamentals! Curtis Preston breaks down copy-on-write vs redirect-on-write, explains why AWS snapshots are different, and shows how to turn snapshots into real backups following 3-2-1 rule. Perfect for IT pros managing NetApp, VMware, or cloud storage systems. 🔒💾' While you're here, Here's some great episodes: https://www.youtube.com/watch?v=ZZGn5xlYTec https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s…

View more
June 9, 2025

Human error: The #2 reason we back up

Human error: The #2 reason we back up

Human error now causes more data loss than hardware failures. Join backup expert Curtis Preston as he shares real war stories of IT disasters caused by people, not machines. Learn about directory deletions, tape library incidents, and insider threats. Discover why your backup strategy must account for human mistakes to…

View more