Privilege escalation attacks turn small security breaches into complete network compromises. Learn how hackers climb permission ladders to access critical systems.
Cybersecurity expert Curtis Preston breaks down privilege escalation through real-world examples and Mr. Robot analysis. This video covers vertical attacks that exploit system vulnerabilities, horizontal attacks that spread through shared resources, and why your backup administrator might be your biggest security risk.
You'll discover how the Target breach happened through HVAC systems, why IoT devices create dangerous attack vectors, and how recent ransomware groups use social engineering for privilege escalation. We examine physical security failures at data storage facilities and explain why proper escort policies matter.
Key topics include: least privilege principles, macro exploits in Office documents, the risks of giving backup roles to untrained staff, why tape storage requires specific temperature controls, and how immutable backups protect against privilege escalation attacks.
Whether you're an IT professional, backup administrator, or cybersecurity enthusiast, this analysis provides practical insights for defending against privilege escalation attempts. Learn from fictional scenarios that mirror real-world attack patterns and understand why human factors remain the weakest link in cybersecurity.
Watch to protect your organization from privilege escalation attacks that could wipe out years of critical data and business operations.

While you're here, Here's some great episodes
https://www.youtube.com/watch?v=ZZGn5xlYTec
https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s
https://www.youtube.com/watch?v=ov834MWoBXg&t=2s

This YouTube channel is also available as an audio podcast!
https://www.backupwrapup.com

We also have a blog that I've been running for over 20 years!
https://www.backupcentral.com

I've also written four O'Reilly books! My latest:
https://www.amazon.com/Modern-Data-Protection-Recoverability-Workloads-ebook/dp/B093TQTBC3