What Is Ransomware and Why Should You Care?
What is ransomware, and why does it remain the number one threat to businesses of all sizes? In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi break down the fundamentals of ransomware attacks and explain why the question "what is ransomware" still gets searched tens of thousands of times each month.
We cover the two main types of ransomware attacks: traditional encryption-based attacks where hackers lock your data and demand payment, and the newer double extortion model where attackers steal your sensitive information before encrypting it—then threaten to publish everything if you don't pay.
Our hosts share real-world examples including the Sony hack, the Costa Rica government attack, and the massive Jaguar Land Rover breach that cost over $2.5 billion. Whether you're a Fortune 500 company or a small dental office, this episode explains what is ransomware, why you're a target, and why preparation is your best defense.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we answer a question that gets searched tens
Speaker:of thousands of times every month.
Speaker:What is ransomware?
Speaker:Honestly, if uh, you think you know the answer, the game has probably changed.
Speaker:Today's attacks always, or almost always include what we call a double
Speaker:extortion attack, where they threaten to publish your dirty laundry.
Speaker:If you don't pay up, imagine the worst email anyone at your group has
Speaker:ever written on the evening news.
Speaker:We'll break down both types of attacks.
Speaker:Talk about why literally everyone is a target.
Speaker:And discuss why the odds of you getting hit are basically a hundred percent plus.
Speaker:I talk about my new book with, uh, WR, that I wrote with Dr. Mike Saylor.
Speaker:And, uh, I hope you enjoy it.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that there were no backups of the database that we just lost.
Speaker:I don't want that to happen to you.
Speaker:That's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:welcome to the backup wrap up.
Speaker:I'm your host w Curtis Preston, AKA, Mr. Backup, and I have with
Speaker:me Prasanna, the subnet mask.
Speaker:Molly Andi, how's it going?
Speaker:Prasanna.
Speaker:Yeah, I probably deserved that.
Speaker:Uh, I fell down a YouTube rabbit hole and spent many, many, many, many hours
Speaker:and redid my home networking to make it look nice and spent way too much money.
Speaker:Oh, you spent a, oh, I didn't know you spent a bunch of money.
Speaker:You just said you like redid things.
Speaker:I just thought you just like, you know, move cables around or whatnot.
Speaker:no, it was also like buying a mini rack and a UPS and a NAS and a switch.
Speaker:Yeah, and some network cables to make it all look nice and
Speaker:Yeah.
Speaker:yeah,
Speaker:it looks really, really good,
Speaker:yeah.
Speaker:Yeah.
Speaker:You spent a few dollars.
Speaker:There was a few years ago.
Speaker:You may recall when I did, I had my, my wifi project 'cause I
Speaker:was tired of like my way too many smart devices that didn't have a, a wifi.
Speaker:A reliable wifi connection and that, that's, that worked out
Speaker:really well for me since then.
Speaker:That was like a few years ago now.
Speaker:Yeah.
Speaker:Yeah, I
Speaker:remember that.
Speaker:yeah.
Speaker:So it's been nice to, to have a reliable wifi connection.
Speaker:So I wish you all the best.
Speaker:so what, what do you think if you woke up one morning, you know, you
Speaker:went into work and then all your computers have a little screen on
Speaker:'em that start talking about Bitcoin?
Speaker:Yeah, I would just turn around and walk right out.
Speaker:Yeah.
Speaker:Yeah.
Speaker:gonna be one of those not so productive days.
Speaker:How
Speaker:Yeah.
Speaker:You know, I think about your, your current employer, they've
Speaker:got one or two computers.
Speaker:Can you imagine?
Speaker:Right.
Speaker:Uh, yeah.
Speaker:I mean, the bigger you are as a company, the bigger target you are
Speaker:I agree with that statement, but I also think that that's sort of the danger,
Speaker:Uhhuh?
Speaker:in that situation, because smaller companies might think, Hey,
Speaker:they're going after the big guys.
Speaker:I don't need to worry about this.
Speaker:But as we all know,
Speaker:everyone is a target.
Speaker:Yeah, we're talking of course about ransomware.
Speaker:I think that's, is that how it's pronounced?
Speaker:Ransomware?
Speaker:Um, and, uh, we're, you know, I, I thought we'd, with the upcoming release of.
Speaker:My little book here.
Speaker:By the way, for those of you watching us, uh, or listening to us on, uh,
Speaker:you know, apple Podcasts or whatever, you can actually watch us on YouTube
Speaker:and you get to see, I've now got wall art with the picture of my upcoming
Speaker:book that I wrote with, uh, Dr.
Speaker:Mike Saylor
Speaker:Learning Ransomware Response and Recovery.
Speaker:Uh, it's a. Lizard?
Speaker:I don't
Speaker:No.
Speaker:Have you named the lizard?
Speaker:Oh, If I give it, you know, I've never named any of the other ones.
Speaker:Like, you know, I've got the garal over here and I got the seven banded armadillo.
Speaker:I don't have,
Speaker:I think you should name them.
Speaker:you think I should
Speaker:name 'em?
Speaker:think so.
Speaker:I.
Speaker:I'm gonna call this one Prasanna.
Speaker:I knew you were going to do that, especially after you had named your Tesla.
Speaker:Yeah, my Tesla is called It's Prasanna's Fault.
Speaker:Uh, yeah,
Speaker:it it is your fault that I have a Tesla.
Speaker:100%. So, uh, yeah, we're talking about ransomware and I thought we'd do a
Speaker:little bit, you know, again, celebrate the, the upcoming release of the book.
Speaker:We're gonna, like, just, we're gonna be talking about ransomware for
Speaker:quite a bit, so if ransomware bores you, uh, you know, maybe you should
Speaker:go watch some YouTube.
Speaker:so I know that we're talking about ransomware in this episode, but
Speaker:I wonder how many people in it
Speaker:Mm-hmm.
Speaker:don't know what the word ransomware is in the year 2026.
Speaker:Like,
Speaker:just
Speaker:think that there's actually anyone in it who doesn't know what ransomware is?
Speaker:Well, yeah.
Speaker:You know why?
Speaker:The Google Keyword Planner, which I use to plan my episodes.
Speaker:What do you suppose the average monthly search for?
Speaker:What is ransomware?
Speaker:Uh
Speaker:Oh.
Speaker:I am gonna guess.
Speaker:It's like per month,
Speaker:10 million.
Speaker:Oh, no, it's not that bad.
Speaker:No, but, but,
Speaker:but
Speaker:but
Speaker:10 to a hundred thousand times a month.
Speaker:But here's the thing, here's my question.
Speaker:How, how much, like, outside of it,
Speaker:who cares about ransomware?
Speaker:So, um, I, I'm, I think this is mostly it and it related people and,
Speaker:uh, and so, you know, we're, we're spot, we're talking to those people.
Speaker:So if you already know what ransomware is and you know, I don't know, go listen
Speaker:to one of our other episodes.
Speaker:Yeah, you might you always, everyone learns a thing or two let's talk about,
Speaker:you know, what is ransomware and there, and there are sort of two flavors, if
Speaker:you will, of, of a ransomware attack.
Speaker:And I think that the second one is
Speaker:becoming much more common, right?
Speaker:interesting.
Speaker:So I'll talk the first one because I'm not sure what the second one is
Speaker:you're referring to, but traditionally,
Speaker:Yeah.
Speaker:A traditional talk about a traditional
Speaker:ransomware
Speaker:Yeah.
Speaker:A traditional ransomware attack is where someone gains access to your systems.
Speaker:They might encrypt your data,
Speaker:Mm-hmm.
Speaker:and then they ask for a ransom, right?
Speaker:Usually Bitcoin
Speaker:in order to provide you back the key to unlock your data,
Speaker:and then they got smarter.
Speaker:Because people were like, Hey, I don't need to pay the ransom.
Speaker:Let me just restore from backups.
Speaker:And so then they added an additional extortion mechanism where they would
Speaker:exfiltrate some of your sensitive data emails, et cetera, and then say, okay, if
Speaker:you don't pay us the ransom, that's fine.
Speaker:If you could restore your environment, but we're then gonna release all this data
Speaker:about your company that you may not want out in public, and therefore you really,
Speaker:really, really should pay a ransome.
Speaker:And you said you didn't know what the other kind of attack was.
Speaker:Were they both The second
Speaker:The first one
Speaker:you did, the first and the second.
Speaker:See, you
Speaker:don't need me.
Speaker:I don't even need to be here.
Speaker:Um, yeah.
Speaker:So that, so basically that second attack is what we, what we now
Speaker:call a double extortion attack.
Speaker:Right?
Speaker:Uh, the, the original was sort of the.
Speaker:The standard extortion.
Speaker:Right.
Speaker:Either give it, you know, but basically it's where the word ransom
Speaker:came from or ransomware, because it's, you're ransoming the data.
Speaker:You, I've taken your data essentially, and, and by taking
Speaker:it, basically we have, we have made your data inaccessible to you.
Speaker:It, we didn't have to take it.
Speaker:In the sense of the way
Speaker:a traditional like ransom would be, but we've essentially taken your
Speaker:data away from you by encrypting it and you can have it back.
Speaker:Right.
Speaker:Um, you know, for the, you
Speaker:know, for $1 million.
Speaker:but I, I think though, even that first case, even though the
Speaker:second one is more bulletproof from a threat actor perspective,
Speaker:because they're more
Speaker:likely to be paid, I think though the first one is still common in
Speaker:consumer personal ransomware attacks,
Speaker:Where someone opens an email, they encrypt your laptop, and they're
Speaker:like, Hey, pay me some Bitcoin.
Speaker:Because it's sort of a volume play, right?
Speaker:They're looking to hit as many systems as possible, hoping someone pays out.
Speaker:They don't really need to exfiltrate the data because what are they
Speaker:gonna find on your laptop, your home pictures, and stuff like that,
Speaker:Well, home pictures.
Speaker:yeah,
Speaker:like
Speaker:I.
Speaker:yes, there are some data.
Speaker:There is technically it is our, there are data, but I'd never say it that
Speaker:way.
Speaker:There there is data on many people's home devices that
Speaker:they would not want out there.
Speaker:Right.
Speaker:But then to filter that all out and to process it.
Speaker:Right.
Speaker:If you have a million devices
Speaker:Yeah, well again, well, you know, the spray and pray, right?
Speaker:So there basically, I'm gonna say there's a
Speaker:a significant percentage of people that have
Speaker:sensitive pictures and video on their personal devices that
Speaker:they would not want out to
Speaker:the world.
Speaker:I'm gonna tell those people, please stop putting that stuff on your devices.
Speaker:Right.
Speaker:Um, you know, it, it, it's in today's world that is, you know,
Speaker:I I, I'm not blaming the victim.
Speaker:I'm just stating a fact that if that data is accessible in iCloud or, uh, you
Speaker:know, or something like that, right?
Speaker:Um, Google Photos, et cetera.
Speaker:Uh.
Speaker:It is possible that it will
Speaker:get taken and, and, and, then leaked.
Speaker:And I mean, look at all of the famous people that, that, have, uh, had their
Speaker:basically nude photos leaked,
Speaker:And, I think this is a good segue or analogy into that small business
Speaker:case we were talking about earlier,
Speaker:right?
Speaker:Where an average home user might think, oh, I'm not a celebrity.
Speaker:I don't need to worry about this stuff.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Well, uh, and, and again, think about, so it's not just, um, I
Speaker:love using the phrase 11 herbs and spices, right, which is from KFC.
Speaker:For those of you
Speaker:that don't
Speaker:know, that's a u it's a US thing.
Speaker:But, uh, they used to always talk about their, that that was their secret.
Speaker:You know, their, their, their, uh, what would their secret sauce, right?
Speaker:The, you know.
Speaker:It's not just like your, your secret sauce.
Speaker:You might not, you're thinking, well, I don't have, uh, 11 herbs and spices.
Speaker:I don't have some massive corporate secret that if it got
Speaker:out, my company would be over.
Speaker:I'm just, uh, an oil change
Speaker:guy.
Speaker:Right.
Speaker:Um, so the question is, you know, is there anything.
Speaker:On there that you would not want out?
Speaker:Not not, you know, like I said, ip.
Speaker:But have you ever searched on anything that maybe you shouldn't
Speaker:have searched on a company computer?
Speaker:Right?
Speaker:Think about those kinds of things, conversations, emails that you had.
Speaker:Where you talked about, let's just continue with the oil change guy,
Speaker:where you talked about how stupid all these people are that come
Speaker:in and they're always coming in.
Speaker:They're supposed to do their oil at 5,000 miles and they're
Speaker:coming in at 57,000 miles.
Speaker:That was stupid.
Speaker:In fact, there was a guy named
Speaker:Steve, you know, and you just, you know,
Speaker:or, or you're joking about never actually changing someone's oil or
Speaker:Yeah.
Speaker:Yeah.
Speaker:Oh yeah.
Speaker:Right.
Speaker:Ooh.
Speaker:Oh, that would be really worse.
Speaker:Right?
Speaker:Um, you know, I can think, um, there's a, there, uh, there's a
Speaker:local, um, oil change company.
Speaker:It's a bit of a non-sequitur, but there was an oil change company here
Speaker:that, um, I caught them talking my wife into a injector cleaning service.
Speaker:Every oil change.
Speaker:They were charging her, and by the time I was like, why, why are
Speaker:your oil changes so expensive?
Speaker:She goes, well, they said I needed the thing.
Speaker:And I'm like, oh.
Speaker:My God, I was so angry.
Speaker:I was, I, I, let's just say I read, I'm gonna write it.
Speaker:So think about, you know, anything your company might have done ever
Speaker:that would not look good in the local news.
Speaker:That's the kind of thing that would go out.
Speaker:You know, um, you know, emails between, and also emails that
Speaker:you might not know about, right?
Speaker:There may be people at your company.
Speaker:I know that this is, you know, it's gonna surprise you, but not everybody at your
Speaker:company is a, is a, what do you call it?
Speaker:A, a saint,
Speaker:right?
Speaker:Think about that, right?
Speaker:That is what a modern ransomware attack is, and I will say that.
Speaker:Most of what we cover in the book is how to defend against a traditional
Speaker:ransomware attack, because by the way, a new ransomware attack of
Speaker:double extortion is still the old school of ransomware attack, right?
Speaker:Um,
Speaker:With a new
Speaker:st with a new spin,
Speaker:you still need to be able to restore your data and get to get your data back,
Speaker:and then you will need to make a dec a business decision as to whether or not.
Speaker:This secret, whatever it is, whether it's, you know, you know, your company
Speaker:IP or uh,
Speaker:embarrassing information, whether or not
Speaker:you wanna allow that to go out.
Speaker:yeah.
Speaker:And if I think, go back and think about like the double extortion one, right?
Speaker:One of the most famous ones that sticks in my mind is a Sony hack,
Speaker:Yeah.
Speaker:Yeah.
Speaker:right?
Speaker:Where someone got in, they were in the system, they exfiltrated a bunch of
Speaker:emails where studio execs were mocking some of the actors and actresses,
Speaker:and that did not go over well.
Speaker:No, it did not.
Speaker:Uh, I mean, they eventually recovered and, and I, and that's
Speaker:what I want people to think about.
Speaker:It's gonna be one of those things where you, you have to have a long-term, uh, you
Speaker:know, view and you have to say, you know.
Speaker:Long term, it's not good for us, uh, to pay the ransom because all you're doing
Speaker:when you pay the ransom is to, uh, to tell the people that you pay ransom,
Speaker:right?
Speaker:And you are absolutely, just like in the real ransom world, you are setting
Speaker:yourself up to be kidnapped again.
Speaker:Yep.
Speaker:In fact, that's where a lot of these ransomware as a service people do, right?
Speaker:They still have that persistent connectivity into your environment,
Speaker:and they sell it to the next person who then uses that to then hack
Speaker:you, and you now, like you said, you have to pay the ransom again.
Speaker:Yeah, exactly.
Speaker:Um,
Speaker:Well, you know, for a second there, I thought you were going to say
Speaker:that it's okay to continue writing emails like that and other things and
Speaker:never learning from your mistakes.
Speaker:You should learn from your mistakes.
Speaker:I bet you Sony learned not to talk about their talent in the emails.
Speaker:Uh, I'm sure they still talk about their talent, you know, talk about their talent.
Speaker:They just don't do it in email.
Speaker:Although I have to say, people continue.
Speaker:To amaze me in terms of what they continue to talk about in email in today's world.
Speaker:You know, given or or text.
Speaker:Yeah, text.
Speaker:Right.
Speaker:Um, and, uh, like, yeah, because, you know, well anyway, but the
Speaker:thing is, the thing about all that stuff, all that stuff could come out in a, um.
Speaker:In, in an attack.
Speaker:And so there are things and we're gonna talk about in, in, in upcoming episodes.
Speaker:We are, we are at our heart.
Speaker:We're still a backup and recovery, uh, focused, uh, podcast.
Speaker:But you, in a modern world, you need to be, uh, aware and to understand
Speaker:the threats that your backups have.
Speaker:And I don't know anyone that would argue with the following statement.
Speaker:Ransomware is the number one threat to your backups, um, and the number
Speaker:one reason that you need your backups.
Speaker:I was gonna say, Billy is the number one threat to your backups.
Speaker:What?
Speaker:The random person who might go and just like blow up your environment, but
Speaker:Billy, Billy Billy's, uh,
Speaker:sorry,
Speaker:Billy.
Speaker:not to.
Speaker:Yeah.
Speaker:You know, technically that could be my first name.
Speaker:You know that right?
Speaker:The W. The
Speaker:but it's not
Speaker:but it's
Speaker:but it's, it's interesting point you made because if you look at, I'm, I'm just
Speaker:looking at the poster behind you, right?
Speaker:Your, your book, right?
Speaker:And it's really like ransomware response, right?
Speaker:Which I think everyone thinks about, but I
Speaker:think that key thing is the last piece, right?
Speaker:The recovery
Speaker:Yeah.
Speaker:Yeah.
Speaker:right?
Speaker:Backup is crucial
Speaker:in recovering from ransomware.
Speaker:yeah, exactly.
Speaker:So, so the, you know, and, and this is the, this is the tack that
Speaker:this podcast and that book takes.
Speaker:There are a million books you can go by on how to not get ransomware.
Speaker:Our book basically starts from what they call an assumed breach.
Speaker:Um, you know, a position, which means you're probably gonna get ransomware.
Speaker:The odds of you as a company not getting any ransomware ever are virtually nil.
Speaker:So you need to be able to respond to that and to recover.
Speaker:And, and the, the, the position of the book is that you need
Speaker:to have these discussions.
Speaker:Now.
Speaker:You need to make the decisions.
Speaker:Now what are we going to do?
Speaker:When we get a double extortion attack, right?
Speaker:Think about the worst thing that your company has that
Speaker:you don't want getting out.
Speaker:What are we gonna do when some Russian, um, you know, company comes
Speaker:to us and says, you know, you know, we have this stuff and what they
Speaker:do, by the way, what they do is they post it on like a proof site, right?
Speaker:Um, you know, they, they call it a Proof of life site.
Speaker:Right.
Speaker:Uh, just like, again, going back with the ransom
Speaker:concept right here, here, here's the proof that we have your
Speaker:data and that we can publish it
Speaker:anytime we want to.
Speaker:Um, you know what, you need to make all these decisions upfront.
Speaker:Uh, you know,
Speaker:if you're gonna be successful,
Speaker:so I, as you were talking through this, sorry, I might have
Speaker:looked a little distracted and I
Speaker:you looked a little distracted.
Speaker:because when you were talking through that, so we live in California, right?
Speaker:You
Speaker:know, the first thing that popped to mind,
Speaker:What?
Speaker:earthquake preparedness.
Speaker:Right?
Speaker:Really when you're talking about ransomware recovery, like everything you
Speaker:talked about, have a plan ahead of time.
Speaker:Figure out what you're going to do, all the rest
Speaker:as kids, right?
Speaker:You did the exact same thing, right?
Speaker:You figured out, okay, if something happened, I'm going here.
Speaker:Here's my little bag for school that contains like non-perishable
Speaker:food in case I get stuck at school with water right here.
Speaker:The emergency contact numbers, everything else, because being
Speaker:prepared is half the battle.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Agreed.
Speaker:By the way, um, just a funny little thing.
Speaker:One of my, uh, uh, technical, uh, editors, right?
Speaker:Um, uh, Gina, she, um.
Speaker:She said, you know, the term assume breach means a lot different for women.
Speaker:And I was like, she, I was like, I was like, uh, yeah.
Speaker:Okay.
Speaker:I didn't make up the term.
Speaker:All right.
Speaker:It's just a, it's, it's just an industry term.
Speaker:Assume, breach.
Speaker:I dunno what to tell you.
Speaker:Um, anyway.
Speaker:Yeah.
Speaker:So, so you, you, I, I think the, the point that we're making right
Speaker:now, and the point that the book makes is that you need to adopt.
Speaker:The, the tack that you're probably going to get it, or at least that the
Speaker:chances of you getting are significantly high.
Speaker:It's not the same.
Speaker:When we go back to again, to, to use your, your, your earthquake, uh, thing.
Speaker:If you live in, there are certain parts of the country where natural
Speaker:disasters almost don't get to you, right?
Speaker:The only thing generally you're worried about is like fires, right?
Speaker:You're not gonna get floods, you're not gonna get.
Speaker:Hurricanes, you're not gonna get, um, you.
Speaker:know, actually it's sort of you.
Speaker:If you think, if you think about the country, our country, I don't know about
Speaker:other countries, but if you think about the country, you pick your poison, right?
Speaker:Do you want
Speaker:hurricanes and tsunamis?
Speaker:Do you want tornadoes?
Speaker:Do you want earthquakes?
Speaker:Do you want
Speaker:massive forest fires?
Speaker:My, my point was that depending on, there are parts where you
Speaker:can pick, where natural disasters don't really go after you.
Speaker:Um, I'm thinking like south, like not east, you know, like
Speaker:somewhere
Speaker:the DRE show
Speaker:below the south.
Speaker:I remember the direction.
Speaker:Maybe there's nowhere you could go,
Speaker:but the, but your odds are lower.
Speaker:My point is.
Speaker:There's nowhere you can go to lower the odds of a ransomware attack.
Speaker:Right?
Speaker:Um, and, and that's if, if you learn nothing from this episode,
Speaker:it's that the odds and, and we go into the stats in the book, uh, the
Speaker:odds of you getting a ransomware attack are, it's something like 80%.
Speaker:Uh, you know, in terms of, especially when you look at over time,
Speaker:right?
Speaker:Over time, the odds of you getting a ransomware attack are
Speaker:essentially a hundred percent.
Speaker:Right.
Speaker:Uh, and so the question is, there are a bunch of things that you can do in
Speaker:advance a, to minimize, at least reduce the number of attacks that you get.
Speaker:There are like the, the book does start out with, and we're, we're
Speaker:gonna cover that in the podcast.
Speaker:The book does start out with, here are some things that if you're not doing
Speaker:them well, you're just, you know, you're, that, that person that never
Speaker:changes their oil, you've gotta do some things and, and it will stop roughly
Speaker:90% of the attacks when you look at.
Speaker:So many of the stories that we've read, and they're like, oh, and they, you
Speaker:know, they had a bad password and they didn't have MA and they, you know,
Speaker:you're like, you know, it just kills me.
Speaker:Or unpatched system
Speaker:Yeah.
Speaker:Unpatched systems.
Speaker:Yeah.
Speaker:All that stuff, right?
Speaker:So there are some things you can do to significantly reduce the
Speaker:frequency of a successful attack, but there are also some things that
Speaker:you need to do in advance to prepare.
Speaker:To be able to respond.
Speaker:Right.
Speaker:One of them is, uh, obviously backup and recovery,
Speaker:right?
Speaker:Having a solid backup and recovery system, um, that uses immutable storage, right?
Speaker:We, we've, we, we talk about that a lot.
Speaker:We talked about it in the last few episodes.
Speaker:Um, you know, and then another I really believe strongly, and this is, you know,
Speaker:this will sound like I'm, I'm shilling for
Speaker:Mike, but I believe strongly in having a, a, uh, cybersecurity,
Speaker:uh, service provider,
Speaker:right?
Speaker:Having somebody that this is what they do, right?
Speaker:Look at, you know, even if they're just like doing a regular checkup
Speaker:on what it is that you are doing, uh, but, but they can also provide.
Speaker:SEIM/SOAR tools and XDR tools where they have like a volume discount, right?
Speaker:And then they could potentially put in that, you know, and then you get, and, and
Speaker:they can more importantly, because what matters more than the product you pick is
Speaker:how it gets configured and they'll know
Speaker:how to do that.
Speaker:Right.
Speaker:Um, anyway, we're getting ahead of ourselves.
Speaker:Um.
Speaker:Yeah.
Speaker:Save those for later.
Speaker:Come on,
Speaker:yeah.
Speaker:Um, but, but buy my book anyway.
Speaker:Um, we, it's available for pre-order now.
Speaker:I'm actually literally, right now I'm doing what's called the QC two, which
Speaker:is the quality control number two.
Speaker:This is the final,
Speaker:When it's, so, do you have a date for our
Speaker:Uh, it's gonna be, uh, yeah,
Speaker:I think the official date is March and we're on, we're
Speaker:on target for, uh, that, um, you know, we
Speaker:have
Speaker:so
Speaker:a couple of things.
Speaker:March, 20, 26.
Speaker:Yeah.
Speaker:So if you're listening to this after, then it's already out.
Speaker:You should just go buy it.
Speaker:And there's a companion site for the book that will be live
Speaker:by the time the book is ready.
Speaker:It's currently not live.
Speaker:Um.
Speaker:It's funny, I was, I was, I was using, uh, my French friend as I
Speaker:like to call him Claude, to, to, to review the text in the book.
Speaker:Right.
Speaker:And, and I was like, Hey, look for any typos, look for any,
Speaker:you know, bad URLs or anything.
Speaker:And, and Claude was like, Hey, uh, that website that you're pointing
Speaker:people to, uh, it doesn't exist yet.
Speaker:I'm like, yeah, I know.
Speaker:Trust me, I know I will get that website up before the site goes live.
Speaker:So I've got like.
Speaker:One month to get it up in there.
Speaker:Uh, you'll be fine.
Speaker:Yeah, so I'm
Speaker:just gonna double check, see if there's anything else I want to cover on this.
Speaker:So for people who want to pick up the book in
Speaker:Yeah, yeah.
Speaker:how do they get it?
Speaker:So right now the, the, the one thing I can tell you is it's on amazon.com,
Speaker:right?
Speaker:It's on amazon.com and it's on O'Reilly dot com.
Speaker:It, you know, it's wherever you buy books, right?
Speaker:We'll, we'll have a link for it on the, the show website backup wrap up.com.
Speaker:We'll have a link for it there.
Speaker:And, um, and actually if you buy it there, I'll probably get an extra few bucks.
Speaker:So, you know, feel free to do that.
Speaker:All right.
Speaker:Um, anything else that we need to talk about with the,
Speaker:Nope.
Speaker:yeah, so basically I'm gonna say ransomware is the number one threat
Speaker:to the, to the stability of your data center and the business,
Speaker:and it's a business problem.
Speaker:Not just a technological problem, right?
Speaker:It is a thing that could shut down your company, right?
Speaker:It will shut down your company, right?
Speaker:You
Speaker:And it has in the
Speaker:yeah, you look at um, you look at companies that have ceased to
Speaker:exist after ransomware attacks.
Speaker:You
Speaker:look at companies that are significantly hamper.
Speaker:I think the worst one that I can think of is actually not
Speaker:a company, it's Costa Rica.
Speaker:There's a, Costa Rica got attacked, the entire government got attacked and they
Speaker:had a, or have a law that it's illegal for them to use taxpayer dollars to pay
Speaker:ransom.
Speaker:And so they didn't pay the ransom and basically, um, they
Speaker:never got their stuff back.
Speaker:And so they had to like rebuild essentially, whatever the.
Speaker:I dunno if the right, if you say federal government, but essentially the, their
Speaker:version of the federal government, like imagine rebuilding the IRS from scratch.
Speaker:Right.
Speaker:That's, that's what they had to do.
Speaker:Right.
Speaker:Um, so
Speaker:So, uh, so, uh, adding to that,
Speaker:Yeah,
Speaker:um, I was thinking about, well, as you were saying, like what
Speaker:is the most riskiest, uh, or costliest ransomware attack,
Speaker:Jaguar Land Rover.
Speaker:yeah.
Speaker:Are they still
Speaker:I think there's still recovering, I think it's like two and a half
Speaker:billion dollars in counting.
Speaker:So like three cars.
Speaker:Um, they're not the least expensive cars on the planet, I'll just say that.
Speaker:Yeah,
Speaker:two and a half billion, including all their suppliers and everything
Speaker:else that's been shut down.
Speaker:wow.
Speaker:That is just massive.
Speaker:Um, and, and, and you know, for most people listening to this, they're
Speaker:like, oh, well that, you know, they're just such a big company.
Speaker:You know, just, just think about what you would do if literally any of your mission
Speaker:critical servers just stop working,
Speaker:right?
Speaker:You can't
Speaker:access orders, you can't access customers, you can't email your
Speaker:customers.
Speaker:You wanna let your customers know what's going on, but you don't
Speaker:even know who your customers
Speaker:are because your computers are locked.
Speaker:It's I, it goes back to, I don't remember if you remember this,
Speaker:but remember the dentist, MSP,
Speaker:dentist, office, MSP, that got hit with ransomware and
Speaker:all the dentist's office got
Speaker:I do remember that.
Speaker:I was a, as I recall, it was a Dallas company.
Speaker:Um, yeah.
Speaker:Um.
Speaker:are you gonna do if you're a dentist and you're like, I can't email my patients.
Speaker:The patient shows up and they're like, I would need a teeth cleaned.
Speaker:You're like, I don't know who you are.
Speaker:I don't have your records.
Speaker:I can't entry you into my system.
Speaker:All the rest of that.
Speaker:Yeah.
Speaker:Um, it, it's not a good day, so
Speaker:just if you, if you're not doing much for ransomware, it's
Speaker:time to at least look into it.
Speaker:Um, feel free to check out my book and also, um, you know, following
Speaker:episodes, follow us and, um.
Speaker:You know, tell a friend, tell Prasanna, uh, that is a wrap.