Social engineering attacks are a big way hackers breach organizations today.

Learn the tactics they use and how to stop them from Mr. Robot analysis.
Ever wonder how hackers actually get into companies? It's not always through sophisticated technical exploits - most of the time, it's through social engineering. In this episode, I break down real social engineering tactics using examples from Mr. Robot, including how a character uses Instagram to stalk a target, shows up at their location, and even sleeps with them to compromise their phone and steal sensitive corporate emails.

But this isn't just about TV drama - these tactics are being used right now by real ransomware groups like Scattered Spider, who call help desks pretending to be employees asking for password resets. I also discuss how the Sony email hack from a few years ago mirrors what we see in the show, and why your organization's backup systems might be the kingdom that hackers are really after.

You'll learn why underfunding your IT security team (like the hospital in the show with a $7,000 annual budget) creates massive vulnerabilities, how to protect yourself from social media reconnaissance, and why you need to think about the cybersecurity of your backup systems, not just your production environment.

Whether you're a backup professional, IT manager, or just want to understand how these attacks work, this episode gives you practical insights you can use to protect yourself and your organization. Don't let social engineering be the weak link in your security chain.

While you're here, Here's some great episodes from this year:
https://www.youtube.com/watch?v=ZZGn5xlYTec
https://www.youtube.com/watch?v=nHz5hGZy0nY&t=2s
https://www.youtube.com/watch?v=ov834MWoBXg&t=2s

This YouTube channel is also available as an audio podcast!
https://www.backupwrapup.com

We also have a blog that I've been running for over 20 years!
https://www.backupcentral.com

I've also written four O'Reilly books! My latest:
https://www.amazon.com/Modern-Data-Protection-Recoverability-Workloads-ebook/dp/B093TQTBC3