<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/backupwrapup/" rel="self" type="application/rss+xml"/><title><![CDATA[The Backup Wrap-Up]]></title><podcast:guid>9ff8e436-0911-530b-8bb5-7f5a0c37acee</podcast:guid><lastBuildDate>Mon, 30 Mar 2026 17:03:39 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[All rights reserved]]></copyright><managingEditor>W. Curtis Preston (Mr. Backup)</managingEditor><itunes:summary><![CDATA[Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware.  

The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from.  His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others.

A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe.  That's why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware.  If you'd like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you. ]]></itunes:summary><image><url>https://artwork.captivate.fm/4670d4e3-81d6-4770-aeca-fe0331f5ce9e/IO00Uwof5u-hiUJElhkbBmKT.jpg</url><title>The Backup Wrap-Up</title><link><![CDATA[https://www.backupwrapup.com]]></link></image><itunes:image href="https://artwork.captivate.fm/4670d4e3-81d6-4770-aeca-fe0331f5ce9e/IO00Uwof5u-hiUJElhkbBmKT.jpg"/><itunes:owner><itunes:name>W. Curtis Preston (Mr. Backup)</itunes:name></itunes:owner><itunes:author>W. Curtis Preston (Mr. Backup)</itunes:author><description>Formerly known as &quot;Restore it All,&quot; The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware.  

The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis&apos; passion for backups began over 30 years ago when his employer, a $35B bank, lost its purchasing database – and the backups he was in charge of were worthless. After miraculously not being fired, he resolved to learn everything he could about a topic most people try to get away from.  His co-host, Prasanna, saw similar tragedies from the vendor side of the house and also wanted to do whatever he could to stop that from happening to others.

A particular focus lately has been the scourge of ransomware that is plaguing IT organizations across the globe.  That&apos;s why in addition to backup and disaster recovery, we also touch on information security techniques you can use to protect your backup systems from ransomware.  If you&apos;d like to go from being unappreciated to being a cyber recovery hero, this is the podcast for you. </description><link>https://www.backupwrapup.com</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Turning unappreciated backup admins into cyber recovery heroes]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:new-feed-url>https://feeds.captivate.fm/backupwrapup/</itunes:new-feed-url><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Emergency Episode: The PyPI Software Supply Chain Attack You Need to Know About</title><itunes:title>Emergency Episode: The PyPI Software Supply Chain Attack You Need to Know About</itunes:title><description><![CDATA[<p>A PyPI software supply chain attack hit LiteLLM — a library pulled into developer environments 97 million times a month — and if you use it, you may already be compromised. This wasn't a fake package or a typo-squatting trick. Attackers stole real credentials, published malicious code as the real thing, and walked out with SSH keys, cloud credentials, Kubernetes tokens, API keys, and more — all encrypted and sent home before anyone knew what happened.</p><p>I'm doing something I've never done before: an emergency episode, recorded and published immediately because this is that serious. I brought in Dr. Mike Saylor, co-author of our book <em>Learning Ransomware Response and Recovery</em>, and my co-host Prasanna Malaiyandi to break down exactly what happened, how to find out if you were hit, and what you need to do to protect yourself going forward.</p><p>We open with a story from 1982 that perfectly captures what this attack really is — getting poisoned by something you trusted completely. That framing matters. This wasn't a failure of the library. It was a failure of the supply chain. And it can happen again.</p><p><strong>Chapters:</strong></p><p>00:00:00 - Intro: Why this is an emergency episode</p><p>00:01:35 - Meet the guests: Dr. Mike Saylor and Prasanna Malaiyandi</p><p>00:02:31 - The Tylenol poisoning analogy and what it means for software supply chains</p><p>00:05:51 - What LiteLLM is and what the malware actually did to your environment</p><p>00:09:04 - Dependencies explained: why you're affected even if you didn't install LiteLLM directly</p><p>00:12:24 - How to find out if you were hit: the first things to check right now</p><p>00:14:23 - IOCs and TTPs: what to look for in your logs and on your systems</p><p>00:19:07 - Network indicators: unusual traffic and what it tells you</p><p>00:22:12 - How security teams can find out if developers installed it without telling anyone</p><p>00:30:38 - Action items for the future: inventory, pinning, and hash verification</p><p>00:36:55 - Sandboxing new downloads before they touch your environment</p><p>00:37:59 - Immutable backups: why this attack makes the case for them</p><p>00:40:33 - Modern authentication: MFA, its limits, and why passkeys matter</p><p>00:46:53 - Where to get threat intel so you hear about attacks like this faster</p><p>00:53:23 - Wrap-up</p><p>If you installed or upgraded LiteLLM on or after March 24, 2026 without a pinned version, stop what you're doing and listen to this episode first.</p><p>The story:</p><p>https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/ </p><p>https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/ </p><p>https://snyk.io/articles/poisoned-security-scanner-backdooring-litellm/ </p><p>https://www.wiz.io/blog/threes-a-crowd-teampcp-trojanizes-litellm-in-continuation-of-campaign</p><p>https://checkmarx.com/zero-post/python-pypi-supply-chain-attack-colorama/ </p><p>https://www.upwind.io/feed/litellm-pypi-supply-chain-attack-malicious-release </p><p>https://docs.litellm.ai/blog/security-update-march-2026 </p><p>https://www.helpnetsecurity.com/2026/03/25/teampcp-supply-chain-attacks/ </p><p>https://www.darktrace.com/resources/the-cisos-guide-to-cyber-ai</p><p>https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/</p><p>Resources:</p><p>https://www.stopransomware.com</p><p>https://www.cisa.gov</p><p>https://www.cve.org/</p>]]></description><content:encoded><![CDATA[<p>A PyPI software supply chain attack hit LiteLLM — a library pulled into developer environments 97 million times a month — and if you use it, you may already be compromised. This wasn't a fake package or a typo-squatting trick. Attackers stole real credentials, published malicious code as the real thing, and walked out with SSH keys, cloud credentials, Kubernetes tokens, API keys, and more — all encrypted and sent home before anyone knew what happened.</p><p>I'm doing something I've never done before: an emergency episode, recorded and published immediately because this is that serious. I brought in Dr. Mike Saylor, co-author of our book <em>Learning Ransomware Response and Recovery</em>, and my co-host Prasanna Malaiyandi to break down exactly what happened, how to find out if you were hit, and what you need to do to protect yourself going forward.</p><p>We open with a story from 1982 that perfectly captures what this attack really is — getting poisoned by something you trusted completely. That framing matters. This wasn't a failure of the library. It was a failure of the supply chain. And it can happen again.</p><p><strong>Chapters:</strong></p><p>00:00:00 - Intro: Why this is an emergency episode</p><p>00:01:35 - Meet the guests: Dr. Mike Saylor and Prasanna Malaiyandi</p><p>00:02:31 - The Tylenol poisoning analogy and what it means for software supply chains</p><p>00:05:51 - What LiteLLM is and what the malware actually did to your environment</p><p>00:09:04 - Dependencies explained: why you're affected even if you didn't install LiteLLM directly</p><p>00:12:24 - How to find out if you were hit: the first things to check right now</p><p>00:14:23 - IOCs and TTPs: what to look for in your logs and on your systems</p><p>00:19:07 - Network indicators: unusual traffic and what it tells you</p><p>00:22:12 - How security teams can find out if developers installed it without telling anyone</p><p>00:30:38 - Action items for the future: inventory, pinning, and hash verification</p><p>00:36:55 - Sandboxing new downloads before they touch your environment</p><p>00:37:59 - Immutable backups: why this attack makes the case for them</p><p>00:40:33 - Modern authentication: MFA, its limits, and why passkeys matter</p><p>00:46:53 - Where to get threat intel so you hear about attacks like this faster</p><p>00:53:23 - Wrap-up</p><p>If you installed or upgraded LiteLLM on or after March 24, 2026 without a pinned version, stop what you're doing and listen to this episode first.</p><p>The story:</p><p>https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/ </p><p>https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/ </p><p>https://snyk.io/articles/poisoned-security-scanner-backdooring-litellm/ </p><p>https://www.wiz.io/blog/threes-a-crowd-teampcp-trojanizes-litellm-in-continuation-of-campaign</p><p>https://checkmarx.com/zero-post/python-pypi-supply-chain-attack-colorama/ </p><p>https://www.upwind.io/feed/litellm-pypi-supply-chain-attack-malicious-release </p><p>https://docs.litellm.ai/blog/security-update-march-2026 </p><p>https://www.helpnetsecurity.com/2026/03/25/teampcp-supply-chain-attacks/ </p><p>https://www.darktrace.com/resources/the-cisos-guide-to-cyber-ai</p><p>https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/</p><p>Resources:</p><p>https://www.stopransomware.com</p><p>https://www.cisa.gov</p><p>https://www.cve.org/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/pypi-software-supply-chain-attack]]></link><guid isPermaLink="false">25c5e7aa-cc7b-4f9f-9654-8417f04a7f55</guid><itunes:image href="https://artwork.captivate.fm/2a2ba8df-159c-49fb-8bf5-a09d033a5cd0/EMERGENCY-EPISODE-THE-PYPI-ATTACK-1.jpg"/><pubDate>Thu, 26 Mar 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/25c5e7aa-cc7b-4f9f-9654-8417f04a7f55.mp3" length="53870008" type="audio/mpeg"/><itunes:duration>56:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/799ed319-2dcc-4fde-ad98-efa93147f090/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/799ed319-2dcc-4fde-ad98-efa93147f090/index.html" type="text/html"/></item><item><title>Fileless Malware: The Attack That Lives in Memory</title><itunes:title>Fileless Malware: The Attack That Lives in Memory</itunes:title><description><![CDATA[<p>Fileless malware is one of the most dangerous attack types out there — it never writes to your hard drive, lives entirely in RAM, and can steal your credentials before your antivirus has any idea it's there. In this episode, I bring in Dr. Mike Saylor — my co-author on <em>Learning Ransomware Response &amp; Recovery</em> — to break down exactly how this attack works, why it's so hard to detect, and what you can actually do to protect yourself.</p><p>Mike walks us through how fileless malware hides in memory, how bad guys maintain their foothold even after a reboot by modifying registry keys or rewriting the operating system itself, and why the ArcGIS attack is a perfect real-world example — attackers sitting undetected inside a network for two years. We also get into MFA, specifically why a lot of MFA setups are done wrong, why passkeys are the better answer, and when it's time to bring in an EDR or XDR tool.</p><p>Fair warning: the action items here are a bit more advanced than our usual stuff. Think of this as the 401k conversation — don't have it before you've built your emergency fund. But this is stuff you absolutely need to know.</p><p>00:01:26 - Welcome &amp; intro</p><p>00:04:43 - What is fileless malware?</p><p>00:09:16 - How fileless malware achieves persistence (ArcGIS case study)</p><p>00:15:02 - Can fileless malware spread beyond one machine?</p><p>00:16:43 - Defending yourself: MFA done right</p><p>00:20:38 - Why passkeys beat MFA</p><p>00:23:00 - EDR and XDR explained</p><p>00:28:03 - How modern EDR tools detect fileless malware</p><p>00:30:01 - Wrap-up and action items</p>]]></description><content:encoded><![CDATA[<p>Fileless malware is one of the most dangerous attack types out there — it never writes to your hard drive, lives entirely in RAM, and can steal your credentials before your antivirus has any idea it's there. In this episode, I bring in Dr. Mike Saylor — my co-author on <em>Learning Ransomware Response &amp; Recovery</em> — to break down exactly how this attack works, why it's so hard to detect, and what you can actually do to protect yourself.</p><p>Mike walks us through how fileless malware hides in memory, how bad guys maintain their foothold even after a reboot by modifying registry keys or rewriting the operating system itself, and why the ArcGIS attack is a perfect real-world example — attackers sitting undetected inside a network for two years. We also get into MFA, specifically why a lot of MFA setups are done wrong, why passkeys are the better answer, and when it's time to bring in an EDR or XDR tool.</p><p>Fair warning: the action items here are a bit more advanced than our usual stuff. Think of this as the 401k conversation — don't have it before you've built your emergency fund. But this is stuff you absolutely need to know.</p><p>00:01:26 - Welcome &amp; intro</p><p>00:04:43 - What is fileless malware?</p><p>00:09:16 - How fileless malware achieves persistence (ArcGIS case study)</p><p>00:15:02 - Can fileless malware spread beyond one machine?</p><p>00:16:43 - Defending yourself: MFA done right</p><p>00:20:38 - Why passkeys beat MFA</p><p>00:23:00 - EDR and XDR explained</p><p>00:28:03 - How modern EDR tools detect fileless malware</p><p>00:30:01 - Wrap-up and action items</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/fileless-malware-attack-lives-in-memory-leaves-no-trace]]></link><guid isPermaLink="false">f11f4ccc-f98a-4734-b9f1-8ea866f30f4b</guid><itunes:image href="https://artwork.captivate.fm/6000adfe-33e5-4e9e-adde-af0ba1916608/What-is-Ransomware-10.jpg"/><pubDate>Mon, 23 Mar 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/f11f4ccc-f98a-4734-b9f1-8ea866f30f4b.mp3" length="31158111" type="audio/mpeg"/><itunes:duration>32:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/a328d057-7f43-4cb7-a0d7-6db6515eff1e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a328d057-7f43-4cb7-a0d7-6db6515eff1e/index.html" type="text/html"/></item><item><title>Living Off the Land Attack: Hackers Using Your Own Tools Against You</title><itunes:title>Living Off the Land Attack: Hackers Using Your Own Tools Against You</itunes:title><description><![CDATA[<p>A living off the land attack is one of the sneakiest techniques in a ransomware operator's playbook — and in this episode, Dr. Mike Saylor breaks down exactly what it is, how it works, and what your organization can actually do about it.</p><p>Instead of bringing their own tools into your environment (which might trip your alarms), attackers just use what's already there. PowerShell. WMI. RDP. The same tools your admins run every single day. To your monitoring systems, it looks completely normal. That's the whole point.</p><p>Mike and Curtis cover why attackers prefer your tools over their own, how recon can quietly run for 30 to 90 days before the attack goes loud, and what defenders can actually do about it — removing admin privileges, system hardening, golden images, application whitelisting, and free tools like Nmap and Wireshark. There's also a match.com story involving organized crime and a wooden casket on someone's front porch that you really don't want to miss.</p><p>0:00 - Intro</p><p>1:21 - Welcome and Book Announcement</p><p>3:28 - What Is a Living Off the Land Attack?</p><p>5:38 - Real-World Example: Conti Ransomware and WMI</p><p>8:12 - Why Attackers Use Your Tools Instead of Their Own</p><p>13:05 - Admin Privileges: Best Practice vs. Reality</p><p>17:31 - The Louvre Heist Analogy</p><p>20:08 - Recon Phase: Low and Slow</p><p>24:16 - What Defenders Can Do</p><p>25:55 - RDP and Remote Access</p><p>29:48 - The Recon Timeline: 30-90 Days</p><p>30:48 - PowerShell and System Hardening</p><p>34:10 - Network Discovery Tools (Nmap and Wireshark)</p><p>37:37 - Application Whitelisting and Geo IP Blocking</p><p>42:08 - Action Items and Wrap-Up</p>]]></description><content:encoded><![CDATA[<p>A living off the land attack is one of the sneakiest techniques in a ransomware operator's playbook — and in this episode, Dr. Mike Saylor breaks down exactly what it is, how it works, and what your organization can actually do about it.</p><p>Instead of bringing their own tools into your environment (which might trip your alarms), attackers just use what's already there. PowerShell. WMI. RDP. The same tools your admins run every single day. To your monitoring systems, it looks completely normal. That's the whole point.</p><p>Mike and Curtis cover why attackers prefer your tools over their own, how recon can quietly run for 30 to 90 days before the attack goes loud, and what defenders can actually do about it — removing admin privileges, system hardening, golden images, application whitelisting, and free tools like Nmap and Wireshark. There's also a match.com story involving organized crime and a wooden casket on someone's front porch that you really don't want to miss.</p><p>0:00 - Intro</p><p>1:21 - Welcome and Book Announcement</p><p>3:28 - What Is a Living Off the Land Attack?</p><p>5:38 - Real-World Example: Conti Ransomware and WMI</p><p>8:12 - Why Attackers Use Your Tools Instead of Their Own</p><p>13:05 - Admin Privileges: Best Practice vs. Reality</p><p>17:31 - The Louvre Heist Analogy</p><p>20:08 - Recon Phase: Low and Slow</p><p>24:16 - What Defenders Can Do</p><p>25:55 - RDP and Remote Access</p><p>29:48 - The Recon Timeline: 30-90 Days</p><p>30:48 - PowerShell and System Hardening</p><p>34:10 - Network Discovery Tools (Nmap and Wireshark)</p><p>37:37 - Application Whitelisting and Geo IP Blocking</p><p>42:08 - Action Items and Wrap-Up</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/living-off-the-land-attack]]></link><guid isPermaLink="false">b729e3f9-8a2e-400f-a920-6b288627fe4d</guid><itunes:image href="https://artwork.captivate.fm/ec27446f-66b0-455c-a345-cbcd2469f785/What-is-Ransomware-9.jpg"/><pubDate>Mon, 16 Mar 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/b729e3f9-8a2e-400f-a920-6b288627fe4d.mp3" length="44787763" type="audio/mpeg"/><itunes:duration>46:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/affc756c-05ca-4caa-ab25-5ab0dd7e725b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/affc756c-05ca-4caa-ab25-5ab0dd7e725b/index.html" type="text/html"/></item><item><title>New Research Exposes Password Manager Vulnerabilities in LastPass, Bitwarden &amp; Dashlane</title><itunes:title>New Research Exposes Password Manager Vulnerabilities in LastPass, Bitwarden &amp; Dashlane</itunes:title><description><![CDATA[<p>Password manager vulnerabilities aren't just about bad code — and a new research paper out of Zurich just proved it. Researchers analyzed three of the most popular password managers and found fundamental design flaws baked into the very architecture that's supposed to keep your credentials safe. Curtis and Prasanna break it all down and tell you what to do about it.</p><p>If you've ever been that person who asks "but what if the password manager gets hacked?" — this episode is for you. And if you haven't been asking that question, you probably should start. A research team looked at LastPass, Bitwarden, and Dashlane — products with a combined 60 million users representing roughly 23% of the password manager market — and what they found wasn't sloppy programming. It was something harder to fix: architectural problems at the core of how encrypted vaults work.</p><p>Curtis walks through how the zero-knowledge encryption model works, why the vault recovery process creates an inherent trust problem, and why the researchers were able to exploit that trust by impersonating the server during vault recovery. Prasanna adds another layer — the field-level encryption issues inside the vaults themselves, where there's no strong verification that data hasn't been manipulated. It's not theoretical. It's a real attack surface.</p><p>The good news? Curtis still believes password managers are the right tool for today — better than sticky notes on a monitor (yes, he saw that in real life) and better than reusing passwords. But he's also clear that passkeys are the right direction for the future, even if the current implementation is still a little rough around the edges.</p><p>https://eprint.iacr.org/2026/058.pdf</p><p>https://www.theregister.com/2026/02/16/password_managers/</p><p>https://www.forbes.com/sites/daveywinder/2026/01/23/lastpass-issues-critical-warning-for-users---password-attacks-underway/</p>]]></description><content:encoded><![CDATA[<p>Password manager vulnerabilities aren't just about bad code — and a new research paper out of Zurich just proved it. Researchers analyzed three of the most popular password managers and found fundamental design flaws baked into the very architecture that's supposed to keep your credentials safe. Curtis and Prasanna break it all down and tell you what to do about it.</p><p>If you've ever been that person who asks "but what if the password manager gets hacked?" — this episode is for you. And if you haven't been asking that question, you probably should start. A research team looked at LastPass, Bitwarden, and Dashlane — products with a combined 60 million users representing roughly 23% of the password manager market — and what they found wasn't sloppy programming. It was something harder to fix: architectural problems at the core of how encrypted vaults work.</p><p>Curtis walks through how the zero-knowledge encryption model works, why the vault recovery process creates an inherent trust problem, and why the researchers were able to exploit that trust by impersonating the server during vault recovery. Prasanna adds another layer — the field-level encryption issues inside the vaults themselves, where there's no strong verification that data hasn't been manipulated. It's not theoretical. It's a real attack surface.</p><p>The good news? Curtis still believes password managers are the right tool for today — better than sticky notes on a monitor (yes, he saw that in real life) and better than reusing passwords. But he's also clear that passkeys are the right direction for the future, even if the current implementation is still a little rough around the edges.</p><p>https://eprint.iacr.org/2026/058.pdf</p><p>https://www.theregister.com/2026/02/16/password_managers/</p><p>https://www.forbes.com/sites/daveywinder/2026/01/23/lastpass-issues-critical-warning-for-users---password-attacks-underway/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/password-manager-vulnerabilities-lastpass-bitwarden-dashlane]]></link><guid isPermaLink="false">605ef9c4-db20-4800-aa13-9d5f890e79c2</guid><itunes:image href="https://artwork.captivate.fm/7132d3db-af77-4b98-9400-55c316adf6be/What-is-Ransomware-8.jpg"/><pubDate>Mon, 09 Mar 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/605ef9c4-db20-4800-aa13-9d5f890e79c2.mp3" length="41886713" type="audio/mpeg"/><itunes:duration>43:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c70911c-f81c-4ef0-9c4a-1f2bd164da1f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c70911c-f81c-4ef0-9c4a-1f2bd164da1f/index.html" type="text/html"/></item><item><title>What Is an Initial Access Broker — and Why Should You Care?</title><itunes:title>What Is an Initial Access Broker — and Why Should You Care?</itunes:title><description><![CDATA[<p>What is an initial access broker — and why does it matter to your organization? In this episode, W. Curtis Preston and Prasanna Malaiyandi are joined by Dr. Mike Saylor of Black Swan Cybersecurity to break down the role of the initial access broker in today's ransomware attacks.</p><p>Most people picture ransomware as a single bad guy with a keyboard. The reality is way scarier. There's an entire criminal supply chain out there, and the initial access broker is the specialist at the front of it. These are the people who do nothing but break in — stealing credentials, exploiting vulnerabilities, hijacking sessions — and then sell that access to other criminals who do the dirty work. Dr. Mike Saylor walks us through a real case study from 2024 where an employee's personal Gmail account — with a Google Docs folder literally named "passwords" — became the entry point for a corporate ransomware attack months later. This stuff is real, it's happening constantly, and most organizations have no idea how exposed they are.</p><p>We cover what IABs target, how they package and sell access, what "coincidental passwords" are and why they're so dangerous, and what practical steps you can take today to make your organization a harder target.</p><p><strong>Chapters:</strong></p><p>00:00 - Intro: What Is an Initial Access Broker?</p><p>02:12 - Welcome, Introductions, and a Little Judging</p><p>03:33 - Defining the Initial Access Broker</p><p>04:31 - Real Case Study: How Bob's Gmail Became a Corporate Breach</p><p>07:16 - How IABs Package and Sell Access</p><p>10:32 - How Stolen Credentials Get Bundled and Priced</p><p>29:48 - RDP, VPN Vulnerabilities, and What IABs Are Hunting</p><p>32:54 - Web Shells Explained</p><p>35:08 - Session Hijacking and Man-in-the-Middle Attacks</p><p>36:16 - Would Eliminating IABs Stop Ransomware?</p><p>36:49 - How the Cybercriminal Ecosystem Evolved to Create IABs</p><p>39:51 - Practical Takeaways: What You Can Do Right Now</p><p>40:45 - The Numbers: 37 Billion Records and the ShinyHunters Breach</p>]]></description><content:encoded><![CDATA[<p>What is an initial access broker — and why does it matter to your organization? In this episode, W. Curtis Preston and Prasanna Malaiyandi are joined by Dr. Mike Saylor of Black Swan Cybersecurity to break down the role of the initial access broker in today's ransomware attacks.</p><p>Most people picture ransomware as a single bad guy with a keyboard. The reality is way scarier. There's an entire criminal supply chain out there, and the initial access broker is the specialist at the front of it. These are the people who do nothing but break in — stealing credentials, exploiting vulnerabilities, hijacking sessions — and then sell that access to other criminals who do the dirty work. Dr. Mike Saylor walks us through a real case study from 2024 where an employee's personal Gmail account — with a Google Docs folder literally named "passwords" — became the entry point for a corporate ransomware attack months later. This stuff is real, it's happening constantly, and most organizations have no idea how exposed they are.</p><p>We cover what IABs target, how they package and sell access, what "coincidental passwords" are and why they're so dangerous, and what practical steps you can take today to make your organization a harder target.</p><p><strong>Chapters:</strong></p><p>00:00 - Intro: What Is an Initial Access Broker?</p><p>02:12 - Welcome, Introductions, and a Little Judging</p><p>03:33 - Defining the Initial Access Broker</p><p>04:31 - Real Case Study: How Bob's Gmail Became a Corporate Breach</p><p>07:16 - How IABs Package and Sell Access</p><p>10:32 - How Stolen Credentials Get Bundled and Priced</p><p>29:48 - RDP, VPN Vulnerabilities, and What IABs Are Hunting</p><p>32:54 - Web Shells Explained</p><p>35:08 - Session Hijacking and Man-in-the-Middle Attacks</p><p>36:16 - Would Eliminating IABs Stop Ransomware?</p><p>36:49 - How the Cybercriminal Ecosystem Evolved to Create IABs</p><p>39:51 - Practical Takeaways: What You Can Do Right Now</p><p>40:45 - The Numbers: 37 Billion Records and the ShinyHunters Breach</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/what-is-an-initial-access-broker]]></link><guid isPermaLink="false">32857d62-03f9-4d4f-9c95-cdcfe484527f</guid><itunes:image href="https://artwork.captivate.fm/35053e5e-5d74-4ba2-a19c-001c0e8c4b76/What-is-Ransomware-7.jpg"/><pubDate>Mon, 02 Mar 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/32857d62-03f9-4d4f-9c95-cdcfe484527f.mp3" length="42197237" type="audio/mpeg"/><itunes:duration>43:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/50b4baf0-8bbf-4c04-8592-790d7b2ada2e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/50b4baf0-8bbf-4c04-8592-790d7b2ada2e/index.html" type="text/html"/></item><item><title>Ransomware as a Service: How Anyone Can Buy a Cyberattack</title><itunes:title>Ransomware as a Service: How Anyone Can Buy a Cyberattack</itunes:title><description><![CDATA[<p>Ransomware as a service has turned cybercrime into a franchise business — and in this episode, Dr. Mike Saylor and I break down exactly how it works, who's buying, and why the buyer might end up as the patsy.</p><p>If you thought ransomware was just a lone hacker writing code in a basement, this episode is going to change how you think about it. Ransomware as a service means that today, literally anyone — no technical skills required — can pay someone to launch a ransomware attack on their behalf. You hand over the money, tell them what you want, and sit back and watch your crypto wallet. That's it. No portal. No dashboard. No login. Just a chat on the dark web through the TOR network and a prayer that they actually do what you paid for.</p><p>Dr. Mike Saylor walks us through the full criminal ecosystem — from the initial access brokers who collect and sell validated email addresses, to the botnet operators who rent out millions of compromised computers by the hour, to the affiliate programs that tie it all together. We cover the franchise model, the "no honor among thieves" reality of these transactions, and why the person who buys into ransomware as a service might just end up as law enforcement's fall guy.</p><p>This is one of those episodes where the more you learn, the more you realize how much the threat picture has changed — and why your backups are more important than ever.</p><p><strong>Chapters:</strong></p><p>00:00:00 - Episode Intro</p><p>00:01:17 - Introductions &amp; Welcome</p><p>00:03:25 - Setting the Stage: CryptoLocker and the Birth of a Criminal Industry</p><p>00:07:17 - Defining Ransomware as a Service: The Franchise Model</p><p>00:10:36 - The Amazon/AWS Analogy and How Botnets Power the Attacks</p><p>00:17:10 - No Portal, No Dashboard: How Dark Web Transactions Actually Work</p><p>00:19:17 - Why Do RaaS Operators Offer the Service? The Lottery Ticket Theory</p><p>00:21:59 - The Affiliate Model: How the Criminal Ecosystem Specializes</p><p>00:26:33 - How Many RaaS Groups Exist — and Who's Buying?</p><p>00:29:36 - RaaS as Subterfuge: The Conti Group and the Costa Rica Attack</p><p>00:30:49 - Who Are These Criminals, Really?</p>]]></description><content:encoded><![CDATA[<p>Ransomware as a service has turned cybercrime into a franchise business — and in this episode, Dr. Mike Saylor and I break down exactly how it works, who's buying, and why the buyer might end up as the patsy.</p><p>If you thought ransomware was just a lone hacker writing code in a basement, this episode is going to change how you think about it. Ransomware as a service means that today, literally anyone — no technical skills required — can pay someone to launch a ransomware attack on their behalf. You hand over the money, tell them what you want, and sit back and watch your crypto wallet. That's it. No portal. No dashboard. No login. Just a chat on the dark web through the TOR network and a prayer that they actually do what you paid for.</p><p>Dr. Mike Saylor walks us through the full criminal ecosystem — from the initial access brokers who collect and sell validated email addresses, to the botnet operators who rent out millions of compromised computers by the hour, to the affiliate programs that tie it all together. We cover the franchise model, the "no honor among thieves" reality of these transactions, and why the person who buys into ransomware as a service might just end up as law enforcement's fall guy.</p><p>This is one of those episodes where the more you learn, the more you realize how much the threat picture has changed — and why your backups are more important than ever.</p><p><strong>Chapters:</strong></p><p>00:00:00 - Episode Intro</p><p>00:01:17 - Introductions &amp; Welcome</p><p>00:03:25 - Setting the Stage: CryptoLocker and the Birth of a Criminal Industry</p><p>00:07:17 - Defining Ransomware as a Service: The Franchise Model</p><p>00:10:36 - The Amazon/AWS Analogy and How Botnets Power the Attacks</p><p>00:17:10 - No Portal, No Dashboard: How Dark Web Transactions Actually Work</p><p>00:19:17 - Why Do RaaS Operators Offer the Service? The Lottery Ticket Theory</p><p>00:21:59 - The Affiliate Model: How the Criminal Ecosystem Specializes</p><p>00:26:33 - How Many RaaS Groups Exist — and Who's Buying?</p><p>00:29:36 - RaaS as Subterfuge: The Conti Group and the Costa Rica Attack</p><p>00:30:49 - Who Are These Criminals, Really?</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/ransomware-as-a-service-how-anyone-can-buy-a-cyberattack]]></link><guid isPermaLink="false">b175becc-1640-42fe-9df6-533b24820c30</guid><itunes:image href="https://artwork.captivate.fm/0bd1e8a6-5de8-4ea5-ac65-cac02a2b8225/What-is-Ransomware-6.jpg"/><pubDate>Mon, 23 Feb 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/b175becc-1640-42fe-9df6-533b24820c30.mp3" length="33626566" type="audio/mpeg"/><itunes:duration>35:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2b3eb6fd-e1a3-4786-8b34-5e0871ab7657/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2b3eb6fd-e1a3-4786-8b34-5e0871ab7657/index.html" type="text/html"/></item><item><title>The CryptoLocker Virus and the Birth of Modern Ransomware</title><itunes:title>The CryptoLocker Virus and the Birth of Modern Ransomware</itunes:title><description><![CDATA[<p>The cryptolocker virus was the attack that turned ransomware from a nuisance into a full-blown criminal industry — and in this episode of The Backup Wrap-up, we break down exactly how that happened. W. Curtis Preston (Mr. Backup) sits down with co-host Prasanna Malaiyandi and cybersecurity expert Dr. Mike Saylor to trace the full evolution of ransomware and explain why CryptoLocker was the turning point.</p><p>If you've ever wondered how ransomware went from fake pop-up messages to billion-dollar criminal enterprises, this is the episode for you. We start with the earliest days — scareware attacks that did nothing more than frighten you into paying — and walk through the progression of encryption methods that made ransomware increasingly dangerous. Dr. Mike Saylor breaks down the difference between symmetric and asymmetric encryption in plain language, and explains why the move to public-private key pairs made it so much harder for victims to recover without paying up.</p><p>Then we get into the cryptolocker virus itself: how it spread through fake FedEx emails, why it kick-started phishing awareness training, what Operation Tovar did to shut it down, and — just as interesting — what the bad guys learned from its failures. We cover the role of the Zeus botnet, how Bitcoin became the payment method of choice, and why ransoms started out at just a few hundred bucks. We also talk about what happened next: the rise of data exfiltration, double extortion, and even triple extortion where attackers go after the victims of the victims.</p><p>Plus, we take a side trip into the LastPass breach and pour one out for the guy who lost his crypto fortune in a landfill.</p><p>Whether you're in IT, security, or just want to understand how ransomware works, this episode gives you the full picture.</p><p>Chapters:</p><p>00:00:00 — Intro</p><p>00:01:22 — Welcome and Introductions</p><p>00:04:11 — The Three Generations of Ransomware</p><p>00:05:01 — Scareware: Fake Attacks That Did Nothing</p><p>00:05:42 — Ciphers and Decoder Ring Encryption</p><p>00:06:38 — Symmetric Encryption Explained</p><p>00:09:25 — Asymmetric (Public-Private Key) Encryption</p><p>00:12:46 — Why Asymmetric Encryption Made Ransomware Stronger</p><p>00:15:44 — What Was the CryptoLocker Virus?</p><p>00:16:25 — Lessons CryptoLocker Taught Victims and Criminals</p><p>00:18:03 — Operation Tovar Takes Down CryptoLocker</p><p>00:19:54 — Bitcoin, Ransom Amounts, and Getting Paid</p><p>00:23:20 — Botnets Explained: Networks of Zombie Computers</p><p>00:26:22 — Recap: Three Phases of Ransomware</p><p>00:27:09 — Double Extortion and Data Exfiltration</p><p>00:28:01 — The LastPass Connection</p><p>00:28:47 — The Lost Crypto Hard Drive</p>]]></description><content:encoded><![CDATA[<p>The cryptolocker virus was the attack that turned ransomware from a nuisance into a full-blown criminal industry — and in this episode of The Backup Wrap-up, we break down exactly how that happened. W. Curtis Preston (Mr. Backup) sits down with co-host Prasanna Malaiyandi and cybersecurity expert Dr. Mike Saylor to trace the full evolution of ransomware and explain why CryptoLocker was the turning point.</p><p>If you've ever wondered how ransomware went from fake pop-up messages to billion-dollar criminal enterprises, this is the episode for you. We start with the earliest days — scareware attacks that did nothing more than frighten you into paying — and walk through the progression of encryption methods that made ransomware increasingly dangerous. Dr. Mike Saylor breaks down the difference between symmetric and asymmetric encryption in plain language, and explains why the move to public-private key pairs made it so much harder for victims to recover without paying up.</p><p>Then we get into the cryptolocker virus itself: how it spread through fake FedEx emails, why it kick-started phishing awareness training, what Operation Tovar did to shut it down, and — just as interesting — what the bad guys learned from its failures. We cover the role of the Zeus botnet, how Bitcoin became the payment method of choice, and why ransoms started out at just a few hundred bucks. We also talk about what happened next: the rise of data exfiltration, double extortion, and even triple extortion where attackers go after the victims of the victims.</p><p>Plus, we take a side trip into the LastPass breach and pour one out for the guy who lost his crypto fortune in a landfill.</p><p>Whether you're in IT, security, or just want to understand how ransomware works, this episode gives you the full picture.</p><p>Chapters:</p><p>00:00:00 — Intro</p><p>00:01:22 — Welcome and Introductions</p><p>00:04:11 — The Three Generations of Ransomware</p><p>00:05:01 — Scareware: Fake Attacks That Did Nothing</p><p>00:05:42 — Ciphers and Decoder Ring Encryption</p><p>00:06:38 — Symmetric Encryption Explained</p><p>00:09:25 — Asymmetric (Public-Private Key) Encryption</p><p>00:12:46 — Why Asymmetric Encryption Made Ransomware Stronger</p><p>00:15:44 — What Was the CryptoLocker Virus?</p><p>00:16:25 — Lessons CryptoLocker Taught Victims and Criminals</p><p>00:18:03 — Operation Tovar Takes Down CryptoLocker</p><p>00:19:54 — Bitcoin, Ransom Amounts, and Getting Paid</p><p>00:23:20 — Botnets Explained: Networks of Zombie Computers</p><p>00:26:22 — Recap: Three Phases of Ransomware</p><p>00:27:09 — Double Extortion and Data Exfiltration</p><p>00:28:01 — The LastPass Connection</p><p>00:28:47 — The Lost Crypto Hard Drive</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/cryptolocker-virus-modern-ransomware]]></link><guid isPermaLink="false">55d62949-aae4-4556-8842-7b3b6e49dfc0</guid><itunes:image href="https://artwork.captivate.fm/4f82436e-fe65-4677-8c83-006de470266a/What-is-Ransomware-5.jpg"/><pubDate>Mon, 16 Feb 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/55d62949-aae4-4556-8842-7b3b6e49dfc0.mp3" length="31192798" type="audio/mpeg"/><itunes:duration>32:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/52791576-fac5-41b1-8995-8cef172f87d7/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/52791576-fac5-41b1-8995-8cef172f87d7/index.html" type="text/html"/></item><item><title>A Brief History of Ransomware</title><itunes:title>A Brief History of Ransomware</itunes:title><description><![CDATA[<p>A history of ransomware is more than just dates and names—it's the story of how criminals evolved from mailing infected floppy disks in 1989 to running billion-dollar enterprises that cripple entire organizations. On this episode of The Backup Wrap-up, I sit down with Dr. Mike Saylor, my co-author on "Learning Ransomware Response and Recovery," to trace this evolution from the AIDS Trojan to today's sophisticated double extortion attacks.</p><p>We talk about how ransomware went from requiring physical distribution to scaling globally through the internet, how cryptocurrency made anonymous payment possible, and why the shift from tape to disk backups created vulnerabilities that attackers now exploit first. You'll learn about the wild west days when IT focused on building systems without understanding how bad guys attack, the emergence of ransomware-as-a-service that democratized cybercrime, and why modern attacks target your backups before encrypting your production systems.</p><p>If you've ever wondered why backup immutability matters or how we got to a point where ransomware is inevitable rather than hypothetical, this episode connects those dots. Dr. Mike and I also discuss why having backups is still critical even with double extortion threats, and what you need to know about defending your backup systems in today's threat environment.</p><p><strong>Chapter Markers:</strong></p><p>00:00:00 - Introduction</p><p>00:01:19 - Welcome and Guest Introduction</p><p>00:02:19 - Curtis's First Ransomware Memory</p><p>00:03:40 - The AIDS Trojan: First Ransomware (1989)</p><p>00:04:42 - The Wild West Era: Late 1990s Security</p><p>00:08:05 - Y2K and Budget Shifts</p><p>00:11:26 - The Transition from Tape to Disk Backups</p><p>00:15:45 - How Disk Backups Created Vulnerabilities</p><p>00:19:30 - The Rise of Cryptolocker and Bitcoin</p><p>00:23:15 - Ransomware as a Service Emerges</p><p>00:27:40 - WannaCry and NotPetya</p><p>00:31:20 - Double Extortion: The Game Changer</p><p>00:35:10 - Why Backups Still Matter</p><p>00:37:55 - Should You Just Pay the Ransom?</p><p>00:40:01 - Defending Your Backup System</p>]]></description><content:encoded><![CDATA[<p>A history of ransomware is more than just dates and names—it's the story of how criminals evolved from mailing infected floppy disks in 1989 to running billion-dollar enterprises that cripple entire organizations. On this episode of The Backup Wrap-up, I sit down with Dr. Mike Saylor, my co-author on "Learning Ransomware Response and Recovery," to trace this evolution from the AIDS Trojan to today's sophisticated double extortion attacks.</p><p>We talk about how ransomware went from requiring physical distribution to scaling globally through the internet, how cryptocurrency made anonymous payment possible, and why the shift from tape to disk backups created vulnerabilities that attackers now exploit first. You'll learn about the wild west days when IT focused on building systems without understanding how bad guys attack, the emergence of ransomware-as-a-service that democratized cybercrime, and why modern attacks target your backups before encrypting your production systems.</p><p>If you've ever wondered why backup immutability matters or how we got to a point where ransomware is inevitable rather than hypothetical, this episode connects those dots. Dr. Mike and I also discuss why having backups is still critical even with double extortion threats, and what you need to know about defending your backup systems in today's threat environment.</p><p><strong>Chapter Markers:</strong></p><p>00:00:00 - Introduction</p><p>00:01:19 - Welcome and Guest Introduction</p><p>00:02:19 - Curtis's First Ransomware Memory</p><p>00:03:40 - The AIDS Trojan: First Ransomware (1989)</p><p>00:04:42 - The Wild West Era: Late 1990s Security</p><p>00:08:05 - Y2K and Budget Shifts</p><p>00:11:26 - The Transition from Tape to Disk Backups</p><p>00:15:45 - How Disk Backups Created Vulnerabilities</p><p>00:19:30 - The Rise of Cryptolocker and Bitcoin</p><p>00:23:15 - Ransomware as a Service Emerges</p><p>00:27:40 - WannaCry and NotPetya</p><p>00:31:20 - Double Extortion: The Game Changer</p><p>00:35:10 - Why Backups Still Matter</p><p>00:37:55 - Should You Just Pay the Ransom?</p><p>00:40:01 - Defending Your Backup System</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/brief-history-ransomware]]></link><guid isPermaLink="false">2c891325-c412-4731-be26-54696e1f89e9</guid><itunes:image href="https://artwork.captivate.fm/4670d4e3-81d6-4770-aeca-fe0331f5ce9e/IO00Uwof5u-hiUJElhkbBmKT.jpg"/><pubDate>Mon, 09 Feb 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/2c891325-c412-4731-be26-54696e1f89e9.mp3" length="42758166" type="audio/mpeg"/><itunes:duration>44:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/63e5a043-a8a3-4a04-bc99-b48962ef0620/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/63e5a043-a8a3-4a04-bc99-b48962ef0620/index.html" type="text/html"/></item><item><title>How Ransomware Works: The Five Objectives of Every Attack</title><itunes:title>How Ransomware Works: The Five Objectives of Every Attack</itunes:title><description><![CDATA[<p>Understanding how ransomware works is critical for anyone responsible for protecting their organization's data. In this episode of The Backup Wrap-up, we examine the five core objectives that drive nearly every ransomware attack - from initial access through the final ransom note delivery.</p><p>I'm joined by my co-author Dr. Mike Saylor as we kick off what's going to be a comprehensive series on our new book, "Learning Ransomware Response and Recovery." We start at the beginning: how do these attackers even get in? Mike breaks down the role of initial access brokers (IABs) - the bad guys who specialize in harvesting and selling credentials. We talk about why email phishing remains the cheapest and most statistically reliable attack vector, even with all our defenses.</p><p>From there, we walk through lateral movement and reconnaissance. Once attackers are inside your network, they're not sitting idle. They're mapping your environment, identifying your crown jewels, and figuring out where your backups live. The "phone home" phase establishes command and control, letting attackers coordinate their activities and receive instructions.</p><p>We dig into data exfiltration and the rise of double extortion. It's not enough anymore to just encrypt your data - attackers are stealing it first, threatening to publish it even if you can restore from backups. Mike shares some fascinating details about how sophisticated ransomware can be, including variants that examine file headers rather than just extensions to find valuable targets.</p><p>The encryption phase itself is resource-intensive, and Mike explains why you might actually notice your computer acting weird if you're paying attention. Your mouse hesitates, typing lags, the network slows down - these are all potential warning signs.</p><p>Finally, we cover how ransom notes are delivered today. Spoiler: it's not the old-school desktop background takeover anymore. Modern ransomware drops text files in every folder it touches, making sure you can't miss the message.</p><p>This episode sets the foundation for understanding how ransomware works, which is the first step in defending against it and recovering when prevention fails.</p>]]></description><content:encoded><![CDATA[<p>Understanding how ransomware works is critical for anyone responsible for protecting their organization's data. In this episode of The Backup Wrap-up, we examine the five core objectives that drive nearly every ransomware attack - from initial access through the final ransom note delivery.</p><p>I'm joined by my co-author Dr. Mike Saylor as we kick off what's going to be a comprehensive series on our new book, "Learning Ransomware Response and Recovery." We start at the beginning: how do these attackers even get in? Mike breaks down the role of initial access brokers (IABs) - the bad guys who specialize in harvesting and selling credentials. We talk about why email phishing remains the cheapest and most statistically reliable attack vector, even with all our defenses.</p><p>From there, we walk through lateral movement and reconnaissance. Once attackers are inside your network, they're not sitting idle. They're mapping your environment, identifying your crown jewels, and figuring out where your backups live. The "phone home" phase establishes command and control, letting attackers coordinate their activities and receive instructions.</p><p>We dig into data exfiltration and the rise of double extortion. It's not enough anymore to just encrypt your data - attackers are stealing it first, threatening to publish it even if you can restore from backups. Mike shares some fascinating details about how sophisticated ransomware can be, including variants that examine file headers rather than just extensions to find valuable targets.</p><p>The encryption phase itself is resource-intensive, and Mike explains why you might actually notice your computer acting weird if you're paying attention. Your mouse hesitates, typing lags, the network slows down - these are all potential warning signs.</p><p>Finally, we cover how ransom notes are delivered today. Spoiler: it's not the old-school desktop background takeover anymore. Modern ransomware drops text files in every folder it touches, making sure you can't miss the message.</p><p>This episode sets the foundation for understanding how ransomware works, which is the first step in defending against it and recovering when prevention fails.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/how-ransomware-works-five-objectives-every-attack]]></link><guid isPermaLink="false">96bad3ea-d39a-4a05-8abc-d7714119ee62</guid><itunes:image href="https://artwork.captivate.fm/48cab294-5692-4742-8f1c-6911d35dbfad/What-is-Ransomware-2.jpg"/><pubDate>Mon, 02 Feb 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/96bad3ea-d39a-4a05-8abc-d7714119ee62.mp3" length="39510185" type="audio/mpeg"/><itunes:duration>41:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/4b840eed-9070-452f-adef-0ab150c0a8dd/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/4b840eed-9070-452f-adef-0ab150c0a8dd/index.html" type="text/html"/></item><item><title>Disk Backup Security - Disk Make Things Worse?</title><itunes:title>Disk Backup Security - Disk Make Things Worse?</itunes:title><description><![CDATA[<p>Disk backup security is the weak link that ransomware attackers exploit every day—and most backup admins don't even realize it. In this episode, Curtis and Prasanna examine how the move from tape to disk-based backups created an unintended security gap that threat actors now target as their first priority.</p><p>The transition to disk brought real benefits: deduplication made storage affordable, replication eliminated the "man in a van" for offsite copies, and backup verification became practical. But disk backup security wasn't part of the original architecture. When backups lived on tape, physical access was required to destroy them. Disk backups sitting in E:\backups can be wiped out with a single command.</p><p>Threat actors figured this out fast. After gaining initial access, the first thing they do is identify and eliminate your backups. No backups means no recovery—which means you pay the ransom.</p><p>Curtis and Prasanna discuss the history of how we got here, why backups are now the number one target, and practical solutions including obfuscation, getting backups out of user space, and implementing truly immutable storage. The standard is simple: if you can't delete the backups, they can't delete the backups.</p><p><strong>TIMESTAMPS:</strong></p><p>0:00 - Episode intro</p><p>1:24 - Welcome &amp; introductions</p><p>4:04 - Tape explained for the modern audience</p><p>9:07 - Why tape got faster (and problematic)</p><p>10:54 - The shoe-shining problem</p><p>12:27 - Deduplication changes everything</p><p>15:35 - Benefits of disk-based backup</p><p>20:29 - THE PROBLEM: RM -r / DEL <em>.</em></p><p>23:43 - Backups are the #1 ransomware target</p><p>26:26 - Immutability as the solution</p><p>27:32 - Book: Learning Ransomware Response &amp; Recovery</p>]]></description><content:encoded><![CDATA[<p>Disk backup security is the weak link that ransomware attackers exploit every day—and most backup admins don't even realize it. In this episode, Curtis and Prasanna examine how the move from tape to disk-based backups created an unintended security gap that threat actors now target as their first priority.</p><p>The transition to disk brought real benefits: deduplication made storage affordable, replication eliminated the "man in a van" for offsite copies, and backup verification became practical. But disk backup security wasn't part of the original architecture. When backups lived on tape, physical access was required to destroy them. Disk backups sitting in E:\backups can be wiped out with a single command.</p><p>Threat actors figured this out fast. After gaining initial access, the first thing they do is identify and eliminate your backups. No backups means no recovery—which means you pay the ransom.</p><p>Curtis and Prasanna discuss the history of how we got here, why backups are now the number one target, and practical solutions including obfuscation, getting backups out of user space, and implementing truly immutable storage. The standard is simple: if you can't delete the backups, they can't delete the backups.</p><p><strong>TIMESTAMPS:</strong></p><p>0:00 - Episode intro</p><p>1:24 - Welcome &amp; introductions</p><p>4:04 - Tape explained for the modern audience</p><p>9:07 - Why tape got faster (and problematic)</p><p>10:54 - The shoe-shining problem</p><p>12:27 - Deduplication changes everything</p><p>15:35 - Benefits of disk-based backup</p><p>20:29 - THE PROBLEM: RM -r / DEL <em>.</em></p><p>23:43 - Backups are the #1 ransomware target</p><p>26:26 - Immutability as the solution</p><p>27:32 - Book: Learning Ransomware Response &amp; Recovery</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/disk-backup-security-disk-make-things-worse]]></link><guid isPermaLink="false">f5fe2171-782e-48e6-a732-3dad2238e8ab</guid><itunes:image href="https://artwork.captivate.fm/a90d08f2-b76c-40c5-aca7-3bd3d7525aa1/What-is-Ransomware-1.jpg"/><pubDate>Mon, 26 Jan 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/f5fe2171-782e-48e6-a732-3dad2238e8ab.mp3" length="30993871" type="audio/mpeg"/><itunes:duration>32:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2896652b-ec8c-4e86-b70f-792ca8e44b68/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2896652b-ec8c-4e86-b70f-792ca8e44b68/index.html" type="text/html"/></item><item><title>What Is Ransomware and Why Should You Care?</title><itunes:title>What Is Ransomware and Why Should You Care?</itunes:title><description><![CDATA[<p>What is ransomware, and why does it remain the number one threat to businesses of all sizes? In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi break down the fundamentals of ransomware attacks and explain why the question "what is ransomware" still gets searched tens of thousands of times each month.</p><p>We cover the two main types of ransomware attacks: traditional encryption-based attacks where hackers lock your data and demand payment, and the newer double extortion model where attackers steal your sensitive information before encrypting it—then threaten to publish everything if you don't pay.</p><p>Our hosts share real-world examples including the Sony hack, the Costa Rica government attack, and the massive Jaguar Land Rover breach that cost over $2.5 billion. Whether you're a Fortune 500 company or a small dental office, this episode explains what is ransomware, why you're a target, and why preparation is your best defense.</p>]]></description><content:encoded><![CDATA[<p>What is ransomware, and why does it remain the number one threat to businesses of all sizes? In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi break down the fundamentals of ransomware attacks and explain why the question "what is ransomware" still gets searched tens of thousands of times each month.</p><p>We cover the two main types of ransomware attacks: traditional encryption-based attacks where hackers lock your data and demand payment, and the newer double extortion model where attackers steal your sensitive information before encrypting it—then threaten to publish everything if you don't pay.</p><p>Our hosts share real-world examples including the Sony hack, the Costa Rica government attack, and the massive Jaguar Land Rover breach that cost over $2.5 billion. Whether you're a Fortune 500 company or a small dental office, this episode explains what is ransomware, why you're a target, and why preparation is your best defense.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/what-is-ransomware-why-care]]></link><guid isPermaLink="false">32c25085-341a-4efb-880e-0a8e0275e177</guid><itunes:image href="https://artwork.captivate.fm/e37355be-0edd-424d-a43e-74503cb356fb/What-is-Ransomware.jpg"/><pubDate>Mon, 19 Jan 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/32c25085-341a-4efb-880e-0a8e0275e177.mp3" length="29877488" type="audio/mpeg"/><itunes:duration>31:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/43ba85ae-6305-457e-9a89-bebca0d73ae8/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/43ba85ae-6305-457e-9a89-bebca0d73ae8/index.html" type="text/html"/></item><item><title>Backup TCO: The Costs Nobody Talks About</title><itunes:title>Backup TCO: The Costs Nobody Talks About</itunes:title><description><![CDATA[<p>What's your real backup TCO? Most organizations focus on software licenses, hardware, and cloud storage when budgeting for backup infrastructure. But those are just the visible costs. The true backup TCO includes something far more expensive: the humans managing it all.</p><p>In this episode, Curtis and Prasanna break down the complete picture of backup costs. They explore why soft costs—the labor, the troubleshooting, the daily monitoring—often exceed what you're paying for technology. With studies showing over half of environments spend more than 10 hours weekly on backup management, those labor dollars add up fast.</p><p>The discussion covers cloud storage pitfalls (especially with object lock and retention policies), why automation is your best friend, and whether SaaS-based backup might actually save you money. Curtis shares his infamous 1993 story about losing a production database – the origin story of Mr. Backup himself. If you're looking to get a handle on your backup TCO, this is the episode for you.</p>]]></description><content:encoded><![CDATA[<p>What's your real backup TCO? Most organizations focus on software licenses, hardware, and cloud storage when budgeting for backup infrastructure. But those are just the visible costs. The true backup TCO includes something far more expensive: the humans managing it all.</p><p>In this episode, Curtis and Prasanna break down the complete picture of backup costs. They explore why soft costs—the labor, the troubleshooting, the daily monitoring—often exceed what you're paying for technology. With studies showing over half of environments spend more than 10 hours weekly on backup management, those labor dollars add up fast.</p><p>The discussion covers cloud storage pitfalls (especially with object lock and retention policies), why automation is your best friend, and whether SaaS-based backup might actually save you money. Curtis shares his infamous 1993 story about losing a production database – the origin story of Mr. Backup himself. If you're looking to get a handle on your backup TCO, this is the episode for you.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/backup-tco-hidden-costs]]></link><guid isPermaLink="false">d34bd6ff-7f1f-4139-8b38-76259e044ccc</guid><itunes:image href="https://artwork.captivate.fm/a2fbec0e-e8ce-4dfd-a59f-eefef9503359/10-features-every-backup-system-needs-5.jpg"/><pubDate>Mon, 12 Jan 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d34bd6ff-7f1f-4139-8b38-76259e044ccc.mp3" length="29332891" type="audio/mpeg"/><itunes:duration>30:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/409f53ab-4bf2-4ddd-9187-bf5d85a3403c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/409f53ab-4bf2-4ddd-9187-bf5d85a3403c/index.html" type="text/html"/></item><item><title>Why Ransomware Attacks on Backups Should Terrify You</title><itunes:title>Why Ransomware Attacks on Backups Should Terrify You</itunes:title><description><![CDATA[<p>Ransomware attacks on backups have reached epidemic levels, with 96% of attacks now targeting backup infrastructure. In this episode of The Backup Wrap-up, Curtis Preston and Prasanna Malaiyandi break down the alarming statistics and explain why cybercriminals have made your recovery systems their primary target.</p><p>The math is simple: if attackers destroy your backups, you're far more likely to pay the ransom. And with only 25% of organizations feeling prepared for ransomware attacks on backups, the gap between threat and readiness is massive.</p><p>Curtis and Prasanna discuss two studies revealing these numbers, explore why less than 7% of companies recover within a day, and outline practical defenses including true immutability, separate identity management systems, and MFA. If you're not protecting your backup infrastructure from ransomware attacks on backups, you're leaving yourself wide open.</p>]]></description><content:encoded><![CDATA[<p>Ransomware attacks on backups have reached epidemic levels, with 96% of attacks now targeting backup infrastructure. In this episode of The Backup Wrap-up, Curtis Preston and Prasanna Malaiyandi break down the alarming statistics and explain why cybercriminals have made your recovery systems their primary target.</p><p>The math is simple: if attackers destroy your backups, you're far more likely to pay the ransom. And with only 25% of organizations feeling prepared for ransomware attacks on backups, the gap between threat and readiness is massive.</p><p>Curtis and Prasanna discuss two studies revealing these numbers, explore why less than 7% of companies recover within a day, and outline practical defenses including true immutability, separate identity management systems, and MFA. If you're not protecting your backup infrastructure from ransomware attacks on backups, you're leaving yourself wide open.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/ransomware-attacks-on-backups-threat]]></link><guid isPermaLink="false">4d7e458f-5c55-4773-92bc-63cf16d18d25</guid><itunes:image href="https://artwork.captivate.fm/4670d4e3-81d6-4770-aeca-fe0331f5ce9e/IO00Uwof5u-hiUJElhkbBmKT.jpg"/><pubDate>Mon, 05 Jan 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/4d7e458f-5c55-4773-92bc-63cf16d18d25.mp3" length="28147142" type="audio/mpeg"/><itunes:duration>29:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/ec2a09f5-d2da-4126-92c8-68fd21174792/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/ec2a09f5-d2da-4126-92c8-68fd21174792/index.html" type="text/html"/></item><item><title>Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance</title><itunes:title>Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance</itunes:title><description><![CDATA[<p>Building a cyber security team isn't optional anymore; it's the difference between recovering from ransomware and going out of business. In this episode, Curtis and Prasanna explain why hardening your backup infrastructure is only half the battle. You need professionals who know how to configure XDR systems without drowning you in false positives, blue teams to defend your environment, and red teams to test whether your defenses actually work. They cover the role of MSSPs, incident response planning, cyber insurance requirements, and why attempting ransomware response on your own is like those old TV warnings: "Don't try this at home." If you've been following their series on backup basics and system hardening, this episode ties it all together with the human element that makes or breaks your recovery plan.</p>]]></description><content:encoded><![CDATA[<p>Building a cyber security team isn't optional anymore; it's the difference between recovering from ransomware and going out of business. In this episode, Curtis and Prasanna explain why hardening your backup infrastructure is only half the battle. You need professionals who know how to configure XDR systems without drowning you in false positives, blue teams to defend your environment, and red teams to test whether your defenses actually work. They cover the role of MSSPs, incident response planning, cyber insurance requirements, and why attempting ransomware response on your own is like those old TV warnings: "Don't try this at home." If you've been following their series on backup basics and system hardening, this episode ties it all together with the human element that makes or breaks your recovery plan.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/build-your-cybersecurity-team-blue-team-read-team-cyber-insurance]]></link><guid isPermaLink="false">68f18a58-1a3b-44e4-b6f8-78eeb1e6340e</guid><itunes:image href="https://artwork.captivate.fm/956c7837-4c85-4799-9dda-b195f3e19db9/10-features-every-backup-system-needs-3.jpg"/><pubDate>Mon, 22 Dec 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/68f18a58-1a3b-44e4-b6f8-78eeb1e6340e.mp3" length="29898808" type="audio/mpeg"/><itunes:duration>31:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2b5aa80e-d997-4eb5-a8b6-bdc9ee23e759/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2b5aa80e-d997-4eb5-a8b6-bdc9ee23e759/index.html" type="text/html"/></item><item><title>Building a resilient backup system</title><itunes:title>Building a resilient backup system</itunes:title><description><![CDATA[<p>Want to know how to build an resilient backup system that protects from ransomware attacks? In this episode, Curtis and Prasanna go beyond the basics to discuss four critical security features every modern backup system needs. Building on feedback from their previous episode about backup fundamentals, they cover multi-factor authentication (and why SMS doesn't cut it anymore), secure remote access methods, role-based access control, and when to bring in managed security service providers. The hosts explain why the person with full backup system access is literally the most powerful person in your company from a data destruction standpoint. If ransomware is your number one recovery scenario—and it is—then these security hardening techniques aren't optional. They're survival skills for your backup infrastructure.</p>]]></description><content:encoded><![CDATA[<p>Want to know how to build an resilient backup system that protects from ransomware attacks? In this episode, Curtis and Prasanna go beyond the basics to discuss four critical security features every modern backup system needs. Building on feedback from their previous episode about backup fundamentals, they cover multi-factor authentication (and why SMS doesn't cut it anymore), secure remote access methods, role-based access control, and when to bring in managed security service providers. The hosts explain why the person with full backup system access is literally the most powerful person in your company from a data destruction standpoint. If ransomware is your number one recovery scenario—and it is—then these security hardening techniques aren't optional. They're survival skills for your backup infrastructure.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/building-resilient-backup-system]]></link><guid isPermaLink="false">c6262c29-34fc-4826-8d04-89940748544e</guid><itunes:image href="https://artwork.captivate.fm/253efcd4-db73-480c-9eac-db8abcd094f7/10-features-every-backup-system-needs-1.jpg"/><pubDate>Mon, 15 Dec 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c6262c29-34fc-4826-8d04-89940748544e.mp3" length="33397135" type="audio/mpeg"/><itunes:duration>34:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/00ba3fd9-61a1-46c1-9117-00b23256b900/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/00ba3fd9-61a1-46c1-9117-00b23256b900/index.html" type="text/html"/></item><item><title>10 Must-Have Features of Any Backup System</title><itunes:title>10 Must-Have Features of Any Backup System</itunes:title><description><![CDATA[<p>Every backup system needs certain design elements to actually work when disaster strikes. In this episode of The Backup Wrap-up, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi break down the 10 non-negotiable components your backup system must have. They cover the 3-2-1 rule, automated scheduling, recovery testing, defined RTOs and RPOs, backup security, SaaS protection, documentation, retention policies, monitoring, and endpoint backup. If your backup system is missing any of these elements, you're taking risks you can't afford. Curtis and Prasanna share war stories from real disasters and explain why no one cares if you can back up - they only care if you can restore. This fast-paced episode gives you the checklist every IT professional needs to evaluate their current backup approach.</p>]]></description><content:encoded><![CDATA[<p>Every backup system needs certain design elements to actually work when disaster strikes. In this episode of The Backup Wrap-up, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi break down the 10 non-negotiable components your backup system must have. They cover the 3-2-1 rule, automated scheduling, recovery testing, defined RTOs and RPOs, backup security, SaaS protection, documentation, retention policies, monitoring, and endpoint backup. If your backup system is missing any of these elements, you're taking risks you can't afford. Curtis and Prasanna share war stories from real disasters and explain why no one cares if you can back up - they only care if you can restore. This fast-paced episode gives you the checklist every IT professional needs to evaluate their current backup approach.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/10-must-have-backup-system-features]]></link><guid isPermaLink="false">d4813ced-c672-4336-992c-c19032532198</guid><itunes:image href="https://artwork.captivate.fm/060e419a-9bb8-4093-9f08-db837fdd45ec/10-features-every-backup-system-needs.jpg"/><pubDate>Mon, 08 Dec 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d4813ced-c672-4336-992c-c19032532198.mp3" length="33242051" type="audio/mpeg"/><itunes:duration>34:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/80f07620-361d-4652-86ee-a577bf9b72a4/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/80f07620-361d-4652-86ee-a577bf9b72a4/index.html" type="text/html"/></item><item><title>The Death of the 3-2-1 Rule: Enter 3-2-1-1-0</title><itunes:title>The Death of the 3-2-1 Rule: Enter 3-2-1-1-0</itunes:title><description><![CDATA[<p>The 3-2-1 rule is dead. Long live 3-2-1-1-0. For decades, the 3-2-1 rule has been the gold standard for backup strategies - three copies of your data, on two different media, with one copy somewhere else. But ransomware killed it. Not because the fundamentals were wrong, but because threat actors learned to target backups specifically. In this episode, Curtis and Prasanna explain why the traditional 3-2-1 rule isn't enough anymore and what the evolution to 3-2-1-1-0 means for your backup strategy. The extra "1" stands for one immutable, air-gapped copy that attackers can't delete or encrypt. The "0" means zero failures - your backups must actually work when you need them. You'll learn why SaaS platforms don't meet the 3-2-1 rule, how to think about immutability in the cloud era, and why this upgrade isn't optional if you want to survive a ransomware attack.</p><p>Our interview with Peter Krogh, the one who coined the term:</p><p>https://www.backupwrapup.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast/</p>]]></description><content:encoded><![CDATA[<p>The 3-2-1 rule is dead. Long live 3-2-1-1-0. For decades, the 3-2-1 rule has been the gold standard for backup strategies - three copies of your data, on two different media, with one copy somewhere else. But ransomware killed it. Not because the fundamentals were wrong, but because threat actors learned to target backups specifically. In this episode, Curtis and Prasanna explain why the traditional 3-2-1 rule isn't enough anymore and what the evolution to 3-2-1-1-0 means for your backup strategy. The extra "1" stands for one immutable, air-gapped copy that attackers can't delete or encrypt. The "0" means zero failures - your backups must actually work when you need them. You'll learn why SaaS platforms don't meet the 3-2-1 rule, how to think about immutability in the cloud era, and why this upgrade isn't optional if you want to survive a ransomware attack.</p><p>Our interview with Peter Krogh, the one who coined the term:</p><p>https://www.backupwrapup.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/death-of-321-rule-enter-32110]]></link><guid isPermaLink="false">cd71f0e3-260a-4e50-8f20-ce156ab50f27</guid><itunes:image href="https://artwork.captivate.fm/195c85e5-8cf0-4367-a313-1132285bcbe4/Your-paragraph-text-3000-x-3000-px.jpg"/><pubDate>Mon, 01 Dec 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/cd71f0e3-260a-4e50-8f20-ce156ab50f27.mp3" length="30240684" type="audio/mpeg"/><itunes:duration>31:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/31e7281a-e8b9-47ef-934a-f1ba2012defb/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/31e7281a-e8b9-47ef-934a-f1ba2012defb/index.html" type="text/html"/></item><item><title>How to Set Realistic Recovery Point Objective (RPO) Goals</title><itunes:title>How to Set Realistic Recovery Point Objective (RPO) Goals</itunes:title><description><![CDATA[<p>Want to know how much data you're really willing to lose? We're breaking down recovery point objective RPO - the agreement about how much data loss you can accept, measured in time. Most organizations have RPOs that are pure fantasy, claiming they can only lose an hour of data when they're backing up once a day. Curtis and Prasanna discuss why RPO matters, how ransomware scenarios can force you to accept more data loss than planned, and the difference between your stated RPO and your actual backup frequency. Learn practical strategies for rightsizing your backup schedule, using database transaction logs to minimize data loss, leveraging snapshot-based backup technologies, and protecting your SaaS applications like Microsoft 365 and Salesforce. From incremental backups to continuous data protection, discover how modern backup technology can help you meet your recovery point objective RPO targets without overwhelming your infrastructure.</p>]]></description><content:encoded><![CDATA[<p>Want to know how much data you're really willing to lose? We're breaking down recovery point objective RPO - the agreement about how much data loss you can accept, measured in time. Most organizations have RPOs that are pure fantasy, claiming they can only lose an hour of data when they're backing up once a day. Curtis and Prasanna discuss why RPO matters, how ransomware scenarios can force you to accept more data loss than planned, and the difference between your stated RPO and your actual backup frequency. Learn practical strategies for rightsizing your backup schedule, using database transaction logs to minimize data loss, leveraging snapshot-based backup technologies, and protecting your SaaS applications like Microsoft 365 and Salesforce. From incremental backups to continuous data protection, discover how modern backup technology can help you meet your recovery point objective RPO targets without overwhelming your infrastructure.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/set-realistic-recovery-point-objective-rpo]]></link><guid isPermaLink="false">c43e353a-4f5d-4beb-b01d-916172794319</guid><itunes:image href="https://artwork.captivate.fm/f54b6028-fbf8-41f7-8544-34b5b2f500b5/your-recovery-time-objective-is-a-fantasy-2.jpg"/><pubDate>Mon, 24 Nov 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c43e353a-4f5d-4beb-b01d-916172794319.mp3" length="33728547" type="audio/mpeg"/><itunes:duration>35:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fd6a47eb-3c4f-4649-890e-b6bb03a09eab/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fd6a47eb-3c4f-4649-890e-b6bb03a09eab/index.html" type="text/html"/></item><item><title>Recovery Time Objective vs Reality: Closing the Gap</title><itunes:title>Recovery Time Objective vs Reality: Closing the Gap</itunes:title><description><![CDATA[<p>Most IT teams can't meet their recovery time objective—and they don't even know it. In this episode of The Backup Wrap-up, Curtis and Prasanna explain why your RTO is probably fantasy, who should actually be setting it (hint: not you), and what recovery time actual really means. We cover the critical difference between objectives and reality, why testing is non-negotiable, and how to have honest conversations with business leadership about what's achievable. Learn about DR drills, chaos engineering, tabletop exercises, and why measuring your actual recovery times is the only way to close the gap. Stop feeling like a failure and start building realistic, tested recovery plans that actually work when disaster strikes.</p>]]></description><content:encoded><![CDATA[<p>Most IT teams can't meet their recovery time objective—and they don't even know it. In this episode of The Backup Wrap-up, Curtis and Prasanna explain why your RTO is probably fantasy, who should actually be setting it (hint: not you), and what recovery time actual really means. We cover the critical difference between objectives and reality, why testing is non-negotiable, and how to have honest conversations with business leadership about what's achievable. Learn about DR drills, chaos engineering, tabletop exercises, and why measuring your actual recovery times is the only way to close the gap. Stop feeling like a failure and start building realistic, tested recovery plans that actually work when disaster strikes.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/recovery-time-objective-vs-reality]]></link><guid isPermaLink="false">2b3c5b98-cab8-4864-a758-cb7d6b6ab35c</guid><itunes:image href="https://artwork.captivate.fm/788a49a2-52c5-4c30-88b6-3ff7353172f8/your-recovery-time-objective-is-a-fantasy.jpg"/><pubDate>Mon, 17 Nov 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/2b3c5b98-cab8-4864-a758-cb7d6b6ab35c.mp3" length="31645450" type="audio/mpeg"/><itunes:duration>32:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/8e37e3a5-4c42-4644-b15e-438ee5abc053/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8e37e3a5-4c42-4644-b15e-438ee5abc053/index.html" type="text/html"/></item><item><title>Microsoft 365 backup is NOT an option - It&apos;s mandatory</title><itunes:title>Microsoft 365 backup is NOT an option - It&apos;s mandatory</itunes:title><description><![CDATA[<p>Many organizations believe that Microsoft 365 backup is handled by Microsoft. That's a dangerous misconception. In this episode, W. Curtis Preston (Mr. Backup) and Microsoft 365 expert Vanessa Toves explain why you own your data and are responsible for protecting it—not Microsoft. They discuss the limitations of the recycle bin, why retention policies aren't backups, and what can go wrong when organizations assume SaaS means hands-off data protection. Whether you're running a Fortune 500 company or a small business, if you're using Microsoft 365, you need a proper backup solution. Learn why the shared responsibility model means you're on the hook for your data, and what you can do to protect it. This conversation will change how you think about cloud data protection.</p>]]></description><content:encoded><![CDATA[<p>Many organizations believe that Microsoft 365 backup is handled by Microsoft. That's a dangerous misconception. In this episode, W. Curtis Preston (Mr. Backup) and Microsoft 365 expert Vanessa Toves explain why you own your data and are responsible for protecting it—not Microsoft. They discuss the limitations of the recycle bin, why retention policies aren't backups, and what can go wrong when organizations assume SaaS means hands-off data protection. Whether you're running a Fortune 500 company or a small business, if you're using Microsoft 365, you need a proper backup solution. Learn why the shared responsibility model means you're on the hook for your data, and what you can do to protect it. This conversation will change how you think about cloud data protection.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/microsoft-365-backup-requirement]]></link><guid isPermaLink="false">380a2360-5612-4163-94b5-6c8e78bd2d46</guid><itunes:image href="https://artwork.captivate.fm/472c5fa1-ca59-46af-9f97-5e9e403f5102/arCGIS-hack-unnoticed-for-one-year-3.jpg"/><pubDate>Mon, 10 Nov 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/380a2360-5612-4163-94b5-6c8e78bd2d46.mp3" length="57254695" type="audio/mpeg"/><itunes:duration>59:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/881830e6-f9db-4f74-b5da-8bcb02c6bc81/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/881830e6-f9db-4f74-b5da-8bcb02c6bc81/index.html" type="text/html"/></item><item><title>Detect Ransomware Before It Destroys Your Business</title><itunes:title>Detect Ransomware Before It Destroys Your Business</itunes:title><description><![CDATA[<p>Ransomware detection is more complex than most organizations realize. In this episode, cybersecurity expert Mike Saylor breaks down the real-world signs of ransomware attacks—from users complaining about slow computers to smart devices acting strangely. We explore polymorphic malware that changes based on its target, the risks posed by managed service providers using shared credentials, and why milliseconds matter in ransomware detection and response. Mike explains the difference between EDR, XDR, SIEM, and SOAR tools, helping you understand which security solutions you actually need. We also discuss why 24/7 monitoring is non-negotiable and how even small businesses can afford proper ransomware detection capabilities. If you're trying to protect your organization without breaking the bank, this episode offers practical guidance on building your security stack and knowing when to call in expert help.</p>]]></description><content:encoded><![CDATA[<p>Ransomware detection is more complex than most organizations realize. In this episode, cybersecurity expert Mike Saylor breaks down the real-world signs of ransomware attacks—from users complaining about slow computers to smart devices acting strangely. We explore polymorphic malware that changes based on its target, the risks posed by managed service providers using shared credentials, and why milliseconds matter in ransomware detection and response. Mike explains the difference between EDR, XDR, SIEM, and SOAR tools, helping you understand which security solutions you actually need. We also discuss why 24/7 monitoring is non-negotiable and how even small businesses can afford proper ransomware detection capabilities. If you're trying to protect your organization without breaking the bank, this episode offers practical guidance on building your security stack and knowing when to call in expert help.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/detect-ransomware-before-destroys-business]]></link><guid isPermaLink="false">1693d5dc-f3b6-4420-8920-5d1113c02ff4</guid><itunes:image href="https://artwork.captivate.fm/86b503a9-0945-4b89-a62c-135946d73883/arCGIS-hack-unnoticed-for-one-year-2.jpg"/><pubDate>Mon, 27 Oct 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1693d5dc-f3b6-4420-8920-5d1113c02ff4.mp3" length="32573325" type="audio/mpeg"/><itunes:duration>33:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/800747ae-1dc3-43f4-aefa-de7171fa7909/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/800747ae-1dc3-43f4-aefa-de7171fa7909/index.html" type="text/html"/></item><item><title>The ArcGIS Hack That Turned Backups Into a Malware Repository</title><itunes:title>The ArcGIS Hack That Turned Backups Into a Malware Repository</itunes:title><description><![CDATA[<p>This episode examines a sophisticated ArcGIS hack that remained undetected for 12 months. The threat group Flax Typhoon compromised an ArcGIS server by exploiting weak credentials and deploying a malicious Java extension that functioned as a web shell. The attack highlights critical failures in traditional security approaches: the malware was backed up along with legitimate data, signature-based detection tools completely missed the custom code, and the lack of multi-factor authentication made the initial breach possible. Curtis and Prasanna discuss why behavioral detection is now mandatory, how password length trumps complexity, and the importance of cyber hygiene practices like regular system audits and extension management. They also cover ReliaQuest's recommendations for preventing similar attacks, including automated response playbooks and monitoring for anomalous behavior. If you're running public-facing applications or managing any IT infrastructure, this episode provides actionable lessons you can't afford to ignore.</p><p>https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise</p>]]></description><content:encoded><![CDATA[<p>This episode examines a sophisticated ArcGIS hack that remained undetected for 12 months. The threat group Flax Typhoon compromised an ArcGIS server by exploiting weak credentials and deploying a malicious Java extension that functioned as a web shell. The attack highlights critical failures in traditional security approaches: the malware was backed up along with legitimate data, signature-based detection tools completely missed the custom code, and the lack of multi-factor authentication made the initial breach possible. Curtis and Prasanna discuss why behavioral detection is now mandatory, how password length trumps complexity, and the importance of cyber hygiene practices like regular system audits and extension management. They also cover ReliaQuest's recommendations for preventing similar attacks, including automated response playbooks and monitoring for anomalous behavior. If you're running public-facing applications or managing any IT infrastructure, this episode provides actionable lessons you can't afford to ignore.</p><p>https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/arcgis-hack-backups-malware-repository]]></link><guid isPermaLink="false">e3881853-01fe-4181-9521-7e803b87cded</guid><itunes:image href="https://artwork.captivate.fm/9769ceef-3467-487b-83f1-3418e901ac49/arCGIS-hack-unnoticed-for-one-year.jpg"/><pubDate>Mon, 20 Oct 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/e3881853-01fe-4181-9521-7e803b87cded.mp3" length="24286857" type="audio/mpeg"/><itunes:duration>25:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/6a4dcdb4-18fa-4740-bada-0159a41920a5/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/6a4dcdb4-18fa-4740-bada-0159a41920a5/index.html" type="text/html"/></item><item><title>Deepfake Attacks: The Growing Threat to Enterprise Security</title><itunes:title>Deepfake Attacks: The Growing Threat to Enterprise Security</itunes:title><description><![CDATA[<p>Deepfake attacks are exploding, and your company is probably not ready. In this episode of The Backup Wrap-up, we dive into how cybercriminals are using AI to clone voices and create fake videos to authorize fraudulent wire transfers and reset credentials. With nearly 50% of businesses already experiencing deepfake attacks, this isn't a future problem – it's happening right now. We break down the two main attack vectors: authorization fraud (where fake CEOs trick employees into wiring money) and credential theft (where attackers reset passwords and MFA tokens). More importantly, we give you actionable defense strategies: multi-channel verification protocols, callback procedures for sensitive transactions, employee training programs, and break-glass scenarios. You'll learn what not to rely on (spoiler: caller ID is worthless) and why policy and procedure matter more than technology alone. This is a must-listen for anyone responsible for security or financial controls.</p>]]></description><content:encoded><![CDATA[<p>Deepfake attacks are exploding, and your company is probably not ready. In this episode of The Backup Wrap-up, we dive into how cybercriminals are using AI to clone voices and create fake videos to authorize fraudulent wire transfers and reset credentials. With nearly 50% of businesses already experiencing deepfake attacks, this isn't a future problem – it's happening right now. We break down the two main attack vectors: authorization fraud (where fake CEOs trick employees into wiring money) and credential theft (where attackers reset passwords and MFA tokens). More importantly, we give you actionable defense strategies: multi-channel verification protocols, callback procedures for sensitive transactions, employee training programs, and break-glass scenarios. You'll learn what not to rely on (spoiler: caller ID is worthless) and why policy and procedure matter more than technology alone. This is a must-listen for anyone responsible for security or financial controls.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/deepfake-attacks-enterprise-security]]></link><guid isPermaLink="false">fedd3a40-23a7-4bb2-b1ae-4f840a2f572b</guid><itunes:image href="https://artwork.captivate.fm/54d55f7d-6e8f-4015-8905-705b401d84e5/stopping.jpg"/><pubDate>Mon, 06 Oct 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/fedd3a40-23a7-4bb2-b1ae-4f840a2f572b.mp3" length="36864926" type="audio/mpeg"/><itunes:duration>38:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/35f7fbb3-adf3-4f1b-911b-15ab641fac78/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/35f7fbb3-adf3-4f1b-911b-15ab641fac78/index.html" type="text/html"/></item><item><title>Cyber Attack Notification - Final Lessons from Mr. Robot Season One</title><itunes:title>Cyber Attack Notification - Final Lessons from Mr. Robot Season One</itunes:title><description><![CDATA[<p>When cyber attack notification goes wrong, companies face a disaster worse than the original breach. This episode dives deep into the critical mistakes organizations make when communicating about security incidents - and why transparency beats secrecy every time.</p><p>We examine real-world failures like LastPass and Rackspace, where poor communication strategies amplified the damage from their cyber attacks. From legal requirements in California and GDPR to the new one-hour notification rules in China, we cover what regulations demand and why going beyond compliance makes business sense.</p><p>Learn how to create effective status pages, manage customer expectations during recovery, and avoid the death-by-a-thousand-cuts approach that destroys trust. We share practical strategies for early and frequent communication that can actually strengthen customer relationships during crisis situations.</p>]]></description><content:encoded><![CDATA[<p>When cyber attack notification goes wrong, companies face a disaster worse than the original breach. This episode dives deep into the critical mistakes organizations make when communicating about security incidents - and why transparency beats secrecy every time.</p><p>We examine real-world failures like LastPass and Rackspace, where poor communication strategies amplified the damage from their cyber attacks. From legal requirements in California and GDPR to the new one-hour notification rules in China, we cover what regulations demand and why going beyond compliance makes business sense.</p><p>Learn how to create effective status pages, manage customer expectations during recovery, and avoid the death-by-a-thousand-cuts approach that destroys trust. We share practical strategies for early and frequent communication that can actually strengthen customer relationships during crisis situations.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/cyber-attack-notification-mr-robot-season-one]]></link><guid isPermaLink="false">6a73d580-2239-44f5-b109-0c0e79a95d2b</guid><itunes:image href="https://artwork.captivate.fm/aab6d107-c079-453d-a319-bbd94388ccec/MR-ROBOT-PODCAST-COVER.png"/><pubDate>Mon, 29 Sep 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/6a73d580-2239-44f5-b109-0c0e79a95d2b.mp3" length="46143211" type="audio/mpeg"/><itunes:duration>48:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Insider Threats and the Power of Least Privilege Access</title><itunes:title>Insider Threats and the Power of Least Privilege Access</itunes:title><description><![CDATA[<p>Insider threats represent one of the most dangerous cybersecurity risks facing organizations today - and they're way more common than you think. In this episode of The Backup Wrap-up, we explore the three main types of insider threats: compromised employees who get extorted or have their credentials stolen, disgruntled workers who want revenge after getting fired, and outside attackers who infiltrate your company to become malicious insiders. We break down real-world scenarios and discuss how to protect against them using least privilege principles, monitoring systems, and immutable backups. You'll learn why 31% of insider threat incidents could have been prevented if someone had spoken up, and why immutable backups are your last line of defense when an insider goes rogue. This is a must-listen for anyone responsible for data protection and cybersecurity.</p>]]></description><content:encoded><![CDATA[<p>Insider threats represent one of the most dangerous cybersecurity risks facing organizations today - and they're way more common than you think. In this episode of The Backup Wrap-up, we explore the three main types of insider threats: compromised employees who get extorted or have their credentials stolen, disgruntled workers who want revenge after getting fired, and outside attackers who infiltrate your company to become malicious insiders. We break down real-world scenarios and discuss how to protect against them using least privilege principles, monitoring systems, and immutable backups. You'll learn why 31% of insider threat incidents could have been prevented if someone had spoken up, and why immutable backups are your last line of defense when an insider goes rogue. This is a must-listen for anyone responsible for data protection and cybersecurity.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/insider-threats-least-privilege-access]]></link><guid isPermaLink="false">dba2ad48-04cb-479a-b1b9-a2a6a0492261</guid><itunes:image href="https://artwork.captivate.fm/379acc8b-8814-4798-85b2-c2084c7f3921/MR-ROBOT-PODCAST-COVER.jpg"/><pubDate>Mon, 22 Sep 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/dba2ad48-04cb-479a-b1b9-a2a6a0492261.mp3" length="41941501" type="audio/mpeg"/><itunes:duration>43:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/8dbb8214-5079-47f4-9294-4934bd91a09d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8dbb8214-5079-47f4-9294-4934bd91a09d/index.html" type="text/html"/></item><item><title>Advanced Persistent Threats Explained Through Mr. Robot</title><itunes:title>Advanced Persistent Threats Explained Through Mr. Robot</itunes:title><description><![CDATA[<p>Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended periods. In this episode, we analyze multiple APT scenarios from Mr. Robot, including the Evil Corp hack, Ollie's compromised laptop, and the Dark Army's infiltration of Allsafe. We explore how threat actors establish footholds, maintain persistence, and operate across different network segments. From raspberry pi devices hidden in executive washrooms to compromised thermostats communicating with other facilities, we examine the various ways APTs can manifest. Our discussion covers detection methods, the importance of monitoring new devices, and why proper incident response goes far beyond simple malware scans. Learn the red flags to watch for and why machine learning tools are becoming critical for identifying suspicious network behavior.</p>]]></description><content:encoded><![CDATA[<p>Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended periods. In this episode, we analyze multiple APT scenarios from Mr. Robot, including the Evil Corp hack, Ollie's compromised laptop, and the Dark Army's infiltration of Allsafe. We explore how threat actors establish footholds, maintain persistence, and operate across different network segments. From raspberry pi devices hidden in executive washrooms to compromised thermostats communicating with other facilities, we examine the various ways APTs can manifest. Our discussion covers detection methods, the importance of monitoring new devices, and why proper incident response goes far beyond simple malware scans. Learn the red flags to watch for and why machine learning tools are becoming critical for identifying suspicious network behavior.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/advanced-persistent-threats-explained]]></link><guid isPermaLink="false">03186820-cd7a-4e24-91f0-307c72b7a618</guid><itunes:image href="https://artwork.captivate.fm/857293dc-81fb-48ab-a4ca-7dcbd8e3c568/MR-ROBOT-PODCAST-COVER-2.jpg"/><pubDate>Mon, 15 Sep 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/03186820-cd7a-4e24-91f0-307c72b7a618.mp3" length="31240460" type="audio/mpeg"/><itunes:duration>32:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/b571ae3c-13f2-4ac5-835a-3093924be710/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b571ae3c-13f2-4ac5-835a-3093924be710/index.html" type="text/html"/></item><item><title>Cybersecurity Situational Awareness Lessons from Mr. Robot</title><itunes:title>Cybersecurity Situational Awareness Lessons from Mr. Robot</itunes:title><description><![CDATA[<p>This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hacking, and social engineering tactics. The hosts discuss real-world defenses including USB port management, network segmentation, and employee training. They explore WPA2 encryption vulnerabilities and why upgrading to WPA3 matters for wireless security. The conversation covers practical cybersecurity situational awareness lessons, from recognizing physical security threats to monitoring network traffic patterns. Curtis shares war stories about malware-infected conference USB sticks, and both hosts examine how poor cybersecurity situational awareness enabled the fictional attacks. This episode provides actionable insights for IT professionals looking to strengthen their organization's security posture against USB-based threats, Bluetooth exploits, and social engineering campaigns.</p>]]></description><content:encoded><![CDATA[<p>This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hacking, and social engineering tactics. The hosts discuss real-world defenses including USB port management, network segmentation, and employee training. They explore WPA2 encryption vulnerabilities and why upgrading to WPA3 matters for wireless security. The conversation covers practical cybersecurity situational awareness lessons, from recognizing physical security threats to monitoring network traffic patterns. Curtis shares war stories about malware-infected conference USB sticks, and both hosts examine how poor cybersecurity situational awareness enabled the fictional attacks. This episode provides actionable insights for IT professionals looking to strengthen their organization's security posture against USB-based threats, Bluetooth exploits, and social engineering campaigns.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/cybersecurity-situational-awareness-mr-robot-ep6]]></link><guid isPermaLink="false">1657d4bb-774a-4dc5-a9f7-759c35113111</guid><itunes:image href="https://artwork.captivate.fm/fca9bb51-bf87-43e5-9a0d-ef02b7cf5380/MR-ROBOT-PODCAST-COVER-1.jpg"/><pubDate>Mon, 08 Sep 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1657d4bb-774a-4dc5-a9f7-759c35113111.mp3" length="40125863" type="audio/mpeg"/><itunes:duration>41:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/66411383-39d9-4738-8091-49ec00fc07ce/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/66411383-39d9-4738-8091-49ec00fc07ce/index.html" type="text/html"/></item><item><title>Honeypot Server Best Practices - From Mr. Robot to Reality</title><itunes:title>Honeypot Server Best Practices - From Mr. Robot to Reality</itunes:title><description><![CDATA[<p>Learn the ins and outs of honeypot server deployment and management in this episode of The Backup Wrap-up. We break down the cybersecurity concept using examples from Mr. Robot episodes 1.6 and 1.7, showing how these deceptive systems can catch both external attackers and insider threats.</p><p>A honeypot server works by creating an enticing target that looks valuable but contains no real business data. The key is making it accessible through common exploits and monitoring every access attempt. Curtis and Prasanna discuss real-world implementation strategies, from naming conventions to network placement, and explain why the honeypot only works if attackers don't know it exists. They also cover the critical importance of remote log storage for forensic analysis and how these systems can reveal attack patterns and entry points during incident response.</p>]]></description><content:encoded><![CDATA[<p>Learn the ins and outs of honeypot server deployment and management in this episode of The Backup Wrap-up. We break down the cybersecurity concept using examples from Mr. Robot episodes 1.6 and 1.7, showing how these deceptive systems can catch both external attackers and insider threats.</p><p>A honeypot server works by creating an enticing target that looks valuable but contains no real business data. The key is making it accessible through common exploits and monitoring every access attempt. Curtis and Prasanna discuss real-world implementation strategies, from naming conventions to network placement, and explain why the honeypot only works if attackers don't know it exists. They also cover the critical importance of remote log storage for forensic analysis and how these systems can reveal attack patterns and entry points during incident response.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/honeypot-server-practices-mr-robot]]></link><guid isPermaLink="false">ddd7cbb2-6ab8-44c1-a096-412e190b5c2d</guid><itunes:image href="https://artwork.captivate.fm/56ec1111-1998-40d9-98da-07e58c335499/MR-ROBOT-PODCAST-COVER.jpg"/><pubDate>Mon, 01 Sep 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/ddd7cbb2-6ab8-44c1-a096-412e190b5c2d.mp3" length="38949288" type="audio/mpeg"/><itunes:duration>40:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/eb7d86a5-085c-43b8-9151-008572e21b94/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/eb7d86a5-085c-43b8-9151-008572e21b94/index.html" type="text/html"/></item><item><title>Privilege Escalation Explained: Mr. Robot Cybersecurity Lessons</title><itunes:title>Privilege Escalation Explained: Mr. Robot Cybersecurity Lessons</itunes:title><description><![CDATA[<p>Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileges and compromise entire networks. Through examples from Mr. Robot, we explore both vertical privilege escalation (exploiting vulnerabilities for admin access) and horizontal attacks (spreading through shared systems). Learn why backup administrators often become prime targets for privilege escalation and how proper security controls can prevent these attacks. We discuss real-world cases including the Target breach via HVAC systems and recent ransomware campaigns using social engineering for privilege escalation. Discover how IoT devices create attack vectors, why physical security remains crucial, and how immutable backups protect against privilege escalation attempts. Perfect for IT professionals seeking to understand and defend against these sophisticated attack methods.</p><p>Mentioned in the episode:</p><p>https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/</p><p>https://www.backupwrapup.com/red-team-cyber-security-strategies/</p><p>Pre-order Learning Ransomware Response &amp; Recovery: https://www.amazon.com/Learning-Ransomware-Response-Recovery-Stopping/dp/1098169581</p>]]></description><content:encoded><![CDATA[<p>Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileges and compromise entire networks. Through examples from Mr. Robot, we explore both vertical privilege escalation (exploiting vulnerabilities for admin access) and horizontal attacks (spreading through shared systems). Learn why backup administrators often become prime targets for privilege escalation and how proper security controls can prevent these attacks. We discuss real-world cases including the Target breach via HVAC systems and recent ransomware campaigns using social engineering for privilege escalation. Discover how IoT devices create attack vectors, why physical security remains crucial, and how immutable backups protect against privilege escalation attempts. Perfect for IT professionals seeking to understand and defend against these sophisticated attack methods.</p><p>Mentioned in the episode:</p><p>https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/</p><p>https://www.backupwrapup.com/red-team-cyber-security-strategies/</p><p>Pre-order Learning Ransomware Response &amp; Recovery: https://www.amazon.com/Learning-Ransomware-Response-Recovery-Stopping/dp/1098169581</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/privilege-escalation-mr-robot-cybersecurity]]></link><guid isPermaLink="false">d8cdbbca-1117-4994-861b-f11dc54ea4f7</guid><itunes:image href="https://artwork.captivate.fm/95da86ba-4a38-43a0-b38e-fabd6583aa12/MR-ROBOT-PODCAST-COVER.jpg"/><pubDate>Mon, 25 Aug 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d8cdbbca-1117-4994-861b-f11dc54ea4f7.mp3" length="45139268" type="audio/mpeg"/><itunes:duration>47:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Mr Robot Lessons: Cybersecurity in the Workplace</title><itunes:title>Mr Robot Lessons: Cybersecurity in the Workplace</itunes:title><description><![CDATA[<p>This episode examines cybersecurity in the workplace through the lens of Mr. Robot's "Exploits" episode, where social engineering takes center stage. Curtis Preston and Prasanna break down how Elliot infiltrates Steel Mountain data center using badge cloning, psychological manipulation, and fake identities.</p><p>The hosts analyze real-world implications of these attacks, from coffee shop badge theft to exploiting lonely employees. They discuss critical gaps in physical security protocols and explain why cybersecurity in the workplace fails when organizations rely on single points of security. Key topics include visitor badge systems, tailgating prevention, security camera monitoring, and building a culture where employees feel empowered to challenge unauthorized access. The episode reveals how most workplace breaches happen through human exploitation rather than technical hacking, making employee training and robust security protocols critical for protecting sensitive data and systems.</p>]]></description><content:encoded><![CDATA[<p>This episode examines cybersecurity in the workplace through the lens of Mr. Robot's "Exploits" episode, where social engineering takes center stage. Curtis Preston and Prasanna break down how Elliot infiltrates Steel Mountain data center using badge cloning, psychological manipulation, and fake identities.</p><p>The hosts analyze real-world implications of these attacks, from coffee shop badge theft to exploiting lonely employees. They discuss critical gaps in physical security protocols and explain why cybersecurity in the workplace fails when organizations rely on single points of security. Key topics include visitor badge systems, tailgating prevention, security camera monitoring, and building a culture where employees feel empowered to challenge unauthorized access. The episode reveals how most workplace breaches happen through human exploitation rather than technical hacking, making employee training and robust security protocols critical for protecting sensitive data and systems.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/mr-robot-lessons-cybersecurity-workplace]]></link><guid isPermaLink="false">9ba449bb-c3fe-44c5-823a-ccba7bab3188</guid><itunes:image href="https://artwork.captivate.fm/59a3911c-7472-4efc-bb24-3db1016225a4/RECON-2.jpg"/><pubDate>Mon, 18 Aug 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9ba449bb-c3fe-44c5-823a-ccba7bab3188.mp3" length="42172186" type="audio/mpeg"/><itunes:duration>43:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Social Engineering Attacks: Lessons from Mr. Robot Episode 3</title><itunes:title>Social Engineering Attacks: Lessons from Mr. Robot Episode 3</itunes:title><description><![CDATA[<p>Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social engineering to impersonate employees and reset passwords. We break down the hospital hacking scene, revealing how underfunded IT departments create vulnerabilities that social engineering attacks exploit. The episode also covers email security, backup system risks, and the Sony hack parallels shown in the series. Learn how to protect your organization from social engineering by understanding what information to keep private, how to properly fund cybersecurity, and why your backup systems need protection from social engineering tactics.</p>]]></description><content:encoded><![CDATA[<p>Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social engineering to impersonate employees and reset passwords. We break down the hospital hacking scene, revealing how underfunded IT departments create vulnerabilities that social engineering attacks exploit. The episode also covers email security, backup system risks, and the Sony hack parallels shown in the series. Learn how to protect your organization from social engineering by understanding what information to keep private, how to properly fund cybersecurity, and why your backup systems need protection from social engineering tactics.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/social-engineering-mr-robot-ep3]]></link><guid isPermaLink="false">e409b0e3-1139-47a1-a9a6-f58f3d7f7444</guid><itunes:image href="https://artwork.captivate.fm/c20b87bc-66ad-42d2-a5cb-b26b95c880da/o4F2ZjZ_a9PYpIFpr6NTe2X2.jpg"/><pubDate>Mon, 11 Aug 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/e409b0e3-1139-47a1-a9a6-f58f3d7f7444.mp3" length="25017457" type="audio/mpeg"/><itunes:duration>26:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fe97225d-0bfc-454a-b917-38be9ed79b39/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fe97225d-0bfc-454a-b917-38be9ed79b39/index.html" type="text/html"/></item><item><title>Reconnaissance in Cyber Security: Lessons from Mr. Robot ep 1.1</title><itunes:title>Reconnaissance in Cyber Security: Lessons from Mr. Robot ep 1.1</itunes:title><description><![CDATA[<p>Reconnaissance in cyber security isn't just about scanning networks; it's about understanding your entire attack surface, including the human element. In this episode, Curtis and Prasanna analyze Mr. Robot season one, episode two, (AKA ep 1.1) to explore how sophisticated threat actors conduct reconnaissance before major attacks.</p><p>Learn how F Society mapped Evil Corp's infrastructure, identified backup locations like Steel Mountain, and used human intelligence to target vulnerable employees. We discuss the reality that attackers will spend months researching your organization, mapping your networks, and identifying weaknesses in both your technology and your people.</p><p>The hosts break down practical reconnaissance techniques, from social engineering tactics (like the CD attack on Angela and Ollie) to digital network mapping. You'll discover why backup systems are prime targets for reconnaissance and how proper network segregation can limit blast radius when - not if - you're compromised.</p>]]></description><content:encoded><![CDATA[<p>Reconnaissance in cyber security isn't just about scanning networks; it's about understanding your entire attack surface, including the human element. In this episode, Curtis and Prasanna analyze Mr. Robot season one, episode two, (AKA ep 1.1) to explore how sophisticated threat actors conduct reconnaissance before major attacks.</p><p>Learn how F Society mapped Evil Corp's infrastructure, identified backup locations like Steel Mountain, and used human intelligence to target vulnerable employees. We discuss the reality that attackers will spend months researching your organization, mapping your networks, and identifying weaknesses in both your technology and your people.</p><p>The hosts break down practical reconnaissance techniques, from social engineering tactics (like the CD attack on Angela and Ollie) to digital network mapping. You'll discover why backup systems are prime targets for reconnaissance and how proper network segregation can limit blast radius when - not if - you're compromised.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/reconnaissance-cyber-security-mr-robot-ep1.1]]></link><guid isPermaLink="false">24594678-a4cf-44d2-a983-4ff1c3f22459</guid><itunes:image href="https://artwork.captivate.fm/f1a6182b-e328-42c8-8961-d6c115323ee7/H_cqEiMAwqPEymndsMnM_zXJ.jpg"/><pubDate>Mon, 04 Aug 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/24594678-a4cf-44d2-a983-4ff1c3f22459.mp3" length="33016373" type="audio/mpeg"/><itunes:duration>34:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/8e15bca1-19cc-4d81-a4f3-ff2a197fbfd7/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8e15bca1-19cc-4d81-a4f3-ff2a197fbfd7/index.html" type="text/html"/></item><item><title>Social Engineering Lessons from Mr. Robot Episode 1</title><itunes:title>Social Engineering Lessons from Mr. Robot Episode 1</itunes:title><description><![CDATA[<p>Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercriminals to manipulate victims into revealing sensitive information.</p><p>This episode covers social engineering phone scams targeting even cybersecurity professionals, the dangers of AI-powered voice cloning in modern attacks, and practical defense strategies. Discover why security questions should never be answered truthfully, how to verify suspicious calls claiming to be from banks or family members, and the importance of "trust but verify" principles.</p><p>The hosts also examine insider threats in cybersecurity firms, discuss the role of OSINT (Open Source Intelligence) in attacks, and explain honeypot detection systems. Plus, learn about proper backup storage security and why offsite, air-gapped backups remain critical for ransomware protection. Get actionable tips to protect yourself and your organization from increasingly sophisticated social engineering schemes.</p><p>Disclaimer: The Backup Wrap-up is not affiliated with the Mr. Robot show nor the network on which it airs.  But we think you should go watch it!</p>]]></description><content:encoded><![CDATA[<p>Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercriminals to manipulate victims into revealing sensitive information.</p><p>This episode covers social engineering phone scams targeting even cybersecurity professionals, the dangers of AI-powered voice cloning in modern attacks, and practical defense strategies. Discover why security questions should never be answered truthfully, how to verify suspicious calls claiming to be from banks or family members, and the importance of "trust but verify" principles.</p><p>The hosts also examine insider threats in cybersecurity firms, discuss the role of OSINT (Open Source Intelligence) in attacks, and explain honeypot detection systems. Plus, learn about proper backup storage security and why offsite, air-gapped backups remain critical for ransomware protection. Get actionable tips to protect yourself and your organization from increasingly sophisticated social engineering schemes.</p><p>Disclaimer: The Backup Wrap-up is not affiliated with the Mr. Robot show nor the network on which it airs.  But we think you should go watch it!</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/social-engineering-lessons-mr-robot-episode-1]]></link><guid isPermaLink="false">a08e38b3-9f0a-4757-8978-411c2f79876b</guid><itunes:image href="https://artwork.captivate.fm/46cb02fd-bf3c-402b-a49d-6aed8ea63ef4/ZVL21o-2zJf5jeygQOZku7zl.jpg"/><pubDate>Mon, 28 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/a08e38b3-9f0a-4757-8978-411c2f79876b.mp3" length="43432752" type="audio/mpeg"/><itunes:duration>45:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fd0265d3-ebaa-41e2-93d8-96f0b6f84e1b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fd0265d3-ebaa-41e2-93d8-96f0b6f84e1b/index.html" type="text/html"/></item><item><title>Insider Threat Prevention: Protecting Your Backups from Within</title><itunes:title>Insider Threat Prevention: Protecting Your Backups from Within</itunes:title><description><![CDATA[<p>The insider threat represents one of the most dangerous and overlooked cybersecurity challenges facing organizations today. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna explore the three distinct types of insider threats that can devastate your organization from within.</p><p>From malicious employees seeking revenge to careless workers who fall for social engineering, insider threats come in many forms. The hosts examine real-world cases including the Coinbase breach through compromised contractors, Apple's lawsuit against an employee who stole Vision Pro secrets, and the infamous logic bomb attack that destroyed an entire company's data.</p><p>Learn practical strategies for implementing least privilege access, immutable backup protection, and multi-person authentication controls. Discover why 83% of companies experienced some form of insider threat attack in 2024, and get actionable advice on security training, vendor management, and incident response planning to protect your organization's most critical assets.</p>]]></description><content:encoded><![CDATA[<p>The insider threat represents one of the most dangerous and overlooked cybersecurity challenges facing organizations today. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna explore the three distinct types of insider threats that can devastate your organization from within.</p><p>From malicious employees seeking revenge to careless workers who fall for social engineering, insider threats come in many forms. The hosts examine real-world cases including the Coinbase breach through compromised contractors, Apple's lawsuit against an employee who stole Vision Pro secrets, and the infamous logic bomb attack that destroyed an entire company's data.</p><p>Learn practical strategies for implementing least privilege access, immutable backup protection, and multi-person authentication controls. Discover why 83% of companies experienced some form of insider threat attack in 2024, and get actionable advice on security training, vendor management, and incident response planning to protect your organization's most critical assets.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/insider-threat-prevention-protecting-backups]]></link><guid isPermaLink="false">c2fd6163-ac16-49b9-a64c-ab4492bb55e1</guid><itunes:image href="https://artwork.captivate.fm/0e3d4c36-9053-4aa3-9cac-8aa80666b5dd/5db9MvPwaHsJPkzXWZrZQ6Ge.jpg"/><pubDate>Mon, 21 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c2fd6163-ac16-49b9-a64c-ab4492bb55e1.mp3" length="37905225" type="audio/mpeg"/><itunes:duration>39:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/cd7a3e8c-40da-4c2d-8a05-f5591e772587/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/cd7a3e8c-40da-4c2d-8a05-f5591e772587/index.html" type="text/html"/></item><item><title>Mission Impossible Movie Teaches Real Cyber Security Lessons</title><itunes:title>Mission Impossible Movie Teaches Real Cyber Security Lessons</itunes:title><description><![CDATA[<p>This episode explores surprising cyber security lessons hidden within Mission: Impossible's latest blockbuster. We analyze how Hollywood's depiction of AI threats, immutable backups, and air-gapped storage actually reflects real-world data protection challenges.</p><p>Curtis and Prasanna dissect the movie's central premise: an AI entity altering digital reality, making it impossible to distinguish truth from fiction. The solution? An underwater Doomsday Vault containing an immutable, offline backup of the original source code. We discuss how this fictional scenario mirrors actual cybersecurity best practices, from 3-2-1 backup strategies to cryptographic hash verification.</p><p>Key topics include the spectrum of immutability, why truly offline storage matters for ransomware protection, and how insider threats can compromise even the most secure systems. We also cover practical applications like object storage, SHA-256 hashing, and the human vulnerabilities that often undermine technical security measures. Whether you're a backup professional or just curious about data protection, this episode proves that sometimes the best cyber security lessons come from the most unexpected places.</p>]]></description><content:encoded><![CDATA[<p>This episode explores surprising cyber security lessons hidden within Mission: Impossible's latest blockbuster. We analyze how Hollywood's depiction of AI threats, immutable backups, and air-gapped storage actually reflects real-world data protection challenges.</p><p>Curtis and Prasanna dissect the movie's central premise: an AI entity altering digital reality, making it impossible to distinguish truth from fiction. The solution? An underwater Doomsday Vault containing an immutable, offline backup of the original source code. We discuss how this fictional scenario mirrors actual cybersecurity best practices, from 3-2-1 backup strategies to cryptographic hash verification.</p><p>Key topics include the spectrum of immutability, why truly offline storage matters for ransomware protection, and how insider threats can compromise even the most secure systems. We also cover practical applications like object storage, SHA-256 hashing, and the human vulnerabilities that often undermine technical security measures. Whether you're a backup professional or just curious about data protection, this episode proves that sometimes the best cyber security lessons come from the most unexpected places.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/mission-impossible-real-cyber-security]]></link><guid isPermaLink="false">7a3dd824-7589-4d2a-af7e-84c82f3754f8</guid><itunes:image href="https://artwork.captivate.fm/43aa6d8d-5f05-49c6-b567-bb440ff4507d/psy_gyyCAfSLWkWd5VW-v1bN.jpg"/><pubDate>Mon, 14 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/7a3dd824-7589-4d2a-af7e-84c82f3754f8.mp3" length="44876383" type="audio/mpeg"/><itunes:duration>46:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/212ad32a-1cbf-4648-909c-79b9648681e2/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/212ad32a-1cbf-4648-909c-79b9648681e2/index.html" type="text/html"/></item><item><title>The EU Cloud Exit - Backup Strategies for Digital Sovereignty</title><itunes:title>The EU Cloud Exit - Backup Strategies for Digital Sovereignty</itunes:title><description><![CDATA[<p>The EU cloud exit movement is reshaping how European organizations think about data storage and sovereignty. Companies across Europe are moving away from US-based cloud providers like Microsoft 365, AWS, and Google Workspace due to concerns about the Cloud Act and data privacy regulations.</p><p>In this episode, Curtis and Prasanna explore the backup implications of this major shift. They discuss the challenges of replacing comprehensive platforms like Microsoft 365 with multiple EU-based providers, the complexities of bringing services back in-house, and why the 3-2-1 backup rule becomes even more critical during these transitions.</p><p>Whether organizations choose local  providers or decide to self-host their infrastructure, data protection remains paramount. The hosts share real-world examples of failed backup strategies, including the Rackspace Exchange disaster and OVH's data center fire, to illustrate why third-party backup solutions are necessary regardless of your hosting choice.</p>]]></description><content:encoded><![CDATA[<p>The EU cloud exit movement is reshaping how European organizations think about data storage and sovereignty. Companies across Europe are moving away from US-based cloud providers like Microsoft 365, AWS, and Google Workspace due to concerns about the Cloud Act and data privacy regulations.</p><p>In this episode, Curtis and Prasanna explore the backup implications of this major shift. They discuss the challenges of replacing comprehensive platforms like Microsoft 365 with multiple EU-based providers, the complexities of bringing services back in-house, and why the 3-2-1 backup rule becomes even more critical during these transitions.</p><p>Whether organizations choose local  providers or decide to self-host their infrastructure, data protection remains paramount. The hosts share real-world examples of failed backup strategies, including the Rackspace Exchange disaster and OVH's data center fire, to illustrate why third-party backup solutions are necessary regardless of your hosting choice.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/eu-cloud-exit-backup-strategies]]></link><guid isPermaLink="false">a6b37d0b-ce4b-44fc-b60d-8ea2e5cf51e6</guid><itunes:image href="https://artwork.captivate.fm/63835518-a56f-4b26-8074-7fa490fd05eb/pMttioqlOJC_-dEV8w7R3Zsq.jpg"/><pubDate>Mon, 07 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/a6b37d0b-ce4b-44fc-b60d-8ea2e5cf51e6.mp3" length="35871849" type="audio/mpeg"/><itunes:duration>37:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0eafa60b-1b05-40cc-9e9f-26e519fbec7d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0eafa60b-1b05-40cc-9e9f-26e519fbec7d/index.html" type="text/html"/></item><item><title>What Is an Air Gap Backup? Real Protection vs Marketing</title><itunes:title>What Is an Air Gap Backup? Real Protection vs Marketing</itunes:title><description><![CDATA[<p>Air gap has become one of the most overused and misunderstood terms in backup and recovery. In this episode, W. Curtis Preston and Prasanna explore what air gap really means, tracing its origins from the days when everyone used tape storage to modern virtual implementations. They discuss how true air gap required physical separation - tapes stored offsite at facilities like Iron Mountain - and why this gold standard is nearly impossible to achieve with today's connected backup systems.</p><p>The conversation covers modern alternatives including immutable storage, IAM-based protection, and simulated air gaps that disconnect network connections when not actively replicating. Curtis and Prasanna explain why ransomware has made air gap more important than ever, and provide practical guidance for evaluating vendor claims about air gap capabilities in cloud and hybrid environments.</p>]]></description><content:encoded><![CDATA[<p>Air gap has become one of the most overused and misunderstood terms in backup and recovery. In this episode, W. Curtis Preston and Prasanna explore what air gap really means, tracing its origins from the days when everyone used tape storage to modern virtual implementations. They discuss how true air gap required physical separation - tapes stored offsite at facilities like Iron Mountain - and why this gold standard is nearly impossible to achieve with today's connected backup systems.</p><p>The conversation covers modern alternatives including immutable storage, IAM-based protection, and simulated air gaps that disconnect network connections when not actively replicating. Curtis and Prasanna explain why ransomware has made air gap more important than ever, and provide practical guidance for evaluating vendor claims about air gap capabilities in cloud and hybrid environments.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/what-is-air-gap-backup-real-vs-marketing]]></link><guid isPermaLink="false">2b42daa8-fc52-4be0-bf59-ca749c86204d</guid><itunes:image href="https://artwork.captivate.fm/c2ee86a9-ec65-4809-8fd6-4e31642e2dce/jmy5pC15Rq-Mb0_6qCjERWP2.jpg"/><pubDate>Mon, 30 Jun 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/2b42daa8-fc52-4be0-bf59-ca749c86204d.mp3" length="32186700" type="audio/mpeg"/><itunes:duration>33:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/bc067dac-1040-4ea3-8924-da413924d556/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/bc067dac-1040-4ea3-8924-da413924d556/index.html" type="text/html"/></item><item><title>Largest Data Breach in History: What You Need to Know</title><itunes:title>Largest Data Breach in History: What You Need to Know</itunes:title><description><![CDATA[<p>The largest data breach in recent memory has exposed 16 billion login credentials across multiple databases, and we're here to help you understand what it means for your security. This massive exposure involves data stolen primarily through infostealer malware rather than a single company breach.</p><p>Join W. Curtis Preston, Dr. Mike Saylor, and Prasanna Malaiyandi as they break down this complex security incident. Learn why this largest data breach is actually a compilation of stolen credentials from various sources, how infostealer malware works, and why your browsing habits might be putting you at risk. The team discusses practical security measures including proper browser hygiene, multi-factor authentication best practices, and password management strategies. Mike shares eye-opening insights about session security and why having multiple browser tabs open during sensitive activities could compromise your accounts. Get actionable advice on protecting yourself from the fallout of this massive credential exposure.</p>]]></description><content:encoded><![CDATA[<p>The largest data breach in recent memory has exposed 16 billion login credentials across multiple databases, and we're here to help you understand what it means for your security. This massive exposure involves data stolen primarily through infostealer malware rather than a single company breach.</p><p>Join W. Curtis Preston, Dr. Mike Saylor, and Prasanna Malaiyandi as they break down this complex security incident. Learn why this largest data breach is actually a compilation of stolen credentials from various sources, how infostealer malware works, and why your browsing habits might be putting you at risk. The team discusses practical security measures including proper browser hygiene, multi-factor authentication best practices, and password management strategies. Mike shares eye-opening insights about session security and why having multiple browser tabs open during sensitive activities could compromise your accounts. Get actionable advice on protecting yourself from the fallout of this massive credential exposure.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/largest-data-breach-history-what-you-need-know]]></link><guid isPermaLink="false">bc4d4b30-a940-4bbd-a69c-7d211cfd7c9d</guid><itunes:image href="https://artwork.captivate.fm/285dd24d-6028-4429-b361-cd1a9b9b456b/skT6GJ4LKnzjxO-LMvjAzII7.jpg"/><pubDate>Mon, 23 Jun 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/bc4d4b30-a940-4bbd-a69c-7d211cfd7c9d.mp3" length="47194364" type="audio/mpeg"/><itunes:duration>49:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/8cad02ad-fe36-4274-9072-9bafd3270465/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8cad02ad-fe36-4274-9072-9bafd3270465/index.html" type="text/html"/></item><item><title>How do you make a snapshot backup?</title><itunes:title>How do you make a snapshot backup?</itunes:title><description><![CDATA[<p>This episode breaks down snapshot backup fundamentals, covering the key differences between traditional storage snapshots and cloud-based approaches. Curtis and Prasanna explain copy-on-write versus redirect-on-write methods, performance implications, and why some snapshot systems can degrade performance by up to 50%.</p><p>Learn about NetApp's redirect-on-write innovation, VMware's unique approach, and how AWS "snapshots" are actually more like traditional backups. The hosts discuss critical concepts like read-only snapshot properties, storage space management, and the importance of copying snapshots to create true backups that follow the 3-2-1 rule.</p><p>Whether you're managing traditional storage arrays or cloud infrastructure, this episode provides practical guidance on turning snapshots into effective backup strategies. Topics include performance optimization, immutable storage considerations, and real-world implementation challenges that every IT professional faces.</p>]]></description><content:encoded><![CDATA[<p>This episode breaks down snapshot backup fundamentals, covering the key differences between traditional storage snapshots and cloud-based approaches. Curtis and Prasanna explain copy-on-write versus redirect-on-write methods, performance implications, and why some snapshot systems can degrade performance by up to 50%.</p><p>Learn about NetApp's redirect-on-write innovation, VMware's unique approach, and how AWS "snapshots" are actually more like traditional backups. The hosts discuss critical concepts like read-only snapshot properties, storage space management, and the importance of copying snapshots to create true backups that follow the 3-2-1 rule.</p><p>Whether you're managing traditional storage arrays or cloud infrastructure, this episode provides practical guidance on turning snapshots into effective backup strategies. Topics include performance optimization, immutable storage considerations, and real-world implementation challenges that every IT professional faces.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/how-to-make-snapshot-backup]]></link><guid isPermaLink="false">9df59c68-c3c4-4057-9867-cac9a5b0c56a</guid><itunes:image href="https://artwork.captivate.fm/c72024d0-7593-4b8f-9264-3df86f8dff43/T4yg0BvoANz2DixSYBDdvWs2.jpg"/><pubDate>Mon, 16 Jun 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9df59c68-c3c4-4057-9867-cac9a5b0c56a.mp3" length="40123767" type="audio/mpeg"/><itunes:duration>41:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c5609e1b-41aa-4bfc-b464-b8e1d6f12b14/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c5609e1b-41aa-4bfc-b464-b8e1d6f12b14/index.html" type="text/html"/></item><item><title>Human error: Why We Backup</title><itunes:title>Human error: Why We Backup</itunes:title><description><![CDATA[<p>Human error has replaced hardware failures as the primary driver of data loss and restore operations in modern IT environments. This episode explores real-world examples of how both end users and administrators create the need for backup and recovery operations through accidental deletions, configuration mistakes, and poor processes. W. Curtis Preston shares war stories from his decades in the industry, including incidents involving accidental directory deletions, source code stored in temporary folders, and tape library disasters. The discussion covers how technology improvements like RAID and solid-state drives have made hardware more reliable, shifting the focus to human-related incidents. The hosts also examine insider threats and the importance of implementing proper controls around privileged access. Learn why understanding human error patterns is critical for designing effective backup and recovery strategies that account for the reality of how data actually gets lost.</p>]]></description><content:encoded><![CDATA[<p>Human error has replaced hardware failures as the primary driver of data loss and restore operations in modern IT environments. This episode explores real-world examples of how both end users and administrators create the need for backup and recovery operations through accidental deletions, configuration mistakes, and poor processes. W. Curtis Preston shares war stories from his decades in the industry, including incidents involving accidental directory deletions, source code stored in temporary folders, and tape library disasters. The discussion covers how technology improvements like RAID and solid-state drives have made hardware more reliable, shifting the focus to human-related incidents. The hosts also examine insider threats and the importance of implementing proper controls around privileged access. Learn why understanding human error patterns is critical for designing effective backup and recovery strategies that account for the reality of how data actually gets lost.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/human-error-why-we-backup]]></link><guid isPermaLink="false">42a9eaa9-8ff6-4edc-a751-1293eb65f664</guid><itunes:image href="https://artwork.captivate.fm/e57de599-d1bb-4066-b946-8d90951f0e91/G0eu2xOcgKpQb99cEhCMXwno.jpg"/><pubDate>Mon, 09 Jun 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/42a9eaa9-8ff6-4edc-a751-1293eb65f664.mp3" length="34738763" type="audio/mpeg"/><itunes:duration>36:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0a034d7e-acdc-4e75-89a7-aedbfb267580/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0a034d7e-acdc-4e75-89a7-aedbfb267580/index.html" type="text/html"/></item><item><title>How to Extract ROI from Backups</title><itunes:title>How to Extract ROI from Backups</itunes:title><description><![CDATA[<p>Learn how to extract measurable ROI from your backups beyond traditional disaster recovery. Curtis and Prasanna explore proven strategies for extracting business value from backup infrastructure through test and development environments, security monitoring, compliance checking, and AI-powered analytics. Discover why the shift from tape to disk storage created new opportunities for ROI from backups, including instant restore capabilities and data mining applications. The hosts share real-world examples of organizations using backup data for threat detection, regulatory compliance, and business intelligence. From Veeam's AI integration to copy data management techniques, this episode reveals practical approaches to transform backup systems from cost centers into value generators. Whether you're struggling to justify backup expenses or seeking ways to leverage existing investments, these ROI from backups strategies can help extract maximum value from your stored data.</p>]]></description><content:encoded><![CDATA[<p>Learn how to extract measurable ROI from your backups beyond traditional disaster recovery. Curtis and Prasanna explore proven strategies for extracting business value from backup infrastructure through test and development environments, security monitoring, compliance checking, and AI-powered analytics. Discover why the shift from tape to disk storage created new opportunities for ROI from backups, including instant restore capabilities and data mining applications. The hosts share real-world examples of organizations using backup data for threat detection, regulatory compliance, and business intelligence. From Veeam's AI integration to copy data management techniques, this episode reveals practical approaches to transform backup systems from cost centers into value generators. Whether you're struggling to justify backup expenses or seeking ways to leverage existing investments, these ROI from backups strategies can help extract maximum value from your stored data.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/how-extract-roi-from-backups]]></link><guid isPermaLink="false">2e6993e3-4e3c-493d-9e7e-77f331aeba8f</guid><itunes:image href="https://artwork.captivate.fm/d7aa9c18-779f-43ae-a59f-bf9f0a50dff0/SP4HqUSZgBUbHFC1OJppEMGp.jpg"/><pubDate>Mon, 02 Jun 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/2e6993e3-4e3c-493d-9e7e-77f331aeba8f.mp3" length="40860198" type="audio/mpeg"/><itunes:duration>42:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/12c3754d-d336-4cbd-a92b-2ab50c671320/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/12c3754d-d336-4cbd-a92b-2ab50c671320/index.html" type="text/html"/></item><item><title>World Backup Day: Take the Pledge to Protect Your Data</title><itunes:title>World Backup Day: Take the Pledge to Protect Your Data</itunes:title><description><![CDATA[<p>World Backup Day falls on March 31st - the day before April Fool's Day because not backing up your data is no joke. In this episode, hosts W. Curtis Preston and Prasanna Malaiyandi discuss alarming statistics about data loss and why proper backup strategies are essential for business survival.</p><p>The hosts break down the famous 3-2-1 backup rule and how it applies to both consumers and enterprises. They examine the growing threat of ransomware, including double extortion attacks where criminals not only encrypt your data but threaten to publish it. With 94% of companies that suffer major data loss failing to recover, and 70% of small businesses closing within a year of significant data loss, World Backup Day serves as a crucial reminder to implement robust backup strategies that include immutable storage and protection for often-overlooked SaaS applications.</p><p>Stories from this episode:</p><p>https://www.forbes.com/sites/tomcoughlin/2025/03/31/march-31-is-world-backup-day/</p><p>https://objectfirst.com/blog/world-backup-day-2025/</p><p>https://www.backupwrapup.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast/</p>]]></description><content:encoded><![CDATA[<p>World Backup Day falls on March 31st - the day before April Fool's Day because not backing up your data is no joke. In this episode, hosts W. Curtis Preston and Prasanna Malaiyandi discuss alarming statistics about data loss and why proper backup strategies are essential for business survival.</p><p>The hosts break down the famous 3-2-1 backup rule and how it applies to both consumers and enterprises. They examine the growing threat of ransomware, including double extortion attacks where criminals not only encrypt your data but threaten to publish it. With 94% of companies that suffer major data loss failing to recover, and 70% of small businesses closing within a year of significant data loss, World Backup Day serves as a crucial reminder to implement robust backup strategies that include immutable storage and protection for often-overlooked SaaS applications.</p><p>Stories from this episode:</p><p>https://www.forbes.com/sites/tomcoughlin/2025/03/31/march-31-is-world-backup-day/</p><p>https://objectfirst.com/blog/world-backup-day-2025/</p><p>https://www.backupwrapup.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/world-backup-day-take-the-pledge]]></link><guid isPermaLink="false">19a5868c-d7bb-40f1-b359-cbc5d55d5501</guid><itunes:image href="https://artwork.captivate.fm/624488a2-70dc-4995-94ac-8108125a7d51/3SLMsrRm2vMN_b45_11UK0IO.jpg"/><pubDate>Mon, 19 May 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/19a5868c-d7bb-40f1-b359-cbc5d55d5501.mp3" length="33402552" type="audio/mpeg"/><itunes:duration>34:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/8dd0bf85-de44-4663-a8de-43ada5793f8e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8dd0bf85-de44-4663-a8de-43ada5793f8e/index.html" type="text/html"/></item><item><title>Ransomware Targets VMware ESXi: Melissa Palmer Explains the Threat</title><itunes:title>Ransomware Targets VMware ESXi: Melissa Palmer Explains the Threat</itunes:title><description><![CDATA[<p>You've found The Backup Wrap-up, your go-to podcast for all things backup, recovery, and cyber-recovery. In this episode, we tackle one of the scariest threats out there - ransomware targeting VMware ESXi environments. I'm joined by Prasanna Malaiyandi and our special guest Melissa Palmer, also known as @vmiss, who's an independent technology analyst and ransomware resiliency architect. We get into why virtualization environments are such juicy targets for attackers, how they're specifically going after vCenter and ESXi hosts, and why your backup strategy is probably missing some critical components. If you've got a virtualized environment, you need to listen to this. Melissa brings her unique perspective from both the virtualization and security worlds to help you protect your most critical infrastructure. So buckle up - this is an episode you can't afford to miss if you want to keep your VMware environment safe from ransomware attacks.</p>]]></description><content:encoded><![CDATA[<p>You've found The Backup Wrap-up, your go-to podcast for all things backup, recovery, and cyber-recovery. In this episode, we tackle one of the scariest threats out there - ransomware targeting VMware ESXi environments. I'm joined by Prasanna Malaiyandi and our special guest Melissa Palmer, also known as @vmiss, who's an independent technology analyst and ransomware resiliency architect. We get into why virtualization environments are such juicy targets for attackers, how they're specifically going after vCenter and ESXi hosts, and why your backup strategy is probably missing some critical components. If you've got a virtualized environment, you need to listen to this. Melissa brings her unique perspective from both the virtualization and security worlds to help you protect your most critical infrastructure. So buckle up - this is an episode you can't afford to miss if you want to keep your VMware environment safe from ransomware attacks.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/ransomware-targets-vmware-esxi-melissa-palmer]]></link><guid isPermaLink="false">6be3a3d6-61a4-4791-b538-9d4fae5c72c1</guid><itunes:image href="https://artwork.captivate.fm/0e3c903b-28c1-4f1c-8282-8c8e66d789f3/cB7PSp6CnIWVGUzDYdR01C69.jpg"/><pubDate>Mon, 05 May 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/6be3a3d6-61a4-4791-b538-9d4fae5c72c1.mp3" length="50159366" type="audio/mpeg"/><itunes:duration>52:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f4d48357-e9f5-4fd0-acdf-bff8eab53b4b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f4d48357-e9f5-4fd0-acdf-bff8eab53b4b/index.html" type="text/html"/></item><item><title>Breaking Down the VeeamOn Announcements for Backup Admins</title><itunes:title>Breaking Down the VeeamOn Announcements for Backup Admins</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-up, W. Curtis Preston breaks down the key VeeamON announcements from the VeeamON 2025 conference in San Diego. He highlights Veeam's focus on security and ransomware defense, including their new CrowdStrike integration and data resilience maturity model developed with McKinsey and MIT.</p><p>Curtis shares his excitement about Veeam's long-awaited Linux-based software appliance, which addresses a critical security vulnerability in Windows-based backup systems. He also discusses other major VeeamON announcements like their Anthropic partnership for AI-powered backup content search, Microsoft Intra ID support, and the ability to recover backups to Azure in under five minutes. Whether you're a Veeam customer or just interested in backup technology trends, this episode provides valuable insights into these significant VeeamOn announcements.</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-up, W. Curtis Preston breaks down the key VeeamON announcements from the VeeamON 2025 conference in San Diego. He highlights Veeam's focus on security and ransomware defense, including their new CrowdStrike integration and data resilience maturity model developed with McKinsey and MIT.</p><p>Curtis shares his excitement about Veeam's long-awaited Linux-based software appliance, which addresses a critical security vulnerability in Windows-based backup systems. He also discusses other major VeeamON announcements like their Anthropic partnership for AI-powered backup content search, Microsoft Intra ID support, and the ability to recover backups to Azure in under five minutes. Whether you're a Veeam customer or just interested in backup technology trends, this episode provides valuable insights into these significant VeeamOn announcements.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/breaking-down-veamon-announcements]]></link><guid isPermaLink="false">8c2739ba-d726-4a13-ae01-51f7b59bd32d</guid><itunes:image href="https://artwork.captivate.fm/cac9cf14-cfb4-4de4-8b87-53d554e6415c/I5ZdzVqBsjchPz5SmFQwWXUN.jpg"/><pubDate>Mon, 28 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/8c2739ba-d726-4a13-ae01-51f7b59bd32d.mp3" length="43978587" type="audio/mpeg"/><itunes:duration>45:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/54cad1fc-dfeb-43dd-98e6-8fd99cc92bcb/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/54cad1fc-dfeb-43dd-98e6-8fd99cc92bcb/index.html" type="text/html"/></item><item><title>DOGE and GSA Claim $1M Savings by Ditching Old Tape Tech</title><itunes:title>DOGE and GSA Claim $1M Savings by Ditching Old Tape Tech</itunes:title><description><![CDATA[<p>DOGE and GSA recently made headlines with a tweet claiming $1 million annual savings by converting 14,000 magnetic tapes to "permanent modern digital records." In this episode, W. Curtis Preston and Prasanna Malaiyandi analyze whether this claim is possible – although they cannot actually validate it due to lack of information. They discuss that DOGE and GSA's claim is possible given the significant costs of maintaining legacy systems, the migration process would also likely take months and involve substantial upfront expenses. Curtis also shares a humorous story about accidentally pressing an emergency power button during a critical mainframe recovery.</p>]]></description><content:encoded><![CDATA[<p>DOGE and GSA recently made headlines with a tweet claiming $1 million annual savings by converting 14,000 magnetic tapes to "permanent modern digital records." In this episode, W. Curtis Preston and Prasanna Malaiyandi analyze whether this claim is possible – although they cannot actually validate it due to lack of information. They discuss that DOGE and GSA's claim is possible given the significant costs of maintaining legacy systems, the migration process would also likely take months and involve substantial upfront expenses. Curtis also shares a humorous story about accidentally pressing an emergency power button during a critical mainframe recovery.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/doge-and-gsa-ditching-old-tape-tech]]></link><guid isPermaLink="false">f3b921b2-737f-42dc-b76a-0f545433cd66</guid><itunes:image href="https://artwork.captivate.fm/a6ddab51-f9c3-4f71-818c-f8c24ed40cde/zvZfwbELK5GNI72kAQHPhSJ8.jpg"/><pubDate>Mon, 21 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/f3b921b2-737f-42dc-b76a-0f545433cd66.mp3" length="44811154" type="audio/mpeg"/><itunes:duration>46:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/913d434d-49e7-47f3-bec4-09cc8807b7ca/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/913d434d-49e7-47f3-bec4-09cc8807b7ca/index.html" type="text/html"/></item><item><title>Why Tape Backup for Small Business Makes Sense Against Ransomware</title><itunes:title>Why Tape Backup for Small Business Makes Sense Against Ransomware</itunes:title><description><![CDATA[<p>Tape backup for small business might sound like old tech, but Mag Store's new Thunderbolt-compatible tape drive could change that perception. In this episode, we discuss how this new offering potentially opens tape technology to a wider market of SMBs and content creators looking for ransomware protection and cost-effective long-term storage.</p><p>Curtis and Prasanna dive into the specifics of when tape backup makes financial sense for small business data protection, particularly for companies generating large amounts of data or concerned about cloud security. They explore the $6,000 upfront investment against the long-term benefits of $90 tape cartridges that hold 45TB compressed. Perfect for SMBs with on-premises data or YouTube creators needing affordable archive solutions that are truly air-gapped from ransomware threats.</p>]]></description><content:encoded><![CDATA[<p>Tape backup for small business might sound like old tech, but Mag Store's new Thunderbolt-compatible tape drive could change that perception. In this episode, we discuss how this new offering potentially opens tape technology to a wider market of SMBs and content creators looking for ransomware protection and cost-effective long-term storage.</p><p>Curtis and Prasanna dive into the specifics of when tape backup makes financial sense for small business data protection, particularly for companies generating large amounts of data or concerned about cloud security. They explore the $6,000 upfront investment against the long-term benefits of $90 tape cartridges that hold 45TB compressed. Perfect for SMBs with on-premises data or YouTube creators needing affordable archive solutions that are truly air-gapped from ransomware threats.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/tape-backup-for-small-business-ransomware]]></link><guid isPermaLink="false">0fe73f0e-91aa-404b-bfd0-62b4a679dd20</guid><itunes:image href="https://artwork.captivate.fm/54e2cf25-3c5e-4f0e-b2ed-43517b8d0dba/aKVOYODILdD4wCP2W1t_dZAk.jpg"/><pubDate>Mon, 14 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0fe73f0e-91aa-404b-bfd0-62b4a679dd20.mp3" length="36921347" type="audio/mpeg"/><itunes:duration>38:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/aaafcc21-82cc-4d3e-9704-7e1d4fa147bf/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/aaafcc21-82cc-4d3e-9704-7e1d4fa147bf/index.html" type="text/html"/></item><item><title>How Forever Incremental Backup Changed the World</title><itunes:title>How Forever Incremental Backup Changed the World</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-Up, Curtis and Prasanna explore how forever incremental backup technology revolutionized the data protection industry. They discuss the evolution from traditional backup methods to modern approaches that eliminate the need for regular full backups, dramatically reducing network traffic, storage requirements, and backup windows.</p><p>The hosts examine the technical foundations of forever incremental backups, from block-level incremental tracking to backend storage innovations that make multiple recovery points possible without redundant data transfers. They compare older approaches like synthetic fulls with true forever incremental implementations, highlighting the critical differences and benefits. Whether you're still using legacy backup tools or evaluating modern solutions, this episode provides essential insights into why forever incremental has become the standard for efficient, reliable backup systems.</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-Up, Curtis and Prasanna explore how forever incremental backup technology revolutionized the data protection industry. They discuss the evolution from traditional backup methods to modern approaches that eliminate the need for regular full backups, dramatically reducing network traffic, storage requirements, and backup windows.</p><p>The hosts examine the technical foundations of forever incremental backups, from block-level incremental tracking to backend storage innovations that make multiple recovery points possible without redundant data transfers. They compare older approaches like synthetic fulls with true forever incremental implementations, highlighting the critical differences and benefits. Whether you're still using legacy backup tools or evaluating modern solutions, this episode provides essential insights into why forever incremental has become the standard for efficient, reliable backup systems.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/forever-incremental-backup-changed-world]]></link><guid isPermaLink="false">bc274e39-3425-4273-8b97-2aac00370f07</guid><itunes:image href="https://artwork.captivate.fm/6426e1d4-bb01-4ba9-9198-ee8b61e98ada/gNe78FzXusfLbOFpfZRiNvJQ.jpg"/><pubDate>Mon, 07 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/bc274e39-3425-4273-8b97-2aac00370f07.mp3" length="42404172" type="audio/mpeg"/><itunes:duration>44:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/16fec3c7-a831-4745-8b70-3f844da004e8/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/16fec3c7-a831-4745-8b70-3f844da004e8/index.html" type="text/html"/></item><item><title>Cloud vs Tape Throwdown: Which is Better for Archiving?</title><itunes:title>Cloud vs Tape Throwdown: Which is Better for Archiving?</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-Up, we look at the cloud vs tape debate for active archives. The conversation was sparked by a LinkedIn post claiming tape libraries are the only robots not making things easier in 2025, suggesting cloud is superior to tape for active archives.</p><p>We challenge this premise by pointing out that cloud vs tape is a false dichotomy since many cloud storage vendors use tape for their lowest-cost tiers. We examine key considerations including cost (where tape wins by orders of magnitude), data integrity (where tape actually outperforms disk), and access times (where expectations should align with use cases). For organizations running on-premises infrastructure, we also highlight the often-overlooked egress costs and transfer times associated with cloud storage. Whether you're managing secondary storage or planning an archive strategy, this candid discussion cuts through the marketing hype.</p><p>Here's the LinkedIn post that sparked the discussion:</p><p>https://www.linkedin.com/feed/update/urn:li:activity:7300167312144322561/</p><p>Here's a recent episode about how tape is not dead:</p><p>https://www.backupwrapup.com/is-tape-backup-dead-why-it-still-matters/</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-Up, we look at the cloud vs tape debate for active archives. The conversation was sparked by a LinkedIn post claiming tape libraries are the only robots not making things easier in 2025, suggesting cloud is superior to tape for active archives.</p><p>We challenge this premise by pointing out that cloud vs tape is a false dichotomy since many cloud storage vendors use tape for their lowest-cost tiers. We examine key considerations including cost (where tape wins by orders of magnitude), data integrity (where tape actually outperforms disk), and access times (where expectations should align with use cases). For organizations running on-premises infrastructure, we also highlight the often-overlooked egress costs and transfer times associated with cloud storage. Whether you're managing secondary storage or planning an archive strategy, this candid discussion cuts through the marketing hype.</p><p>Here's the LinkedIn post that sparked the discussion:</p><p>https://www.linkedin.com/feed/update/urn:li:activity:7300167312144322561/</p><p>Here's a recent episode about how tape is not dead:</p><p>https://www.backupwrapup.com/is-tape-backup-dead-why-it-still-matters/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/cloud-vs-tape-throwdown-for-archiving]]></link><guid isPermaLink="false">9a777925-49dc-4e66-86eb-9df8078b066e</guid><itunes:image href="https://artwork.captivate.fm/f0791111-9016-434b-87b2-bd0c434fcac5/36pSq-nB0YZ5OqmzgyMJ5ydx.jpg"/><pubDate>Mon, 31 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9a777925-49dc-4e66-86eb-9df8078b066e.mp3" length="35176804" type="audio/mpeg"/><itunes:duration>36:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f6aa3f25-bc08-40a0-81ce-d786dbbbb457/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f6aa3f25-bc08-40a0-81ce-d786dbbbb457/index.html" type="text/html"/></item><item><title>Disaster Recovery Lessons from 9/11 and Beyond</title><itunes:title>Disaster Recovery Lessons from 9/11 and Beyond</itunes:title><description><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi unpack crucial disaster recovery lessons from major events like 9/11. They discuss how companies lost both primary and backup data centers when both World Trade Center towers fell, highlighting why geographic separation is non-negotiable. The hosts break down the technical aspects of disaster recovery, comparing hot sites versus cold sites, and the realities of synchronous versus asynchronous replication across distances.</p><p>Beyond the technical, Curtis and Prasanna share often-overlooked disaster recovery lessons about human factors—where recovery teams will sleep, eat, and work during extended outages when infrastructure is destroyed. They examine a real case from a hurricane-stricken island where teams converted conference rooms to sleeping quarters and relied on satellite communications. Whether you're planning for natural disasters, power outages, or ransomware attacks, these disaster recovery lessons will help ensure your organization can recover when—not if—disaster strikes.</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi unpack crucial disaster recovery lessons from major events like 9/11. They discuss how companies lost both primary and backup data centers when both World Trade Center towers fell, highlighting why geographic separation is non-negotiable. The hosts break down the technical aspects of disaster recovery, comparing hot sites versus cold sites, and the realities of synchronous versus asynchronous replication across distances.</p><p>Beyond the technical, Curtis and Prasanna share often-overlooked disaster recovery lessons about human factors—where recovery teams will sleep, eat, and work during extended outages when infrastructure is destroyed. They examine a real case from a hurricane-stricken island where teams converted conference rooms to sleeping quarters and relied on satellite communications. Whether you're planning for natural disasters, power outages, or ransomware attacks, these disaster recovery lessons will help ensure your organization can recover when—not if—disaster strikes.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/disaster-recovery-lessons-911-beyond]]></link><guid isPermaLink="false">d1a91a51-012c-4d7a-8726-ebb32689ca56</guid><itunes:image href="https://artwork.captivate.fm/efc681c0-a9cb-4f21-a6e0-41b63c2c8752/0ctLuIMtAMKiNyD_7EKWtz0P.jpg"/><pubDate>Mon, 24 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d1a91a51-012c-4d7a-8726-ebb32689ca56.mp3" length="34844095" type="audio/mpeg"/><itunes:duration>36:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/43eda05a-f603-4039-8304-ceec09b159f5/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/43eda05a-f603-4039-8304-ceec09b159f5/index.html" type="text/html"/></item><item><title>How to Choose the Best Password Manager: Security Features That Matter</title><itunes:title>How to Choose the Best Password Manager: Security Features That Matter</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-up, Curtis and Prasanna discuss how to choose the best password manager in light of recent security breaches. They examine the LastPass hack that resulted in $150 million of stolen cryptocurrency and what that teaches us about password manager security.</p><p>The hosts break down the critical security features to look for in the best password manager, including encryption strength, iteration counts, multi-factor authentication options, and passkey support. They emphasize that even with the LastPass breach, using a password manager is still far safer than not using one at all.</p><p>This episode provides practical guidance on evaluating password manager security beyond the standard feature comparisons, with specific recommendations for cryptocurrency users and insights into the technical aspects of password vault protection.</p><p>Here are some references for today's episode:</p><p>https://www.rubrik.com/blog/company/25/rubrik-information-security-team-update</p><p>https://www.bleepingcomputer.com/news/security/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/</p><p>https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/</p><p>https://krebsonsecurity.com/2025/03/feds-link-150m-cyberheist-to-2022-lastpass-hacks/</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-up, Curtis and Prasanna discuss how to choose the best password manager in light of recent security breaches. They examine the LastPass hack that resulted in $150 million of stolen cryptocurrency and what that teaches us about password manager security.</p><p>The hosts break down the critical security features to look for in the best password manager, including encryption strength, iteration counts, multi-factor authentication options, and passkey support. They emphasize that even with the LastPass breach, using a password manager is still far safer than not using one at all.</p><p>This episode provides practical guidance on evaluating password manager security beyond the standard feature comparisons, with specific recommendations for cryptocurrency users and insights into the technical aspects of password vault protection.</p><p>Here are some references for today's episode:</p><p>https://www.rubrik.com/blog/company/25/rubrik-information-security-team-update</p><p>https://www.bleepingcomputer.com/news/security/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/</p><p>https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/</p><p>https://krebsonsecurity.com/2025/03/feds-link-150m-cyberheist-to-2022-lastpass-hacks/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/best-password-manager-security-features]]></link><guid isPermaLink="false">f7b2d8c8-9fc1-4127-9bb3-a99f09c203c2</guid><itunes:image href="https://artwork.captivate.fm/ea20032f-50bf-4e8f-bd56-1ffa91e2b951/t_men2m1UMfeARYyEVpXfEFH.jpg"/><pubDate>Mon, 17 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/f7b2d8c8-9fc1-4127-9bb3-a99f09c203c2.mp3" length="39877581" type="audio/mpeg"/><itunes:duration>41:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/591b1e34-85b1-41a4-a30d-e27ab64c5865/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/591b1e34-85b1-41a4-a30d-e27ab64c5865/index.html" type="text/html"/></item><item><title>Is Tape Backup Dead? Why This Technology Still Matters</title><itunes:title>Is Tape Backup Dead? Why This Technology Still Matters</itunes:title><description><![CDATA[<p>Tape backup isn't dead – but it's glory days are gone. In this episode, W. Curtis Preston and Prasanna Malaiyandi discuss why tape backup remains relevant despite its diminished role in operational backups. They reveal how cloud giants have become the biggest consumers of tape technology while explaining common misconceptions about tape's performance.</p><p>The hosts break down four core advantages tape backup still maintains: unbeatable cost (one to two orders of magnitude cheaper than alternatives), superior speed for bulk transfers, better data integrity with lower bit error rates, and built-in protection against ransomware through true immutability. Whether you're considering your disaster recovery strategy or looking for cost-effective long-term storage, this episode offers valuable insights into why tape backup continues to play a crucial role in modern data protection architectures.</p><p>Here are some related episodes we talk about in the show:</p><p>https://www.backupwrapup.com/ovhs-backup-service-didnt-work/</p><p>https://www.backupwrapup.com/back-in-my-day-backups-were-really-hard/</p><p>https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/</p>]]></description><content:encoded><![CDATA[<p>Tape backup isn't dead – but it's glory days are gone. In this episode, W. Curtis Preston and Prasanna Malaiyandi discuss why tape backup remains relevant despite its diminished role in operational backups. They reveal how cloud giants have become the biggest consumers of tape technology while explaining common misconceptions about tape's performance.</p><p>The hosts break down four core advantages tape backup still maintains: unbeatable cost (one to two orders of magnitude cheaper than alternatives), superior speed for bulk transfers, better data integrity with lower bit error rates, and built-in protection against ransomware through true immutability. Whether you're considering your disaster recovery strategy or looking for cost-effective long-term storage, this episode offers valuable insights into why tape backup continues to play a crucial role in modern data protection architectures.</p><p>Here are some related episodes we talk about in the show:</p><p>https://www.backupwrapup.com/ovhs-backup-service-didnt-work/</p><p>https://www.backupwrapup.com/back-in-my-day-backups-were-really-hard/</p><p>https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/is-tape-backup-dead-why-it-still-matters]]></link><guid isPermaLink="false">32fd871e-60ed-487f-bc20-74c23bdf5100</guid><itunes:image href="https://artwork.captivate.fm/4e465359-81b8-4a4e-b1d7-e7d91f7a4da1/ugUuo0nyKODL43gK-jibQMlb.jpg"/><pubDate>Mon, 10 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/32fd871e-60ed-487f-bc20-74c23bdf5100.mp3" length="54545021" type="audio/mpeg"/><itunes:duration>56:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/88a8bd53-5bfa-4a4d-a4ee-1a90f5300992/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/88a8bd53-5bfa-4a4d-a4ee-1a90f5300992/index.html" type="text/html"/></item><item><title>Hide Your Backup Disk from Ransomware</title><itunes:title>Hide Your Backup Disk from Ransomware</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi discuss critical strategies for securing your backup disk against cyber threats. They explain why the default configuration of storing backups in easily accessible directories makes your backup disk vulnerable to threat actors who specifically target backup systems before launching attacks.</p><p>The conversation covers several effective methods to protect your backup disk, including using proprietary protocols like OST and Boost, implementing Virtual Tape Libraries (VTLs), leveraging dedicated backup appliances, and utilizing object storage both on-premises and in the cloud. Curtis emphasizes that keeping your backup disk out of user space is essential for maintaining security against increasingly sophisticated attackers.</p><p>This episode provides practical advice for anyone using disk-based backup systems who wants to ensure their backup disk remains secure and recoverable when needed most.</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi discuss critical strategies for securing your backup disk against cyber threats. They explain why the default configuration of storing backups in easily accessible directories makes your backup disk vulnerable to threat actors who specifically target backup systems before launching attacks.</p><p>The conversation covers several effective methods to protect your backup disk, including using proprietary protocols like OST and Boost, implementing Virtual Tape Libraries (VTLs), leveraging dedicated backup appliances, and utilizing object storage both on-premises and in the cloud. Curtis emphasizes that keeping your backup disk out of user space is essential for maintaining security against increasingly sophisticated attackers.</p><p>This episode provides practical advice for anyone using disk-based backup systems who wants to ensure their backup disk remains secure and recoverable when needed most.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/hide-your-backup-disk-from-ransomware]]></link><guid isPermaLink="false">437951f4-3de7-4f04-9c02-b926fe91f7c0</guid><itunes:image href="https://artwork.captivate.fm/4bf2e416-c68d-44b4-a69a-e284ac174bab/eGUHDWCtn1aOp_eU9Ze-0Ldv.jpg"/><pubDate>Mon, 03 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/437951f4-3de7-4f04-9c02-b926fe91f7c0.mp3" length="32482629" type="audio/mpeg"/><itunes:duration>33:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Your 4-Hour Recovery Time Objective is Fantasy</title><itunes:title>Your 4-Hour Recovery Time Objective is Fantasy</itunes:title><description><![CDATA[<p>Ever wonder why your recovery time objective seems impossible to meet? In this episode, we challenge the common assumption that a four-hour RTO is achievable for most organizations. Host W. Curtis Preston and guest Prasanna Malaiyandi discuss why these aggressive recovery time objectives often exist only on paper.</p><p>From ransomware attacks to natural disasters, we examine the real-world factors that make rapid recovery more complex than most realize. We break down the differences between recovery time objectives (RTOs) and actual recovery times (RTAs), exploring why organizations need to be more realistic about their recovery capabilities. Whether you're managing backups, planning disaster recovery, or responsible for business continuity, this episode will help you understand what's actually possible when disaster strikes.</p><p>Check out these older episodes about how a real disaster unfolds:</p><p>https://www.backupwrapup.com/real-life-hurricane-disaster-recover-story/</p><p>https://www.backupwrapup.com/disaster-recovery-after-a-hurricane-a-first-hand-account/</p>]]></description><content:encoded><![CDATA[<p>Ever wonder why your recovery time objective seems impossible to meet? In this episode, we challenge the common assumption that a four-hour RTO is achievable for most organizations. Host W. Curtis Preston and guest Prasanna Malaiyandi discuss why these aggressive recovery time objectives often exist only on paper.</p><p>From ransomware attacks to natural disasters, we examine the real-world factors that make rapid recovery more complex than most realize. We break down the differences between recovery time objectives (RTOs) and actual recovery times (RTAs), exploring why organizations need to be more realistic about their recovery capabilities. Whether you're managing backups, planning disaster recovery, or responsible for business continuity, this episode will help you understand what's actually possible when disaster strikes.</p><p>Check out these older episodes about how a real disaster unfolds:</p><p>https://www.backupwrapup.com/real-life-hurricane-disaster-recover-story/</p><p>https://www.backupwrapup.com/disaster-recovery-after-a-hurricane-a-first-hand-account/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/4-hour-recovery-time-objective-fantasy]]></link><guid isPermaLink="false">d5d9c3a3-dd38-4744-93bd-33118cc5d04d</guid><itunes:image href="https://artwork.captivate.fm/112e3d11-8f74-40d3-abdf-268c9e47971e/Y1IHHTyr-u2gdwq2THOzObnG.jpg"/><pubDate>Mon, 24 Feb 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d5d9c3a3-dd38-4744-93bd-33118cc5d04d.mp3" length="37507350" type="audio/mpeg"/><itunes:duration>39:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Passwords vs Passkeys: The Future of Backup Security</title><itunes:title>Passwords vs Passkeys: The Future of Backup Security</itunes:title><description><![CDATA[<p>In this eye-opening episode about passwords vs passkeys, W. Curtis Preston and Prasanna Malaiyandi expose why traditional password protection isn't enough for your backup systems anymore. They break down the evolution from basic passwords to MFA, and explain why passkeys and FIDO compliance represent the next level in security.</p><p>Learn why hackers target backup systems first, how they exploit password vulnerabilities, and why even multi-factor authentication has its weak points. Discover why there hasn't been a single successful attack against FIDO-compliant systems, and why you should be pushing your backup vendors to support passkeys. Whether you're using a traditional backup system or a SaaS solution, this episode gives you the knowledge you need to better protect your last line of defense.</p><p>We talked about this previous episode: https://www.backupwrapup.com/how-do-you-authenticate-with-all-new-hardware/</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode about passwords vs passkeys, W. Curtis Preston and Prasanna Malaiyandi expose why traditional password protection isn't enough for your backup systems anymore. They break down the evolution from basic passwords to MFA, and explain why passkeys and FIDO compliance represent the next level in security.</p><p>Learn why hackers target backup systems first, how they exploit password vulnerabilities, and why even multi-factor authentication has its weak points. Discover why there hasn't been a single successful attack against FIDO-compliant systems, and why you should be pushing your backup vendors to support passkeys. Whether you're using a traditional backup system or a SaaS solution, this episode gives you the knowledge you need to better protect your last line of defense.</p><p>We talked about this previous episode: https://www.backupwrapup.com/how-do-you-authenticate-with-all-new-hardware/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/passwords-vs-passkeys-backup-security]]></link><guid isPermaLink="false">70c24ebb-e32b-4b1c-a86d-1d87cb6f78db</guid><itunes:image href="https://artwork.captivate.fm/17b143cc-ed97-4bb0-88bf-497eab5adfda/dlkVf_2LfCODsv18OCpNeKT8.jpg"/><pubDate>Mon, 17 Feb 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/70c24ebb-e32b-4b1c-a86d-1d87cb6f78db.mp3" length="41885874" type="audio/mpeg"/><itunes:duration>43:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0727e8ab-eae9-4164-9f31-b67c17b18c93/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0727e8ab-eae9-4164-9f31-b67c17b18c93/index.html" type="text/html"/></item><item><title>No one cares about your backup window!</title><itunes:title>No one cares about your backup window!</itunes:title><description><![CDATA[<p>Understanding your backup window is crucial for effective data protection, but there's a twist - it's not just about backup speed. In this episode, we explore why focusing solely on backup speed misses the point entirely. The real measure of success? Your recovery capabilities.</p><p>Join W. Curtis Preston and Prasanna Malaiyandi as they share war stories about backup windows gone wrong, including a memorable tale involving tape drives that could write but couldn't read. Learn why traditional backup windows have evolved, how modern technologies have changed the game, and most importantly, why your recovery testing matters more than your backup speed. We also dive into deduplication taxes, recovery groups, and why instant recovery capabilities might be your best friend in a crisis.</p><p>This is the recovery failure we alluded to w/our friend Stuart Liddle: https://www.backupwrapup.com/laptop-restore-nightmare-900gb/</p>]]></description><content:encoded><![CDATA[<p>Understanding your backup window is crucial for effective data protection, but there's a twist - it's not just about backup speed. In this episode, we explore why focusing solely on backup speed misses the point entirely. The real measure of success? Your recovery capabilities.</p><p>Join W. Curtis Preston and Prasanna Malaiyandi as they share war stories about backup windows gone wrong, including a memorable tale involving tape drives that could write but couldn't read. Learn why traditional backup windows have evolved, how modern technologies have changed the game, and most importantly, why your recovery testing matters more than your backup speed. We also dive into deduplication taxes, recovery groups, and why instant recovery capabilities might be your best friend in a crisis.</p><p>This is the recovery failure we alluded to w/our friend Stuart Liddle: https://www.backupwrapup.com/laptop-restore-nightmare-900gb/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/no-one-cares-about-your-backup-window]]></link><guid isPermaLink="false">aae32634-8921-4267-8948-b76ae43e3626</guid><itunes:image href="https://artwork.captivate.fm/60451e66-9c25-46b5-97d9-493a057928fd/jahIsq9zPouDQoLySPL2bOVP.jpg"/><pubDate>Mon, 10 Feb 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/aae32634-8921-4267-8948-b76ae43e3626.mp3" length="40906193" type="audio/mpeg"/><itunes:duration>42:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c27c41fc-f6f3-4518-a52c-873e0340faab/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c27c41fc-f6f3-4518-a52c-873e0340faab/index.html" type="text/html"/></item><item><title>Artificial Intelligence: The Future of Backup?</title><itunes:title>Artificial Intelligence: The Future of Backup?</itunes:title><description><![CDATA[<p>Artificial intelligence in backup isn't just marketing hype - it's changing how we protect our data. In this episode, W. Curtis Preston and Prasanna Malaiyandi break down the practical applications of AI in backup systems, from intelligent scheduling to ransomware detection.</p><p>Learn how artificial intelligence helps with capacity planning, especially with deduplication systems where predicting storage needs gets tricky. We discuss AI's role in asset discovery, anomaly detection, and even creating better disaster recovery plans. Plus, find out why backing up AI models themselves might become your next big challenge. This no-nonsense look at AI in backup cuts through the confusion and focuses on what really matters - making your backups better.</p>]]></description><content:encoded><![CDATA[<p>Artificial intelligence in backup isn't just marketing hype - it's changing how we protect our data. In this episode, W. Curtis Preston and Prasanna Malaiyandi break down the practical applications of AI in backup systems, from intelligent scheduling to ransomware detection.</p><p>Learn how artificial intelligence helps with capacity planning, especially with deduplication systems where predicting storage needs gets tricky. We discuss AI's role in asset discovery, anomaly detection, and even creating better disaster recovery plans. Plus, find out why backing up AI models themselves might become your next big challenge. This no-nonsense look at AI in backup cuts through the confusion and focuses on what really matters - making your backups better.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/ai-future-of-backup]]></link><guid isPermaLink="false">99fe8783-8334-4199-b518-e7f542ba348c</guid><itunes:image href="https://artwork.captivate.fm/ac9f1cea-1b12-4774-aff7-0d318b144d37/RGMfc8Isb2E6z_Kkkxq51csR.jpg"/><pubDate>Mon, 03 Feb 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/99fe8783-8334-4199-b518-e7f542ba348c.mp3" length="41768440" type="audio/mpeg"/><itunes:duration>43:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/b742f854-49ba-4a51-9d79-6db0eff64cc0/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b742f854-49ba-4a51-9d79-6db0eff64cc0/index.html" type="text/html"/></item><item><title>Disaster Recovery Testing: The Execution Phase</title><itunes:title>Disaster Recovery Testing: The Execution Phase</itunes:title><description><![CDATA[<p>In part two of our disaster recovery testing series, we explore the critical steps of executing a DR test. From coordinating teams and documenting issues to maintaining communication channels during the test, this episode covers everything you need to know about running an effective DR test.</p><p>Host W. Curtis Preston and co-host Prasanna Malaiyandi share practical advice from their extensive experience with disaster recovery testing. They discuss the importance of having backup communication methods, maintaining detailed documentation, and conducting thorough post-test analysis. Learn why testing your DR plan regularly is crucial and how to build a recovery mindset across your organization.</p><p>Whether you're planning your first DR test or looking to improve your existing testing procedures, this episode provides valuable insights to help ensure your disaster recovery testing success.</p>]]></description><content:encoded><![CDATA[<p>In part two of our disaster recovery testing series, we explore the critical steps of executing a DR test. From coordinating teams and documenting issues to maintaining communication channels during the test, this episode covers everything you need to know about running an effective DR test.</p><p>Host W. Curtis Preston and co-host Prasanna Malaiyandi share practical advice from their extensive experience with disaster recovery testing. They discuss the importance of having backup communication methods, maintaining detailed documentation, and conducting thorough post-test analysis. Learn why testing your DR plan regularly is crucial and how to build a recovery mindset across your organization.</p><p>Whether you're planning your first DR test or looking to improve your existing testing procedures, this episode provides valuable insights to help ensure your disaster recovery testing success.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/disaster-recovery-testing-execution-phase]]></link><guid isPermaLink="false">652228d8-d1bf-407f-a25b-605901e8e54f</guid><itunes:image href="https://artwork.captivate.fm/bac52aec-422f-4ce9-bff1-abd32d30d910/57EmkP5h6Eqo8HCJ0P3PVJQS.jpg"/><pubDate>Mon, 27 Jan 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/652228d8-d1bf-407f-a25b-605901e8e54f.mp3" length="32240209" type="audio/mpeg"/><itunes:duration>33:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/726b140d-5b1c-412c-8013-5a4c398b10e8/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/726b140d-5b1c-412c-8013-5a4c398b10e8/index.html" type="text/html"/></item><item><title>Choosing the Best Cloud Backup for Your Small Business</title><itunes:title>Choosing the Best Cloud Backup for Your Small Business</itunes:title><description><![CDATA[<p>Looking for the best cloud backup for small business? This episode cuts straight to what matters. Host W. Curtis Preston and Prasanna Malaiyandi share their expert insights on choosing the right cloud backup solution for your small business needs.</p><p>They break down the critical features every small business should look for in a cloud backup service, including true immutability, proper implementation of the 3-2-1 rule, and transparent pricing. The discussion covers why cloud backup makes sense for small businesses, how to avoid common pitfalls, and what questions to ask potential providers. Whether you're currently shopping for a backup solution or want to verify your existing setup, this episode provides practical, actionable advice from industry veterans who understand what small businesses really need.</p>]]></description><content:encoded><![CDATA[<p>Looking for the best cloud backup for small business? This episode cuts straight to what matters. Host W. Curtis Preston and Prasanna Malaiyandi share their expert insights on choosing the right cloud backup solution for your small business needs.</p><p>They break down the critical features every small business should look for in a cloud backup service, including true immutability, proper implementation of the 3-2-1 rule, and transparent pricing. The discussion covers why cloud backup makes sense for small businesses, how to avoid common pitfalls, and what questions to ask potential providers. Whether you're currently shopping for a backup solution or want to verify your existing setup, this episode provides practical, actionable advice from industry veterans who understand what small businesses really need.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/choosing-best-cloud-backup-small-business]]></link><guid isPermaLink="false">3286e846-0d33-49cd-824f-724322b51d1b</guid><itunes:image href="https://artwork.captivate.fm/09676215-02f5-4c0d-b006-c8a9474eb92b/nyERBG1WrSRHcIsvH5HF6tnH.jpg"/><pubDate>Mon, 20 Jan 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/3286e846-0d33-49cd-824f-724322b51d1b.mp3" length="40328132" type="audio/mpeg"/><itunes:duration>42:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/daef3c89-8e04-4771-946f-a55d739e9797/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/daef3c89-8e04-4771-946f-a55d739e9797/index.html" type="text/html"/></item><item><title>Laptop Restore Nightmare: 900GB Recovery Story</title><itunes:title>Laptop Restore Nightmare: 900GB Recovery Story</itunes:title><description><![CDATA[<p>A personal laptop restore that should have taken days stretched into weeks, highlighting critical lessons about backup and recovery. When our guest's laptop hard drive failed, he thought replacing it with an SSD and restoring from Carbonite would be straightforward. Instead, he faced constant system crashes, hardware challenges, and a restore speed that would make a snail look fast. (Carbonite did not cause the crashes.) Listen as we break down this laptop restore saga, including why the system kept crashing five times per day, how Carbonite handled the interruptions, and whether paying $100 for a physical drive shipment might have been worth it. Perfect for anyone who wants to learn from someone else's restore challenges before facing their own.</p><p>Other episodes we talk about in this episode:</p><p>https://www.backupwrapup.com/how-to-properly-back-up-your-iphone-icloud-is-not-a-backup/</p><p>https://www.backupwrapup.com/videos/carbonite-lost-7500-customers-backup-data/</p><p>https://www.backupwrapup.com/carbonite-lawsuit-cloud-backup-cautionary-tale/</p>]]></description><content:encoded><![CDATA[<p>A personal laptop restore that should have taken days stretched into weeks, highlighting critical lessons about backup and recovery. When our guest's laptop hard drive failed, he thought replacing it with an SSD and restoring from Carbonite would be straightforward. Instead, he faced constant system crashes, hardware challenges, and a restore speed that would make a snail look fast. (Carbonite did not cause the crashes.) Listen as we break down this laptop restore saga, including why the system kept crashing five times per day, how Carbonite handled the interruptions, and whether paying $100 for a physical drive shipment might have been worth it. Perfect for anyone who wants to learn from someone else's restore challenges before facing their own.</p><p>Other episodes we talk about in this episode:</p><p>https://www.backupwrapup.com/how-to-properly-back-up-your-iphone-icloud-is-not-a-backup/</p><p>https://www.backupwrapup.com/videos/carbonite-lost-7500-customers-backup-data/</p><p>https://www.backupwrapup.com/carbonite-lawsuit-cloud-backup-cautionary-tale/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/laptop-restore-nightmare-900gb]]></link><guid isPermaLink="false">2a84b310-ef7b-404a-8493-46dd94fd482c</guid><itunes:image href="https://artwork.captivate.fm/96ec801d-851b-4ae0-8268-4021774d177e/lTs8o2rXL1u7ibkqM2gRwaYw.jpg"/><pubDate>Mon, 13 Jan 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/2a84b310-ef7b-404a-8493-46dd94fd482c.mp3" length="46977867" type="audio/mpeg"/><itunes:duration>48:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/270a6595-9983-423e-8e31-89903fdb9b4c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/270a6595-9983-423e-8e31-89903fdb9b4c/index.html" type="text/html"/></item><item><title>Making the Case for Your Backup IT Budget</title><itunes:title>Making the Case for Your Backup IT Budget</itunes:title><description><![CDATA[<p>Getting the right backup IT budget can feel like pulling teeth, but it doesn't have to be that way. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi share real-world strategies for securing the backup IT budget you need to protect your organization.</p><p>Learn how to partner with the security and GRC teams to make your case stronger. Find out why ransomware has changed the game when it comes to backup IT budget discussions, and hear practical tips for documenting your needs. Whether you're struggling with outdated systems or fighting for resources, this episode gives you the ammunition you need to get proper funding for your backup infrastructure.</p><p>Here's a link to the Stoli story if you're interested: https://therecord.media/stoli-group-usa-bankruptcy-filing-ransomware</p>]]></description><content:encoded><![CDATA[<p>Getting the right backup IT budget can feel like pulling teeth, but it doesn't have to be that way. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi share real-world strategies for securing the backup IT budget you need to protect your organization.</p><p>Learn how to partner with the security and GRC teams to make your case stronger. Find out why ransomware has changed the game when it comes to backup IT budget discussions, and hear practical tips for documenting your needs. Whether you're struggling with outdated systems or fighting for resources, this episode gives you the ammunition you need to get proper funding for your backup infrastructure.</p><p>Here's a link to the Stoli story if you're interested: https://therecord.media/stoli-group-usa-bankruptcy-filing-ransomware</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/backup-it-budget-case]]></link><guid isPermaLink="false">524dcb18-fec0-4dd6-991e-7aa55f6db5e3</guid><itunes:image href="https://artwork.captivate.fm/7acee12b-29b1-4b15-8c01-120451afb3fc/4i-80f6rtYCeqF1rfz4saf-G.jpg"/><pubDate>Mon, 06 Jan 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/524dcb18-fec0-4dd6-991e-7aa55f6db5e3.mp3" length="37149979" type="audio/mpeg"/><itunes:duration>38:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/33012a8f-45a7-44e2-953e-19f279fc1b4a/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/33012a8f-45a7-44e2-953e-19f279fc1b4a/index.html" type="text/html"/></item><item><title>DR Case Study: A first hand-account</title><itunes:title>DR Case Study: A first hand-account</itunes:title><description><![CDATA[<p>(For frequent listeners, I made a mistake with last week's episode.  THIS is the episode I meant to publish last week.  I know it has the same description. Sorry about that.)</p><p>This disaster recovery case study takes you inside a real DR scenario when a hurricane devastated an island's data center. Our guest shares his firsthand experience managing recovery efforts with limited resources, no mainland connection, and countless unexpected challenges.  (This is the on-the-ground account of the story we told last week with "Harry Potter.")</p><p>Listen as we explore how basic DR assumptions fell apart, from authentication dependencies to satellite communication limits. Learn why sleeping on air mattresses and eating chicken and rice became part of this disaster recovery case study, and discover critical lessons about DR planning, testing, and documentation that could save your organization. This episode reveals the reality of disaster recovery when everything - including trees - gets stripped away.</p>]]></description><content:encoded><![CDATA[<p>(For frequent listeners, I made a mistake with last week's episode.  THIS is the episode I meant to publish last week.  I know it has the same description. Sorry about that.)</p><p>This disaster recovery case study takes you inside a real DR scenario when a hurricane devastated an island's data center. Our guest shares his firsthand experience managing recovery efforts with limited resources, no mainland connection, and countless unexpected challenges.  (This is the on-the-ground account of the story we told last week with "Harry Potter.")</p><p>Listen as we explore how basic DR assumptions fell apart, from authentication dependencies to satellite communication limits. Learn why sleeping on air mattresses and eating chicken and rice became part of this disaster recovery case study, and discover critical lessons about DR planning, testing, and documentation that could save your organization. This episode reveals the reality of disaster recovery when everything - including trees - gets stripped away.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/dr-case-study-first-hand-account]]></link><guid isPermaLink="false">fcbe33ee-d80a-4ed3-8a8c-6286b8b2ed64</guid><itunes:image href="https://artwork.captivate.fm/840b55e1-da4c-44d3-9283-9e57ee9e3beb/m0IfEL3CXP6gj6fNE6ee1R1Y.jpg"/><pubDate>Mon, 23 Dec 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/fcbe33ee-d80a-4ed3-8a8c-6286b8b2ed64.mp3" length="51038751" type="audio/mpeg"/><itunes:duration>53:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/30f26dca-756e-4064-a621-3e264e07b936/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/30f26dca-756e-4064-a621-3e264e07b936/index.html" type="text/html"/></item><item><title>NetBackup Disaster: When Nature Strikes Back</title><itunes:title>NetBackup Disaster: When Nature Strikes Back</itunes:title><description><![CDATA[<p>When a hurricane struck an island data center, one backup admin faced a NetBackup disaster that tested years of experience and planning. This episode reveals the real-world challenges of recovering from a catastrophic event that flooded one data center and disrupted access to Iron Mountain's offsite storage facility.</p><p>Listen as our guest, a 20-year veteran backup administrator, shares his firsthand account of managing this NetBackup disaster. Learn about the critical decisions made during the three-week recovery process, the unexpected challenges they faced, and the valuable lessons learned about backup infrastructure, replication strategies, and disaster recovery planning.</p><p>(This is part one of two parts.  Next week you will hear from the person on the ground during this disaster.)</p>]]></description><content:encoded><![CDATA[<p>When a hurricane struck an island data center, one backup admin faced a NetBackup disaster that tested years of experience and planning. This episode reveals the real-world challenges of recovering from a catastrophic event that flooded one data center and disrupted access to Iron Mountain's offsite storage facility.</p><p>Listen as our guest, a 20-year veteran backup administrator, shares his firsthand account of managing this NetBackup disaster. Learn about the critical decisions made during the three-week recovery process, the unexpected challenges they faced, and the valuable lessons learned about backup infrastructure, replication strategies, and disaster recovery planning.</p><p>(This is part one of two parts.  Next week you will hear from the person on the ground during this disaster.)</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/dr-case-study-hurricane-dc]]></link><guid isPermaLink="false">00f88d2d-0c78-4176-bc8a-11aa917c3a41</guid><itunes:image href="https://artwork.captivate.fm/4b3d2d15-a81a-4f76-b864-b3df55b30733/kqDJvbukSHuEAURrXLD4qAW4.jpg"/><pubDate>Mon, 16 Dec 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/00f88d2d-0c78-4176-bc8a-11aa917c3a41.mp3" length="43495896" type="audio/mpeg"/><itunes:duration>45:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fdf04edc-aff3-4938-adaa-6364819c878f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fdf04edc-aff3-4938-adaa-6364819c878f/index.html" type="text/html"/></item><item><title>Free NetBackup Reader: S2|DATA&apos;s Game-Changing Tool</title><itunes:title>Free NetBackup Reader: S2|DATA&apos;s Game-Changing Tool</itunes:title><description><![CDATA[<p>S2|DATA has released a free NetBackup reader that gives users complete control over their backup data without requiring a full NetBackup environment. This standalone application allows anyone to quickly catalog and restore data from NetBackup disk images, even if they no longer maintain their NetBackup infrastructure.</p><p>CEO Brendan Sullivan joins the show to explain why they created this free tool and how it helps organizations maintain access to their legacy backup data. We discuss the challenges of vendor lock-in, the importance of data ownership, and why companies shouldn't have to keep paying for access to their own information. We also cover how S2|DATA offers a range of services for accessing all legacy backup data, not just NetBackup.</p><p>Whether you're considering moving away from a backup product or simply want easier access to your backup data, this episode explains how this free NetBackup reader can help you take control of your data destiny.</p><p>You can read about it here: <a href="https://s2data.com/libertas-free-backup-reader/" rel="noopener noreferrer" target="_blank">https://s2data.com/libertas-free-backup-reader/</a></p>]]></description><content:encoded><![CDATA[<p>S2|DATA has released a free NetBackup reader that gives users complete control over their backup data without requiring a full NetBackup environment. This standalone application allows anyone to quickly catalog and restore data from NetBackup disk images, even if they no longer maintain their NetBackup infrastructure.</p><p>CEO Brendan Sullivan joins the show to explain why they created this free tool and how it helps organizations maintain access to their legacy backup data. We discuss the challenges of vendor lock-in, the importance of data ownership, and why companies shouldn't have to keep paying for access to their own information. We also cover how S2|DATA offers a range of services for accessing all legacy backup data, not just NetBackup.</p><p>Whether you're considering moving away from a backup product or simply want easier access to your backup data, this episode explains how this free NetBackup reader can help you take control of your data destiny.</p><p>You can read about it here: <a href="https://s2data.com/libertas-free-backup-reader/" rel="noopener noreferrer" target="_blank">https://s2data.com/libertas-free-backup-reader/</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/free-netbackup-reader]]></link><guid isPermaLink="false">af06b36d-9b90-4a45-905e-312e0fe1459f</guid><itunes:image href="https://artwork.captivate.fm/98d522a3-f3ee-4fe8-a5e3-2048358e8b90/OXiLLSmj8eL86If_QN9re-Vd.jpg"/><pubDate>Mon, 02 Dec 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/af06b36d-9b90-4a45-905e-312e0fe1459f.mp3" length="26097454" type="audio/mpeg"/><itunes:duration>27:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/3806d6d7-cf5d-46cb-955d-a1e80592779b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3806d6d7-cf5d-46cb-955d-a1e80592779b/index.html" type="text/html"/></item><item><title>Disaster Recovery Test Gone Wrong</title><itunes:title>Disaster Recovery Test Gone Wrong</itunes:title><description><![CDATA[<p>In this eye-opening episode, we examine a real-world disaster recovery test gone wrong  from Kodiak Island, Alaska. Our guest Paul Van Dyke shares his story of intentionally taking down an entire server environment over a weekend, armed with only backup tapes and determination. This disaster recovery test example showcases both what not to do and valuable lessons learned.</p><p>Paul walks us through his bold 2001 decision to reorganize storage across five servers by completely wiping them all at once. What was supposed to be a weekend project turned into a five-day marathon, including sleeping on his office floor to swap backup tapes. While he eventually succeeded in restoring everything, this disaster recovery test example demonstrates why proper testing and planning are crucial for any major infrastructure changes.</p><p>Join us for this candid conversation about backup testing, restoration planning, and the unique challenges of managing IT infrastructure on a remote Alaskan island. Learn from Paul's experience so you don't have to learn these lessons the hard way!</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode, we examine a real-world disaster recovery test gone wrong  from Kodiak Island, Alaska. Our guest Paul Van Dyke shares his story of intentionally taking down an entire server environment over a weekend, armed with only backup tapes and determination. This disaster recovery test example showcases both what not to do and valuable lessons learned.</p><p>Paul walks us through his bold 2001 decision to reorganize storage across five servers by completely wiping them all at once. What was supposed to be a weekend project turned into a five-day marathon, including sleeping on his office floor to swap backup tapes. While he eventually succeeded in restoring everything, this disaster recovery test example demonstrates why proper testing and planning are crucial for any major infrastructure changes.</p><p>Join us for this candid conversation about backup testing, restoration planning, and the unique challenges of managing IT infrastructure on a remote Alaskan island. Learn from Paul's experience so you don't have to learn these lessons the hard way!</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/dr-test-gone-wrong]]></link><guid isPermaLink="false">354e5ebc-75cb-4720-8887-4e6a6db39d0a</guid><itunes:image href="https://artwork.captivate.fm/ab5c432e-22d3-4389-9bc1-fe3becc9e1ce/4c0_s351F4qdIz2Xae_vMitn.jpg"/><pubDate>Mon, 25 Nov 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/354e5ebc-75cb-4720-8887-4e6a6db39d0a.mp3" length="55114695" type="audio/mpeg"/><itunes:duration>57:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c2de7c1-378b-4d24-b5d5-01c2806e0361/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c2de7c1-378b-4d24-b5d5-01c2806e0361/index.html" type="text/html"/></item><item><title>Disaster Recovery Testing: Start Small Before Going Big</title><itunes:title>Disaster Recovery Testing: Start Small Before Going Big</itunes:title><description><![CDATA[<p>Ready to level up your disaster recovery testing game? This episode covers everything from basic restore testing to full-scale DR scenarios. Curtis and Prasanna share real-world experiences and practical advice for implementing effective disaster recovery testing strategies.</p><p>Learn why starting small is crucial, how to define clear success criteria, and ways to test without risking your production environment. We discuss different infrastructure types, from physical servers to cloud platforms, and explain how each requires its own testing approach. Plus, get insights on creating effective runbooks and ensuring your team can execute recovery procedures without depending on specific individuals.</p><p>Whether you're planning your first DR test or looking to improve existing procedures, this episode provides actionable guidance for building confidence in your recovery capabilities.</p><p>BTW if you want to watch/listen to the Alaska DR story, I'm actually going to repost it next week.</p>]]></description><content:encoded><![CDATA[<p>Ready to level up your disaster recovery testing game? This episode covers everything from basic restore testing to full-scale DR scenarios. Curtis and Prasanna share real-world experiences and practical advice for implementing effective disaster recovery testing strategies.</p><p>Learn why starting small is crucial, how to define clear success criteria, and ways to test without risking your production environment. We discuss different infrastructure types, from physical servers to cloud platforms, and explain how each requires its own testing approach. Plus, get insights on creating effective runbooks and ensuring your team can execute recovery procedures without depending on specific individuals.</p><p>Whether you're planning your first DR test or looking to improve existing procedures, this episode provides actionable guidance for building confidence in your recovery capabilities.</p><p>BTW if you want to watch/listen to the Alaska DR story, I'm actually going to repost it next week.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/disaster-recovery-testing-start-small]]></link><guid isPermaLink="false">0cd82e14-f13b-4d54-a77a-a0e9d80856d5</guid><itunes:image href="https://artwork.captivate.fm/d9d1a613-9bf8-4dc1-bb3d-ab2b63678641/idmkmf9vpOKbwV8rj38JnTT_.jpg"/><pubDate>Mon, 18 Nov 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0cd82e14-f13b-4d54-a77a-a0e9d80856d5.mp3" length="36546435" type="audio/mpeg"/><itunes:duration>38:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2a144d73-2f28-4001-89ba-0f50b9133bdf/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2a144d73-2f28-4001-89ba-0f50b9133bdf/index.html" type="text/html"/></item><item><title>Detecting Ransomware Before It&apos;s Too Late</title><itunes:title>Detecting Ransomware Before It&apos;s Too Late</itunes:title><description><![CDATA[<p><strong>WC</strong></p><p>continue</p><p>=====================DESCRIPTION===============</p><p>Detecting ransomware requires more than just good antivirus software - it demands a comprehensive approach using multiple tools and techniques. In this episode of The Backup Wrap-up, security expert Mike Saylor breaks down the essential components of ransomware detection, from endpoint protection to network monitoring.</p><p>Learn about the latest detection tools like XDR, EDR, and SOAR, and discover why many organizations might benefit from working with a managed security service provider. We discuss real-world examples of ransomware detection, including unusual signs that might indicate an attack in progress. Whether you're managing IT for a small business or an enterprise organization, this episode provides practical insights into detecting ransomware before it's too late.</p>]]></description><content:encoded><![CDATA[<p><strong>WC</strong></p><p>continue</p><p>=====================DESCRIPTION===============</p><p>Detecting ransomware requires more than just good antivirus software - it demands a comprehensive approach using multiple tools and techniques. In this episode of The Backup Wrap-up, security expert Mike Saylor breaks down the essential components of ransomware detection, from endpoint protection to network monitoring.</p><p>Learn about the latest detection tools like XDR, EDR, and SOAR, and discover why many organizations might benefit from working with a managed security service provider. We discuss real-world examples of ransomware detection, including unusual signs that might indicate an attack in progress. Whether you're managing IT for a small business or an enterprise organization, this episode provides practical insights into detecting ransomware before it's too late.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/detecting-ransomware-before-too-late]]></link><guid isPermaLink="false">e2e898dc-8e94-4773-b042-f842527c0858</guid><itunes:image href="https://artwork.captivate.fm/989eb434-28a3-47fb-ae05-0fd2ec2605b0/uc_Rk-Gm-3X8FiI8zdgOf4I9.jpg"/><pubDate>Mon, 11 Nov 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0d9d884d-5db1-4cda-ac06-db5903eb9af8/Detecting-ransomware.mp3" length="43407248" type="audio/mpeg"/><itunes:duration>45:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/926ce898-6a02-4fd3-9349-00fe2cca279b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/926ce898-6a02-4fd3-9349-00fe2cca279b/index.html" type="text/html"/></item><item><title>RTO vs RPO: The Foundations of Backup Design</title><itunes:title>RTO vs RPO: The Foundations of Backup Design</itunes:title><description><![CDATA[<p>In this essential episode of The Backup Wrap-up, we dive deep into RTO vs RPO – the foundational concepts that drive backup and recovery system design. Curtis and Prasanna break down why these aren't just technical metrics, but crucial business decisions that should come from your stakeholders.</p><p>Learn why different applications need different RTOs and RPOs, how these metrics influence your backup frequency and system design, and why getting them wrong can cost your company millions. We'll show you how to have productive conversations with stakeholders about recovery objectives, and why the common answer of "zero downtime" isn't always the right one. Whether you're new to backup or a seasoned pro, this episode will reshape how you think about recovery objectives.</p>]]></description><content:encoded><![CDATA[<p>In this essential episode of The Backup Wrap-up, we dive deep into RTO vs RPO – the foundational concepts that drive backup and recovery system design. Curtis and Prasanna break down why these aren't just technical metrics, but crucial business decisions that should come from your stakeholders.</p><p>Learn why different applications need different RTOs and RPOs, how these metrics influence your backup frequency and system design, and why getting them wrong can cost your company millions. We'll show you how to have productive conversations with stakeholders about recovery objectives, and why the common answer of "zero downtime" isn't always the right one. Whether you're new to backup or a seasoned pro, this episode will reshape how you think about recovery objectives.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/rto-vs-rpo-foundations]]></link><guid isPermaLink="false">a9f76c47-4f88-4e51-9c0b-0da34b7c5fc1</guid><itunes:image href="https://artwork.captivate.fm/c07546e8-03bd-4f4f-80f2-245fe2e3fe1a/IaFUHDCeSncA4Y6MAZAIlNdF.jpg"/><pubDate>Mon, 04 Nov 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/a9f76c47-4f88-4e51-9c0b-0da34b7c5fc1.mp3" length="39139451" type="audio/mpeg"/><itunes:duration>40:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/496f11f4-51ea-4199-b896-c51314e0d393/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/496f11f4-51ea-4199-b896-c51314e0d393/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-037191e0-8acd-4abd-bfa2-74b4ef840bc6.json" type="application/json+chapters"/></item><item><title>Backup from Hell: SMB vs 400TB</title><itunes:title>Backup from Hell: SMB vs 400TB</itunes:title><description><![CDATA[<p>Experience the backup from hell in this eye-opening episode of The Backup Wrap-up. What started as a straightforward 40TB backup spiraled into a months-long battle with 400TB of data, failing tape drives, and directories containing hundreds millions of files.</p><p>Host W. Curtis Preston shares his first-hand account of tackling this backup from hell, including the challenges of dealing with SMB protocol limitations, tape drive failures, and the infamous "million file problem." Learn why backing up 99 million files in a single directory isn't just challenging - it's nearly impossible over standard protocols.</p><p>Discover the solutions that finally worked, from switching to disk-based backup to implementing local tar backups. Whether you're a backup admin or IT professional, this episode offers valuable insights into handling extreme backup scenarios.</p>]]></description><content:encoded><![CDATA[<p>Experience the backup from hell in this eye-opening episode of The Backup Wrap-up. What started as a straightforward 40TB backup spiraled into a months-long battle with 400TB of data, failing tape drives, and directories containing hundreds millions of files.</p><p>Host W. Curtis Preston shares his first-hand account of tackling this backup from hell, including the challenges of dealing with SMB protocol limitations, tape drive failures, and the infamous "million file problem." Learn why backing up 99 million files in a single directory isn't just challenging - it's nearly impossible over standard protocols.</p><p>Discover the solutions that finally worked, from switching to disk-based backup to implementing local tar backups. Whether you're a backup admin or IT professional, this episode offers valuable insights into handling extreme backup scenarios.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/backup-from-hell-smb-vs-400tb]]></link><guid isPermaLink="false">03d0bf00-7282-4182-ac25-7b739c4934a9</guid><itunes:image href="https://artwork.captivate.fm/6a15501d-2829-4ee1-9aa3-53bd8fed0f76/NUdtB0QqMY0ufaHBXm6sk50w.png"/><pubDate>Mon, 28 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/03d0bf00-7282-4182-ac25-7b739c4934a9.mp3" length="42921159" type="audio/mpeg"/><itunes:duration>44:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c108824-e890-477b-a486-773225628094/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c108824-e890-477b-a486-773225628094/index.html" type="text/html"/></item><item><title>Election Integrity 101: What Every Voter Should Know</title><itunes:title>Election Integrity 101: What Every Voter Should Know</itunes:title><description><![CDATA[<p>In this important episode, we tackle the crucial topic of election integrity. As a seasoned poll worker and site manager, I take you behind the scenes of our voting process, revealing the numerous safeguards and checks in place to ensure fair and accurate elections. We debunk common myths, explain the importance of paper ballots, and discuss how mail-in voting actually works. You'll learn about the rigorous signature verification process, the role of election observers, and why it's nearly impossible to commit large-scale voter fraud. Whether you're skeptical about our electoral system or simply curious, this episode provides valuable insights into how we maintain election integrity. Don't miss this chance to understand the nuts and bolts of our democratic process and why you can trust in the security of your vote.</p>]]></description><content:encoded><![CDATA[<p>In this important episode, we tackle the crucial topic of election integrity. As a seasoned poll worker and site manager, I take you behind the scenes of our voting process, revealing the numerous safeguards and checks in place to ensure fair and accurate elections. We debunk common myths, explain the importance of paper ballots, and discuss how mail-in voting actually works. You'll learn about the rigorous signature verification process, the role of election observers, and why it's nearly impossible to commit large-scale voter fraud. Whether you're skeptical about our electoral system or simply curious, this episode provides valuable insights into how we maintain election integrity. Don't miss this chance to understand the nuts and bolts of our democratic process and why you can trust in the security of your vote.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/election-integrity-101-what-voters-should-know]]></link><guid isPermaLink="false">8acd95cd-d61b-4062-bdbf-63cd745c0c07</guid><itunes:image href="https://artwork.captivate.fm/dd4b0973-19cb-4ca2-8b19-f918412f5de7/LQkPjkZ6DZBHG0VEIGVN6pJ2.jpg"/><pubDate>Mon, 21 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/eb1031c4-a049-4548-8405-677c408de911/Election-Integrity.mp3" length="60554857" type="audio/mpeg"/><itunes:duration>01:03:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/28f3891c-9534-4ee9-a6b0-fb0ea78393a8/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/28f3891c-9534-4ee9-a6b0-fb0ea78393a8/index.html" type="text/html"/></item><item><title>The Dark Side of Backup System Consolidation</title><itunes:title>The Dark Side of Backup System Consolidation</itunes:title><description><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, we look at the dangers of the consolidating backup market, a trend that's reshaping the industry. We talk about recent major acquisitions like Cohesity's purchase of Veritas and Salesforce's takeover of OwnBackup, examining the implications for customers and the market at large.</p><p>After covering each acquisition, we talk about the often-overlooked risks of keeping legacy backup systems operational post-consolidation, including security vulnerabilities and ongoing costs. We also address the challenges of data accessibility and the potential legal ramifications of retaining old backups. Whether you're a seasoned IT professional or new to the world of data protection, this episode offers valuable insights into navigating the complex landscape of backup market consolidation.</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, we look at the dangers of the consolidating backup market, a trend that's reshaping the industry. We talk about recent major acquisitions like Cohesity's purchase of Veritas and Salesforce's takeover of OwnBackup, examining the implications for customers and the market at large.</p><p>After covering each acquisition, we talk about the often-overlooked risks of keeping legacy backup systems operational post-consolidation, including security vulnerabilities and ongoing costs. We also address the challenges of data accessibility and the potential legal ramifications of retaining old backups. Whether you're a seasoned IT professional or new to the world of data protection, this episode offers valuable insights into navigating the complex landscape of backup market consolidation.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/backup-consolidation-dark-side]]></link><guid isPermaLink="false">564127af-2712-4323-9506-0be44ca92b1d</guid><itunes:image href="https://artwork.captivate.fm/4670d4e3-81d6-4770-aeca-fe0331f5ce9e/IO00Uwof5u-hiUJElhkbBmKT.jpg"/><pubDate>Mon, 14 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6b6301eb-869d-45f6-8ab9-b34022445f60/Backup-consolidation.mp3" length="40817165" type="audio/mpeg"/><itunes:duration>42:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/d51a6f76-91e2-4852-8ef8-10a914b27057/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d51a6f76-91e2-4852-8ef8-10a914b27057/index.html" type="text/html"/></item><item><title>Rogue Administrator Nightmare: Lessons from a Real-Life Attack</title><itunes:title>Rogue Administrator Nightmare: Lessons from a Real-Life Attack</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-up that proves Curtis right :) we look into the shocking case of a rogue administrator who held an entire company's IT infrastructure hostage. We explore how Daniel Rhyne, a core infrastructure engineer, managed to lock out his colleagues and demand a $750,000 ransom. This real-world example highlights the critical importance of safeguarding against insider threats.</p><p>We look into practical strategies to prevent such incidents, including implementing least privilege access, enforcing "four eyes" principles for critical changes, and maintaining robust logging and auditing systems. The discussion also covers recovery options and the vital role of off-site immutable backups in mitigating damage from rogue administrators. Whether you're an IT professional or business leader, this episode provides essential insights into protecting your organization from the potentially devastating actions of trusted insiders gone rogue.</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-up that proves Curtis right :) we look into the shocking case of a rogue administrator who held an entire company's IT infrastructure hostage. We explore how Daniel Rhyne, a core infrastructure engineer, managed to lock out his colleagues and demand a $750,000 ransom. This real-world example highlights the critical importance of safeguarding against insider threats.</p><p>We look into practical strategies to prevent such incidents, including implementing least privilege access, enforcing "four eyes" principles for critical changes, and maintaining robust logging and auditing systems. The discussion also covers recovery options and the vital role of off-site immutable backups in mitigating damage from rogue administrators. Whether you're an IT professional or business leader, this episode provides essential insights into protecting your organization from the potentially devastating actions of trusted insiders gone rogue.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/rogue-administrator-nightmare-lessons]]></link><guid isPermaLink="false">0da87cc1-5c45-46a1-8415-c3ac0910b8ad</guid><itunes:image href="https://artwork.captivate.fm/cd0ceb87-6af7-4897-8e44-ce8638affad9/YXWGzxRNlbpxvR_6PGNOZ-K6.jpg"/><pubDate>Mon, 07 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0da87cc1-5c45-46a1-8415-c3ac0910b8ad.mp3" length="36941408" type="audio/mpeg"/><itunes:duration>38:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Business Impact Analysis: Your Key to Resilient Operations</title><itunes:title>Business Impact Analysis: Your Key to Resilient Operations</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-up, we explore the critical process of a business impact analysis (BIA) and its importance for organizations of all sizes. Our expert guest, Dr. Mike Saylor, shares valuable insights on conducting effective BIAs, including why it's best to have a third party perform them. We discuss how business impact analysis informs disaster recovery plans, aligns IT with business needs, and helps justify crucial investments in resilient systems. You'll learn about the steps involved in a BIA, from stakeholder identification to financial impact assessment, and understand how this process can save your organization time, money, and headaches in the long run. Whether you're an IT professional or a business leader, this episode provides essential knowledge for protecting your organization's critical functions and ensuring business continuity.</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-up, we explore the critical process of a business impact analysis (BIA) and its importance for organizations of all sizes. Our expert guest, Dr. Mike Saylor, shares valuable insights on conducting effective BIAs, including why it's best to have a third party perform them. We discuss how business impact analysis informs disaster recovery plans, aligns IT with business needs, and helps justify crucial investments in resilient systems. You'll learn about the steps involved in a BIA, from stakeholder identification to financial impact assessment, and understand how this process can save your organization time, money, and headaches in the long run. Whether you're an IT professional or a business leader, this episode provides essential knowledge for protecting your organization's critical functions and ensuring business continuity.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/business-impact-analysis]]></link><guid isPermaLink="false">0c84292a-dd05-4f44-a6f2-385a8268df6c</guid><itunes:image href="https://artwork.captivate.fm/a8e51a9c-1192-44ef-a542-f54f3e31bbed/oy9AgSz80vltCPJUa-txTi2l.jpg"/><pubDate>Mon, 30 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0c84292a-dd05-4f44-a6f2-385a8268df6c.mp3" length="44893094" type="audio/mpeg"/><itunes:duration>46:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Building a Resilient Ransomware Backup Strategy</title><itunes:title>Building a Resilient Ransomware Backup Strategy</itunes:title><description><![CDATA[<p>In this essential episode of The Backup Wrap-up, we delve into the critical components of a robust ransomware backup strategy. We explore the concept of dwell time and its implications on backup retention periods, emphasizing the need for longer-term storage solutions. Our discussion covers the importance of frequent backups and designing systems with multiple recovery options. We examine the benefits of cutting-edge technologies like snapshots, replication, and cloud-based recovery solutions in crafting an effective ransomware backup strategy. The episode also tackles the nuances of database versus file system recovery and provides insights on evaluating the importance of encrypted data. Whether you're an IT professional or a business owner, this episode offers valuable guidance on fortifying your ransomware backup strategy to protect your critical data assets.</p>]]></description><content:encoded><![CDATA[<p>In this essential episode of The Backup Wrap-up, we delve into the critical components of a robust ransomware backup strategy. We explore the concept of dwell time and its implications on backup retention periods, emphasizing the need for longer-term storage solutions. Our discussion covers the importance of frequent backups and designing systems with multiple recovery options. We examine the benefits of cutting-edge technologies like snapshots, replication, and cloud-based recovery solutions in crafting an effective ransomware backup strategy. The episode also tackles the nuances of database versus file system recovery and provides insights on evaluating the importance of encrypted data. Whether you're an IT professional or a business owner, this episode offers valuable guidance on fortifying your ransomware backup strategy to protect your critical data assets.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/resilient-ransomware-backup-strategy]]></link><guid isPermaLink="false">9ed7457a-f842-4df8-a255-e72018abac0d</guid><itunes:image href="https://artwork.captivate.fm/fd711ccf-b7b5-4c01-9f84-43657dc62b9b/4RK5WtYEYkrYEZgFX0D3b6CB.jpg"/><pubDate>Mon, 23 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9ed7457a-f842-4df8-a255-e72018abac0d.mp3" length="49019607" type="audio/mpeg"/><itunes:duration>51:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/5392781f-22a0-4995-a901-b3b91e6f8bf5/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5392781f-22a0-4995-a901-b3b91e6f8bf5/index.html" type="text/html"/></item><item><title>Detecting Ransomware Before It&apos;s Too Late</title><itunes:title>Detecting Ransomware Before It&apos;s Too Late</itunes:title><description><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, we delve into the critical topic of detecting ransomware. Joined by cybersecurity expert Dr. Mike Sailor, we explore the subtle signs that could indicate a ransomware attack in progress. From slight performance degradation to unusual network behavior, we cover the early warning signs that every IT professional and digital asset owner should be aware of.</p><p>Our discussion goes beyond just identifying threats. We examine the role of advanced security tools like SIEM and XDR in early ransomware detection, and why integrating these with endpoint protection is crucial for an effective defense strategy. We also stress the importance of having a solid incident response plan and the benefits of virtualization in recovery efforts. Whether you're looking to bolster your organization's cybersecurity or simply protect your personal data, this episode provides invaluable insights into detecting ransomware before it's too late.</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, we delve into the critical topic of detecting ransomware. Joined by cybersecurity expert Dr. Mike Sailor, we explore the subtle signs that could indicate a ransomware attack in progress. From slight performance degradation to unusual network behavior, we cover the early warning signs that every IT professional and digital asset owner should be aware of.</p><p>Our discussion goes beyond just identifying threats. We examine the role of advanced security tools like SIEM and XDR in early ransomware detection, and why integrating these with endpoint protection is crucial for an effective defense strategy. We also stress the importance of having a solid incident response plan and the benefits of virtualization in recovery efforts. Whether you're looking to bolster your organization's cybersecurity or simply protect your personal data, this episode provides invaluable insights into detecting ransomware before it's too late.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/detecting-ransomware-before-too-late]]></link><guid isPermaLink="false">b39be378-ceb4-4bd1-b6ca-bb840f17a2b0</guid><itunes:image href="https://artwork.captivate.fm/db102ce4-45cc-44fd-9928-0f9478b4cd96/T8_zfh5mWVmRSOv_P3iV8TpC.jpg"/><pubDate>Mon, 16 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/b39be378-ceb4-4bd1-b6ca-bb840f17a2b0.mp3" length="43986537" type="audio/mpeg"/><itunes:duration>45:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/62c5d341-a4df-4883-8820-6eed8321f2b8/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/62c5d341-a4df-4883-8820-6eed8321f2b8/index.html" type="text/html"/></item><item><title>Tabletop Exercises: Your Secret Weapon Against Cyberattacks</title><itunes:title>Tabletop Exercises: Your Secret Weapon Against Cyberattacks</itunes:title><description><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, we delve into the world of tabletop exercises and their crucial role in cybersecurity preparedness. Our guest expert, Mike Saylor from Black Swan Security, guides us through the ins and outs of planning and executing effective tabletop exercises. We explore why these simulations are essential for organizations of all sizes, and how they can dramatically improve incident response capabilities.</p><p>Listeners will gain valuable insights into selecting the right scenarios, involving key stakeholders, and creating a safe environment for learning. We also discuss common pitfalls to avoid and the importance of regular practice. Whether you're new to tabletop exercises or looking to enhance your existing program, this episode provides practical advice for strengthening your organization's cyber resilience. Don't miss this opportunity to level up your incident response game!</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, we delve into the world of tabletop exercises and their crucial role in cybersecurity preparedness. Our guest expert, Mike Saylor from Black Swan Security, guides us through the ins and outs of planning and executing effective tabletop exercises. We explore why these simulations are essential for organizations of all sizes, and how they can dramatically improve incident response capabilities.</p><p>Listeners will gain valuable insights into selecting the right scenarios, involving key stakeholders, and creating a safe environment for learning. We also discuss common pitfalls to avoid and the importance of regular practice. Whether you're new to tabletop exercises or looking to enhance your existing program, this episode provides practical advice for strengthening your organization's cyber resilience. Don't miss this opportunity to level up your incident response game!</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/tabletop-exercises-secret-weapon-cyberattacks]]></link><guid isPermaLink="false">d02f1e1d-4be6-4974-a90f-fe0f092e6994</guid><itunes:image href="https://artwork.captivate.fm/9e1c5355-a24a-42e4-bc3d-598e7ccb2fd5/7tp7oQgNSpkkTwdFGvNkzXdP.jpg"/><pubDate>Mon, 09 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d02f1e1d-4be6-4974-a90f-fe0f092e6994.mp3" length="46020741" type="audio/mpeg"/><itunes:duration>47:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/de91f81a-f780-4f30-b23c-6d23e2163f28/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/de91f81a-f780-4f30-b23c-6d23e2163f28/index.html" type="text/html"/></item><item><title>Fostering a Culture of Cybersecurity with Training</title><itunes:title>Fostering a Culture of Cybersecurity with Training</itunes:title><description><![CDATA[<p>In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions, we cover it all.</p><p>Learn why rewarding vigilance is more effective than punishing mistakes, and how to foster a security-aware culture in your organization. We discuss the importance of relevant, interactive training methods, including simulated phishing tests, and how to train users to spot suspicious activity beyond just phishing attempts. Whether you're an IT professional or a business owner, this episode provides valuable insights to enhance your cybersecurity training efforts and strengthen your organization's digital defenses.</p>]]></description><content:encoded><![CDATA[<p>In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions, we cover it all.</p><p>Learn why rewarding vigilance is more effective than punishing mistakes, and how to foster a security-aware culture in your organization. We discuss the importance of relevant, interactive training methods, including simulated phishing tests, and how to train users to spot suspicious activity beyond just phishing attempts. Whether you're an IT professional or a business owner, this episode provides valuable insights to enhance your cybersecurity training efforts and strengthen your organization's digital defenses.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/culture-of-cybersecurity-training]]></link><guid isPermaLink="false">e887829d-dd5a-4971-a952-da837673cd53</guid><itunes:image href="https://artwork.captivate.fm/0f7ac85a-50ae-4e64-b19a-40e6901a2a6b/X6mhPnwAc6fVja0NwQZNpmlZ.jpg"/><pubDate>Mon, 02 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/e887829d-dd5a-4971-a952-da837673cd53.mp3" length="43606178" type="audio/mpeg"/><itunes:duration>45:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c36d4660-5bee-4ac6-a993-2032cd390b8d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c36d4660-5bee-4ac6-a993-2032cd390b8d/index.html" type="text/html"/></item><item><title>Incident Response Plan 101: From BIA to Execution</title><itunes:title>Incident Response Plan 101: From BIA to Execution</itunes:title><description><![CDATA[<p>In this very dense episode of The Backup Wrap-up, we delve into the critical world of incident response plans, from the business impact analysis (BIA) to finalizing its creation. Our expert guest, Dr. Mike Saylor, CEO  of Blackswan Security, shares invaluable insights on crafting and implementing effective incident response strategies. We explore the key components of a robust plan, from conducting a business impact analysis to creating scenario-specific playbooks.</p><p>Learn why having an incident response plan is crucial in today's cyber threat landscape and how to design one that works for your organization. We discuss the importance of regular updates, secure storage, and testing through tabletop exercises. Whether you're an IT professional or a business leader, this episode provides practical advice on preparing for and managing potential security incidents. Don't miss this essential guide to strengthening your organization's cyber resilience through comprehensive incident response planning.</p>]]></description><content:encoded><![CDATA[<p>In this very dense episode of The Backup Wrap-up, we delve into the critical world of incident response plans, from the business impact analysis (BIA) to finalizing its creation. Our expert guest, Dr. Mike Saylor, CEO  of Blackswan Security, shares invaluable insights on crafting and implementing effective incident response strategies. We explore the key components of a robust plan, from conducting a business impact analysis to creating scenario-specific playbooks.</p><p>Learn why having an incident response plan is crucial in today's cyber threat landscape and how to design one that works for your organization. We discuss the importance of regular updates, secure storage, and testing through tabletop exercises. Whether you're an IT professional or a business leader, this episode provides practical advice on preparing for and managing potential security incidents. Don't miss this essential guide to strengthening your organization's cyber resilience through comprehensive incident response planning.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/incident-response-plan-101]]></link><guid isPermaLink="false">9dfed502-2734-498e-b94b-29f0e50984f4</guid><itunes:image href="https://artwork.captivate.fm/f5521362-0ba3-468a-ab01-8688b55323c7/pHfxn2yCeZ4dhZnG-P7EMuHK.jpg"/><pubDate>Mon, 26 Aug 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9dfed502-2734-498e-b94b-29f0e50984f4.mp3" length="35908224" type="audio/mpeg"/><itunes:duration>37:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/be55fd5f-0755-48ba-8f7b-d89d02e740e1/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/be55fd5f-0755-48ba-8f7b-d89d02e740e1/index.html" type="text/html"/></item><item><title>Reducing Your Cyberattack Blast Radius: Expert Tips</title><itunes:title>Reducing Your Cyberattack Blast Radius: Expert Tips</itunes:title><description><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, we delve into the critical concept of minimizing the cyberattack blast radius. Joined by cybersecurity expert Dr. Mike Saylor, we explore practical strategies to significantly reduce the impact of a breach on your organization.</p><p>We start by discussing the principle of least privilege access and its role in containing a cyberattack's blast radius. Next, we examine the importance of network segmentation in limiting the spread of an attack. The conversation then shifts to the often-overlooked aspect of controlling outbound traffic to prevent data exfiltration.</p><p>Throughout the episode, we provide actionable insights and best practices that IT professionals and business owners can implement to enhance their cybersecurity posture. By focusing on minimizing the cyberattack blast radius, organizations can better protect their digital assets and mitigate potential damages in the event of a breach.</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode of The Backup Wrap-up, we delve into the critical concept of minimizing the cyberattack blast radius. Joined by cybersecurity expert Dr. Mike Saylor, we explore practical strategies to significantly reduce the impact of a breach on your organization.</p><p>We start by discussing the principle of least privilege access and its role in containing a cyberattack's blast radius. Next, we examine the importance of network segmentation in limiting the spread of an attack. The conversation then shifts to the often-overlooked aspect of controlling outbound traffic to prevent data exfiltration.</p><p>Throughout the episode, we provide actionable insights and best practices that IT professionals and business owners can implement to enhance their cybersecurity posture. By focusing on minimizing the cyberattack blast radius, organizations can better protect their digital assets and mitigate potential damages in the event of a breach.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/reduce-cyberattack-blast-radius]]></link><guid isPermaLink="false">3cc69287-a009-4f1c-83cf-0186448e6d57</guid><itunes:image href="https://artwork.captivate.fm/c7f90b79-5536-444a-91d8-e0bbfc8d656a/-07YfD1JQE6M2lEJX7ipaIMj.jpg"/><pubDate>Mon, 19 Aug 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/3cc69287-a009-4f1c-83cf-0186448e6d57.mp3" length="36730349" type="audio/mpeg"/><itunes:duration>38:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f09196af-62ef-45d5-85bb-f3f234b5875d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f09196af-62ef-45d5-85bb-f3f234b5875d/index.html" type="text/html"/></item><item><title>Ransomware Forensics: Preserving Digital Evidence</title><itunes:title>Ransomware Forensics: Preserving Digital Evidence</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-Up, we delve into the crucial world of ransomware forensics with cybersecurity expert Mike Saylor. We explore the essential steps and tools used in forensic analysis during a cyber attack, highlighting the importance of preserving evidence and navigating the complexities of both traditional and mobile device forensics.</p><p>From log preservation to forensic imaging, we discuss how organizations can prepare for and respond to ransomware incidents. Mike shares insights on the different forensic tools available, their applications, and the challenges faced in modern cybersecurity investigations. We also touch on the importance of having a forensic response plan in place before an attack occurs.</p><p>Whether you're an IT professional or simply interested in cybersecurity, this episode offers valuable knowledge about the forensic processes that help unravel cyber attacks and protect valuable data. Tune in to enhance your understanding of ransomware forensics and strengthen your organization's cyber defenses.</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-Up, we delve into the crucial world of ransomware forensics with cybersecurity expert Mike Saylor. We explore the essential steps and tools used in forensic analysis during a cyber attack, highlighting the importance of preserving evidence and navigating the complexities of both traditional and mobile device forensics.</p><p>From log preservation to forensic imaging, we discuss how organizations can prepare for and respond to ransomware incidents. Mike shares insights on the different forensic tools available, their applications, and the challenges faced in modern cybersecurity investigations. We also touch on the importance of having a forensic response plan in place before an attack occurs.</p><p>Whether you're an IT professional or simply interested in cybersecurity, this episode offers valuable knowledge about the forensic processes that help unravel cyber attacks and protect valuable data. Tune in to enhance your understanding of ransomware forensics and strengthen your organization's cyber defenses.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/ransomware-forensics-preserving-evidence]]></link><guid isPermaLink="false">3b0a4993-d1bb-4357-8943-f43330bcdc35</guid><itunes:image href="https://artwork.captivate.fm/50d0412c-5061-4125-ae55-b2d6f38a9055/TPeaei7DUrZW1LPmiCJ9uMXO.jpg"/><pubDate>Mon, 12 Aug 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/3b0a4993-d1bb-4357-8943-f43330bcdc35.mp3" length="32799966" type="audio/mpeg"/><itunes:duration>45:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/87026017-32e3-4fa6-b9e3-cbdf6c1ca0bc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/87026017-32e3-4fa6-b9e3-cbdf6c1ca0bc/index.html" type="text/html"/></item><item><title>The Cyber Insurance Playbook: What You Need to Know</title><itunes:title>The Cyber Insurance Playbook: What You Need to Know</itunes:title><description><![CDATA[<p>Dive into the world of cyber insurance with our latest episode featuring expert Mike Saylor. We explore the evolving landscape of cyber insurance policies and their crucial role in today's digital security strategies. Learn why cyber insurance is more than just a financial safeguard and how it can be a proactive tool in your cybersecurity arsenal.</p><p>Mike shares invaluable insights on maximizing your cyber insurance benefits, from understanding policy nuances to leveraging your insurer's expertise. We discuss common misconceptions, the importance of pre-incident preparation, and strategies for effective incident response. Whether you're a small business owner or a corporate executive, this episode provides essential knowledge to navigate the complex terrain of cyber insurance and protect your digital assets.</p>]]></description><content:encoded><![CDATA[<p>Dive into the world of cyber insurance with our latest episode featuring expert Mike Saylor. We explore the evolving landscape of cyber insurance policies and their crucial role in today's digital security strategies. Learn why cyber insurance is more than just a financial safeguard and how it can be a proactive tool in your cybersecurity arsenal.</p><p>Mike shares invaluable insights on maximizing your cyber insurance benefits, from understanding policy nuances to leveraging your insurer's expertise. We discuss common misconceptions, the importance of pre-incident preparation, and strategies for effective incident response. Whether you're a small business owner or a corporate executive, this episode provides essential knowledge to navigate the complex terrain of cyber insurance and protect your digital assets.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/cyber-insurance-playbook]]></link><guid isPermaLink="false">49514e2d-6575-44fe-87aa-be00adb57ed0</guid><itunes:image href="https://artwork.captivate.fm/2f9944f6-41b9-4a20-84ad-3b62e502b5a2/cOtabBrA5-BvhmupRa51AEuv.jpg"/><pubDate>Mon, 05 Aug 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/49514e2d-6575-44fe-87aa-be00adb57ed0.mp3" length="36318342" type="audio/mpeg"/><itunes:duration>50:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/a94e5c08-ce1e-49c1-b697-135442d67f3b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a94e5c08-ce1e-49c1-b697-135442d67f3b/index.html" type="text/html"/></item><item><title>Advanced Ransomware Prevention</title><itunes:title>Advanced Ransomware Prevention</itunes:title><description><![CDATA[<p>In this important episode of "The Backup Wrap-Up," we continue our discussion on ransomware, and dive deeper into the world of ransomware prevention.  We assume you've done the basics (password &amp; patch management, and MFA), and want to do more. As cyber threats continue to evolve, it's more important than ever to stay ahead of potential attacks. We discuss a range of strategies to protect your organization, from application whitelisting to securing service accounts.</p><p>Among other things, our conversation covers the importance of restricting risky network protocols, implementing multi-factor authentication, and employing reputable anti-malware software. We also explore the benefits of penetration testing and red team exercises. Additionally, we emphasize the significance of establishing relationships with blue teams and law enforcement resources before an attack occurs.</p><p>Join us as we provide actionable insights on ransomware prevention, helping you build a robust defense against this pervasive cyber threat. Whether you're an IT professional or a business owner, this episode is packed with valuable information to enhance your cybersecurity posture.</p>]]></description><content:encoded><![CDATA[<p>In this important episode of "The Backup Wrap-Up," we continue our discussion on ransomware, and dive deeper into the world of ransomware prevention.  We assume you've done the basics (password &amp; patch management, and MFA), and want to do more. As cyber threats continue to evolve, it's more important than ever to stay ahead of potential attacks. We discuss a range of strategies to protect your organization, from application whitelisting to securing service accounts.</p><p>Among other things, our conversation covers the importance of restricting risky network protocols, implementing multi-factor authentication, and employing reputable anti-malware software. We also explore the benefits of penetration testing and red team exercises. Additionally, we emphasize the significance of establishing relationships with blue teams and law enforcement resources before an attack occurs.</p><p>Join us as we provide actionable insights on ransomware prevention, helping you build a robust defense against this pervasive cyber threat. Whether you're an IT professional or a business owner, this episode is packed with valuable information to enhance your cybersecurity posture.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/advanced-ransomware-prevention]]></link><guid isPermaLink="false">60c9173e-2d2b-44ba-9b86-70666c507287</guid><itunes:image href="https://artwork.captivate.fm/bc151fa5-7444-4e8c-b8fe-cd42e085142f/_zLMj5-YDxN6XKwwvARIWrrW.jpg"/><pubDate>Mon, 29 Jul 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/60c9173e-2d2b-44ba-9b86-70666c507287.mp3" length="42719286" type="audio/mpeg"/><itunes:duration>44:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/873b5db7-3535-4dc1-9542-09baa9edcad8/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/873b5db7-3535-4dc1-9542-09baa9edcad8/index.html" type="text/html"/></item><item><title>IT Security Audit Essentials: Protect Your Network</title><itunes:title>IT Security Audit Essentials: Protect Your Network</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-Up, we delve into the critical world of IT security audits. We explore why these audits are essential for maintaining a robust cybersecurity posture and how they can help organizations identify and address potential vulnerabilities. Our discussion covers key elements of surviving an IT security audit, including user education, application whitelisting, and securing remote access protocols. We also touch on the importance of regular security assessments and proactive measures to stay ahead of cyber threats. Whether you're an IT professional or a business owner, this episode provides valuable insights into conducting thorough IT security audits and implementing best practices to protect your digital assets. Tune in to learn how you can strengthen your organization's defenses and become a cybersecurity hero.</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-Up, we delve into the critical world of IT security audits. We explore why these audits are essential for maintaining a robust cybersecurity posture and how they can help organizations identify and address potential vulnerabilities. Our discussion covers key elements of surviving an IT security audit, including user education, application whitelisting, and securing remote access protocols. We also touch on the importance of regular security assessments and proactive measures to stay ahead of cyber threats. Whether you're an IT professional or a business owner, this episode provides valuable insights into conducting thorough IT security audits and implementing best practices to protect your digital assets. Tune in to learn how you can strengthen your organization's defenses and become a cybersecurity hero.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/it-security-audit-essentials-protect-network]]></link><guid isPermaLink="false">8faebfc9-27ba-47a9-8389-7fcfc85bde9b</guid><itunes:image href="https://artwork.captivate.fm/13f2d1c0-4d03-4042-8714-387ebb472757/5VresH9BtOMim_RrXT4BLSRT.jpg"/><pubDate>Mon, 15 Jul 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/8faebfc9-27ba-47a9-8389-7fcfc85bde9b.mp3" length="27873779" type="audio/mpeg"/><itunes:duration>38:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/4dd22659-f02b-4b11-a114-b8b4ef51478a/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/4dd22659-f02b-4b11-a114-b8b4ef51478a/index.html" type="text/html"/></item><item><title>How to Stop Ransomware: 3 Essential Strategies</title><itunes:title>How to Stop Ransomware: 3 Essential Strategies</itunes:title><description><![CDATA[<p>Discover how to stop ransomware in its tracks with this informative episode of The Backup Wrap-up. Hosts W. Curtis Preston and Prasanna Malaiyandi look into three crucial strategies that can prevent 90% or more of ransomware attacks. Learn why patch management is your first line of defense and how to implement it effectively. Explore the world of password security and discover why a robust password management system is essential. Finally, uncover the power of multi-factor authentication in thwarting unauthorized access. Don't miss this opportunity to strengthen your cybersecurity defenses and stay one step ahead of cybercriminals.</p>]]></description><content:encoded><![CDATA[<p>Discover how to stop ransomware in its tracks with this informative episode of The Backup Wrap-up. Hosts W. Curtis Preston and Prasanna Malaiyandi look into three crucial strategies that can prevent 90% or more of ransomware attacks. Learn why patch management is your first line of defense and how to implement it effectively. Explore the world of password security and discover why a robust password management system is essential. Finally, uncover the power of multi-factor authentication in thwarting unauthorized access. Don't miss this opportunity to strengthen your cybersecurity defenses and stay one step ahead of cybercriminals.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/how-to-stop-ransomware-3-essential-strategies]]></link><guid isPermaLink="false">3335d3bc-99bb-4904-b535-d01a0209122f</guid><itunes:image href="https://artwork.captivate.fm/beaee907-b937-4a79-a359-e733c5390c18/79xKN5YUw6Xw0DuCJ3661l01.jpg"/><pubDate>Mon, 08 Jul 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/3335d3bc-99bb-4904-b535-d01a0209122f.mp3" length="35171346" type="audio/mpeg"/><itunes:duration>48:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/894e1750-d642-4e9c-aa60-622e03d07704/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/894e1750-d642-4e9c-aa60-622e03d07704/index.html" type="text/html"/></item><item><title>Immutable Backups: Your Ultimate Defense Against Ransomware</title><itunes:title>Immutable Backups: Your Ultimate Defense Against Ransomware</itunes:title><description><![CDATA[<p>In this episode, we delve into the world of immutable backups, a crucial component of modern data protection strategies. We explore why immutable backups have become increasingly important in the face of sophisticated cyber threats, especially ransomware attacks that target backup systems. The episode covers the evolution from tape backups to disk-based systems and cloud solutions, highlighting how this shift has introduced new security challenges.</p><p>We discuss the spectrum of immutability in backup systems, from basic file system protections to fully immutable cloud storage options. The conversation touches on various implementations of immutable backups, their strengths, and potential vulnerabilities. We also address the importance of multi-factor authentication and awareness of emerging threats like AI-based voice impersonation. </p>]]></description><content:encoded><![CDATA[<p>In this episode, we delve into the world of immutable backups, a crucial component of modern data protection strategies. We explore why immutable backups have become increasingly important in the face of sophisticated cyber threats, especially ransomware attacks that target backup systems. The episode covers the evolution from tape backups to disk-based systems and cloud solutions, highlighting how this shift has introduced new security challenges.</p><p>We discuss the spectrum of immutability in backup systems, from basic file system protections to fully immutable cloud storage options. The conversation touches on various implementations of immutable backups, their strengths, and potential vulnerabilities. We also address the importance of multi-factor authentication and awareness of emerging threats like AI-based voice impersonation. </p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/immutable-backups-defense-ransomware]]></link><guid isPermaLink="false">1df72bf9-4150-4144-af42-2e3c7a1c7e4b</guid><itunes:image href="https://artwork.captivate.fm/de1abe66-b24d-41a9-aa12-9f4c2a3ddd40/h0eyhxjass7jIlOXjhM-KUsb.jpg"/><pubDate>Mon, 01 Jul 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1df72bf9-4150-4144-af42-2e3c7a1c7e4b.mp3" length="32339469" type="audio/mpeg"/><itunes:duration>44:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/66a07c4e-f5b6-4ca5-b807-d985d011d419/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/66a07c4e-f5b6-4ca5-b807-d985d011d419/index.html" type="text/html"/></item><item><title>Protect Backups from Ransomware: Expert Strategies</title><itunes:title>Protect Backups from Ransomware: Expert Strategies</itunes:title><description><![CDATA[<p>In this crucial episode, we delve into how to protect backups from ransomware, a critical concern for IT professionals and business owners alike. We explore why backup systems are prime targets for cybercriminals and the devastating consequences of a successful attack. Our discussion covers essential strategies to fortify your backups, including implementing immutable storage, using local accounts instead of Active Directory, and employing network segmentation. We also emphasize the importance of robust monitoring systems and regular patching. By understanding the risks and implementing these protective measures, you can significantly enhance your organization's resilience against ransomware attacks. Don't miss this vital information on how to protect backups from ransomware and secure your data's last line of defense.</p>]]></description><content:encoded><![CDATA[<p>In this crucial episode, we delve into how to protect backups from ransomware, a critical concern for IT professionals and business owners alike. We explore why backup systems are prime targets for cybercriminals and the devastating consequences of a successful attack. Our discussion covers essential strategies to fortify your backups, including implementing immutable storage, using local accounts instead of Active Directory, and employing network segmentation. We also emphasize the importance of robust monitoring systems and regular patching. By understanding the risks and implementing these protective measures, you can significantly enhance your organization's resilience against ransomware attacks. Don't miss this vital information on how to protect backups from ransomware and secure your data's last line of defense.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/protect-backups-from-ransomware-strategies]]></link><guid isPermaLink="false">c984d0bf-6c5b-4921-af4f-ebe2abe6e871</guid><itunes:image href="https://artwork.captivate.fm/b31c85fe-cbdc-45c8-8d32-45778f1b57d0/fgz0W2cUk4o3U8Y1L-ncWv4y.jpg"/><pubDate>Mon, 24 Jun 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c984d0bf-6c5b-4921-af4f-ebe2abe6e871.mp3" length="25368845" type="audio/mpeg"/><itunes:duration>35:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/040f4153-74ac-4927-a8b8-23293b21e4c9/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/040f4153-74ac-4927-a8b8-23293b21e4c9/index.html" type="text/html"/></item><item><title>Ransomware 101:  What is ransomware?</title><itunes:title>Ransomware 101:  What is ransomware?</itunes:title><description><![CDATA[<p>This episode about what is ransomware is the first in a new series on the topic.  The episode explores what it is, how it works, and why it has become such a significant threat to businesses and individuals alike. We discuss the evolution of ransomware attacks, from simple data encryption to sophisticated extortion schemes involving data exfiltration and direct attacks on backup systems. Our conversation highlights the importance of prevention and detection measures, such as robust access controls, limiting internet-facing systems, and monitoring for data exfiltration. We also emphasize the critical role of backup and recovery strategies, including offline and immutable backups, in mitigating the impact of ransomware attacks. Throughout the episode, we provide insights into the complex ransomware threat landscape and offer practical advice for organizations looking to protect their data and systems from this ever-evolving threat.</p>]]></description><content:encoded><![CDATA[<p>This episode about what is ransomware is the first in a new series on the topic.  The episode explores what it is, how it works, and why it has become such a significant threat to businesses and individuals alike. We discuss the evolution of ransomware attacks, from simple data encryption to sophisticated extortion schemes involving data exfiltration and direct attacks on backup systems. Our conversation highlights the importance of prevention and detection measures, such as robust access controls, limiting internet-facing systems, and monitoring for data exfiltration. We also emphasize the critical role of backup and recovery strategies, including offline and immutable backups, in mitigating the impact of ransomware attacks. Throughout the episode, we provide insights into the complex ransomware threat landscape and offer practical advice for organizations looking to protect their data and systems from this ever-evolving threat.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/what-is-ransomware]]></link><guid isPermaLink="false">9116834f-bcd2-498d-a55f-45c69dcfdb46</guid><itunes:image href="https://artwork.captivate.fm/12d9c72f-4093-4ddc-8416-9004fcd02980/uUKfLekurMSMbITIvmPT2OcT.jpg"/><pubDate>Mon, 17 Jun 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9116834f-bcd2-498d-a55f-45c69dcfdb46.mp3" length="25801133" type="audio/mpeg"/><itunes:duration>35:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2e6c4a19-7c42-439f-9fdb-164f9258625a/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2e6c4a19-7c42-439f-9fdb-164f9258625a/index.html" type="text/html"/></item><item><title>XDR vs SIEM: Do you need to choose?</title><itunes:title>XDR vs SIEM: Do you need to choose?</itunes:title><description><![CDATA[<p>In this episode, we explore the differences between XDR and SIEM, two crucial tools in the world of security monitoring. Our guest, Dez Rock, CEO of SIEMonster, shares her fascinating journey from professional hacker to building an affordable, scalable SIEM solution that encompasses SOAR and XDR capabilities. We discuss the importance of evaluating security tools based on their true capabilities rather than just market perception, and Dez provides real-world examples of how SIEMonster's SIEM/XDR tool automatically detected and shut down a ransomware attack at a large hospital client. Tune in to learn about the evolving security landscape, the pros and cons of XDR vs SIEM, and how you may not have to choose! Whether you're an IT professional or simply interested in the latest cybersecurity trends, this episode offers valuable insights into the future of security monitoring.</p>]]></description><content:encoded><![CDATA[<p>In this episode, we explore the differences between XDR and SIEM, two crucial tools in the world of security monitoring. Our guest, Dez Rock, CEO of SIEMonster, shares her fascinating journey from professional hacker to building an affordable, scalable SIEM solution that encompasses SOAR and XDR capabilities. We discuss the importance of evaluating security tools based on their true capabilities rather than just market perception, and Dez provides real-world examples of how SIEMonster's SIEM/XDR tool automatically detected and shut down a ransomware attack at a large hospital client. Tune in to learn about the evolving security landscape, the pros and cons of XDR vs SIEM, and how you may not have to choose! Whether you're an IT professional or simply interested in the latest cybersecurity trends, this episode offers valuable insights into the future of security monitoring.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/xdr-vs-siem-do-you-need-to-choose]]></link><guid isPermaLink="false">c8026259-b3cd-4a99-a2ad-0cf881a6ba5d</guid><itunes:image href="https://artwork.captivate.fm/68297f8f-764a-4733-a767-d9901acf9890/JxLBFpmNxQ34iUByWeIuNWPm.jpg"/><pubDate>Mon, 10 Jun 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c8026259-b3cd-4a99-a2ad-0cf881a6ba5d.mp3" length="32202174" type="audio/mpeg"/><itunes:duration>44:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f3ad727a-23ce-4149-abee-18032df7133a/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f3ad727a-23ce-4149-abee-18032df7133a/index.html" type="text/html"/></item><item><title>Strengthening Your Cybersecurity Blue Team: Pro Tips</title><itunes:title>Strengthening Your Cybersecurity Blue Team: Pro Tips</itunes:title><description><![CDATA[<p>In this episode, we explore the essential strategies and best practices for building and optimizing a blue team cybersecurity approach. Our guest, Mike Saylor, shares his expertise on how organizations can effectively prepare for and respond to cyber incidents. From establishing relationships with law enforcement to conducting tabletop exercises and understanding cyber insurance policies, Mike provides valuable insights to help companies strengthen their cybersecurity posture.</p><p>Throughout the episode, we discuss the importance of focusing on detection and response capabilities, not just prevention, and how a well-prepared blue team can make all the difference in the face of a cyber threat. Mike also shares real-world stories that illustrate the key lessons and takeaways for organizations looking to enhance their cybersecurity efforts. Tune in to learn how you can better protect your company from cyber threats with a robust blue team approach.</p>]]></description><content:encoded><![CDATA[<p>In this episode, we explore the essential strategies and best practices for building and optimizing a blue team cybersecurity approach. Our guest, Mike Saylor, shares his expertise on how organizations can effectively prepare for and respond to cyber incidents. From establishing relationships with law enforcement to conducting tabletop exercises and understanding cyber insurance policies, Mike provides valuable insights to help companies strengthen their cybersecurity posture.</p><p>Throughout the episode, we discuss the importance of focusing on detection and response capabilities, not just prevention, and how a well-prepared blue team can make all the difference in the face of a cyber threat. Mike also shares real-world stories that illustrate the key lessons and takeaways for organizations looking to enhance their cybersecurity efforts. Tune in to learn how you can better protect your company from cyber threats with a robust blue team approach.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/strengthening-cybersecurity-blue-team-pro-tips]]></link><guid isPermaLink="false">5559a6c9-f088-4c1a-b555-1c062d2f3f23</guid><itunes:image href="https://artwork.captivate.fm/97658ad4-f963-4b33-a75f-ad43a576b797/xy527zEwemP3COmoaKB-BFZJ.jpg"/><pubDate>Mon, 03 Jun 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/5559a6c9-f088-4c1a-b555-1c062d2f3f23.mp3" length="37367287" type="audio/mpeg"/><itunes:duration>51:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c59297e7-b02b-4b93-8d76-03ca799ccbc0/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c59297e7-b02b-4b93-8d76-03ca799ccbc0/index.html" type="text/html"/></item><item><title>Thinking Like a Hacker: Red Team Cyber Security Strategies</title><itunes:title>Thinking Like a Hacker: Red Team Cyber Security Strategies</itunes:title><description><![CDATA[<p>In this popular episode from last year, we explore the fascinating world of red team cyber security with Dwayne Laflotte, a seasoned expert in offensive cybersecurity. Dwayne shares his wealth of knowledge and experience, diving into the tactics and strategies employed by red teams to identify vulnerabilities and strengthen an organization's defenses. From exploiting backup systems to the importance of least privilege and strong passwords, this episode is a must-listen for anyone interested in bolstering their cybersecurity posture.</p><p>Dwayne provides captivating examples of how red team cyber security professionals think outside the box to breach networks, emphasizing the need for constant vigilance and adaptability in the face of evolving threats. He also highlights the critical role of collaboration between red and blue teams, stressing the importance of a multi-layered approach to cybersecurity. Packed with practical insights and actionable advice, this episode is an invaluable resource for IT professionals and business leaders alike.</p>]]></description><content:encoded><![CDATA[<p>In this popular episode from last year, we explore the fascinating world of red team cyber security with Dwayne Laflotte, a seasoned expert in offensive cybersecurity. Dwayne shares his wealth of knowledge and experience, diving into the tactics and strategies employed by red teams to identify vulnerabilities and strengthen an organization's defenses. From exploiting backup systems to the importance of least privilege and strong passwords, this episode is a must-listen for anyone interested in bolstering their cybersecurity posture.</p><p>Dwayne provides captivating examples of how red team cyber security professionals think outside the box to breach networks, emphasizing the need for constant vigilance and adaptability in the face of evolving threats. He also highlights the critical role of collaboration between red and blue teams, stressing the importance of a multi-layered approach to cybersecurity. Packed with practical insights and actionable advice, this episode is an invaluable resource for IT professionals and business leaders alike.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/red-team-cyber-security-strategies]]></link><guid isPermaLink="false">56b57018-a67d-4855-9ff3-ef0daee0346d</guid><itunes:image href="https://artwork.captivate.fm/ce16249a-310a-4917-91df-876a529df4ab/c0iwh8eZQeyialLj0q0XFaiF.jpg"/><pubDate>Mon, 27 May 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/56b57018-a67d-4855-9ff3-ef0daee0346d.mp3" length="40899062" type="audio/mpeg"/><itunes:duration>56:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/62a6f788-46bf-422d-94ae-01458481597f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/62a6f788-46bf-422d-94ae-01458481597f/index.html" type="text/html"/></item><item><title>Google Cloud Disaster Recovery: Lessons from UniSuper&apos;s Close Call</title><itunes:title>Google Cloud Disaster Recovery: Lessons from UniSuper&apos;s Close Call</itunes:title><description><![CDATA[<p>In this episode, we delve into the critical importance of Google Cloud disaster recovery planning through the lens of UniSuper's recent brush with catastrophe. When Google accidentally deleted UniSuper's entire VMware environment, the Australian pension provider faced the terrifying prospect of losing access to $125 billion in assets and the data of over 600,000 members.</p><p>Hosts W. Curtis Preston and Prasanna Malaiyandi dissect the incident, highlighting how UniSuper's adherence to the 3-2-1 backup rule and use of third-party backup solutions ultimately saved the day. They explore the key lessons learned from this Google Cloud disaster, including the importance of having isolated data copies, clear communication during outages, and a robust recovery strategy. This real-world case study serves as a stark reminder of the risks associated with relying solely on cloud providers for data protection and the necessity of comprehensive Google Cloud disaster recovery planning.</p>]]></description><content:encoded><![CDATA[<p>In this episode, we delve into the critical importance of Google Cloud disaster recovery planning through the lens of UniSuper's recent brush with catastrophe. When Google accidentally deleted UniSuper's entire VMware environment, the Australian pension provider faced the terrifying prospect of losing access to $125 billion in assets and the data of over 600,000 members.</p><p>Hosts W. Curtis Preston and Prasanna Malaiyandi dissect the incident, highlighting how UniSuper's adherence to the 3-2-1 backup rule and use of third-party backup solutions ultimately saved the day. They explore the key lessons learned from this Google Cloud disaster, including the importance of having isolated data copies, clear communication during outages, and a robust recovery strategy. This real-world case study serves as a stark reminder of the risks associated with relying solely on cloud providers for data protection and the necessity of comprehensive Google Cloud disaster recovery planning.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/google-cloud-disaster-recovery-lessons]]></link><guid isPermaLink="false">d6a30b58-4ea5-4296-bcb0-9f63b4260332</guid><itunes:image href="https://artwork.captivate.fm/d9a14073-1983-4778-b41c-3db74896c645/7W10u6fi21k4CoKh9P_AIWe3.png"/><pubDate>Mon, 20 May 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d6a30b58-4ea5-4296-bcb0-9f63b4260332.mp3" length="22917201" type="audio/mpeg"/><itunes:duration>31:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Electronic Discovery tools that extract from backups</title><itunes:title>Electronic Discovery tools that extract from backups</itunes:title><description><![CDATA[<p>In this episode, we explore the world of electronic discovery tools and how they're transforming the legal landscape. Our guest, Brendan Sullivan, shares his expertise on the challenges companies face when dealing with legacy data and the importance of using the right tools for eDiscovery. Learn how purpose-built software can greatly enhance efficiency, accuracy, and defensibility in the eDiscovery process. Brendan also discusses the growing need for data remediation and migration services, as well as the role of computer forensics and eDiscovery platforms in building strong legal cases. Whether you're a legal professional looking to streamline your workflow or simply interested in the intersection of technology and law, this episode is a must-listen.</p>]]></description><content:encoded><![CDATA[<p>In this episode, we explore the world of electronic discovery tools and how they're transforming the legal landscape. Our guest, Brendan Sullivan, shares his expertise on the challenges companies face when dealing with legacy data and the importance of using the right tools for eDiscovery. Learn how purpose-built software can greatly enhance efficiency, accuracy, and defensibility in the eDiscovery process. Brendan also discusses the growing need for data remediation and migration services, as well as the role of computer forensics and eDiscovery platforms in building strong legal cases. Whether you're a legal professional looking to streamline your workflow or simply interested in the intersection of technology and law, this episode is a must-listen.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/electronic-discovery-tools-backup-as-a-source]]></link><guid isPermaLink="false">681e85c1-0c2c-4450-bc53-91ac428d28ef</guid><itunes:image href="https://artwork.captivate.fm/38fee294-64f3-42d8-8782-8399ca97d1f7/njmy28s_fQKK2IO1SFLAcYaF.jpg"/><pubDate>Mon, 13 May 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/681e85c1-0c2c-4450-bc53-91ac428d28ef.mp3" length="37805116" type="audio/mpeg"/><itunes:duration>52:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/01c08092-d001-44ab-9770-eb13072f99bc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/01c08092-d001-44ab-9770-eb13072f99bc/index.html" type="text/html"/></item><item><title>Cloud Disaster Recovery: Lessons from Failures</title><itunes:title>Cloud Disaster Recovery: Lessons from Failures</itunes:title><description><![CDATA[<p>Capping our series on cloud disasters is this one on cloud disaster recovery. In this episode, we review the lessons we learned from discussing 10 cloud disasters.  We talk about the critical strategies and techniques to ensure your data is protected and recoverable in the event of a disaster in the cloud. From the basic 3-2-1 rule to the pitfalls of solely trusting your cloud provider for proper disaster recovery, we dive into real-world examples and expert insights to help you build a robust cloud disaster recovery plan for your cloud data.</p><p>Discover the importance of regular testing, the role of third-party backup solutions, and the key considerations for choosing a reliable cloud provider. Whether you're a small business or a large enterprise, this episode provides actionable advice to enhance your cloud disaster recovery posture and maintain business continuity in the face of unexpected disruptions. Tune in now and learn how to safeguard your valuable data in the cloud era.</p>]]></description><content:encoded><![CDATA[<p>Capping our series on cloud disasters is this one on cloud disaster recovery. In this episode, we review the lessons we learned from discussing 10 cloud disasters.  We talk about the critical strategies and techniques to ensure your data is protected and recoverable in the event of a disaster in the cloud. From the basic 3-2-1 rule to the pitfalls of solely trusting your cloud provider for proper disaster recovery, we dive into real-world examples and expert insights to help you build a robust cloud disaster recovery plan for your cloud data.</p><p>Discover the importance of regular testing, the role of third-party backup solutions, and the key considerations for choosing a reliable cloud provider. Whether you're a small business or a large enterprise, this episode provides actionable advice to enhance your cloud disaster recovery posture and maintain business continuity in the face of unexpected disruptions. Tune in now and learn how to safeguard your valuable data in the cloud era.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/cloud-disaster-recovery-lessons-from-real-failures]]></link><guid isPermaLink="false">05023188-6712-4f2c-a4fe-3f3939b6b8ae</guid><itunes:image href="https://artwork.captivate.fm/0cdeab96-dfbf-447b-8e04-6e20ef9da2d7/xDWVfII2MkSbinXJZJDat9Eb.jpg"/><pubDate>Mon, 06 May 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/05023188-6712-4f2c-a4fe-3f3939b6b8ae.mp3" length="30526061" type="audio/mpeg"/><itunes:duration>42:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2b4e5e89-509e-4dde-9803-b72c29237884/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2b4e5e89-509e-4dde-9803-b72c29237884/index.html" type="text/html"/></item><item><title>Life Uncontained YouTube Channel Loses Month of Footage in Crash</title><itunes:title>Life Uncontained YouTube Channel Loses Month of Footage in Crash</itunes:title><description><![CDATA[<p>In this episode, we discuss the devastating crash experienced by the popular YouTube channel "Life Uncontained," which resulted in the loss of a month's worth of irreplaceable video footage. The Life Uncontained crash serves as a stark reminder of the importance of proper backup strategies for protecting valuable digital assets. We delve into the lessons learned from this unfortunate incident and explore the best practices for safeguarding your data from hardware failures and other potential disasters. From the 3-2-1 backup rule to the use of multiple storage media, we cover the essential steps you can take to minimize the risk of catastrophic data loss. Whether you're a content creator, business owner, or simply someone who values their digital memories, this episode provides crucial insights into the world of data protection and backup. Don't miss this opportunity to learn from the "Life Uncontained" story and fortify your own backup plan.</p><p>https://www.youtube.com/watch?v=fQsTs3C0T-c&amp;ab_channel=LifeUncontained</p>]]></description><content:encoded><![CDATA[<p>In this episode, we discuss the devastating crash experienced by the popular YouTube channel "Life Uncontained," which resulted in the loss of a month's worth of irreplaceable video footage. The Life Uncontained crash serves as a stark reminder of the importance of proper backup strategies for protecting valuable digital assets. We delve into the lessons learned from this unfortunate incident and explore the best practices for safeguarding your data from hardware failures and other potential disasters. From the 3-2-1 backup rule to the use of multiple storage media, we cover the essential steps you can take to minimize the risk of catastrophic data loss. Whether you're a content creator, business owner, or simply someone who values their digital memories, this episode provides crucial insights into the world of data protection and backup. Don't miss this opportunity to learn from the "Life Uncontained" story and fortify your own backup plan.</p><p>https://www.youtube.com/watch?v=fQsTs3C0T-c&amp;ab_channel=LifeUncontained</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/life-uncontained-crash-youtube-channel-loses-month]]></link><guid isPermaLink="false">3766356c-c56b-4ae1-bfd0-0f8e4e8a1098</guid><itunes:image href="https://artwork.captivate.fm/79b7b94b-50a2-4c14-9cb4-eb2497502f67/v5N0q3X1DDehtmKlGVn8h4nl.jpg"/><pubDate>Mon, 29 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/3766356c-c56b-4ae1-bfd0-0f8e4e8a1098.mp3" length="30299102" type="audio/mpeg"/><itunes:duration>42:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/9f0ff788-9c27-4484-93d7-139854451786/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9f0ff788-9c27-4484-93d7-139854451786/index.html" type="text/html"/></item><item><title>The Disastrous Dedoose Crash: Lessons Learned</title><itunes:title>The Disastrous Dedoose Crash: Lessons Learned</itunes:title><description><![CDATA[<p>In 2014, the cloud-based research platform Dedoose suffered a catastrophic crash, losing customer data and backups simultaneously. We examine the causes of the Dedoose crash, its impact on users, and crucial lessons for anyone relying on SaaS. Learn how subpar backup practices, like monthly-only backups and overwriting previous versions, can lead to disaster. Hear how Dedoose responded and key steps to prevent your own cloud data calamity.</p><p>Links from this episode:</p><p><a href="https://www.informationweek.com/it-infrastructure/social-science-site-using-azure-loses-data#close-modal" rel="noopener noreferrer" target="_blank">https://www.informationweek.com/it-infrastructure/social-science-site-using-azure-loses-data#close-modal</a></p><p><a href="https://www.insidehighered.com/news/2014/05/16/dedoose-crash-shows-dangers-handing-data-cloud-services" rel="noopener noreferrer" target="_blank">https://www.insidehighered.com/news/2014/05/16/dedoose-crash-shows-dangers-handing-data-cloud-services</a></p><p><a href="https://www.latimes.com/business/technology/la-fi-tn-dedoose-crash-academic-cloud-20140512-story.html" rel="noopener noreferrer" target="_blank">https://www.latimes.com/business/technology/la-fi-tn-dedoose-crash-academic-cloud-20140512-story.html</a></p><p><a href="https://www.chronicle.com/blogs/wiredcampus/hazards-of-the-cloud-data-storage-services-crash-sets-back-researchers" rel="noopener noreferrer" target="_blank">https://www.chronicle.com/blogs/wiredcampus/hazards-of-the-cloud-data-storage-services-crash-sets-back-researchers</a></p><p><a href="https://web.archive.org/web/20230927112141/https://www.dedoose.com/blog/dedoose-update-significant-data-recovery-successful-how-to-save-a-project-locally" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20230927112141/https://www.dedoose.com/blog/dedoose-update-significant-data-recovery-successful-how-to-save-a-project-locally</a></p><p><a href="https://web.archive.org/web/20140512214308/http://blog.dedoose.com/2014/05/dedooses-black-eye-crash-and-recovery-efforts/" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20140512214308/http://blog.dedoose.com/2014/05/dedooses-black-eye-crash-and-recovery-efforts/</a></p><p><a href="https://www.dedoose.com/about/security" rel="noopener noreferrer" target="_blank">https://www.dedoose.com/about/security</a></p>]]></description><content:encoded><![CDATA[<p>In 2014, the cloud-based research platform Dedoose suffered a catastrophic crash, losing customer data and backups simultaneously. We examine the causes of the Dedoose crash, its impact on users, and crucial lessons for anyone relying on SaaS. Learn how subpar backup practices, like monthly-only backups and overwriting previous versions, can lead to disaster. Hear how Dedoose responded and key steps to prevent your own cloud data calamity.</p><p>Links from this episode:</p><p><a href="https://www.informationweek.com/it-infrastructure/social-science-site-using-azure-loses-data#close-modal" rel="noopener noreferrer" target="_blank">https://www.informationweek.com/it-infrastructure/social-science-site-using-azure-loses-data#close-modal</a></p><p><a href="https://www.insidehighered.com/news/2014/05/16/dedoose-crash-shows-dangers-handing-data-cloud-services" rel="noopener noreferrer" target="_blank">https://www.insidehighered.com/news/2014/05/16/dedoose-crash-shows-dangers-handing-data-cloud-services</a></p><p><a href="https://www.latimes.com/business/technology/la-fi-tn-dedoose-crash-academic-cloud-20140512-story.html" rel="noopener noreferrer" target="_blank">https://www.latimes.com/business/technology/la-fi-tn-dedoose-crash-academic-cloud-20140512-story.html</a></p><p><a href="https://www.chronicle.com/blogs/wiredcampus/hazards-of-the-cloud-data-storage-services-crash-sets-back-researchers" rel="noopener noreferrer" target="_blank">https://www.chronicle.com/blogs/wiredcampus/hazards-of-the-cloud-data-storage-services-crash-sets-back-researchers</a></p><p><a href="https://web.archive.org/web/20230927112141/https://www.dedoose.com/blog/dedoose-update-significant-data-recovery-successful-how-to-save-a-project-locally" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20230927112141/https://www.dedoose.com/blog/dedoose-update-significant-data-recovery-successful-how-to-save-a-project-locally</a></p><p><a href="https://web.archive.org/web/20140512214308/http://blog.dedoose.com/2014/05/dedooses-black-eye-crash-and-recovery-efforts/" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20140512214308/http://blog.dedoose.com/2014/05/dedooses-black-eye-crash-and-recovery-efforts/</a></p><p><a href="https://www.dedoose.com/about/security" rel="noopener noreferrer" target="_blank">https://www.dedoose.com/about/security</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/disastrous-dedoose-crash-lessons-learned]]></link><guid isPermaLink="false">36e7fba8-6ca8-4944-ad0f-b6182cb3d31b</guid><itunes:image href="https://artwork.captivate.fm/3e4dbb3a-5257-480e-877f-1f3ddd6b33c6/oicnxFFmQexQVEvWAFwjo0XJ.jpg"/><pubDate>Mon, 22 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/36e7fba8-6ca8-4944-ad0f-b6182cb3d31b.mp3" length="29056815" type="audio/mpeg"/><itunes:duration>40:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/4932d37a-0da8-448e-a752-05f0f49e483b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/4932d37a-0da8-448e-a752-05f0f49e483b/index.html" type="text/html"/></item><item><title>StorageCraft Outage: Lessons from a Cloud Backup Disaster</title><itunes:title>StorageCraft Outage: Lessons from a Cloud Backup Disaster</itunes:title><description><![CDATA[<p>In this episode, we examine the StorageCraft outage that erased customer backup data during a botched cloud migration. We compare StorageCraft's response to Carbonite's in a similar incident and discuss the critical lessons for backup vendors and customers. Learn the importance of meticulous migration processes, potential backup resiliency strategies, and what to do if your cloud backups disappear. Don't miss these vital insights to avoid cloud backup disasters and ensure your data is always recoverable.</p><p>Stories covering this outage:</p><p><a href="https://www.crn.com/slide-shows/storage/arcserve-ceo-storagecraft-backup-data-loss-not-acceptable" rel="noopener noreferrer" target="_blank">https://www.crn.com/slide-shows/storage/arcserve-ceo-storagecraft-backup-data-loss-not-acceptable</a></p><p><a href="https://www.techtarget.com/searchdisasterrecovery/news/252515647/StorageCraft-DRaaS-outage-highlights-layered-protection-need" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchdisasterrecovery/news/252515647/StorageCraft-DRaaS-outage-highlights-layered-protection-need</a></p><p><a href="https://www.reddit.com/r/msp/comments/tgggey/just_got_a_call_from_storagecraft_cloud_data_is/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/msp/comments/tgggey/just_got_a_call_from_storagecraft_cloud_data_is/</a></p><p><a href="https://blocksandfiles.com/2022/03/22/arcserve-storagecraft-operation-has-lost-customer-data/" rel="noopener noreferrer" target="_blank">https://blocksandfiles.com/2022/03/22/arcserve-storagecraft-operation-has-lost-customer-data/</a></p><p><a href="https://www.channele2e.com/news/arcserve-storagecraft-draas-suffers-cloud-data-protection-issues" rel="noopener noreferrer" target="_blank">https://www.channele2e.com/news/arcserve-storagecraft-draas-suffers-cloud-data-protection-issues</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, we examine the StorageCraft outage that erased customer backup data during a botched cloud migration. We compare StorageCraft's response to Carbonite's in a similar incident and discuss the critical lessons for backup vendors and customers. Learn the importance of meticulous migration processes, potential backup resiliency strategies, and what to do if your cloud backups disappear. Don't miss these vital insights to avoid cloud backup disasters and ensure your data is always recoverable.</p><p>Stories covering this outage:</p><p><a href="https://www.crn.com/slide-shows/storage/arcserve-ceo-storagecraft-backup-data-loss-not-acceptable" rel="noopener noreferrer" target="_blank">https://www.crn.com/slide-shows/storage/arcserve-ceo-storagecraft-backup-data-loss-not-acceptable</a></p><p><a href="https://www.techtarget.com/searchdisasterrecovery/news/252515647/StorageCraft-DRaaS-outage-highlights-layered-protection-need" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchdisasterrecovery/news/252515647/StorageCraft-DRaaS-outage-highlights-layered-protection-need</a></p><p><a href="https://www.reddit.com/r/msp/comments/tgggey/just_got_a_call_from_storagecraft_cloud_data_is/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/msp/comments/tgggey/just_got_a_call_from_storagecraft_cloud_data_is/</a></p><p><a href="https://blocksandfiles.com/2022/03/22/arcserve-storagecraft-operation-has-lost-customer-data/" rel="noopener noreferrer" target="_blank">https://blocksandfiles.com/2022/03/22/arcserve-storagecraft-operation-has-lost-customer-data/</a></p><p><a href="https://www.channele2e.com/news/arcserve-storagecraft-draas-suffers-cloud-data-protection-issues" rel="noopener noreferrer" target="_blank">https://www.channele2e.com/news/arcserve-storagecraft-draas-suffers-cloud-data-protection-issues</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/storagecraft-outage-lessons-from-a-cloud-backup-disaster]]></link><guid isPermaLink="false">35ccccd1-7aae-4cd0-904c-c040ad4622f0</guid><itunes:image href="https://artwork.captivate.fm/17256150-2217-4ce1-be2a-2f3daba3b314/mVVYEACwW-44pHFkunANV4N6.jpg"/><pubDate>Mon, 15 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/35ccccd1-7aae-4cd0-904c-c040ad4622f0.mp3" length="25187355" type="audio/mpeg"/><itunes:duration>34:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/9da86e3f-3121-4f45-abaf-71df47972825/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9da86e3f-3121-4f45-abaf-71df47972825/index.html" type="text/html"/></item><item><title>Rackspace Ransomware Attack: Lessons Learned</title><itunes:title>Rackspace Ransomware Attack: Lessons Learned</itunes:title><description><![CDATA[<p>In this episode, we examine the Rackspace ransomware attack that crippled the company's hosted exchange environment, affecting thousands of customers. We discuss the timeline of events, the importance of timely patching, and the challenges Rackspace faced in restoring customer data. Learn about the value of comprehensive disaster recovery plans and third-party backups in protecting your organization from similar attacks. Don't miss this opportunity to gain valuable insights from one of the most significant ransomware incidents in recent years.</p>]]></description><content:encoded><![CDATA[<p>In this episode, we examine the Rackspace ransomware attack that crippled the company's hosted exchange environment, affecting thousands of customers. We discuss the timeline of events, the importance of timely patching, and the challenges Rackspace faced in restoring customer data. Learn about the value of comprehensive disaster recovery plans and third-party backups in protecting your organization from similar attacks. Don't miss this opportunity to gain valuable insights from one of the most significant ransomware incidents in recent years.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/rackspace-ransomware-attack-lessons-learned]]></link><guid isPermaLink="false">0b8b9904-49e1-4534-b740-d08e070e45a8</guid><itunes:image href="https://artwork.captivate.fm/5591c3d0-b1a2-4acb-9dd6-46fe1bc50ce6/MT_zIWmbSQUkUUS8JsiyHAEx.jpg"/><pubDate>Mon, 08 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0b8b9904-49e1-4534-b740-d08e070e45a8.mp3" length="30599087" type="audio/mpeg"/><itunes:duration>42:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2a1ae3d7-1953-4081-b36b-41cbea2ca583/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2a1ae3d7-1953-4081-b36b-41cbea2ca583/index.html" type="text/html"/></item><item><title>The Carbonite Lawsuit: A Cloud Backup Cautionary Tale</title><itunes:title>The Carbonite Lawsuit: A Cloud Backup Cautionary Tale</itunes:title><description><![CDATA[<p>In this episode, we uncover the troubled history of Carbonite, a once prominent cloud backup provider plagued by lawsuits.  In one Carbonite lawsuit they were the plaintiff, in another they were the defendant.  From using inadequate storage arrays to failing to protect customer data, Carbonite's story serves as a warning for backup customers. Learn the importance of thoroughly vetting backup vendors and the risks of blindly trusting marketing claims. Don't miss this deep dive into Carbonite's multi-million dollar legal battles and valuable lessons for anyone relying on cloud backup services.</p><ul><li>Stories discussed in this episode:</li><li><a href="https://backupcentral.com/carbonite-liar/" rel="noopener noreferrer" target="_blank">https://backupcentral.com/carbonite-liar/</a></li><li><a href="https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/" rel="noopener noreferrer" target="_blank">https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/</a></li><li><a href="https://www.theregister.com/2009/03/23/carbonite_sues_promise/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2009/03/23/carbonite_sues_promise/</a></li><li><a href="https://www.backblaze.com/blog/carbonite-data-loss-reports-miss-the-point/" rel="noopener noreferrer" target="_blank">https://www.backblaze.com/blog/carbonite-data-loss-reports-miss-the-point/</a></li><li><a href="https://www.datacenterknowledge.com/archives/2009/03/23/carbonite-lawsuit-reveals-data-loss" rel="noopener noreferrer" target="_blank">https://www.datacenterknowledge.com/archives/2009/03/23/carbonite-lawsuit-reveals-data-loss</a></li><li><a href="https://www.datacenterknowledge.com/archives/2009/03/25/more-on-carbonites-data-loss" rel="noopener noreferrer" target="_blank">https://www.datacenterknowledge.com/archives/2009/03/25/more-on-carbonites-data-loss</a></li><li><a href="https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/" rel="noopener noreferrer" target="_blank">https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/</a></li><li><a href="https://www.computerworld.com/article/2481289/carbonite-loses-7-500-customers--files--ouch-.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/2481289/carbonite-loses-7-500-customers--files--ouch-.html</a></li><li><a href="https://techcrunch.com/2009/01/03/journalspace-drama-all-data-lost-without-backup-company-deadpooled/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2009/01/03/journalspace-drama-all-data-lost-without-backup-company-deadpooled/</a></li><li><a href="https://archive.nytimes.com/bits.blogs.nytimes.com/2008/09/11/carbonite-steps-up-the-competition-in-online-back-up/?scp=1&amp;sq=mozy&amp;st=cse&amp;apage=2#comments" rel="noopener noreferrer" target="_blank">https://archive.nytimes.com/bits.blogs.nytimes.com/2008/09/11/carbonite-steps-up-the-competition-in-online-back-up/?scp=1&amp;sq=mozy&amp;st=cse&amp;apage=2#comments</a></li><li><a href="https://www.cnet.com/tech/tech-industry/carbonite-sues-hardware-maker-reseller/" rel="noopener noreferrer" target="_blank">https://www.cnet.com/tech/tech-industry/carbonite-sues-hardware-maker-reseller/</a></li><li>​​<a href="https://fingfx.thomsonreuters.com/gfx/legaldocs/byprkkkozve/01312024carbonite.pdf" rel="noopener noreferrer" target="_blank">https://fingfx.thomsonreuters.com/gfx/legaldocs/byprkkkozve/01312024carbonite.pdf</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this episode, we uncover the troubled history of Carbonite, a once prominent cloud backup provider plagued by lawsuits.  In one Carbonite lawsuit they were the plaintiff, in another they were the defendant.  From using inadequate storage arrays to failing to protect customer data, Carbonite's story serves as a warning for backup customers. Learn the importance of thoroughly vetting backup vendors and the risks of blindly trusting marketing claims. Don't miss this deep dive into Carbonite's multi-million dollar legal battles and valuable lessons for anyone relying on cloud backup services.</p><ul><li>Stories discussed in this episode:</li><li><a href="https://backupcentral.com/carbonite-liar/" rel="noopener noreferrer" target="_blank">https://backupcentral.com/carbonite-liar/</a></li><li><a href="https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/" rel="noopener noreferrer" target="_blank">https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/</a></li><li><a href="https://www.theregister.com/2009/03/23/carbonite_sues_promise/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2009/03/23/carbonite_sues_promise/</a></li><li><a href="https://www.backblaze.com/blog/carbonite-data-loss-reports-miss-the-point/" rel="noopener noreferrer" target="_blank">https://www.backblaze.com/blog/carbonite-data-loss-reports-miss-the-point/</a></li><li><a href="https://www.datacenterknowledge.com/archives/2009/03/23/carbonite-lawsuit-reveals-data-loss" rel="noopener noreferrer" target="_blank">https://www.datacenterknowledge.com/archives/2009/03/23/carbonite-lawsuit-reveals-data-loss</a></li><li><a href="https://www.datacenterknowledge.com/archives/2009/03/25/more-on-carbonites-data-loss" rel="noopener noreferrer" target="_blank">https://www.datacenterknowledge.com/archives/2009/03/25/more-on-carbonites-data-loss</a></li><li><a href="https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/" rel="noopener noreferrer" target="_blank">https://archive.nytimes.com/pogue.blogs.nytimes.com/2009/01/27/carbonite-stacks-the-deck-on-amazon/</a></li><li><a href="https://www.computerworld.com/article/2481289/carbonite-loses-7-500-customers--files--ouch-.html" rel="noopener noreferrer" target="_blank">https://www.computerworld.com/article/2481289/carbonite-loses-7-500-customers--files--ouch-.html</a></li><li><a href="https://techcrunch.com/2009/01/03/journalspace-drama-all-data-lost-without-backup-company-deadpooled/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2009/01/03/journalspace-drama-all-data-lost-without-backup-company-deadpooled/</a></li><li><a href="https://archive.nytimes.com/bits.blogs.nytimes.com/2008/09/11/carbonite-steps-up-the-competition-in-online-back-up/?scp=1&amp;sq=mozy&amp;st=cse&amp;apage=2#comments" rel="noopener noreferrer" target="_blank">https://archive.nytimes.com/bits.blogs.nytimes.com/2008/09/11/carbonite-steps-up-the-competition-in-online-back-up/?scp=1&amp;sq=mozy&amp;st=cse&amp;apage=2#comments</a></li><li><a href="https://www.cnet.com/tech/tech-industry/carbonite-sues-hardware-maker-reseller/" rel="noopener noreferrer" target="_blank">https://www.cnet.com/tech/tech-industry/carbonite-sues-hardware-maker-reseller/</a></li><li>​​<a href="https://fingfx.thomsonreuters.com/gfx/legaldocs/byprkkkozve/01312024carbonite.pdf" rel="noopener noreferrer" target="_blank">https://fingfx.thomsonreuters.com/gfx/legaldocs/byprkkkozve/01312024carbonite.pdf</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/carbonite-lawsuit-cloud-backup-cautionary-tale]]></link><guid isPermaLink="false">acab3cc5-bc42-45db-b357-3c8b1ac938a6</guid><itunes:image href="https://artwork.captivate.fm/8b3654a2-9ce5-4235-b99a-faf72acf9180/2iHxNbaij4TYLi_bsGRAYQzT.jpg"/><pubDate>Mon, 01 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/acab3cc5-bc42-45db-b357-3c8b1ac938a6.mp3" length="33561373" type="audio/mpeg"/><itunes:duration>46:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/6a998c08-d829-488b-8897-3b0d06cef9ec/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/6a998c08-d829-488b-8897-3b0d06cef9ec/index.html" type="text/html"/></item><item><title>Salesforce.com&apos;s Permission Slip-Up (Another Cloud Disaster)</title><itunes:title>Salesforce.com&apos;s Permission Slip-Up (Another Cloud Disaster)</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-Up, Curtis and his co-host dive into the chaos caused by Salesforce's accidental "modify all" permission change in 2019. They explore the fallout from this real-world SaaS disaster, including how Salesforce scrambled to restore proper permissions and the frustration felt by impacted customers.</p><p>Curtis and his co-host discuss the crucial role third-party backups could have played in mitigating the impact of this incident, and why relying solely on a SaaS vendor's recovery capabilities can leave organizations vulnerable. They also share practical advice on how listeners can avoid similar cloud disasters by implementing a comprehensive backup strategy for their SaaS applications.</p><p>Whether you're a Salesforce user, a SaaS enthusiast, or simply interested in the world of data protection, this episode offers valuable insights and entertaining anecdotes that will help you become a Cyber Recovery Hero. Tune in to learn, laugh, and discover how to safeguard your organization's critical data in the cloud.</p><p>Links</p><ul><li>Original SF post: https://issues.salesforce.com/issue/a028c00000qQ53kAAC/user-profiles-and-permission-sets-related-to-pardot-licensed-orgs-were-modified-by-salesforce</li><li>Second post: https://salesforce.stackexchange.com/questions/262830/salesforce-bug-enabled-modify-all</li><li>Big deal: https://appomni.com/blog_post/2019-blog-modify-all/</li><li>SF follow up: https://help.salesforce.com/s/articleView?id=000384056&amp;type=1</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-Up, Curtis and his co-host dive into the chaos caused by Salesforce's accidental "modify all" permission change in 2019. They explore the fallout from this real-world SaaS disaster, including how Salesforce scrambled to restore proper permissions and the frustration felt by impacted customers.</p><p>Curtis and his co-host discuss the crucial role third-party backups could have played in mitigating the impact of this incident, and why relying solely on a SaaS vendor's recovery capabilities can leave organizations vulnerable. They also share practical advice on how listeners can avoid similar cloud disasters by implementing a comprehensive backup strategy for their SaaS applications.</p><p>Whether you're a Salesforce user, a SaaS enthusiast, or simply interested in the world of data protection, this episode offers valuable insights and entertaining anecdotes that will help you become a Cyber Recovery Hero. Tune in to learn, laugh, and discover how to safeguard your organization's critical data in the cloud.</p><p>Links</p><ul><li>Original SF post: https://issues.salesforce.com/issue/a028c00000qQ53kAAC/user-profiles-and-permission-sets-related-to-pardot-licensed-orgs-were-modified-by-salesforce</li><li>Second post: https://salesforce.stackexchange.com/questions/262830/salesforce-bug-enabled-modify-all</li><li>Big deal: https://appomni.com/blog_post/2019-blog-modify-all/</li><li>SF follow up: https://help.salesforce.com/s/articleView?id=000384056&amp;type=1</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/salesforce-permission-slip-up-cloud-disaster]]></link><guid isPermaLink="false">0a7e97da-124e-4f1a-a049-e1d8b7faf328</guid><itunes:image href="https://artwork.captivate.fm/4f8ded90-9aad-4721-9f28-5df7fc6f95c2/Ev2V62xVSWxRlm2gVNr6fCQD.jpg"/><pubDate>Mon, 25 Mar 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0a7e97da-124e-4f1a-a049-e1d8b7faf328.mp3" length="24693325" type="audio/mpeg"/><itunes:duration>34:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/1d1cdb13-4843-478d-ba83-ef3612b2abf5/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/1d1cdb13-4843-478d-ba83-ef3612b2abf5/index.html" type="text/html"/></item><item><title>KPMG Blunder Proves Microsoft 365 Needs Backup (Cloud Disasters)</title><itunes:title>KPMG Blunder Proves Microsoft 365 Needs Backup (Cloud Disasters)</itunes:title><description><![CDATA[<p>In this shocking episode of The Backup Wrap-up, we delve into the jaw-dropping data loss disaster that struck global consulting giant KPMG at the height of the 2020 pandemic. With one errant click, a Microsoft 365 admin accidentally wiped out months of critical Teams chat data for a staggering 145,000 employees.</p><p>Join host W. Curtis Preston as he unravels this extraordinary tale of digital destruction and explores the crucial lessons it holds for organizations relying on Microsoft 365 and other SaaS platforms. Curtis breaks down the differences between retention policies and actual backups, exposes common misconceptions about cloud provider data protection responsibilities, and highlights the potential legal and compliance nightmares that can arise from such catastrophic data loss.</p><p>If you're using Microsoft 365 or any SaaS application, you can't afford to miss this vital wake-up call. Tune in to discover why a robust third-party backup strategy is essential, no matter how big your company or how reliable your cloud provider seems. Learn from KPMG's misfortune and ensure your organization's critical data is always protected, in the cloud and beyond.</p><p>Don't become the next cautionary tale – listen now and secure your SaaS data before it's too late!</p>]]></description><content:encoded><![CDATA[<p>In this shocking episode of The Backup Wrap-up, we delve into the jaw-dropping data loss disaster that struck global consulting giant KPMG at the height of the 2020 pandemic. With one errant click, a Microsoft 365 admin accidentally wiped out months of critical Teams chat data for a staggering 145,000 employees.</p><p>Join host W. Curtis Preston as he unravels this extraordinary tale of digital destruction and explores the crucial lessons it holds for organizations relying on Microsoft 365 and other SaaS platforms. Curtis breaks down the differences between retention policies and actual backups, exposes common misconceptions about cloud provider data protection responsibilities, and highlights the potential legal and compliance nightmares that can arise from such catastrophic data loss.</p><p>If you're using Microsoft 365 or any SaaS application, you can't afford to miss this vital wake-up call. Tune in to discover why a robust third-party backup strategy is essential, no matter how big your company or how reliable your cloud provider seems. Learn from KPMG's misfortune and ensure your organization's critical data is always protected, in the cloud and beyond.</p><p>Don't become the next cautionary tale – listen now and secure your SaaS data before it's too late!</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/kpmg-blunder-proves-microsoft-365-needs-backup-cloud-disasters]]></link><guid isPermaLink="false">ada0baf3-6223-4bd0-ac03-a72b1c79e82d</guid><itunes:image href="https://artwork.captivate.fm/706cfb09-25da-4bc3-a5f4-a04ce9b14aaf/dmSOpztR23lfo4W2BNPd2LTW.jpg"/><pubDate>Mon, 18 Mar 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/ada0baf3-6223-4bd0-ac03-a72b1c79e82d.mp3" length="29763059" type="audio/mpeg"/><itunes:duration>41:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c81d2113-e9d8-4112-ae7c-bfb277e0b434/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c81d2113-e9d8-4112-ae7c-bfb277e0b434/index.html" type="text/html"/></item><item><title>OVHCloud Dumpster Fire (Cloud Disasters)</title><itunes:title>OVHCloud Dumpster Fire (Cloud Disasters)</itunes:title><description><![CDATA[<p>In this important episode of the Backup Wrap-up, W. Curtis Preston, AKA Mr. Backup, takes you on a deep dive into the shocking story of the OVHCloud data center fire of 2021. This catastrophic event left hundreds of customers scrambling to recover their precious data (often without backups), exposing the startling truth about OVHCloud's data center and backup practices and the devastating consequences of misplaced trust in cloud providers.</p><p>As usual, Curtis is joined by co-host Prasanna Malaiyandi as they unravel the complex web of controversial decisions, legal battles, and hard lessons learned from this disastrous incident. They explore the factors contributing to the fire's severity, the staggering extent of the data loss, and the eye-opening revelations about OVHCloud's backup infrastructure.</p><p>But this episode is more than just a cautionary tale. Curtis and Prasanna delve into the crucial questions every organization must ask their cloud provider to ensure their data is truly secure. They share invaluable insights and actionable advice to help you avoid falling victim to a similar fate.</p><p>Whether you're an IT professional responsible for safeguarding your company's data or an individual looking to protect your digital life, this episode is a must-listen. You'll come away with a deeper understanding of the risks associated with cloud storage, the importance of robust backup strategies, and the steps you can take to become a cyber-recovery hero.</p><p>Don't miss this opportunity to learn from one of the most significant cloud disasters in recent history. Tune in now and discover how you can keep your data out of the fire and emerge as an unsung hero in the world of backup and recovery.</p><p>Articles covering this story:</p><p>https://www.datacenterdynamics.com/en/news/ovh-fire-octave-klaba-says-ups-systems-were-ablaze/</p><p>https://www.datacenterdynamics.com/en/news/fire-could-cost-ovhcloud-105-million-ipo-filing-reveals/</p><p>https://www.datacenterdynamics.com/en/news/ovhcloud-ordered-to-pay-250k-to-two-customers-who-lost-data-in-strasbourg-data-center-fire/</p><p>https://www.datacenterdynamics.com/en/news/ovhcloud-fire-report-sbg2-data-center-had-wooden-ceilings-no-extinguisher-and-no-power-cut-out/</p><p>Election worker episode:</p><p>https://www.backupwrapup.com/election-poll-site-manager-explains-us-election-systems/</p>]]></description><content:encoded><![CDATA[<p>In this important episode of the Backup Wrap-up, W. Curtis Preston, AKA Mr. Backup, takes you on a deep dive into the shocking story of the OVHCloud data center fire of 2021. This catastrophic event left hundreds of customers scrambling to recover their precious data (often without backups), exposing the startling truth about OVHCloud's data center and backup practices and the devastating consequences of misplaced trust in cloud providers.</p><p>As usual, Curtis is joined by co-host Prasanna Malaiyandi as they unravel the complex web of controversial decisions, legal battles, and hard lessons learned from this disastrous incident. They explore the factors contributing to the fire's severity, the staggering extent of the data loss, and the eye-opening revelations about OVHCloud's backup infrastructure.</p><p>But this episode is more than just a cautionary tale. Curtis and Prasanna delve into the crucial questions every organization must ask their cloud provider to ensure their data is truly secure. They share invaluable insights and actionable advice to help you avoid falling victim to a similar fate.</p><p>Whether you're an IT professional responsible for safeguarding your company's data or an individual looking to protect your digital life, this episode is a must-listen. You'll come away with a deeper understanding of the risks associated with cloud storage, the importance of robust backup strategies, and the steps you can take to become a cyber-recovery hero.</p><p>Don't miss this opportunity to learn from one of the most significant cloud disasters in recent history. Tune in now and discover how you can keep your data out of the fire and emerge as an unsung hero in the world of backup and recovery.</p><p>Articles covering this story:</p><p>https://www.datacenterdynamics.com/en/news/ovh-fire-octave-klaba-says-ups-systems-were-ablaze/</p><p>https://www.datacenterdynamics.com/en/news/fire-could-cost-ovhcloud-105-million-ipo-filing-reveals/</p><p>https://www.datacenterdynamics.com/en/news/ovhcloud-ordered-to-pay-250k-to-two-customers-who-lost-data-in-strasbourg-data-center-fire/</p><p>https://www.datacenterdynamics.com/en/news/ovhcloud-fire-report-sbg2-data-center-had-wooden-ceilings-no-extinguisher-and-no-power-cut-out/</p><p>Election worker episode:</p><p>https://www.backupwrapup.com/election-poll-site-manager-explains-us-election-systems/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com/ovhcloud-datacenter-backup-design-total-loss-cloud-disasters]]></link><guid isPermaLink="false">c06edb5a-fe0d-4dc1-97e0-fc7e4579bb17</guid><itunes:image href="https://artwork.captivate.fm/6df3bf41-dc06-4843-bea8-11bca48baaf3/g2f_KUpMuxPwL12-M5BmcyoA.jpg"/><pubDate>Mon, 11 Mar 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c06edb5a-fe0d-4dc1-97e0-fc7e4579bb17.mp3" length="26835254" type="audio/mpeg"/><itunes:duration>37:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/434fdc34-4d9b-4748-97c9-b275327d07d0/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/434fdc34-4d9b-4748-97c9-b275327d07d0/index.html" type="text/html"/></item><item><title>Cloud disasters: Musey deletes their own company!</title><itunes:title>Cloud disasters: Musey deletes their own company!</itunes:title><description><![CDATA[<p>In this episode, we uncover the little-known but cautionary tale of Musey, a startup building an interior design app that catastrophically lost everything when an admin accidentally deleted their entire Google Workspace account.</p><p>We dive deep into:</p><ul><li>How a single slip-up by an admin led to over $1.5 million of intellectual property stored in Google Drive getting instantly wiped out</li><li>Musey's desperate attempts to get their data back by contacting Google and even filing a lawsuit</li><li>How not even the cloud giants like Google have an obligation to restore customer data lost due to error or malfeasance</li><li>Why you absolutley need independent backups of cloud data instead of blindly trusting sync and retention policies</li></ul><br/><p>The devastating story of Musey serves as a sobering reminder that human error can still trump even the most resilient cloud platforms. Don’t miss this rare peek behind the curtain at a colossal cloud failure that very few people know about.</p><p>Story: <a href="https://www.theregister.com/2019/07/05/musey_v_google_lawsuit/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2019/07/05/musey_v_google_lawsuit/</a></p><p>Lawsuit filed: <a href="https://regmedia.co.uk/2019/07/05/musey_v_google.pdf" rel="noopener noreferrer" target="_blank">https://regmedia.co.uk/2019/07/05/musey_v_google.pdf</a></p><p>Lawsuit pulled: <a href="https://dockets.justia.com/docket/california/candce/4:2019cv03864/344456" rel="noopener noreferrer" target="_blank">https://dockets.justia.com/docket/california/candce/4:2019cv03864/344456</a></p><p>Museyapp.com 6/6/19 says “buy this domain”:</p><p><a href="https://web.archive.org/web/20190606022957/http://www.museyapp.com/" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20190606022957/http://www.museyapp.com/</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, we uncover the little-known but cautionary tale of Musey, a startup building an interior design app that catastrophically lost everything when an admin accidentally deleted their entire Google Workspace account.</p><p>We dive deep into:</p><ul><li>How a single slip-up by an admin led to over $1.5 million of intellectual property stored in Google Drive getting instantly wiped out</li><li>Musey's desperate attempts to get their data back by contacting Google and even filing a lawsuit</li><li>How not even the cloud giants like Google have an obligation to restore customer data lost due to error or malfeasance</li><li>Why you absolutley need independent backups of cloud data instead of blindly trusting sync and retention policies</li></ul><br/><p>The devastating story of Musey serves as a sobering reminder that human error can still trump even the most resilient cloud platforms. Don’t miss this rare peek behind the curtain at a colossal cloud failure that very few people know about.</p><p>Story: <a href="https://www.theregister.com/2019/07/05/musey_v_google_lawsuit/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2019/07/05/musey_v_google_lawsuit/</a></p><p>Lawsuit filed: <a href="https://regmedia.co.uk/2019/07/05/musey_v_google.pdf" rel="noopener noreferrer" target="_blank">https://regmedia.co.uk/2019/07/05/musey_v_google.pdf</a></p><p>Lawsuit pulled: <a href="https://dockets.justia.com/docket/california/candce/4:2019cv03864/344456" rel="noopener noreferrer" target="_blank">https://dockets.justia.com/docket/california/candce/4:2019cv03864/344456</a></p><p>Museyapp.com 6/6/19 says “buy this domain”:</p><p><a href="https://web.archive.org/web/20190606022957/http://www.museyapp.com/" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20190606022957/http://www.museyapp.com/</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">adbf4cb9-5678-45fc-bce9-a97c25b03a22</guid><itunes:image href="https://artwork.captivate.fm/cf4adb22-1e87-4359-a060-4ce25e74e44a/iLXB8dFX8hf9IFFZoqlIQ7eJ.jpg"/><pubDate>Mon, 04 Mar 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/adbf4cb9-5678-45fc-bce9-a97c25b03a22.mp3" length="19165914" type="audio/mpeg"/><itunes:duration>26:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/38aee2c6-481a-4d87-9f2d-b1f625e43d15/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/38aee2c6-481a-4d87-9f2d-b1f625e43d15/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-588011e3-7cde-4eb2-bc9a-96c1b1f2a144.json" type="application/json+chapters"/></item><item><title>Cloud catastrophes: Codespaces.com deleted out of existence</title><itunes:title>Cloud catastrophes: Codespaces.com deleted out of existence</itunes:title><description><![CDATA[<p>In 2014, software-as-a-service company Code Spaces disappeared overnight after a devastating cyber attack. Thousands of coders lost access to their work when insufficient cloud backups failed under pressure.  The company was forced to go out of business.</p><p>Learn the tragic tale of how Code Spaces ignored standard data protection rules, putting their business and clients at risk. We’ll unpack what went wrong with their cloud architecture and backup systems, allowing a single hacker to destroy their SaaS company.</p><p>Understand why you still need backup - even native cloud redundancy isn't enough. Our hosts explore the hard lessons from this cloud catastrophe and equip you with actionable advice around security, access controls, preparation, and backup policies. Safeguard your slice of the cloud and avoid the mistakes that ultimately shuttered Code Spaces.</p><p>Articles covering this story:</p><ul><li><a href="https://www.esecurityplanet.com/networks/code-spaces-destroyed-by-cyber-attack/" rel="noopener noreferrer" target="_blank">https://www.esecurityplanet.com/networks/code-spaces-destroyed-by-cyber-attack/</a></li><li><a href="https://www.itgovernance.co.uk/blog/the-attack-that-forced-code-spaces-out-of-business-what-went-wrong" rel="noopener noreferrer" target="_blank">https://www.itgovernance.co.uk/blog/the-attack-that-forced-code-spaces-out-of-business-what-went-wrong</a></li><li><a href="https://www.breaches.cloud/incidents/codespaces/" rel="noopener noreferrer" target="_blank">https://www.breaches.cloud/incidents/codespaces/</a></li><li><a href="https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/" rel="noopener noreferrer" target="_blank">https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/</a></li><li><a href="https://thehackernews.com/2014/06/cyber-attack-on-code-spaces-puts.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2014/06/cyber-attack-on-code-spaces-puts.html</a></li><li><a href="https://www.csoonline.com/article/547518/disaster-recovery-code-spaces-forced-to-close-its-doors-after-security-incident.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/547518/disaster-recovery-code-spaces-forced-to-close-its-doors-after-security-incident.html</a></li><li><a href="https://blogs.manageengine.com/it-security/passwordmanagerpro/2014/08/20/code-spaces-aws-security-breach-a-sad-reminder-of-the-importance-of-cloud-environment-password-management.html" rel="noopener noreferrer" target="_blank">https://blogs.manageengine.com/it-security/passwordmanagerpro/2014/08/20/code-spaces-aws-security-breach-a-sad-reminder-of-the-importance-of-cloud-environment-password-management.html</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>In 2014, software-as-a-service company Code Spaces disappeared overnight after a devastating cyber attack. Thousands of coders lost access to their work when insufficient cloud backups failed under pressure.  The company was forced to go out of business.</p><p>Learn the tragic tale of how Code Spaces ignored standard data protection rules, putting their business and clients at risk. We’ll unpack what went wrong with their cloud architecture and backup systems, allowing a single hacker to destroy their SaaS company.</p><p>Understand why you still need backup - even native cloud redundancy isn't enough. Our hosts explore the hard lessons from this cloud catastrophe and equip you with actionable advice around security, access controls, preparation, and backup policies. Safeguard your slice of the cloud and avoid the mistakes that ultimately shuttered Code Spaces.</p><p>Articles covering this story:</p><ul><li><a href="https://www.esecurityplanet.com/networks/code-spaces-destroyed-by-cyber-attack/" rel="noopener noreferrer" target="_blank">https://www.esecurityplanet.com/networks/code-spaces-destroyed-by-cyber-attack/</a></li><li><a href="https://www.itgovernance.co.uk/blog/the-attack-that-forced-code-spaces-out-of-business-what-went-wrong" rel="noopener noreferrer" target="_blank">https://www.itgovernance.co.uk/blog/the-attack-that-forced-code-spaces-out-of-business-what-went-wrong</a></li><li><a href="https://www.breaches.cloud/incidents/codespaces/" rel="noopener noreferrer" target="_blank">https://www.breaches.cloud/incidents/codespaces/</a></li><li><a href="https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/" rel="noopener noreferrer" target="_blank">https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/</a></li><li><a href="https://thehackernews.com/2014/06/cyber-attack-on-code-spaces-puts.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2014/06/cyber-attack-on-code-spaces-puts.html</a></li><li><a href="https://www.csoonline.com/article/547518/disaster-recovery-code-spaces-forced-to-close-its-doors-after-security-incident.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/547518/disaster-recovery-code-spaces-forced-to-close-its-doors-after-security-incident.html</a></li><li><a href="https://blogs.manageengine.com/it-security/passwordmanagerpro/2014/08/20/code-spaces-aws-security-breach-a-sad-reminder-of-the-importance-of-cloud-environment-password-management.html" rel="noopener noreferrer" target="_blank">https://blogs.manageengine.com/it-security/passwordmanagerpro/2014/08/20/code-spaces-aws-security-breach-a-sad-reminder-of-the-importance-of-cloud-environment-password-management.html</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">dc49dc8a-84a6-409d-8531-d066a27f9627</guid><itunes:image href="https://artwork.captivate.fm/1066ad95-8588-42b4-b440-c62e99d8605d/FcyFvzz5_2Wmj8v-Ezf6z1Wk.jpg"/><pubDate>Mon, 26 Feb 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/dc49dc8a-84a6-409d-8531-d066a27f9627.mp3" length="26164436" type="audio/mpeg"/><itunes:duration>36:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fcd226ba-771d-4f2f-ac04-22377c7c8d37/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fcd226ba-771d-4f2f-ac04-22377c7c8d37/index.html" type="text/html"/></item><item><title>Crafting the Perfect Disaster Recovery Runbook</title><itunes:title>Crafting the Perfect Disaster Recovery Runbook</itunes:title><description><![CDATA[<p>In this information-packed episode, backup guru W. Curtis Preston and expert guest Prasanna Malaiyandi explore the elements of crafting an effective disaster recovery (DR) runbook. They discuss how a properly structured runbook eliminates confusion during crises by clearly outlining responsibilities and contacts. From making runbooks accessible and absorbed to keeping them actionable with constant updates and tests, they share the 8 critical factors for DR success. Tune in to transform your backup admins into confident cyber recovery heroes with battle-tested runbooks.</p>]]></description><content:encoded><![CDATA[<p>In this information-packed episode, backup guru W. Curtis Preston and expert guest Prasanna Malaiyandi explore the elements of crafting an effective disaster recovery (DR) runbook. They discuss how a properly structured runbook eliminates confusion during crises by clearly outlining responsibilities and contacts. From making runbooks accessible and absorbed to keeping them actionable with constant updates and tests, they share the 8 critical factors for DR success. Tune in to transform your backup admins into confident cyber recovery heroes with battle-tested runbooks.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">f84f4879-af58-4cd5-9107-5bcc0a9b2325</guid><itunes:image href="https://artwork.captivate.fm/d7167090-db0d-46a2-8a74-7e38b2bc3969/30zyAHHuxHP_xjnFqk09bAy1.jpg"/><pubDate>Mon, 19 Feb 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/f84f4879-af58-4cd5-9107-5bcc0a9b2325.mp3" length="29040511" type="audio/mpeg"/><itunes:duration>40:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/684479b3-f01e-4311-a03d-907077d4405c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/684479b3-f01e-4311-a03d-907077d4405c/index.html" type="text/html"/></item><item><title>To DRaaS or Not to DRaaS? Comparing Disaster Recovery Approaches</title><itunes:title>To DRaaS or Not to DRaaS? Comparing Disaster Recovery Approaches</itunes:title><description><![CDATA[<p>Disaster lurks around every corner - ransomware, natural disasters, human errors. Are you thinking about all the data and systems at risk. Is your organization prepared? </p><p>In this episode, Curtis and Prasanna pull back the curtain on the disaster recovery decision - to build or to buy? They unpack the tradeoffs around cost, complexity, control, and even cybersecurity. Whether you're an anxious IT leader losing sleep over business continuity or just disaster recovery curious, you won't want to miss this episode.</p><p>Will your DR strategy survive? Tune in now to find out!</p>]]></description><content:encoded><![CDATA[<p>Disaster lurks around every corner - ransomware, natural disasters, human errors. Are you thinking about all the data and systems at risk. Is your organization prepared? </p><p>In this episode, Curtis and Prasanna pull back the curtain on the disaster recovery decision - to build or to buy? They unpack the tradeoffs around cost, complexity, control, and even cybersecurity. Whether you're an anxious IT leader losing sleep over business continuity or just disaster recovery curious, you won't want to miss this episode.</p><p>Will your DR strategy survive? Tune in now to find out!</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">c5c651b8-4a2b-4a93-bc69-a7be91116630</guid><itunes:image href="https://artwork.captivate.fm/fd11dc1d-1f35-423c-8cf7-24f017833617/uKae_0PLjCBYTrBq386jtpG0.png"/><pubDate>Mon, 12 Feb 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c5c651b8-4a2b-4a93-bc69-a7be91116630.mp3" length="28385360" type="audio/mpeg"/><itunes:duration>39:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/7e5c9a84-e33f-49fd-aac3-66540e0d5d33/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/7e5c9a84-e33f-49fd-aac3-66540e0d5d33/index.html" type="text/html"/></item><item><title>Hot, Warm, and Cold: DR Site Strategies</title><itunes:title>Hot, Warm, and Cold: DR Site Strategies</itunes:title><description><![CDATA[<p>Creating an effective DR strategy means understanding the critical differences between hot, warm, and cold recovery sites. Join backup guru W. Curtis Preston and his cohost Prasanna Malaiyandi for the latest Backup Wrap-Up as they outline real-world strategies to match your RTO, RPO, and budget. You’ll learn the unique benefits and challenges of using both primary for hot sites, and backup replication to cost-effectively create warm recovery sites.</p><p>They also tackle the complexities of cloud DR for VMware environments. Can you do DR of VMware to AWS? What conversion hurdles do you need to plan for? Tune in to find out.</p><p>Whether you're a scrappy SMB or an enterprise with serious SLAs, this tactical episode delivers actionable advice to advance your resilience game. Learn how to leverage the cloud's economies of scale and keep business running no matter what gets thrown your way.</p><p>The backup wrap up turns unappreciated backup admins into cyber recovery heroes.</p>]]></description><content:encoded><![CDATA[<p>Creating an effective DR strategy means understanding the critical differences between hot, warm, and cold recovery sites. Join backup guru W. Curtis Preston and his cohost Prasanna Malaiyandi for the latest Backup Wrap-Up as they outline real-world strategies to match your RTO, RPO, and budget. You’ll learn the unique benefits and challenges of using both primary for hot sites, and backup replication to cost-effectively create warm recovery sites.</p><p>They also tackle the complexities of cloud DR for VMware environments. Can you do DR of VMware to AWS? What conversion hurdles do you need to plan for? Tune in to find out.</p><p>Whether you're a scrappy SMB or an enterprise with serious SLAs, this tactical episode delivers actionable advice to advance your resilience game. Learn how to leverage the cloud's economies of scale and keep business running no matter what gets thrown your way.</p><p>The backup wrap up turns unappreciated backup admins into cyber recovery heroes.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">0d64dcda-611a-4527-a027-9effe0eb0337</guid><itunes:image href="https://artwork.captivate.fm/4fb12b4c-39dc-4e18-b2c4-08f0b9ba0a6c/umTPT0HE5VDTkoc6mhlsI9Pu.jpg"/><pubDate>Mon, 05 Feb 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0d64dcda-611a-4527-a027-9effe0eb0337.mp3" length="29362131" type="audio/mpeg"/><itunes:duration>40:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Disaster Recovery Site: Build, Buy, or Cloud?</title><itunes:title>Disaster Recovery Site: Build, Buy, or Cloud?</itunes:title><description><![CDATA[<p>When disaster strikes, you better have a solid plan for where you’ll recover your operations. Join me, W. Curtis Preston, and Prasanna Malaiyandi, as we explore the nitty-gritty details of your three main options for a disaster recovery site.</p><p>We’ll dig into the pros, cons, risks, and costs associated with rolling your own DR site, hiring a third-party service, or leveraging the public cloud. Each path has its twists and turns. How do you keep a secondary site in sync? What if a regional disaster takes down your DR provider? Can the cloud flex to meet your recovery needs? Tune in for straight-shooting answers.</p><p>This episode tackles the tough questions so you can make informed, bulletproof decisions on housing your failover infrastructure. As always, I’m drawing from decades of experience as a recovering backup admin, and I've designed this podcast just for pros like yourself.</p><p>Batten down the hatches and prepare to take notes - it’s time to build a life raft for your data! </p><p>For those interested in The Gobox Studio, here you go! https://goboxstudio.com/</p>]]></description><content:encoded><![CDATA[<p>When disaster strikes, you better have a solid plan for where you’ll recover your operations. Join me, W. Curtis Preston, and Prasanna Malaiyandi, as we explore the nitty-gritty details of your three main options for a disaster recovery site.</p><p>We’ll dig into the pros, cons, risks, and costs associated with rolling your own DR site, hiring a third-party service, or leveraging the public cloud. Each path has its twists and turns. How do you keep a secondary site in sync? What if a regional disaster takes down your DR provider? Can the cloud flex to meet your recovery needs? Tune in for straight-shooting answers.</p><p>This episode tackles the tough questions so you can make informed, bulletproof decisions on housing your failover infrastructure. As always, I’m drawing from decades of experience as a recovering backup admin, and I've designed this podcast just for pros like yourself.</p><p>Batten down the hatches and prepare to take notes - it’s time to build a life raft for your data! </p><p>For those interested in The Gobox Studio, here you go! https://goboxstudio.com/</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">ff1ee32b-9179-4501-aa51-3aa03c0f2759</guid><itunes:image href="https://artwork.captivate.fm/115a0a40-4b5e-4a33-ac50-ccc6a12b1dab/CpElsQLBUqdqTbq_1u6UMWW_.jpg"/><pubDate>Mon, 29 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/ff1ee32b-9179-4501-aa51-3aa03c0f2759.mp3" length="23123149" type="audio/mpeg"/><itunes:duration>32:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/045e8ce7-43c1-44b1-8a7a-144d78f66bd2/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/045e8ce7-43c1-44b1-8a7a-144d78f66bd2/index.html" type="text/html"/></item><item><title>Disaster Recovery 101: Laying the Groundwork for a Good DR Plan</title><itunes:title>Disaster Recovery 101: Laying the Groundwork for a Good DR Plan</itunes:title><description><![CDATA[<p>Staying resilient in the face of disaster is crucial for any organization today. In this episode, we dive deep into crafting robust disaster recovery plans that help you outmaneuver outages.</p><p>We discuss critical groundwork like taking inventory across environments and analyzing risk to determine what to prioritize recovering when the worst happens. Whether it's ransomware, natural disasters, or other threats taking systems down, smart preparation makes all the difference.</p><p>Key highlights include:</p><ul><li>Figuring out what scenarios are most likely to impact your business based on risk profiles</li><li>Making sure you have visibility into all areas – whether data centers, cloud, SaaS, or endpoints</li><li>Tackling basic protections first before advanced options</li><li>Understanding regional risks that may be unique to your geography</li><li>Thinking through tests that validate your ability to recover when needed</li></ul><br/><p>The right disaster recovery means being able to get back to business rapidly. By learning from unfortunate events others have endured, you can architect resilience that lets you bounce back better no matter the scenario.</p>]]></description><content:encoded><![CDATA[<p>Staying resilient in the face of disaster is crucial for any organization today. In this episode, we dive deep into crafting robust disaster recovery plans that help you outmaneuver outages.</p><p>We discuss critical groundwork like taking inventory across environments and analyzing risk to determine what to prioritize recovering when the worst happens. Whether it's ransomware, natural disasters, or other threats taking systems down, smart preparation makes all the difference.</p><p>Key highlights include:</p><ul><li>Figuring out what scenarios are most likely to impact your business based on risk profiles</li><li>Making sure you have visibility into all areas – whether data centers, cloud, SaaS, or endpoints</li><li>Tackling basic protections first before advanced options</li><li>Understanding regional risks that may be unique to your geography</li><li>Thinking through tests that validate your ability to recover when needed</li></ul><br/><p>The right disaster recovery means being able to get back to business rapidly. By learning from unfortunate events others have endured, you can architect resilience that lets you bounce back better no matter the scenario.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">ab413199-c55e-47af-a879-47b8fa09af5a</guid><itunes:image href="https://artwork.captivate.fm/6007ed1b-5294-499c-b403-16203405a259/JWNJkxtH8bDdtluuoOfXv1wT.jpg"/><pubDate>Mon, 22 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/ab413199-c55e-47af-a879-47b8fa09af5a.mp3" length="34084547" type="audio/mpeg"/><itunes:duration>47:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/b1aacb80-2ca0-4ca0-a1bf-c50e178185b3/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b1aacb80-2ca0-4ca0-a1bf-c50e178185b3/index.html" type="text/html"/></item><item><title>Disaster Recovery 101 - Back to the Fundamentals</title><itunes:title>Disaster Recovery 101 - Back to the Fundamentals</itunes:title><description><![CDATA[<p>Are your backups collecting virtual dust rather than readying you for the next unavoidable disaster? Get back to basics on crafting an ironclad disaster recovery plan. We outline the essential infrastructure, applications, staffing, and execution steps often glossed over by the check-the-box enterprise crowd.</p><p>Going beyond mere data recovery, we detail considerations around standing up replacement infrastructure, understanding system interdependencies, and restoring functionality faster with increased automation. Cloud's scaling and affordability make DR exercises less daunting these days if configured properly on the front-end.</p><p>With major outages increasingly likely, the principles detailed could dictate whether your business emerges unscathed or shutters for good. We share tips for pragmatic preparation reflecting our scar tissue from failures past when lackadaisical DR rigor proved painful. Ever try troubleshooting recovery steps in the midst of a raging hurricane...or gotten that dreaded 2AM offline alert while welcoming your newborn? We have!</p><p>Major takeaways:</p><ul><li>Start recovery documentation with manual steps, increase automation later</li><li>Test often - the cloud enables cost-effective exercising at scale</li><li>Availability outshines recovery - build resilient systems and staff cross-training</li><li>Know precise RTOs and RPOs aligned to business priority and appetite</li></ul><br/><p>Stay tuned as we separate the mavens from the mayhem when adverse events strike. Get your data DR ducks in order now before things migrate south!</p><p>News articles from this episode:</p><p><a href="https://www.bleepingcomputer.com/news/security/50k-wordpress-sites-exposed-to-rce-attacks-by-critical-bug-in-backup-plugin/https://jorgedelacruz.uk/2023/12/06/veeam-whats-new-in-veeam-backup-and-replication-v12-1-major-new-features/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/50k-wordpress-sites-exposed-to-rce-attacks-by-critical-bug-in-backup-plugin/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/50k-wordpress-sites-exposed-to-rce-attacks-by-critical-bug-in-backup-plugin/https://jorgedelacruz.uk/2023/12/06/veeam-whats-new-in-veeam-backup-and-replication-v12-1-major-new-features/" rel="noopener noreferrer" target="_blank">https://jorgedelacruz.uk/2023/12/06/veeam-whats-new-in-veeam-backup-and-replication-v12-1-major-new-features/</a></p>]]></description><content:encoded><![CDATA[<p>Are your backups collecting virtual dust rather than readying you for the next unavoidable disaster? Get back to basics on crafting an ironclad disaster recovery plan. We outline the essential infrastructure, applications, staffing, and execution steps often glossed over by the check-the-box enterprise crowd.</p><p>Going beyond mere data recovery, we detail considerations around standing up replacement infrastructure, understanding system interdependencies, and restoring functionality faster with increased automation. Cloud's scaling and affordability make DR exercises less daunting these days if configured properly on the front-end.</p><p>With major outages increasingly likely, the principles detailed could dictate whether your business emerges unscathed or shutters for good. We share tips for pragmatic preparation reflecting our scar tissue from failures past when lackadaisical DR rigor proved painful. Ever try troubleshooting recovery steps in the midst of a raging hurricane...or gotten that dreaded 2AM offline alert while welcoming your newborn? We have!</p><p>Major takeaways:</p><ul><li>Start recovery documentation with manual steps, increase automation later</li><li>Test often - the cloud enables cost-effective exercising at scale</li><li>Availability outshines recovery - build resilient systems and staff cross-training</li><li>Know precise RTOs and RPOs aligned to business priority and appetite</li></ul><br/><p>Stay tuned as we separate the mavens from the mayhem when adverse events strike. Get your data DR ducks in order now before things migrate south!</p><p>News articles from this episode:</p><p><a href="https://www.bleepingcomputer.com/news/security/50k-wordpress-sites-exposed-to-rce-attacks-by-critical-bug-in-backup-plugin/https://jorgedelacruz.uk/2023/12/06/veeam-whats-new-in-veeam-backup-and-replication-v12-1-major-new-features/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/50k-wordpress-sites-exposed-to-rce-attacks-by-critical-bug-in-backup-plugin/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/50k-wordpress-sites-exposed-to-rce-attacks-by-critical-bug-in-backup-plugin/https://jorgedelacruz.uk/2023/12/06/veeam-whats-new-in-veeam-backup-and-replication-v12-1-major-new-features/" rel="noopener noreferrer" target="_blank">https://jorgedelacruz.uk/2023/12/06/veeam-whats-new-in-veeam-backup-and-replication-v12-1-major-new-features/</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">e50d1b82-a52b-46b0-9398-7a87388c81dd</guid><itunes:image href="https://artwork.captivate.fm/2a9db9b9-d6d9-4a11-b49f-e7547cb3b60a/zUZe8-5K1JNdO7G8nvsFkdre.jpg"/><pubDate>Mon, 15 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/e50d1b82-a52b-46b0-9398-7a87388c81dd.mp3" length="27464700" type="audio/mpeg"/><itunes:duration>38:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c21bbab4-9e8e-4f41-95ef-a510d75bf0fd/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c21bbab4-9e8e-4f41-95ef-a510d75bf0fd/index.html" type="text/html"/></item><item><title>Backup Fails at Archive: Billion-Dollar eDiscovery Disasters</title><itunes:title>Backup Fails at Archive: Billion-Dollar eDiscovery Disasters</itunes:title><description><![CDATA[<p>In this episode, Curtis and Prasanna do a deep dive on the differences between data backup and data archiving. They thoroughly explain that while backup focuses on restoring systems and files to a prior point in time, archiving is all about being able to search and retrieve specific information for legal or regulatory purposes.</p><p>Key reasons you'll want to tune in:</p><ul><li>Learn exactly why companies archive data and how regulatory compliance and legal eDiscovery requests require specialized archive capabilities.</li><li>Understand the dangers of using your backup system as an archive for eDiscovery - lacking full search and exposing too much irrelevant data risks your legal case.</li><li>Hear multiple real-world horror stories of companies failing legal cases due to lacking proper archives - to the tune of billions of dollars lost.</li><li>Get clear examples of how continuous, comprehensive archiving captures all versions of files, emails, and data - including deleted and intermediate items.</li><li>Get a life-line for those of you who are still using your backup system as an archive</li></ul><br/><p>If you need to implement archiving or fix broken archive approaches that risk legal noncompliance, this episode delivers an excellent primer on how archive differs from backup and what genuine archive systems can do.</p><p>https://support.google.com/drive/thread/245861992?sjid=15540859157109248518-NC</p><p>https://support.google.com/drive/answer/14286582?sjid=8199341837463411967-NA</p><p><a href="https://blog.23andme.com/articles/addressing-data-security-concerns?utm_medium=search_brand&amp;utm_source=google&amp;gad_source=1&amp;gclid=EAIaIQobChMIjKfGxPb9ggMV-BitBh15SgW3EAAYASAAEgIBWvD_BwE&amp;gclsrc=aw.dshttps://blog.23andme.com/articles/addressing-data-security-concerns?utm_medium=search_brand&amp;utm_source=google&amp;gad_source=1&amp;gclid=EAIaIQobChMIjKfGxPb9ggMV-BitBh15SgW3EAAYASAAEgIBWvD_BwE&amp;gclsrc=aw.ds" rel="noopener noreferrer" target="_blank">https://blog.23andme.com/articles/addressing-data-security-concerns</a></p><p>https://www.backupwrapup.com/what-is-archive-and-retrieve-backup-to-basics/</p><p>https://www.sullivanstrickler.com</p>]]></description><content:encoded><![CDATA[<p>In this episode, Curtis and Prasanna do a deep dive on the differences between data backup and data archiving. They thoroughly explain that while backup focuses on restoring systems and files to a prior point in time, archiving is all about being able to search and retrieve specific information for legal or regulatory purposes.</p><p>Key reasons you'll want to tune in:</p><ul><li>Learn exactly why companies archive data and how regulatory compliance and legal eDiscovery requests require specialized archive capabilities.</li><li>Understand the dangers of using your backup system as an archive for eDiscovery - lacking full search and exposing too much irrelevant data risks your legal case.</li><li>Hear multiple real-world horror stories of companies failing legal cases due to lacking proper archives - to the tune of billions of dollars lost.</li><li>Get clear examples of how continuous, comprehensive archiving captures all versions of files, emails, and data - including deleted and intermediate items.</li><li>Get a life-line for those of you who are still using your backup system as an archive</li></ul><br/><p>If you need to implement archiving or fix broken archive approaches that risk legal noncompliance, this episode delivers an excellent primer on how archive differs from backup and what genuine archive systems can do.</p><p>https://support.google.com/drive/thread/245861992?sjid=15540859157109248518-NC</p><p>https://support.google.com/drive/answer/14286582?sjid=8199341837463411967-NA</p><p><a href="https://blog.23andme.com/articles/addressing-data-security-concerns?utm_medium=search_brand&amp;utm_source=google&amp;gad_source=1&amp;gclid=EAIaIQobChMIjKfGxPb9ggMV-BitBh15SgW3EAAYASAAEgIBWvD_BwE&amp;gclsrc=aw.dshttps://blog.23andme.com/articles/addressing-data-security-concerns?utm_medium=search_brand&amp;utm_source=google&amp;gad_source=1&amp;gclid=EAIaIQobChMIjKfGxPb9ggMV-BitBh15SgW3EAAYASAAEgIBWvD_BwE&amp;gclsrc=aw.ds" rel="noopener noreferrer" target="_blank">https://blog.23andme.com/articles/addressing-data-security-concerns</a></p><p>https://www.backupwrapup.com/what-is-archive-and-retrieve-backup-to-basics/</p><p>https://www.sullivanstrickler.com</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">1c8479d6-bdbb-4d83-bd7a-2e0e0bcaabea</guid><itunes:image href="https://artwork.captivate.fm/ca3776b4-88b9-4e94-a6ba-29e55d3ec953/0tehwT521Wj0TybXqjhHJP5_.jpg"/><pubDate>Mon, 08 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1c8479d6-bdbb-4d83-bd7a-2e0e0bcaabea.mp3" length="38485348" type="audio/mpeg"/><itunes:duration>53:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c037d7ef-8bca-4fad-9c31-c72f978b0555/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c037d7ef-8bca-4fad-9c31-c72f978b0555/index.html" type="text/html"/></item><item><title>Backup to Basics: Traditional Data Sources</title><itunes:title>Backup to Basics: Traditional Data Sources</itunes:title><description><![CDATA[<p>We’re going back to basics in 2024! Our hosts revisit their smash hit episode from last year all about protecting those traditional data sources like physical servers, VMs, laptops, desktops, and mobile devices. From on-prem to mobile, should it all get backed up? How and why? Tune in as Curtis and Prasanna rehash their spirited debate over backup best practices across your infrastructure and walk through real-world examples of what can go wrong. It’s chock full of fundamental wisdom for data protection pros getting started and veterans alike. Whether you’re making big cloud migrations or maintaining legacy systems, don’t miss this special re-release dedicated to the building blocks of backup as we start the year on a backup to basics kick.</p>]]></description><content:encoded><![CDATA[<p>We’re going back to basics in 2024! Our hosts revisit their smash hit episode from last year all about protecting those traditional data sources like physical servers, VMs, laptops, desktops, and mobile devices. From on-prem to mobile, should it all get backed up? How and why? Tune in as Curtis and Prasanna rehash their spirited debate over backup best practices across your infrastructure and walk through real-world examples of what can go wrong. It’s chock full of fundamental wisdom for data protection pros getting started and veterans alike. Whether you’re making big cloud migrations or maintaining legacy systems, don’t miss this special re-release dedicated to the building blocks of backup as we start the year on a backup to basics kick.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">89e0dd00-bdc7-485d-b373-c15a992d9142</guid><itunes:image href="https://artwork.captivate.fm/5676e0a3-d86d-4bdb-b309-dcd3cc910c1d/8KsFLa3HJt5H9jOBmUO45oDS.jpg"/><pubDate>Mon, 01 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/89e0dd00-bdc7-485d-b373-c15a992d9142.mp3" length="36739645" type="audio/mpeg"/><itunes:duration>51:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0e7fc204-19ea-4c1f-96ed-f9abfdf0daac/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0e7fc204-19ea-4c1f-96ed-f9abfdf0daac/index.html" type="text/html"/></item><item><title>Get Ready Before You Get Got: Ransomware Response Planning</title><itunes:title>Get Ready Before You Get Got: Ransomware Response Planning</itunes:title><description><![CDATA[<p>This timely episode features an in-depth discussion between cybersecurity expert Melissa Palmer (@vmiss) and hosts W. Curtis Preston and Prasanna Malaiyandi on the crucial role preparation and planning play in effectively responding to and recovering from the inevitable ransomware attack.</p><p>They stress that flying by the seat of your pants without an incident response plan when ransomware hits leads to chaotic, inefficient efforts and substantially higher costs. Melissa outlines pragmatic steps organizations should take before an attack to develop and test response playbooks, have partnerships in place with response firms, coordinate across internal teams, bolster detection capabilities, and harden backup/recovery mechanisms.  </p><p>Curtis and Prasanna dive into real-world ransomware response scenarios to highlight the complexity organizations face in assessing the scope of damage from attacks and recalibrating restoration priorities. Melissa offers tips on creating robust processes to rebuild compromised environments quickly. They discuss table-top exercises as cost-efficient ways to uncover plan gaps and get stakeholders aligned on roles and timeline expectations.</p><p>With Melissa's depth of experience assisting ransomware victims, she provides unique insights into preparation best practices often neglected until the worst happens. For IT/security leaders looking to build organizational resilience against ransomware threats, this engaging episode delivers actionable advice on architecting defense-in-depth capabilities tailored to your business requirements.</p><p>Join us for a great episode!</p>]]></description><content:encoded><![CDATA[<p>This timely episode features an in-depth discussion between cybersecurity expert Melissa Palmer (@vmiss) and hosts W. Curtis Preston and Prasanna Malaiyandi on the crucial role preparation and planning play in effectively responding to and recovering from the inevitable ransomware attack.</p><p>They stress that flying by the seat of your pants without an incident response plan when ransomware hits leads to chaotic, inefficient efforts and substantially higher costs. Melissa outlines pragmatic steps organizations should take before an attack to develop and test response playbooks, have partnerships in place with response firms, coordinate across internal teams, bolster detection capabilities, and harden backup/recovery mechanisms.  </p><p>Curtis and Prasanna dive into real-world ransomware response scenarios to highlight the complexity organizations face in assessing the scope of damage from attacks and recalibrating restoration priorities. Melissa offers tips on creating robust processes to rebuild compromised environments quickly. They discuss table-top exercises as cost-efficient ways to uncover plan gaps and get stakeholders aligned on roles and timeline expectations.</p><p>With Melissa's depth of experience assisting ransomware victims, she provides unique insights into preparation best practices often neglected until the worst happens. For IT/security leaders looking to build organizational resilience against ransomware threats, this engaging episode delivers actionable advice on architecting defense-in-depth capabilities tailored to your business requirements.</p><p>Join us for a great episode!</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">1425e806-c0e3-437c-9a0b-9995c8d14159</guid><itunes:image href="https://artwork.captivate.fm/3eed0e12-8cb8-4c19-a693-2a5c1578fe17/G10Hqt37J2VtC5zWlqjgDyV2.jpg"/><pubDate>Mon, 25 Dec 2023 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1425e806-c0e3-437c-9a0b-9995c8d14159.mp3" length="35466650" type="audio/mpeg"/><itunes:duration>49:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/729d1287-d2cd-4756-b4b6-5d7b90029778/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/729d1287-d2cd-4756-b4b6-5d7b90029778/index.html" type="text/html"/></item><item><title>To Change or Not to Change Your Backup System</title><itunes:title>To Change or Not to Change Your Backup System</itunes:title><description><![CDATA[<p>Changing your organization's backup system is no easy task - it requires careful evaluation of requirements, risks, and capabilities. Many admins get stuck with backup environments they've outgrown or that lag on modern demands.</p><p>On this episode, backup guru W. Curtis Preston and his cohost Prasanna Malaiyandi lend their expertise to help you determine if and when migrating your backup solution makes sense. You'll learn:</p><ul><li>Key indicators that your current system is no longer fitting your needs</li><li>How to clearly define backup requirements and alignment to recovery objectives</li><li>Ways to evaluate ease of use, security, and other qualitative factors</li><li>Guidance on integrating specialized systems only when necessary</li><li>The importance of prioritizing immutable storage and rapid recovery</li><li>Change management best practices that curb instability</li></ul><br/><p>With ransomware threats growing, the bar for backup keeps rising. Tune in as our two hosts cover everything you need to make backup system change decisions that balance innovation, budget, and risk - avoiding needless switches while still meeting evolving data protection demands. You'll gain real-world clarity that turns unappreciated backup admins into cyber recovery heroes.</p>]]></description><content:encoded><![CDATA[<p>Changing your organization's backup system is no easy task - it requires careful evaluation of requirements, risks, and capabilities. Many admins get stuck with backup environments they've outgrown or that lag on modern demands.</p><p>On this episode, backup guru W. Curtis Preston and his cohost Prasanna Malaiyandi lend their expertise to help you determine if and when migrating your backup solution makes sense. You'll learn:</p><ul><li>Key indicators that your current system is no longer fitting your needs</li><li>How to clearly define backup requirements and alignment to recovery objectives</li><li>Ways to evaluate ease of use, security, and other qualitative factors</li><li>Guidance on integrating specialized systems only when necessary</li><li>The importance of prioritizing immutable storage and rapid recovery</li><li>Change management best practices that curb instability</li></ul><br/><p>With ransomware threats growing, the bar for backup keeps rising. Tune in as our two hosts cover everything you need to make backup system change decisions that balance innovation, budget, and risk - avoiding needless switches while still meeting evolving data protection demands. You'll gain real-world clarity that turns unappreciated backup admins into cyber recovery heroes.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">2570a063-c487-4e01-bbed-b1b4e7497234</guid><itunes:image href="https://artwork.captivate.fm/e843cb99-2ab4-4dad-bfbd-50c4bb365bf4/YHtoZZfRnbVfDlarWIlPfefc.jpg"/><pubDate>Mon, 18 Dec 2023 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/2570a063-c487-4e01-bbed-b1b4e7497234.mp3" length="33140084" type="audio/mpeg"/><itunes:duration>46:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/591ecd1b-b795-4865-bda4-f1caf2023a94/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/591ecd1b-b795-4865-bda4-f1caf2023a94/index.html" type="text/html"/></item><item><title>Why you should care about Copy Data Management</title><itunes:title>Why you should care about Copy Data Management</itunes:title><description><![CDATA[<p>After diving into the details of the recent Okta breach enabled by password manager vulnerabilities, Curtis and Prasanna tackle the growing issue of copy data sprawl. They define copy data management – the practice of tracking and governing all duplicated production data for backup, DR, development, analytics etc. What problems result from copy proliferation? How feasible is a single consolidated platform? What regulatory and cost implications exist? Tune in as our hosts break down best practices for cataloging, securing, reducing, and better leveraging your organization’s data copies. Specific topics covered include:</p><ul><li>Password manager risks exposed in Okta hack</li><li>Copy data management 101</li><li>Storage cost, compliance, security issues</li><li>Tools and solutions landscape</li><li>Backup reuse considerations and cautions</li><li>Cloud vs. data center copy management</li></ul><br/><p>Join Curtis and Prasanna for another engaging combination of news commentary, frameworks, debates, warnings, and recommendations – this week with a data protection slant. Whether you’re a backup admin or IT leader grappling with copy sprawl, this insightful episode has something for you!</p><p>Articles discussed in this week's episode:</p><p><a href="https://sec.okta.com/harfiles" rel="noopener noreferrer" target="_blank">https://sec.okta.com/harfiles</a></p><p><a href="https://arstechnica.com/information-technology/2023/11/no-okta-senior-management-not-an-errant-employee-caused-you-to-get-hacked/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2023/11/no-okta-senior-management-not-an-errant-employee-caused-you-to-get-hacked/</a></p><p><a href="https://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.htmlhttps://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.html" rel="noopener noreferrer" target="_blank">https://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.htmlhttps://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.html</a></p>]]></description><content:encoded><![CDATA[<p>After diving into the details of the recent Okta breach enabled by password manager vulnerabilities, Curtis and Prasanna tackle the growing issue of copy data sprawl. They define copy data management – the practice of tracking and governing all duplicated production data for backup, DR, development, analytics etc. What problems result from copy proliferation? How feasible is a single consolidated platform? What regulatory and cost implications exist? Tune in as our hosts break down best practices for cataloging, securing, reducing, and better leveraging your organization’s data copies. Specific topics covered include:</p><ul><li>Password manager risks exposed in Okta hack</li><li>Copy data management 101</li><li>Storage cost, compliance, security issues</li><li>Tools and solutions landscape</li><li>Backup reuse considerations and cautions</li><li>Cloud vs. data center copy management</li></ul><br/><p>Join Curtis and Prasanna for another engaging combination of news commentary, frameworks, debates, warnings, and recommendations – this week with a data protection slant. Whether you’re a backup admin or IT leader grappling with copy sprawl, this insightful episode has something for you!</p><p>Articles discussed in this week's episode:</p><p><a href="https://sec.okta.com/harfiles" rel="noopener noreferrer" target="_blank">https://sec.okta.com/harfiles</a></p><p><a href="https://arstechnica.com/information-technology/2023/11/no-okta-senior-management-not-an-errant-employee-caused-you-to-get-hacked/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2023/11/no-okta-senior-management-not-an-errant-employee-caused-you-to-get-hacked/</a></p><p><a href="https://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.htmlhttps://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.html" rel="noopener noreferrer" target="_blank">https://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.htmlhttps://finance.yahoo.com/news/druva-expands-multi-cloud-protection-140000597.html</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">cbb666e3-46b6-4788-81ec-4e4c3a955559</guid><itunes:image href="https://artwork.captivate.fm/6b70e4dd-efa7-4b24-adec-ddf26885decc/vEQue716-_vVsqr9flzRMYCl.jpg"/><pubDate>Mon, 11 Dec 2023 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/cbb666e3-46b6-4788-81ec-4e4c3a955559.mp3" length="30158347" type="audio/mpeg"/><itunes:duration>41:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/d0a7e0c1-1589-46ce-a465-9956802e0f83/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d0a7e0c1-1589-46ce-a465-9956802e0f83/index.html" type="text/html"/></item><item><title>Snap, Replicate, &amp; Protect: Leveraging Near CDP</title><itunes:title>Snap, Replicate, &amp; Protect: Leveraging Near CDP</itunes:title><description><![CDATA[<p>Tired of backup windows and 24-hour recovery point objectives? Then it's time to learn about how snapshots and replication work together to create near-continuous data protection, or near-CDP.</p><p>In this episode, backup experts W. Curtis Preston and Prasanna Malaiyandi dive into leveraging snapshots for instant point-in-time recovery and replication for an offsite copy. By combining these technologies, you can achieve recovery point objectives measured in minutes rather than hours or days.</p><p>Listen in to understand what near CDP is, how it differs from backup and true CDP, and the key capabilities it enables. Discover when to take crash-consistent vs application-consistent snapshots. Learn how near CDP integrates with backup software and how you can use replicated snapshots for automated recovery testing.</p><p>If you need tighter RPOs and near-instant RTOs for your mission-critical systems, you can’t afford to miss this explanation of how snap and replicate delivers a high-frequency, budget-friendly data protection option. Tune in to become a hero by enabling your organization to recover quickly from data corruption, ransomware, and other threats!</p>]]></description><content:encoded><![CDATA[<p>Tired of backup windows and 24-hour recovery point objectives? Then it's time to learn about how snapshots and replication work together to create near-continuous data protection, or near-CDP.</p><p>In this episode, backup experts W. Curtis Preston and Prasanna Malaiyandi dive into leveraging snapshots for instant point-in-time recovery and replication for an offsite copy. By combining these technologies, you can achieve recovery point objectives measured in minutes rather than hours or days.</p><p>Listen in to understand what near CDP is, how it differs from backup and true CDP, and the key capabilities it enables. Discover when to take crash-consistent vs application-consistent snapshots. Learn how near CDP integrates with backup software and how you can use replicated snapshots for automated recovery testing.</p><p>If you need tighter RPOs and near-instant RTOs for your mission-critical systems, you can’t afford to miss this explanation of how snap and replicate delivers a high-frequency, budget-friendly data protection option. Tune in to become a hero by enabling your organization to recover quickly from data corruption, ransomware, and other threats!</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">96e8a834-4e8e-4889-9588-6d19d16d9aa3</guid><itunes:image href="https://artwork.captivate.fm/a09f1bce-2cad-442d-88e0-f141f111eb3c/DwOwK3ZISuG-ojWHHWD3YPYB.jpg"/><pubDate>Mon, 04 Dec 2023 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/96e8a834-4e8e-4889-9588-6d19d16d9aa3.mp3" length="29157754" type="audio/mpeg"/><itunes:duration>40:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/1c6e262d-f954-4bfd-87c5-80af82df7e02/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/1c6e262d-f954-4bfd-87c5-80af82df7e02/index.html" type="text/html"/></item><item><title>Reborn and Reimagined: Don&apos;t Write Off Tape Just Yet</title><itunes:title>Reborn and Reimagined: Don&apos;t Write Off Tape Just Yet</itunes:title><description><![CDATA[<p>Ransomware attacks and data breaches dominate the headlines, but is your data protection strategy truly secure? This must-listen episode dives deep on an unsung hero of cyber resilience - tape.</p><p>Tape may have been written off by some as a legacy technology, yet it offers unparalleled air gap protection that no hacker can penetrate. Top experts from Fujifilm and IBM (sponsors of this episode) reveal the major advances that make modern tape more scalable, reliable, and cost-effective than ever before.</p><p>Learn how the pioneering capabilities of the newest LTO-9 drives and 50TB tape cartridges can economically safeguard tens or hundreds of petabytes. Hear the shocking sustainability advantage, with tape generating 97% less CO2 emissions and using drastically less power than comparable disk solutions.</p><p>With powerful integrated encryption, quantum-safe algorithms on the horizon, and clever optimizations to tame growing data volumes, tape has been reborn as the undisputed information lifeline every organization needs. Don't let your backups remain exposed - get the insider intel on fortifying your last line of defense with tried and tested tape.</p><p>Stories referenced in the episode:</p><p><a href="https://blocksandfiles.com/2023/11/03/backblaze-shard-stash-cache/" rel="noopener noreferrer" target="_blank">https://blocksandfiles.com/2023/11/03/backblaze-shard-stash-cache/</a></p><p><a href="https://blocksandfiles.com/2023/11/06/cohesity-smartfiles-becomes-snowflake-analytics-playground/" rel="noopener noreferrer" target="_blank">https://blocksandfiles.com/2023/11/06/cohesity-smartfiles-becomes-snowflake-analytics-playground/</a></p>]]></description><content:encoded><![CDATA[<p>Ransomware attacks and data breaches dominate the headlines, but is your data protection strategy truly secure? This must-listen episode dives deep on an unsung hero of cyber resilience - tape.</p><p>Tape may have been written off by some as a legacy technology, yet it offers unparalleled air gap protection that no hacker can penetrate. Top experts from Fujifilm and IBM (sponsors of this episode) reveal the major advances that make modern tape more scalable, reliable, and cost-effective than ever before.</p><p>Learn how the pioneering capabilities of the newest LTO-9 drives and 50TB tape cartridges can economically safeguard tens or hundreds of petabytes. Hear the shocking sustainability advantage, with tape generating 97% less CO2 emissions and using drastically less power than comparable disk solutions.</p><p>With powerful integrated encryption, quantum-safe algorithms on the horizon, and clever optimizations to tame growing data volumes, tape has been reborn as the undisputed information lifeline every organization needs. Don't let your backups remain exposed - get the insider intel on fortifying your last line of defense with tried and tested tape.</p><p>Stories referenced in the episode:</p><p><a href="https://blocksandfiles.com/2023/11/03/backblaze-shard-stash-cache/" rel="noopener noreferrer" target="_blank">https://blocksandfiles.com/2023/11/03/backblaze-shard-stash-cache/</a></p><p><a href="https://blocksandfiles.com/2023/11/06/cohesity-smartfiles-becomes-snowflake-analytics-playground/" rel="noopener noreferrer" target="_blank">https://blocksandfiles.com/2023/11/06/cohesity-smartfiles-becomes-snowflake-analytics-playground/</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">9141b908-a1fb-4651-917e-3c3ac774bf9d</guid><itunes:image href="https://artwork.captivate.fm/0569507e-821c-4a16-9bd9-7ad1e9f5f077/fKikpPAqDE05B-FzjENy4qtl.jpg"/><pubDate>Mon, 27 Nov 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/38e15767-835e-4d6d-a91c-513d61d8b63e/Tape-for-air-gap.mp3" length="36835254" type="audio/mpeg"/><itunes:duration>51:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/35c74f7d-d2b1-45c6-914d-be08bb01ba2a/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/35c74f7d-d2b1-45c6-914d-be08bb01ba2a/index.html" type="text/html"/></item><item><title>Virtually Air Gapped: Assessing Cloud Data Protection</title><itunes:title>Virtually Air Gapped: Assessing Cloud Data Protection</itunes:title><description><![CDATA[<p>What does "air gap" really mean when it comes to backups? Curtis takes us back to the early days of offsite tape backups with Iron Mountain to explore the principles behind physical air gaps. We learn about barcode tracking, unmarked vans, and multi-factor delete authorization. How do modern "virtual air gaps" in the cloud compare? Are backup vendors misusing important security terms? Join us as we separate marketing hype from real backup protection and learn timeless lessons around alerting, access controls, and immutable data. After this episode, you'll know how to assess if your backups are following air gap principles - no matter what technology you use.</p>]]></description><content:encoded><![CDATA[<p>What does "air gap" really mean when it comes to backups? Curtis takes us back to the early days of offsite tape backups with Iron Mountain to explore the principles behind physical air gaps. We learn about barcode tracking, unmarked vans, and multi-factor delete authorization. How do modern "virtual air gaps" in the cloud compare? Are backup vendors misusing important security terms? Join us as we separate marketing hype from real backup protection and learn timeless lessons around alerting, access controls, and immutable data. After this episode, you'll know how to assess if your backups are following air gap principles - no matter what technology you use.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">005c481d-e9b7-4b61-9883-2a388c23e5be</guid><itunes:image href="https://artwork.captivate.fm/ede36093-c08e-41d8-82da-e0030af0395d/zw7n9Ykep8LiB9pv-XxLpUaQ.jpg"/><pubDate>Mon, 20 Nov 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/28f0d233-f166-40f2-95dd-f27becb2304c/Airgap.mp3" length="36327739" type="audio/mpeg"/><itunes:duration>50:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/255fd0ef-6336-4b8e-b84e-649ad7981a7f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/255fd0ef-6336-4b8e-b84e-649ad7981a7f/index.html" type="text/html"/></item><item><title>Snapshots vs. Backups: Understanding the Difference</title><itunes:title>Snapshots vs. Backups: Understanding the Difference</itunes:title><description><![CDATA[<p>In this episode of The Backup Wrap-Up, host W. Curtis Preston discusses the importance of understanding the difference between snapshots and backups. He emphasizes that storage snapshots should not be considered as true backups. The episode also covers the recent 1Password and Okta hack, highlighting the frustration of such incidents, especially for those who advocate for password managers and cloud technologies. Tune in to learn more about the risks and implications of relying solely on snapshots and the importance of proper backup strategies.</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Backup Wrap-Up, host W. Curtis Preston discusses the importance of understanding the difference between snapshots and backups. He emphasizes that storage snapshots should not be considered as true backups. The episode also covers the recent 1Password and Okta hack, highlighting the frustration of such incidents, especially for those who advocate for password managers and cloud technologies. Tune in to learn more about the risks and implications of relying solely on snapshots and the importance of proper backup strategies.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">cba833a8-2de9-40af-a94d-865a7ae50140</guid><itunes:image href="https://artwork.captivate.fm/7accc05a-5431-4035-911d-fc4b7d217c7b/H0AxDa-nUm950_F_RVgIb5jT.jpg"/><pubDate>Mon, 13 Nov 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/693d89fe-d9e1-44e9-987f-5c0df5090b3e/Snapshots.mp3" length="35379808" type="audio/mpeg"/><itunes:duration>49:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0fe4e34f-aebe-40af-8ee5-7f3da479801c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0fe4e34f-aebe-40af-8ee5-7f3da479801c/index.html" type="text/html"/></item><item><title>CDP: The Next Great Thing in DR?</title><itunes:title>CDP: The Next Great Thing in DR?</itunes:title><description><![CDATA[<p>In this episode of the Backup Wrap-Up, W. Curtis Preston and Prasanna Malaiyandi discuss Continuous Data Protection (CDP) and its potential as the next great thing in disaster recovery. They explore the concept of meeting an RTO and RPO of zero and question why CDP isn't used for all backups in DR.  Tune in to learn more about CDP and its role in backup and disaster recovery.</p><p>Article mentioned in the story:</p><p><a href="https://www.theregister.com/2023/10/10/ransomware_attacks_register_record_speeds" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2023/10/10/ransomware_attacks_register_record_speeds</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Backup Wrap-Up, W. Curtis Preston and Prasanna Malaiyandi discuss Continuous Data Protection (CDP) and its potential as the next great thing in disaster recovery. They explore the concept of meeting an RTO and RPO of zero and question why CDP isn't used for all backups in DR.  Tune in to learn more about CDP and its role in backup and disaster recovery.</p><p>Article mentioned in the story:</p><p><a href="https://www.theregister.com/2023/10/10/ransomware_attacks_register_record_speeds" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2023/10/10/ransomware_attacks_register_record_speeds</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">bd005744-ffa8-468b-b662-f79271d7cfc6</guid><itunes:image href="https://artwork.captivate.fm/6717f9f9-3a86-4bb5-8785-c8149d82ca1f/NzlscKy05xuDECfoUzJV0seY.png"/><pubDate>Mon, 06 Nov 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e9127044-6875-4beb-a344-f69655908c70/CDP.mp3" length="31220377" type="audio/mpeg"/><itunes:duration>43:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/752403fe-2bdf-4eb9-bb44-38174d244f13/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/752403fe-2bdf-4eb9-bb44-38174d244f13/index.html" type="text/html"/></item><item><title>The Role of Replication in Modern Data Protection systems</title><itunes:title>The Role of Replication in Modern Data Protection systems</itunes:title><description><![CDATA[<p>In this episode, W. Curtis Preston, aka Mr. Backup, and Prasanna Malaiyandi discuss the fundamental technology of replication in data protection systems. They explore what replication is, how it differs from other methods, and why it's not used for everything. They also delve into the differences between synchronous and asynchronous replication and why it matters. The hosts also share news of a backup company called Alcion, which recently raised funding with support from Veeam, a backup company investing in Alcion's focus on Microsoft 365 backups for SMB customers. They also discuss a report from ESG about how cloud backup has evolved. The episode provides insights into the world of data protection and highlights the importance of replication in safeguarding valuable data.</p><p>Articles discussed in this episode:</p><p><a href="https://www.techtarget.com/searchdatabackup/news/366552363/Veeam-leads-funding-round-for-SaaS-backup-provider-Alcion" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchdatabackup/news/366552363/Veeam-leads-funding-round-for-SaaS-backup-provider-Alcion</a></p><p><a href="https://www.techtarget.com/searchdatabackup/feature/Cloud-backup-and-disaster-recovery-evolve-toward-maturity" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchdatabackup/feature/Cloud-backup-and-disaster-recovery-evolve-toward-maturity</a></p>]]></description><content:encoded><![CDATA[<p>In this episode, W. Curtis Preston, aka Mr. Backup, and Prasanna Malaiyandi discuss the fundamental technology of replication in data protection systems. They explore what replication is, how it differs from other methods, and why it's not used for everything. They also delve into the differences between synchronous and asynchronous replication and why it matters. The hosts also share news of a backup company called Alcion, which recently raised funding with support from Veeam, a backup company investing in Alcion's focus on Microsoft 365 backups for SMB customers. They also discuss a report from ESG about how cloud backup has evolved. The episode provides insights into the world of data protection and highlights the importance of replication in safeguarding valuable data.</p><p>Articles discussed in this episode:</p><p><a href="https://www.techtarget.com/searchdatabackup/news/366552363/Veeam-leads-funding-round-for-SaaS-backup-provider-Alcion" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchdatabackup/news/366552363/Veeam-leads-funding-round-for-SaaS-backup-provider-Alcion</a></p><p><a href="https://www.techtarget.com/searchdatabackup/feature/Cloud-backup-and-disaster-recovery-evolve-toward-maturity" rel="noopener noreferrer" target="_blank">https://www.techtarget.com/searchdatabackup/feature/Cloud-backup-and-disaster-recovery-evolve-toward-maturity</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">d09c016a-0e2b-4bb9-8022-36cf0eff700e</guid><itunes:image href="https://artwork.captivate.fm/925894d0-f84f-4edd-b11d-0302c0370b00/mN5ka0DTjFg7kFG_c2q3VABX.png"/><pubDate>Mon, 30 Oct 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c3b62025-ceb2-4c7e-8f36-0cb186a9ffff/Instant-Recovery.mp3" length="32463923" type="audio/mpeg"/><itunes:duration>45:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2e444126-0bff-41f5-9abe-2cfcb42e98e3/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2e444126-0bff-41f5-9abe-2cfcb42e98e3/index.html" type="text/html"/></item><item><title>Is it a backup or just a copy?</title><itunes:title>Is it a backup or just a copy?</itunes:title><description><![CDATA[<p>In this episode of the Backup Wrap-Up, host W. Curtis Preston discusses the importance of distinguishing between a copy and a backup to ensure the protection of valuable data. He also explores key backup concepts such as multiplexing, incremental backups, block-level incremental backups, and source-side deduplication. The episode kicks off with a discussion on the recent MGM hack, highlighting the significant impact it had on the hotel chain and the potential for personal information leaks. Tune in to learn how to safeguard your data effectively and become a backup hero.</p><p>Articles mentioned in the episode:</p><p><a href="https://www.reddit.com/r/vegas/comments/16hxwj0/explain_like_i_am_5_mgm_hacking/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/vegas/comments/16hxwj0/explain_like_i_am_5_mgm_hacking/</a></p><p><a href="https://www.reversinglabs.com/blog/what-we-know-about-blackcat-and-the-mgm-hack" rel="noopener noreferrer" target="_blank">https://www.reversinglabs.com/blog/what-we-know-about-blackcat-and-the-mgm-hack</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Backup Wrap-Up, host W. Curtis Preston discusses the importance of distinguishing between a copy and a backup to ensure the protection of valuable data. He also explores key backup concepts such as multiplexing, incremental backups, block-level incremental backups, and source-side deduplication. The episode kicks off with a discussion on the recent MGM hack, highlighting the significant impact it had on the hotel chain and the potential for personal information leaks. Tune in to learn how to safeguard your data effectively and become a backup hero.</p><p>Articles mentioned in the episode:</p><p><a href="https://www.reddit.com/r/vegas/comments/16hxwj0/explain_like_i_am_5_mgm_hacking/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/vegas/comments/16hxwj0/explain_like_i_am_5_mgm_hacking/</a></p><p><a href="https://www.reversinglabs.com/blog/what-we-know-about-blackcat-and-the-mgm-hack" rel="noopener noreferrer" target="_blank">https://www.reversinglabs.com/blog/what-we-know-about-blackcat-and-the-mgm-hack</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">7b825fbd-66db-4fab-b822-32f678610236</guid><itunes:image href="https://artwork.captivate.fm/df87ec6f-76e5-4af4-8c18-e16d153f0da6/t0Gyd442WQ6uXRpYK58YA68_.png"/><pubDate>Mon, 23 Oct 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/bf346648-c280-4081-b0b0-395e1a8afe01/Tradition-backup-sources.mp3" length="33746961" type="audio/mpeg"/><itunes:duration>46:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/58fa1971-cf97-418a-a139-6d8c94626daf/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/58fa1971-cf97-418a-a139-6d8c94626daf/index.html" type="text/html"/></item><item><title>The importance of backing up cloud resources</title><itunes:title>The importance of backing up cloud resources</itunes:title><description><![CDATA[<p>In this episode of the Backup Wrap-up, we continue our Backup to Basics series by discussing the importance of protecting cloud infrastructure, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). We then dive into the differences between these various cloud services and highlight the need to back up various components of each. We also discuss a recent incident where a Danish hosting company lost a significant amount of customer data due to a ransomware attack, emphasizing the ongoing threat of ransomware and the vulnerability of service providers. Tune in to learn more about safeguarding your data in the cloud.</p><p>Links to articles mentioned in the post:</p><p><a href="https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/</a></p><p><a href="https://www.pcmag.com/how-to/how-to-back-up-restore-your-documents-in-windows-10" rel="noopener noreferrer" target="_blank">https://www.pcmag.com/how-to/how-to-back-up-restore-your-documents-in-windows-10</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Backup Wrap-up, we continue our Backup to Basics series by discussing the importance of protecting cloud infrastructure, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). We then dive into the differences between these various cloud services and highlight the need to back up various components of each. We also discuss a recent incident where a Danish hosting company lost a significant amount of customer data due to a ransomware attack, emphasizing the ongoing threat of ransomware and the vulnerability of service providers. Tune in to learn more about safeguarding your data in the cloud.</p><p>Links to articles mentioned in the post:</p><p><a href="https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/</a></p><p><a href="https://www.pcmag.com/how-to/how-to-back-up-restore-your-documents-in-windows-10" rel="noopener noreferrer" target="_blank">https://www.pcmag.com/how-to/how-to-back-up-restore-your-documents-in-windows-10</a></p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">42e52e26-e94a-4378-b167-14a899dcc753</guid><itunes:image href="https://artwork.captivate.fm/56ae55b7-05d4-47e6-bd84-0f0a3397e5cf/sApxMKuY_EeVUhCysPPz2mM6.png"/><pubDate>Mon, 16 Oct 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/8a9d7c29-4d51-42af-9092-e2c5c4ce939a/8-29-Cloud-sources.mp3" length="26048774" type="audio/mpeg"/><itunes:duration>36:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0ac609ac-3612-40ed-8b54-5b08cdb26f4d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0ac609ac-3612-40ed-8b54-5b08cdb26f4d/index.html" type="text/html"/></item><item><title>The Importance of Backing Up IOT Devices</title><itunes:title>The Importance of Backing Up IOT Devices</itunes:title><description><![CDATA[<p>In this episode of the Backup Wrap-Up, host W. Curtis Preston and co-host Prasanna Malaiyandi explore the topic of data protection in the Internet of Things (IoT) era. With the increasing number of IoT devices in our homes and organizations, it is crucial to understand how to back up and secure the data generated by these devices. They discuss the importance of knowing which devices create important data and where that data is being stored. </p><p>They also discuss IBM's release of a 150 terabyte tape, which showcases advancements in data storage capacity, and a TechTarget ESG survey about the use of the cloud in data protection.</p><p>Tune in to this informative episode for insights on safeguarding your IoT data.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Backup Wrap-Up, host W. Curtis Preston and co-host Prasanna Malaiyandi explore the topic of data protection in the Internet of Things (IoT) era. With the increasing number of IoT devices in our homes and organizations, it is crucial to understand how to back up and secure the data generated by these devices. They discuss the importance of knowing which devices create important data and where that data is being stored. </p><p>They also discuss IBM's release of a 150 terabyte tape, which showcases advancements in data storage capacity, and a TechTarget ESG survey about the use of the cloud in data protection.</p><p>Tune in to this informative episode for insights on safeguarding your IoT data.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">6c7d2bc1-bf8b-468f-9505-5417f613c674</guid><itunes:image href="https://artwork.captivate.fm/f66b603d-573b-45d0-a24e-5d2a265234df/OfKk3uKVjrtUoyVx3mDpAbls.png"/><pubDate>Mon, 09 Oct 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/eac137c1-e370-4b97-81be-7eeb91883c57/B2B-IOT-09-14.mp3" length="27263150" type="audio/mpeg"/><itunes:duration>37:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/b21c0a3f-86a0-4a1a-a19b-5c82259a174f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b21c0a3f-86a0-4a1a-a19b-5c82259a174f/index.html" type="text/html"/></item><item><title>Hybrid Cloud Storage: Back it up or not?</title><itunes:title>Hybrid Cloud Storage: Back it up or not?</itunes:title><description><![CDATA[<p>In this episode of the Backup Wrap-Up, host W. Curtis Preston, also known as Mr. Backup, and his co-host Prasanna Malaiyandi, discuss the importance (or not) of backing up data in hybrid cloud storage systems, with a possibly surprising answer. The episode begins with backup-related news, followed by a deep dive into a single area or lesson that can help protect against ransomware. The news segment includes a story about Toyota, where multiple manufacturing plants shut down during their production process. Tune in for the answer to the question about backing up hybrid storage systems, and to learn more about data backup and disaster recovery systems.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Backup Wrap-Up, host W. Curtis Preston, also known as Mr. Backup, and his co-host Prasanna Malaiyandi, discuss the importance (or not) of backing up data in hybrid cloud storage systems, with a possibly surprising answer. The episode begins with backup-related news, followed by a deep dive into a single area or lesson that can help protect against ransomware. The news segment includes a story about Toyota, where multiple manufacturing plants shut down during their production process. Tune in for the answer to the question about backing up hybrid storage systems, and to learn more about data backup and disaster recovery systems.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">05d0e744-ab58-4c1c-bbbe-842b44ea7630</guid><itunes:image href="https://artwork.captivate.fm/42d0b71c-56c5-45d1-8555-6ab7720a8300/8H1mbLrB1uuNJ06ws0aA-EEQ.png"/><pubDate>Mon, 02 Oct 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/7b5846c7-fec0-417b-9c89-04e73f0000d6/OG-B2B.mp3" length="19833918" type="audio/mpeg"/><itunes:duration>27:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/e7d4004e-8176-48b5-9cdf-008bb6ae3ddc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e7d4004e-8176-48b5-9cdf-008bb6ae3ddc/index.html" type="text/html"/></item><item><title>Restore it All is Changing Its Name</title><itunes:title>Restore it All is Changing Its Name</itunes:title><description><![CDATA[<p>This is a very short episode to explain our name change and a few other minor changes to the format.  The show you know and love is getting better!  (Prasanna and I aren't going anywhere.)</p>]]></description><content:encoded><![CDATA[<p>This is a very short episode to explain our name change and a few other minor changes to the format.  The show you know and love is getting better!  (Prasanna and I aren't going anywhere.)</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">e8b4f27e-a620-45b0-b7dd-424f6be85c64</guid><itunes:image href="https://artwork.captivate.fm/83e7a274-4fe2-41ba-b3ce-2bc4bb15492f/noG_eofkE2_w3NNKay46WxRQ.png"/><pubDate>Wed, 27 Sep 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c9f33644-ffe4-44b5-bcfb-18b5266b00f9/Name-change.mp3" length="1379040" type="audio/mpeg"/><itunes:duration>01:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>The Merging Worlds of Information Security and Data Protection</title><itunes:title>The Merging Worlds of Information Security and Data Protection</itunes:title><description><![CDATA[<p>In this episode of the Restore It All podcast, W. Curtis Preston, a.k.a. Mr. Backup, and Prasanna Malaiyandi are joined by Chris Groot and Stefan Voss from N-Able, a company specializing in backup, data protection and security systems. Nable focuses on serving the needs of managed service providers to deliver excellent service to small and medium-sized businesses. They discuss the importance of catering to the "Fortune 5 million," which includes businesses with 20 to 2000 employees, highlighting the significant role that small businesses play in our economy. Tune in to learn more about Nable's approach to the cloud data protection space and their goal of making backup admins indispensable.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Restore It All podcast, W. Curtis Preston, a.k.a. Mr. Backup, and Prasanna Malaiyandi are joined by Chris Groot and Stefan Voss from N-Able, a company specializing in backup, data protection and security systems. Nable focuses on serving the needs of managed service providers to deliver excellent service to small and medium-sized businesses. They discuss the importance of catering to the "Fortune 5 million," which includes businesses with 20 to 2000 employees, highlighting the significant role that small businesses play in our economy. Tune in to learn more about Nable's approach to the cloud data protection space and their goal of making backup admins indispensable.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">889ff25b-0672-4bc6-bb1e-ebe03d58d29d</guid><itunes:image href="https://artwork.captivate.fm/cbf5b485-555b-4a9c-a5db-cf572862e8eb/_ZyrS2Ph-mZq2SbfTbL_1jp2.png"/><pubDate>Mon, 25 Sep 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ff461cfa-3516-4151-91f0-c73a2dd1be9f/Nable.mp3" length="25576049" type="audio/mpeg"/><itunes:duration>35:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/3a94c4e4-0c06-4669-9145-5a9dbd5483da/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3a94c4e4-0c06-4669-9145-5a9dbd5483da/index.html" type="text/html"/></item><item><title>Why it&apos;s process, then people, then technology</title><itunes:title>Why it&apos;s process, then people, then technology</itunes:title><description><![CDATA[<p>In this episode of Backup Central's Restore It All podcast, the host welcomes cyber expert Rick Mishka to discuss the three aspects of IT: process, people, and technology. They explore the misconception that a new piece of gear or software is always the solution to every problem, particularly in preventing data exfiltration. Rick also shares insights into his short-form podcast, Cyber Pros, where he covers cybersecurity topics in just nine minutes. Tune in to gain valuable perspectives on backup, DR, and data protection.</p>]]></description><content:encoded><![CDATA[<p>In this episode of Backup Central's Restore It All podcast, the host welcomes cyber expert Rick Mishka to discuss the three aspects of IT: process, people, and technology. They explore the misconception that a new piece of gear or software is always the solution to every problem, particularly in preventing data exfiltration. Rick also shares insights into his short-form podcast, Cyber Pros, where he covers cybersecurity topics in just nine minutes. Tune in to gain valuable perspectives on backup, DR, and data protection.</p>]]></content:encoded><link><![CDATA[https://backupcentral.com/why-its-process-then-people-then-technology/]]></link><guid isPermaLink="false">bc1abc90-9829-420a-a953-394c3d5abba0</guid><itunes:image href="https://artwork.captivate.fm/02121e51-4e8d-4d00-b2c2-b9be949bb270/OVqsrZTkJNjBO3bqhI4AYdq1.jpg"/><pubDate>Mon, 18 Sep 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/3a5bbe40-b2e4-44c0-af48-8d9b52c0b9a4/Rick-Mischka.mp3" length="25563831" type="audio/mpeg"/><itunes:duration>35:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/e15fa2b5-5ef5-4a1c-8a13-9b56235d705d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e15fa2b5-5ef5-4a1c-8a13-9b56235d705d/index.html" type="text/html"/></item><item><title>The Unforeseen U-turn: Inside Microsoft 365&apos;s Backup Revolution</title><itunes:title>The Unforeseen U-turn: Inside Microsoft 365&apos;s Backup Revolution</itunes:title><description><![CDATA[<p>In this episode of Restore it All, our hosts Curtis and Prasanna delve deep into the recent significant developments in the world of data backups, with a special spotlight on Microsoft 365's about-face on native user backups. They dissect Microsoft's sudden realization of its potential revenue streams and the ramifications of its new direction.</p><p>The duo also discusses the intricacies of Microsoft's new backup APIs, sharing insights into the former approaches and the strategic changes aimed at enhancing backup efficiency. They traverse the landscapes of various vendors like AWS and Salesforce, drawing parallels and noting divergences in their backup strategies.</p><p>Tune in as Curtis and Prasanna ponder the pros and cons of entrusting your backup with the same vendor, emphasizing the importance of not putting all eggs in one basket. The episode beckons listeners to contemplate crucial questions concerning data storage, protection, and ransomware attacks, urging for a meticulous evaluation of Microsoft's new offerings.</p><p>As they navigate these shifts, the hosts can't help but say, "I told you so," emphasizing the dire need for backing up SaaS services. The conversation leaves listeners with pertinent questions and considerations, beckoning them to anticipate the forthcoming nuances in backup offerings from giants like Microsoft and Salesforce.</p><p>Join us for an episode packed with expert analysis, predictions, and a little bit of gloating, as the world of data backup takes a turn no one saw coming but was perhaps desperately needed.</p>]]></description><content:encoded><![CDATA[<p>In this episode of Restore it All, our hosts Curtis and Prasanna delve deep into the recent significant developments in the world of data backups, with a special spotlight on Microsoft 365's about-face on native user backups. They dissect Microsoft's sudden realization of its potential revenue streams and the ramifications of its new direction.</p><p>The duo also discusses the intricacies of Microsoft's new backup APIs, sharing insights into the former approaches and the strategic changes aimed at enhancing backup efficiency. They traverse the landscapes of various vendors like AWS and Salesforce, drawing parallels and noting divergences in their backup strategies.</p><p>Tune in as Curtis and Prasanna ponder the pros and cons of entrusting your backup with the same vendor, emphasizing the importance of not putting all eggs in one basket. The episode beckons listeners to contemplate crucial questions concerning data storage, protection, and ransomware attacks, urging for a meticulous evaluation of Microsoft's new offerings.</p><p>As they navigate these shifts, the hosts can't help but say, "I told you so," emphasizing the dire need for backing up SaaS services. The conversation leaves listeners with pertinent questions and considerations, beckoning them to anticipate the forthcoming nuances in backup offerings from giants like Microsoft and Salesforce.</p><p>Join us for an episode packed with expert analysis, predictions, and a little bit of gloating, as the world of data backup takes a turn no one saw coming but was perhaps desperately needed.</p>]]></content:encoded><link><![CDATA[https://backupcentral.com/the-unforeseen-u-turn-inside-microsoft-365s-backup-revolution/]]></link><guid isPermaLink="false">7eeebccb-05b3-4fc0-8a3b-02fc3f0bcef3</guid><itunes:image href="https://artwork.captivate.fm/cbee696f-2e14-4b91-9f0f-50d30139be68/ExS2YUBkCLG2mF3MH8RIVASF.jpg"/><pubDate>Mon, 11 Sep 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/3de44b68-f475-4662-814e-1b35c3348048/Told-you-so-part-2.mp3" length="24929689" type="audio/mpeg"/><itunes:duration>34:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/6d9f3339-49cd-4119-9070-94fcada5ed2f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/6d9f3339-49cd-4119-9070-94fcada5ed2f/index.html" type="text/html"/></item><item><title>Are password managers no longer an option?</title><itunes:title>Are password managers no longer an option?</itunes:title><description><![CDATA[<p>In this episode, we look at the latest Ransomware Trends Report from Veeam, which gives us a view into the sobering world of ransomware attacks and the critical lessons they teach us about cyber defense. Join W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi, as they break down the key insights from the report. We explore the ruthless tactics of ransomware operators, the eye-opening stats on recovery time, and the evolving strategies of cyber insurers. From the importance of robust password management and multi-factor authentication to the strategies for safeguarding your backup server, we lay out a battle plan to protect your digital fortress. Tune in to discover why ransomware isn't just a threat—it's a wake-up call for businesses everywhere to bolster their defenses and emerge stronger against the rising tide of cyber threats. Your data's future might just depend on it.</p>]]></description><content:encoded><![CDATA[<p>In this episode, we look at the latest Ransomware Trends Report from Veeam, which gives us a view into the sobering world of ransomware attacks and the critical lessons they teach us about cyber defense. Join W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi, as they break down the key insights from the report. We explore the ruthless tactics of ransomware operators, the eye-opening stats on recovery time, and the evolving strategies of cyber insurers. From the importance of robust password management and multi-factor authentication to the strategies for safeguarding your backup server, we lay out a battle plan to protect your digital fortress. Tune in to discover why ransomware isn't just a threat—it's a wake-up call for businesses everywhere to bolster their defenses and emerge stronger against the rising tide of cyber threats. Your data's future might just depend on it.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/i-told-password-managers-were-important/]]></link><guid isPermaLink="false">999b839a-ad4f-4405-9cdb-4b9e06986efc</guid><itunes:image href="https://artwork.captivate.fm/a8006f75-b465-4eab-bace-e10c4360e5b5/199NHUwlAlJ7dWvb73CWAAjW.jpg"/><pubDate>Mon, 28 Aug 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dd28a730-696c-4d24-9b78-a0f50bb8d314/OG.mp3" length="28528301" type="audio/mpeg"/><itunes:duration>39:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/162d055a-c8c1-49ab-8e8d-0a96706b6db4/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/162d055a-c8c1-49ab-8e8d-0a96706b6db4/index.html" type="text/html"/></item><item><title>Identity Orchestration: Simplifying Multi-Cloud Identity Management</title><itunes:title>Identity Orchestration: Simplifying Multi-Cloud Identity Management</itunes:title><description><![CDATA[<p>In this episode, W. Curtis Preston and Prasanna Malaiyandi are joined by Eric Olden, the CEO of Strata Identity. With over 25 years of experience in the cybersecurity industry, Eric sheds light on the concept of Identity Orchestration and how it addresses the complexities of modern identity management in multi-cloud environments. He discusses the evolution of technology consumption, the philosophy of "bought not sold," and the creation of a new product category in the world of identity management. Eric explains how Strata Identity's platform acts as an abstraction layer, allowing organizations to seamlessly integrate and switch between different identity providers without rewriting applications. He also shares insights on modernization, just-in-time provisioning, and the benefits of the open free IDQL standard. Don't miss this engaging discussion about identity orchestration and its role in simplifying the management of identities across diverse cloud ecosystems.</p>]]></description><content:encoded><![CDATA[<p>In this episode, W. Curtis Preston and Prasanna Malaiyandi are joined by Eric Olden, the CEO of Strata Identity. With over 25 years of experience in the cybersecurity industry, Eric sheds light on the concept of Identity Orchestration and how it addresses the complexities of modern identity management in multi-cloud environments. He discusses the evolution of technology consumption, the philosophy of "bought not sold," and the creation of a new product category in the world of identity management. Eric explains how Strata Identity's platform acts as an abstraction layer, allowing organizations to seamlessly integrate and switch between different identity providers without rewriting applications. He also shares insights on modernization, just-in-time provisioning, and the benefits of the open free IDQL standard. Don't miss this engaging discussion about identity orchestration and its role in simplifying the management of identities across diverse cloud ecosystems.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/identity-orchestration-simplifying-multi-cloud-identity-management/]]></link><guid isPermaLink="false">142539a6-a7df-400a-b9bf-f38243c654ab</guid><itunes:image href="https://artwork.captivate.fm/5cf6f355-474f-497f-8471-ef8ac0a03c09/16HDq9Se9t_YVxeeyGqQwIhK.jpg"/><pubDate>Mon, 21 Aug 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/57358fa0-88f7-4d1e-a481-e99ad1662ee9/Eric-Olden.mp3" length="35886689" type="audio/mpeg"/><itunes:duration>49:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/9cc603c8-b68f-4073-ba9b-e843e203935d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9cc603c8-b68f-4073-ba9b-e843e203935d/index.html" type="text/html"/></item><item><title>Red team leader shares how to think like a hacker</title><itunes:title>Red team leader shares how to think like a hacker</itunes:title><description><![CDATA[<p>Our guest this week is a specialist at offensive cybersecurity; that is, they keep you safe by attacking you and showing you your vulnerabilities. They're a red team.&nbsp; We've got the leader of their red team, Duanne Laflotte, to help us understand how hackers think – and what we can do to stop them.&nbsp; He confirmed some of the recommendations we often make (Ahem: password managers good), but showed us some defenses aren't that helpful. A particularly relevant part to our backup audience is what he told us about the vulnerabilities of our backup system.&nbsp; At least one of them Mr. Backup had never thought of.&nbsp; Duanne is fun and scary all at the same time.&nbsp; I know this will be one of our top episodes this year.</p>]]></description><content:encoded><![CDATA[<p>Our guest this week is a specialist at offensive cybersecurity; that is, they keep you safe by attacking you and showing you your vulnerabilities. They're a red team.&nbsp; We've got the leader of their red team, Duanne Laflotte, to help us understand how hackers think – and what we can do to stop them.&nbsp; He confirmed some of the recommendations we often make (Ahem: password managers good), but showed us some defenses aren't that helpful. A particularly relevant part to our backup audience is what he told us about the vulnerabilities of our backup system.&nbsp; At least one of them Mr. Backup had never thought of.&nbsp; Duanne is fun and scary all at the same time.&nbsp; I know this will be one of our top episodes this year.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/red-team-leader-shares-how-to-think-like-a-hacker/]]></link><guid isPermaLink="false">27a12bc7-87fd-4d20-8e32-38c1aa8e51c3</guid><itunes:image href="https://artwork.captivate.fm/736d5d65-3280-4881-80cc-88066e1867fc/umsrhRziZxw4Bhf_15w1FKeF.jpg"/><pubDate>Mon, 14 Aug 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/2b5a48d4-fe79-426a-8c98-362545a8c10f/Duanne2.mp3" length="46496998" type="audio/mpeg"/><itunes:duration>01:04:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/dd169a8c-0aa4-40bf-ac31-29a7f57f2068/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/dd169a8c-0aa4-40bf-ac31-29a7f57f2068/index.html" type="text/html"/></item><item><title>Blue team stories from the cyber attack trenches</title><itunes:title>Blue team stories from the cyber attack trenches</itunes:title><description><![CDATA[<p>Nothing tells the story like a good story, right?&nbsp; This week we have Mike Saylor, the CEO of Black Swan, a cybersecurity company.&nbsp; Boy, has he been in the trenches.&nbsp; He tells some great stories about responding to cyber attacks. They're great stories and he's a great storyteller.&nbsp; We also learn about FBI Infragard, a partnership between the FBI and the private sector.&nbsp; We hope you enjoy the episode.</p>]]></description><content:encoded><![CDATA[<p>Nothing tells the story like a good story, right?&nbsp; This week we have Mike Saylor, the CEO of Black Swan, a cybersecurity company.&nbsp; Boy, has he been in the trenches.&nbsp; He tells some great stories about responding to cyber attacks. They're great stories and he's a great storyteller.&nbsp; We also learn about FBI Infragard, a partnership between the FBI and the private sector.&nbsp; We hope you enjoy the episode.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/blue-team-stories-from-the-cyber-attack-trenches/]]></link><guid isPermaLink="false">85c98a0f-36d6-4a21-ad24-72aed41e5acc</guid><itunes:image href="https://artwork.captivate.fm/709793bc-2ea2-403a-9d5d-9d8a8cbc112a/y5nBOzkHGrNYxJx3otnzR1ta.jpg"/><pubDate>Mon, 07 Aug 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5042ce4c-8afb-443a-8db1-647543bda8ac/mike.mp3" length="41614484" type="audio/mpeg"/><itunes:duration>57:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/9f8e1b9b-f889-4dc1-b1a4-b2ad3f83367e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9f8e1b9b-f889-4dc1-b1a4-b2ad3f83367e/index.html" type="text/html"/></item><item><title>Should you disclose your cyber attack?</title><itunes:title>Should you disclose your cyber attack?</itunes:title><description><![CDATA[<p>This week the SEC has made a new rule that publicly traded companies must disclose any cyber attacks within four days.&nbsp; What if you're not a publicly traded company in the US?&nbsp; Should you reveal what happened to you?&nbsp; We bring in a wireless cyber security expert, Scott Schober of Berkeley Varitronics Systems, to talk about this topic.&nbsp; Closely related is also what should you do when you personally make a big mistake.&nbsp; Should you tell your boss?&nbsp; What if you're a boss and someone makes a mistake?&nbsp; How should you respond?&nbsp; We get into all of this and more in the week's exciting episode.</p>]]></description><content:encoded><![CDATA[<p>This week the SEC has made a new rule that publicly traded companies must disclose any cyber attacks within four days.&nbsp; What if you're not a publicly traded company in the US?&nbsp; Should you reveal what happened to you?&nbsp; We bring in a wireless cyber security expert, Scott Schober of Berkeley Varitronics Systems, to talk about this topic.&nbsp; Closely related is also what should you do when you personally make a big mistake.&nbsp; Should you tell your boss?&nbsp; What if you're a boss and someone makes a mistake?&nbsp; How should you respond?&nbsp; We get into all of this and more in the week's exciting episode.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/should-you-disclose-your-cyber-attack/]]></link><guid isPermaLink="false">e3c878ac-269f-4db0-971e-0328db2dd8d9</guid><itunes:image href="https://artwork.captivate.fm/41a7cccf-12c4-454f-9ad8-71cbac2769e5/JyEVVgVe39Vyk6Vw-QWIrvkk.jpg"/><pubDate>Mon, 31 Jul 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f0d81a5b-c10d-456b-b747-7a3683461835/Scott.mp3" length="39775899" type="audio/mpeg"/><itunes:duration>55:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/407cdd20-5d2b-4812-9008-404429b8bd2e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/407cdd20-5d2b-4812-9008-404429b8bd2e/index.html" type="text/html"/></item><item><title>Backup security is abysmal, says backup security expert</title><itunes:title>Backup security is abysmal, says backup security expert</itunes:title><description><![CDATA[<p>During this recording, Mr. Backup asked our guest how many backup systems that he had looked at had at least one critical security flaw, he said pretty much 100%.  Holy. Cow.  Doron Pinhas runs a company called Continuity Software, that does security assessments of storage and backup and recovery systems.  They got the permission of some of their customers to anonymize and publish their findings, and the results were abysmal.  (You can read the report yourself <a href="https://www.continuitysoftware.com/resources/the-state-of-storage-backup-security-report-2023/" rel="noopener noreferrer" target="_blank">here</a>.)  He said it was extremely rare to find a backup environment that was properly configured from a security standpoint.  He then went on to explain the kinds of things they look for, and how you can secure your storage and backup and recovery environments. He also explained how such environments are typically overlooked by most security scans! He said they have a lot of <a href="https://www.continuitysoftware.com/resources/" rel="noopener noreferrer" target="_blank">resources on their website</a> to help you, and they also have automated tools that will ensure you stay secure once you zipped things up.  If I were you, I'd check out those resources right now! </p>]]></description><content:encoded><![CDATA[<p>During this recording, Mr. Backup asked our guest how many backup systems that he had looked at had at least one critical security flaw, he said pretty much 100%.  Holy. Cow.  Doron Pinhas runs a company called Continuity Software, that does security assessments of storage and backup and recovery systems.  They got the permission of some of their customers to anonymize and publish their findings, and the results were abysmal.  (You can read the report yourself <a href="https://www.continuitysoftware.com/resources/the-state-of-storage-backup-security-report-2023/" rel="noopener noreferrer" target="_blank">here</a>.)  He said it was extremely rare to find a backup environment that was properly configured from a security standpoint.  He then went on to explain the kinds of things they look for, and how you can secure your storage and backup and recovery environments. He also explained how such environments are typically overlooked by most security scans! He said they have a lot of <a href="https://www.continuitysoftware.com/resources/" rel="noopener noreferrer" target="_blank">resources on their website</a> to help you, and they also have automated tools that will ensure you stay secure once you zipped things up.  If I were you, I'd check out those resources right now! </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-security-is-abysmal-says-backup-security-expert/]]></link><guid isPermaLink="false">4b724763-93d3-4427-90ad-2daf877aee27</guid><itunes:image href="https://artwork.captivate.fm/f2737020-d2e1-4d46-9596-41f11e34bdbc/kdLX1AMWUYxPropK8B9h8LBE.jpg"/><pubDate>Mon, 24 Jul 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e50ce68b-ce20-4ed6-bd48-174005343ce9/Doron.mp3" length="33039755" type="audio/mpeg"/><itunes:duration>45:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/cd34bf7a-d10f-4ad8-bce1-334a4cf6e4a3/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/cd34bf7a-d10f-4ad8-bce1-334a4cf6e4a3/index.html" type="text/html"/></item><item><title>Your backup product is probably lying to you</title><itunes:title>Your backup product is probably lying to you</itunes:title><description><![CDATA[<p>Krista Macomber, analyst from the Futurum Group, joins us this week to talk about a number of things, but one thing really bubbled up to the top: co-opting of marketing terms.  That is, it's probably using terms to describe their product, because they think you want to hear them.   Two big ones these days are "air gapped" and "immutable." Krista and Mr. Backup talk about what these terms really mean – and whether or not your product should be using them to describe their product.  You may not get any answers from this episode, but your darn sure will get some questions to back to your backup vendor with.  </p>]]></description><content:encoded><![CDATA[<p>Krista Macomber, analyst from the Futurum Group, joins us this week to talk about a number of things, but one thing really bubbled up to the top: co-opting of marketing terms.  That is, it's probably using terms to describe their product, because they think you want to hear them.   Two big ones these days are "air gapped" and "immutable." Krista and Mr. Backup talk about what these terms really mean – and whether or not your product should be using them to describe their product.  You may not get any answers from this episode, but your darn sure will get some questions to back to your backup vendor with.  </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/your-backup-product-is-probably-lying-to-you/]]></link><guid isPermaLink="false">2c21adf2-b95a-4f1a-927c-dfbe51ec3a9b</guid><itunes:image href="https://artwork.captivate.fm/2a37d816-7eb2-43d4-b4e2-6fd4af82c0f7/KRvntgSnvN7X54HqIM2i4DgU.jpeg"/><pubDate>Mon, 17 Jul 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ab5efd7f-b04f-4de6-917e-c71e58e58a9f/Krista.mp3" length="44487345" type="audio/mpeg"/><itunes:duration>01:01:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/609b2c59-fd36-48d2-8934-b02cd55bd06c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/609b2c59-fd36-48d2-8934-b02cd55bd06c/index.html" type="text/html"/></item><item><title>Former Green Beret advises us on Cyber Security</title><itunes:title>Former Green Beret advises us on Cyber Security</itunes:title><description><![CDATA[<p>Today we are proud to have as our guest, Zach Fuller, a founding partner of the Silent Sector, a cybersecurity firm -- and a former Green Beret who served in combat.  We talk a little about how his service made him the person he is today, and how it lead him ultimately into helping people protect their own data.  We talk about his top few things he wishes people would do to secure their environments (in addition to Mr. Backup's usual suggestions of password management, MFA, and patch management).  we found Zach a very engaging person, and we know you'll learn a lot.</p>]]></description><content:encoded><![CDATA[<p>Today we are proud to have as our guest, Zach Fuller, a founding partner of the Silent Sector, a cybersecurity firm -- and a former Green Beret who served in combat.  We talk a little about how his service made him the person he is today, and how it lead him ultimately into helping people protect their own data.  We talk about his top few things he wishes people would do to secure their environments (in addition to Mr. Backup's usual suggestions of password management, MFA, and patch management).  we found Zach a very engaging person, and we know you'll learn a lot.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/former-green-beret-advises-us-on-cyber-security/]]></link><guid isPermaLink="false">0ff6d690-597f-40e4-a090-d8b0fdce817d</guid><itunes:image href="https://artwork.captivate.fm/575e2f34-3258-4504-9a36-d28613320712/TkZPBBg2xOIlHwXvwJN3Y9L4.png"/><pubDate>Mon, 10 Jul 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e9f571ef-da59-4470-ad7b-25f1d5ff0a03/Zack.mp3" length="45283869" type="audio/mpeg"/><itunes:duration>01:02:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fc316b97-3bd4-47e9-8406-ef9406d2acc2/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fc316b97-3bd4-47e9-8406-ef9406d2acc2/index.html" type="text/html"/></item><item><title>How to foster a culture of recovery in your organization</title><itunes:title>How to foster a culture of recovery in your organization</itunes:title><description><![CDATA[<p>Our guest this week (Jim Love from the Hashtag Trending podcast and IT World Canada) touched on something we thought was profound.  He felt that some organizations had what he called a "culture of recovery," meaning that they took recovery into account in all aspects of the org.  He explained how he fostered this in companies where he worked, and how you can do the same.   We also covered generative AI, and he shared several other tips from his many years in the business.  Learn the old ways! </p>]]></description><content:encoded><![CDATA[<p>Our guest this week (Jim Love from the Hashtag Trending podcast and IT World Canada) touched on something we thought was profound.  He felt that some organizations had what he called a "culture of recovery," meaning that they took recovery into account in all aspects of the org.  He explained how he fostered this in companies where he worked, and how you can do the same.   We also covered generative AI, and he shared several other tips from his many years in the business.  Learn the old ways! </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-foster-a-culture-of-recovery-in-your-organization/]]></link><guid isPermaLink="false">c48ce7a1-58de-49f5-ba71-e6a2f47148d3</guid><itunes:image href="https://artwork.captivate.fm/3c7fe252-f568-4dfe-9fa6-a455590e0c64/asVRqKbI-uF8RXvxAuSBoP-J.jpg"/><pubDate>Mon, 26 Jun 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/336f806a-2a00-47a6-87d4-f68fdc8c7cec/ITC.mp3" length="44075443" type="audio/mpeg"/><itunes:duration>01:01:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/a84440cb-5fcd-4678-88cc-9d053d6808f1/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a84440cb-5fcd-4678-88cc-9d053d6808f1/index.html" type="text/html"/></item><item><title>How to PROPERLY back up your iPhone (iCloud is not a backup!)</title><itunes:title>How to PROPERLY back up your iPhone (iCloud is not a backup!)</itunes:title><description><![CDATA[<p>iCloud is not a backup; it is a synchronization tool. If you delete things on your phone, it deletes them in iCloud. iCloud is not a backup. In fact, if you have storage optimization turned on, the high-resolution verion of your photos is stored in only one place. If you delete it, it's gone forever. Mr. Backup tries tries three different ways to back up your iPhone, and finally settled on idrive.</p><p>iDrive was the only solution we found that worked for both iPhone and Android (including if you turned on optimized storage).&nbsp; If you'd like to try it, make sure to use the link below.</p><p>Listeners to the podcast get 90% off their first year using the following link (We will also get a referral fee):</p><p><a href="https://www.idrive.com/idrive/o/p/backupcentral/partner90" rel="noopener noreferrer" target="_blank">https://www.idrive.com/idrive/o/p/backupcentral/partner90</a></p>]]></description><content:encoded><![CDATA[<p>iCloud is not a backup; it is a synchronization tool. If you delete things on your phone, it deletes them in iCloud. iCloud is not a backup. In fact, if you have storage optimization turned on, the high-resolution verion of your photos is stored in only one place. If you delete it, it's gone forever. Mr. Backup tries tries three different ways to back up your iPhone, and finally settled on idrive.</p><p>iDrive was the only solution we found that worked for both iPhone and Android (including if you turned on optimized storage).&nbsp; If you'd like to try it, make sure to use the link below.</p><p>Listeners to the podcast get 90% off their first year using the following link (We will also get a referral fee):</p><p><a href="https://www.idrive.com/idrive/o/p/backupcentral/partner90" rel="noopener noreferrer" target="_blank">https://www.idrive.com/idrive/o/p/backupcentral/partner90</a></p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-properly-backup-your-iphone-icloud-is-not-a-backup/]]></link><guid isPermaLink="false">c318b9b3-d769-4e8a-b1ca-4c2417fd004f</guid><itunes:image href="https://artwork.captivate.fm/b4e1bf1a-b510-482f-91b3-98662ad53da5/PccUJqP8gMdLi7GfjKwFWQC9.jpg"/><pubDate>Mon, 19 Jun 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/80af76fc-0f3f-43a0-be03-44dd98430f4c/idrive.mp3" length="37423939" type="audio/mpeg"/><itunes:duration>51:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fe746a04-aa52-4e9c-ad1e-c8fb738a887b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fe746a04-aa52-4e9c-ad1e-c8fb738a887b/index.html" type="text/html"/></item><item><title>Cyber expert not happy with state of cybersecurity today</title><itunes:title>Cyber expert not happy with state of cybersecurity today</itunes:title><description><![CDATA[<p>This week we talk with Eric Jeffery, a cybersecurity SE and host of the Cyber Security Grey Beard podcast, and he is just a little miffed about how organizations are responding to cyber attacks today.  It's not so much about how they respond to the attack itself; it's how they communicate what happened to the public – if at all. He's submitting what happened at the LA Unified School District as his case in point.  He's a bit fired up, so this will be a fun one. </p>]]></description><content:encoded><![CDATA[<p>This week we talk with Eric Jeffery, a cybersecurity SE and host of the Cyber Security Grey Beard podcast, and he is just a little miffed about how organizations are responding to cyber attacks today.  It's not so much about how they respond to the attack itself; it's how they communicate what happened to the public – if at all. He's submitting what happened at the LA Unified School District as his case in point.  He's a bit fired up, so this will be a fun one. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/cyber-se-not-happy-with-state-of-cybersecurity-today/]]></link><guid isPermaLink="false">dd95bc08-de65-4dae-a9db-79ccb6c432a6</guid><itunes:image href="https://artwork.captivate.fm/534b6b2f-be00-4ce1-b220-70c0e97cee9b/jTcWeWRoGzjt6V3-BT8fXNoF.jpg"/><pubDate>Mon, 12 Jun 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/7bb06ad8-a34e-4dd9-813b-68ebdf44c422/Eric-Jeffreys.mp3" length="40435133" type="audio/mpeg"/><itunes:duration>56:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c670e291-bd3f-4674-945c-7f4ce412e65c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c670e291-bd3f-4674-945c-7f4ce412e65c/index.html" type="text/html"/></item><item><title>How do you authenticate with all new hardware?</title><itunes:title>How do you authenticate with all new hardware?</itunes:title><description><![CDATA[<p>Imagine you're a small business or household that just lost everything in a fire, and your phones, ipads, and laptops went up in flames too.  Where do you start?  You've got a cloud-based password manager (e.g. Dashlane, OnePassword, KeyPass) and MFA system (e.g. Google Authenticator, Authy).  How do you authenticate yourself with these systems if you have all new hardware?  That's what we're talking about in this episode.  </p><p>We reference this great previous episode about being prepared for disasters:</p><p>https://www.backupcentral.com/how-to-prepare-for-an-emergency-at-home-and-work/</p>]]></description><content:encoded><![CDATA[<p>Imagine you're a small business or household that just lost everything in a fire, and your phones, ipads, and laptops went up in flames too.  Where do you start?  You've got a cloud-based password manager (e.g. Dashlane, OnePassword, KeyPass) and MFA system (e.g. Google Authenticator, Authy).  How do you authenticate yourself with these systems if you have all new hardware?  That's what we're talking about in this episode.  </p><p>We reference this great previous episode about being prepared for disasters:</p><p>https://www.backupcentral.com/how-to-prepare-for-an-emergency-at-home-and-work/</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-do-you-authenticate-with-all-new-hardware/]]></link><guid isPermaLink="false">2b2b6a64-9d43-4371-b3e0-7f6a9cd2d8c9</guid><itunes:image href="https://artwork.captivate.fm/b17fb4cb-5522-4a89-aa8d-50427eb4743f/eOX3lbnUiBCElyZLifPSBsG0.jpg"/><pubDate>Mon, 05 Jun 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6c6d95f9-a75a-40b3-86b4-21a5177caf12/RIA-Bootstrap-sue.mp3" length="39820424" type="audio/mpeg"/><itunes:duration>55:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/7bf7f6cb-dff7-4a84-883b-9353d84f7af6/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/7bf7f6cb-dff7-4a84-883b-9353d84f7af6/index.html" type="text/html"/></item><item><title>You could lose access to iCloud account data forever!</title><itunes:title>You could lose access to iCloud account data forever!</itunes:title><description><![CDATA[<p>There was a shocking article by Joanna Stern of the Wall Street Journal about how you are a simple bar trick away from losing access to all your photos (and some money) forever.  All they need to do is steal your iPhone after seeing you type in your passcode, and they can lock you out of your account forever.  1. This is why we back up stuff  and 2. There is a way to stop this.   I'm not yet sure how vulnerable Android folks are to the same problem.  If I've piqued your interest, this is the episode for you. </p><p>Here are two YouTube videos where the WSJ talks about this:</p><p>https://www.youtube.com/watch?v=QUYODQB_2wQ</p><p>https://www.youtube.com/watch?v=tCfb9Wizq9Q</p>]]></description><content:encoded><![CDATA[<p>There was a shocking article by Joanna Stern of the Wall Street Journal about how you are a simple bar trick away from losing access to all your photos (and some money) forever.  All they need to do is steal your iPhone after seeing you type in your passcode, and they can lock you out of your account forever.  1. This is why we back up stuff  and 2. There is a way to stop this.   I'm not yet sure how vulnerable Android folks are to the same problem.  If I've piqued your interest, this is the episode for you. </p><p>Here are two YouTube videos where the WSJ talks about this:</p><p>https://www.youtube.com/watch?v=QUYODQB_2wQ</p><p>https://www.youtube.com/watch?v=tCfb9Wizq9Q</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">055c71d1-d362-4411-90fb-52e7b264e52a</guid><itunes:image href="https://artwork.captivate.fm/bf83b512-42e1-42b3-811c-3ce2c6c22d3d/zAgn_-TdX5KFIwL7LxhnSbg5.jpg"/><pubDate>Mon, 22 May 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/2cb5898e-ea28-4365-82b1-1bef43ba4977/RIA-AppleTheft.mp3" length="30522292" type="audio/mpeg"/><itunes:duration>42:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/20036d7b-4f7f-4bfc-8390-c54c79dedd5b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/20036d7b-4f7f-4bfc-8390-c54c79dedd5b/index.html" type="text/html"/></item><item><title>How to back up and recover a database (Backup to Basics series)</title><itunes:title>How to back up and recover a database (Backup to Basics series)</itunes:title><description><![CDATA[<p>Have we got a packed episode for you.&nbsp; This week in our continued Backup to Basics series, we dive deep into the various options for backing up and recovering databases, along with the pros and cons of each.&nbsp; Want to figure out the best way to back up your traditional or modern database? This is your episode.&nbsp; As usual, Mr. Backup and Prasanna also manage to make it fun. This is a great episode and we think you'll enjoy it.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Have we got a packed episode for you.&nbsp; This week in our continued Backup to Basics series, we dive deep into the various options for backing up and recovering databases, along with the pros and cons of each.&nbsp; Want to figure out the best way to back up your traditional or modern database? This is your episode.&nbsp; As usual, Mr. Backup and Prasanna also manage to make it fun. This is a great episode and we think you'll enjoy it.&nbsp;</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-back-up-and-recover-a-database-backup-to-basics-series/]]></link><guid isPermaLink="false">da95079e-7b19-4782-915c-d51fb8ee5580</guid><itunes:image href="https://artwork.captivate.fm/0d3bd736-7e91-4c61-b52c-1bd71af8b028/CDvzqvn6GNNQyNvMdRIsH40Q.jpeg"/><pubDate>Mon, 15 May 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e094d7d7-70b7-4b5c-966f-40a146ec03ef/RIA-Databases2.mp3" length="40804715" type="audio/mpeg"/><itunes:duration>56:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f99eb268-4736-49a9-889c-35a78e2e9ab8/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f99eb268-4736-49a9-889c-35a78e2e9ab8/index.html" type="text/html"/></item><item><title>Flash expert schools Mr. Backup</title><itunes:title>Flash expert schools Mr. Backup</itunes:title><description><![CDATA[<p>A few weeks ago, Mr. Backup (W. Curtis Preston) said he didn't understand why people used flash for backups.  He said it was overkill.  A few days later, Howard Marks of Vast (friend of the pod) took issue with that statement, and asked for the chance to defend Vast's title, so to speak.  Howard is a friend of the pod and we were happy to say yes.  We also take the opportunity to get an update on Vast, and discuss their data reduction techniques in more detail.  Bonus points if you get the cover art reference.</p>]]></description><content:encoded><![CDATA[<p>A few weeks ago, Mr. Backup (W. Curtis Preston) said he didn't understand why people used flash for backups.  He said it was overkill.  A few days later, Howard Marks of Vast (friend of the pod) took issue with that statement, and asked for the chance to defend Vast's title, so to speak.  Howard is a friend of the pod and we were happy to say yes.  We also take the opportunity to get an update on Vast, and discuss their data reduction techniques in more detail.  Bonus points if you get the cover art reference.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/flash-expert-schools-mr-backup/]]></link><guid isPermaLink="false">9cf8711e-feb0-4abc-a823-b78092078419</guid><itunes:image href="https://artwork.captivate.fm/6b9377dc-65cf-4fc3-a2de-0b9e78affaf7/_8Xr-uGl_p15XmBFpib5L7Up.jpeg"/><pubDate>Mon, 08 May 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/12cd233f-47cd-449e-bb74-6a46f69ca82e/Howard-rebuttal.mp3" length="45092037" type="audio/mpeg"/><itunes:duration>01:02:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/d6876844-564a-4550-9393-7f690298aa20/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d6876844-564a-4550-9393-7f690298aa20/index.html" type="text/html"/></item><item><title>What are SIEM, SOAR, EDR, XDR? Are they available as a service?</title><itunes:title>What are SIEM, SOAR, EDR, XDR? Are they available as a service?</itunes:title><description><![CDATA[<p>Are you doing all you can to stop ransomware attacks before they happen, or kill them the moment they show up?  Have you looked into this and found yourself swimming in alphabet soup (SIEM, SOAR, EDR, XDR)?  Have you looked at some of these tools and found them to be prohibitively expensive or too complex?  This is the episode for you.  We have Dez Rock, CEO of SIEMonster, a SIEM/SOAR/XDR as a service company.  She helps us weed our way through these acronyms, and then tells us about how SIEMonster (pronounced sea-monster) is bringing this important technology to companies of all sizes. </p>]]></description><content:encoded><![CDATA[<p>Are you doing all you can to stop ransomware attacks before they happen, or kill them the moment they show up?  Have you looked into this and found yourself swimming in alphabet soup (SIEM, SOAR, EDR, XDR)?  Have you looked at some of these tools and found them to be prohibitively expensive or too complex?  This is the episode for you.  We have Dez Rock, CEO of SIEMonster, a SIEM/SOAR/XDR as a service company.  She helps us weed our way through these acronyms, and then tells us about how SIEMonster (pronounced sea-monster) is bringing this important technology to companies of all sizes. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-are-seim-soar-edr-xdr-are-they-available-as-a-service/]]></link><guid isPermaLink="false">82c2b8b0-0dcc-4439-a428-00ff47ad31da</guid><itunes:image href="https://artwork.captivate.fm/4f1d513a-b8e5-4328-9976-b66009ef09b0/oayk6Zq1jlQX1SzRI7Fg9ogc.jpg"/><pubDate>Tue, 02 May 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f6a89c5d-5d8a-475f-bb30-2d54f495979a/RIA-SIEMonster.mp3" length="34166373" type="audio/mpeg"/><itunes:duration>47:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/25a42f18-1ead-4aea-ac63-b5b691b52523/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/25a42f18-1ead-4aea-ac63-b5b691b52523/index.html" type="text/html"/></item><item><title>What can you learn from the LastPass hack?</title><itunes:title>What can you learn from the LastPass hack?</itunes:title><description><![CDATA[<p>Last year LastPass suffered two hacks that left their customer's data exposed.&nbsp; What can you learn from this event, even if you're not a LastPass customer?&nbsp; We use this hack as an example of what your company should do (or not do) if it ever suffers such a hack.&nbsp; We also talk about password managers, and what this hack means to those who use them.&nbsp; You do use one, right?&nbsp; This is a great episode, chock full of information.&nbsp; We hope you enjoy it.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Last year LastPass suffered two hacks that left their customer's data exposed.&nbsp; What can you learn from this event, even if you're not a LastPass customer?&nbsp; We use this hack as an example of what your company should do (or not do) if it ever suffers such a hack.&nbsp; We also talk about password managers, and what this hack means to those who use them.&nbsp; You do use one, right?&nbsp; This is a great episode, chock full of information.&nbsp; We hope you enjoy it.&nbsp;</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-can-you-learn-from-the-lastpass-hack/]]></link><guid isPermaLink="false">b99b46b1-2112-4bce-ab39-117ddcd0ca4a</guid><itunes:image href="https://artwork.captivate.fm/91ba514a-8dac-4059-8d9b-9ac8f744aa38/Giw81cbszfGYu2ADMK576kjK.jpg"/><pubDate>Mon, 24 Apr 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/610c45eb-b37b-4d22-931f-7d5f39bb4f2d/RIA-Lastpass.mp3" length="40209121" type="audio/mpeg"/><itunes:duration>55:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Backing up databases, Part 1 (Backup to basics)</title><itunes:title>Backing up databases, Part 1 (Backup to basics)</itunes:title><description><![CDATA[<p>It was a dark and stormy night in 1993 when paris (the database server) went down.  It would be  a night the new backup admin would never forget because he couldn't restore the database from backup.  The only bright side of that very sad story is that it launched a career.  Yes, that's the night W. Curtis Preston started his path toward Mr. Backup.  Hear him tell the story in his own words, in the middle of the backup to basics series about backing up databases. Avoid the mistake that could have (but did not) cost him his job and enjoy a good episode while you're at it!</p>]]></description><content:encoded><![CDATA[<p>It was a dark and stormy night in 1993 when paris (the database server) went down.  It would be  a night the new backup admin would never forget because he couldn't restore the database from backup.  The only bright side of that very sad story is that it launched a career.  Yes, that's the night W. Curtis Preston started his path toward Mr. Backup.  Hear him tell the story in his own words, in the middle of the backup to basics series about backing up databases. Avoid the mistake that could have (but did not) cost him his job and enjoy a good episode while you're at it!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backing-up-databases-part-1-backup-to-basics/]]></link><guid isPermaLink="false">8e9a0103-5758-4fcb-9f41-d7c01c5c995e</guid><itunes:image href="https://artwork.captivate.fm/4670d4e3-81d6-4770-aeca-fe0331f5ce9e/IO00Uwof5u-hiUJElhkbBmKT.jpg"/><pubDate>Mon, 17 Apr 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a4a7028f-afa9-4160-913d-ef2c228e0afa/RIA-databases.mp3" length="32022555" type="audio/mpeg"/><itunes:duration>44:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/bd1a782b-08db-4c32-b317-588f66caa09f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/bd1a782b-08db-4c32-b317-588f66caa09f/index.html" type="text/html"/></item><item><title>What computers should you back up? (Backup to Basics Series)</title><itunes:title>What computers should you back up? (Backup to Basics Series)</itunes:title><description><![CDATA[<p>Are you backing up all the things you should be backing up?  In this latest episode of our Backup to Basics series,  Mr. Backup &amp; Prasanna look at the list of the traditional things we think about backing up: servers, databases, laptops, mobile devices, file servers, virtualization servers, etc.  The big question tackled in this episode is what of these things should you be backing up?  Mr. Backup, of course, takes a pretty hard line about backup, but he may surprise you on some of his exceptions.  We hope you enjoy the episode.</p>]]></description><content:encoded><![CDATA[<p>Are you backing up all the things you should be backing up?  In this latest episode of our Backup to Basics series,  Mr. Backup &amp; Prasanna look at the list of the traditional things we think about backing up: servers, databases, laptops, mobile devices, file servers, virtualization servers, etc.  The big question tackled in this episode is what of these things should you be backing up?  Mr. Backup, of course, takes a pretty hard line about backup, but he may surprise you on some of his exceptions.  We hope you enjoy the episode.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-should-you-back-up-part-1-backup-to-basics-series/]]></link><guid isPermaLink="false">306727bb-caf1-4d72-91e2-49d35fb888ee</guid><itunes:image href="https://artwork.captivate.fm/17c653b2-6c10-4957-8b9a-264469ce6813/7H__3_e3cU8obNfbRBzmpq3x.jpg"/><pubDate>Mon, 10 Apr 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/57d0b666-0f6c-4972-a00a-75d6fa3aa337/RIA-Traditional.mp3" length="37860298" type="audio/mpeg"/><itunes:duration>52:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fee945bb-3c3c-4cd7-a3b6-daf4edc292da/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fee945bb-3c3c-4cd7-a3b6-daf4edc292da/index.html" type="text/html"/></item><item><title>Can you apply least privilege to private data?</title><itunes:title>Can you apply least privilege to private data?</itunes:title><description><![CDATA[<p>You know how we tell you to limit the amount of privilege each admin gets, in order to limit the blast radius if their account is compromised?  What if you could apply that concept to applications that use private data to accomplish their task?  We blindly give everything we have on each person to just about any app that needs anything.  But if you had an app that only needs first name and email address, why not just give it that?  And if it asks for more than that, what if you had a way to give it masked data, since it doesn't really need it anyway?  That's how I would describe Sky Flow, a privacy as a service company, after interviewing its Head of Marketing, Sean Falconer.  Fascinating new approach to the problem of personal data sprawl.</p>]]></description><content:encoded><![CDATA[<p>You know how we tell you to limit the amount of privilege each admin gets, in order to limit the blast radius if their account is compromised?  What if you could apply that concept to applications that use private data to accomplish their task?  We blindly give everything we have on each person to just about any app that needs anything.  But if you had an app that only needs first name and email address, why not just give it that?  And if it asks for more than that, what if you had a way to give it masked data, since it doesn't really need it anyway?  That's how I would describe Sky Flow, a privacy as a service company, after interviewing its Head of Marketing, Sean Falconer.  Fascinating new approach to the problem of personal data sprawl.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/can-you-apply-least-privilege-to-private-data/]]></link><guid isPermaLink="false">e59c8d42-056f-4c69-a92e-73dfc978c272</guid><itunes:image href="https://artwork.captivate.fm/1f5bf149-5033-447d-a491-70e4d0ec175c/29lTNJupMbMigkP8-pVBYgcK.png"/><pubDate>Mon, 03 Apr 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/fccac246-2179-4844-8b7e-b94cb85691e3/RIA-PaaS.mp3" length="40261466" type="audio/mpeg"/><itunes:duration>55:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Six vulnerabilities your password manager might have</title><itunes:title>Six vulnerabilities your password manager might have</itunes:title><description><![CDATA[<p>I was shocked to learn that my favorite password manager had a few known vulnerabilities, and you might be shocked too!  We found this great research paper from the University of York, and invited one of the co-authors on to discuss it.  Siamek Shahandasthi, an Associate Professor from the University of York, explained all the vulnerabilities discussed in the paper, and why each is important.   I was able to verify that at least one is still found in my current password manager.  How many are in yours?  Let's pressure the companies to address these, shall we? </p><p>Check out the paper yourself here: https://eprints.whiterose.ac.uk/158056/8/Revisiting_Security_Vulnerabilities_in_Commercial_Password_Managers_2.pdf</p>]]></description><content:encoded><![CDATA[<p>I was shocked to learn that my favorite password manager had a few known vulnerabilities, and you might be shocked too!  We found this great research paper from the University of York, and invited one of the co-authors on to discuss it.  Siamek Shahandasthi, an Associate Professor from the University of York, explained all the vulnerabilities discussed in the paper, and why each is important.   I was able to verify that at least one is still found in my current password manager.  How many are in yours?  Let's pressure the companies to address these, shall we? </p><p>Check out the paper yourself here: https://eprints.whiterose.ac.uk/158056/8/Revisiting_Security_Vulnerabilities_in_Commercial_Password_Managers_2.pdf</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">a02aea37-4f32-43d8-b731-ac1ef7b8bd64</guid><itunes:image href="https://artwork.captivate.fm/4670d4e3-81d6-4770-aeca-fe0331f5ce9e/IO00Uwof5u-hiUJElhkbBmKT.jpg"/><pubDate>Mon, 27 Mar 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/62aa5292-c6f7-4edd-87b5-eb1b046c57ad/RIA-Password-Paper.mp3" length="44962263" type="audio/mpeg"/><itunes:duration>01:02:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>What is deduplication and how does it work?  (Backup to Basics series)</title><itunes:title>What is deduplication and how does it work?  (Backup to Basics series)</itunes:title><description><![CDATA[<p>In our latest episode of the Backup to Basics series, we talk about what I think is the most important invention in my career: deduplication.  Without dedupe, much of what we do in backup and recovery, and disaster recovery, would simply not be possible.  Without dedupe there really is no disk backup market; there is no cloud backup market.  I'd be out of a job! What is dedupe, anyway, and how does it work?  What are the different kinds of dedupe and does that matter?  You should learn a lot about this important topic. </p>]]></description><content:encoded><![CDATA[<p>In our latest episode of the Backup to Basics series, we talk about what I think is the most important invention in my career: deduplication.  Without dedupe, much of what we do in backup and recovery, and disaster recovery, would simply not be possible.  Without dedupe there really is no disk backup market; there is no cloud backup market.  I'd be out of a job! What is dedupe, anyway, and how does it work?  What are the different kinds of dedupe and does that matter?  You should learn a lot about this important topic. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-is-deduplication-and-how-does-it-work-backup-to-basics-series/]]></link><guid isPermaLink="false">c6fb5f27-6404-412f-a526-a19945eca381</guid><itunes:image href="https://artwork.captivate.fm/3c4d3962-40a2-48de-b3d3-1337598ca436/kLMQhpMs0Ar7PotmGEMMhNYt.jpg"/><pubDate>Mon, 20 Mar 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1f6ccacb-be6a-42e7-9516-951e725bfdab/RIA-Dedupe-Storage.mp3" length="35199886" type="audio/mpeg"/><itunes:duration>48:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/ab012e94-8587-4e17-974d-8786f7ddc603/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/ab012e94-8587-4e17-974d-8786f7ddc603/index.html" type="text/html"/></item><item><title>Preparing an incident response plan for ransomware</title><itunes:title>Preparing an incident response plan for ransomware</itunes:title><description><![CDATA[<p>An incident response plan is the key to successfully surviving a ransomware attack, and it's a bit like Dramamine.  The time to get one is too late to get one.  @Vmiss (Melissa Palmer) joins us again to talk about this important topic.  We talk about the important role cyber insurance companies can play in helping you find an IR team and helping you develop a plan.  (They can actually force you to do so in order to get coverage.) @vmiss was a blast to talk to again, and we're sure you'll enjoy this episode. </p>]]></description><content:encoded><![CDATA[<p>An incident response plan is the key to successfully surviving a ransomware attack, and it's a bit like Dramamine.  The time to get one is too late to get one.  @Vmiss (Melissa Palmer) joins us again to talk about this important topic.  We talk about the important role cyber insurance companies can play in helping you find an IR team and helping you develop a plan.  (They can actually force you to do so in order to get coverage.) @vmiss was a blast to talk to again, and we're sure you'll enjoy this episode. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/preparing-an-incident-response-plan-for-ransomware/]]></link><guid isPermaLink="false">8c1f14ca-b8a2-4b43-bd1c-b6dfc12c6db7</guid><itunes:image href="https://artwork.captivate.fm/ddd51f92-7081-433b-8046-348cd103b6fe/TLDg3TIgRti507eu-PMNEf9x.jpg"/><pubDate>Mon, 13 Mar 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/eb4052ed-adce-41d6-9185-b05207a9f377/incident-response-1.mp3" length="35370728" type="audio/mpeg"/><itunes:duration>49:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/8b923452-daad-4379-9c86-5cbfe1d2e15d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8b923452-daad-4379-9c86-5cbfe1d2e15d/index.html" type="text/html"/></item><item><title>What to do with your network in a ransomware attack</title><itunes:title>What to do with your network in a ransomware attack</itunes:title><description><![CDATA[<p>We have talked about this a lot on the pod, and now we have someone that can explain what you actually do with your network when you get a ransomware attack. It's Tom Hollingsworth from Gestalt IT, and we're excited to have him on the pod.  Some of his recommendations of course, require some configuration in advance.  We talk about VLANs, SEIM and access management tools, and why many networking admins are terrified of the "reject all" concept that would actually make your network much more resilient in an attack.  There is some really good stuff in this episode. </p>]]></description><content:encoded><![CDATA[<p>We have talked about this a lot on the pod, and now we have someone that can explain what you actually do with your network when you get a ransomware attack. It's Tom Hollingsworth from Gestalt IT, and we're excited to have him on the pod.  Some of his recommendations of course, require some configuration in advance.  We talk about VLANs, SEIM and access management tools, and why many networking admins are terrified of the "reject all" concept that would actually make your network much more resilient in an attack.  There is some really good stuff in this episode. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-to-do-with-your-network-in-a-ransomware-attack/]]></link><guid isPermaLink="false">03cab6c4-c127-4fec-a905-ce5fc54d4ac6</guid><itunes:image href="https://artwork.captivate.fm/a0603cc3-1a4f-4f53-8962-233671da90b3/xyCg04M0ub7C7qlAnv95tpjW.jpg"/><pubDate>Mon, 06 Mar 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/7a913d37-9140-4fdb-ba84-bf9671ee5f5b/ransom-net.mp3" length="43804926" type="audio/mpeg"/><itunes:duration>01:00:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/445217cc-1c1f-4f6c-bb3b-478fe08810de/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/445217cc-1c1f-4f6c-bb3b-478fe08810de/index.html" type="text/html"/></item><item><title>Could your backup system achieve Sheltered Harbor certification?</title><itunes:title>Could your backup system achieve Sheltered Harbor certification?</itunes:title><description><![CDATA[<p>Sheltered Harbor is a non-profit organization dedicated to making sure financial organizations are able to recover after a cyber attack.  Even if you're not a financial institution, there is a lot to learn hear.  They've done a lot of work to make this standard practical in the real world.  If nothing else, you can review what they ask orgs to do and see if you can apply it to your own environment.  We once again have Eric Bursley to guide us through the topic.  Even Mr. Backup learned something! </p>]]></description><content:encoded><![CDATA[<p>Sheltered Harbor is a non-profit organization dedicated to making sure financial organizations are able to recover after a cyber attack.  Even if you're not a financial institution, there is a lot to learn hear.  They've done a lot of work to make this standard practical in the real world.  If nothing else, you can review what they ask orgs to do and see if you can apply it to your own environment.  We once again have Eric Bursley to guide us through the topic.  Even Mr. Backup learned something! </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/could-your-backup-system-achieve-safeharbor-certification/]]></link><guid isPermaLink="false">5c78c815-3756-467b-8d88-bb151bb1704b</guid><itunes:image href="https://artwork.captivate.fm/0d9c7629-a787-4851-866d-9d3a1cbb4c15/4W8y3WfAys5tiio36mKDulWe.jpg"/><pubDate>Mon, 27 Feb 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/91b602cf-87d6-41b9-81b0-d4e18b7381be/RIA-Safeharbor2.mp3" length="38258090" type="audio/mpeg"/><itunes:duration>53:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/d557c2b7-2d82-417a-b976-4c7f39b53393/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d557c2b7-2d82-417a-b976-4c7f39b53393/index.html" type="text/html"/></item><item><title>Do you need a managed security service provider (MSSP)?</title><itunes:title>Do you need a managed security service provider (MSSP)?</itunes:title><description><![CDATA[<p>Today we're visited by Scott McCrady, the CEO of Solcyber, a leading managed security service provider.  He says they're changing the model of how small and medium-sized companies secure their infrastructure against attacks, without any of the typical upfront cost or ongoing maintenance hassles of traditional methods.  Have you tried securing your environment, only to suffer "alert fatigue?"  Scott feels your pain and has fixed this by doing all of that as a service, which you pay for like a typical SaaS offering.  Just a per-user fee per month - one SKU.  It's a new way to secure your infrastructure. </p>]]></description><content:encoded><![CDATA[<p>Today we're visited by Scott McCrady, the CEO of Solcyber, a leading managed security service provider.  He says they're changing the model of how small and medium-sized companies secure their infrastructure against attacks, without any of the typical upfront cost or ongoing maintenance hassles of traditional methods.  Have you tried securing your environment, only to suffer "alert fatigue?"  Scott feels your pain and has fixed this by doing all of that as a service, which you pay for like a typical SaaS offering.  Just a per-user fee per month - one SKU.  It's a new way to secure your infrastructure. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/do-you-need-a-managed-security-service-provider-mssp/]]></link><guid isPermaLink="false">d4e2f48e-d17c-4095-8acd-747f27eb326f</guid><itunes:image href="https://artwork.captivate.fm/c3ff9b4c-975f-4fca-8963-eaed97e64f85/wUwWXt5_0T4lmzBiOjyJEC5C.jpg"/><pubDate>Mon, 20 Feb 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/98a663dd-3714-491f-a5cf-f0353728b91d/Solcyber.mp3" length="44003977" type="audio/mpeg"/><itunes:duration>01:01:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/49305798-fc5a-4e38-833b-f967cdfcee0a/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/49305798-fc5a-4e38-833b-f967cdfcee0a/index.html" type="text/html"/></item><item><title>@vmiss warns about ransomware attacks on VMware</title><itunes:title>@vmiss warns about ransomware attacks on VMware</itunes:title><description><![CDATA[<p>How great is it to discuss your favorite topics, learn something new, and have a great time all at the same time?  That's what this episode is like.  @vmiss (AKA Melissa Palmer) came on the pod for the first time this week.  I've read a lot of her content and tweets over the years, and it was great to finally put a face to the name.   She knows her stuff when it comes to security, since she was actually working in it before she got into VMware. It was a great conversation I think you'll learn a lot from.  </p>]]></description><content:encoded><![CDATA[<p>How great is it to discuss your favorite topics, learn something new, and have a great time all at the same time?  That's what this episode is like.  @vmiss (AKA Melissa Palmer) came on the pod for the first time this week.  I've read a lot of her content and tweets over the years, and it was great to finally put a face to the name.   She knows her stuff when it comes to security, since she was actually working in it before she got into VMware. It was a great conversation I think you'll learn a lot from.  </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/vmiss-warns-about-ransomware-attacks-on-vmware/]]></link><guid isPermaLink="false">4351c324-5748-4b97-bbe0-0180892a0e1b</guid><itunes:image href="https://artwork.captivate.fm/814bd7e4-8619-4fa7-89ab-ed564e813e4f/J24rQm53-LkOLsDFIj-hXOnp.jpg"/><pubDate>Mon, 13 Feb 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e6a35a21-df3f-4400-915f-684f97c3e02b/RIA-vmiss1.mp3" length="36588547" type="audio/mpeg"/><itunes:duration>50:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/e997bbe0-ff3e-4a5d-ae7c-daac5a00a801/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e997bbe0-ff3e-4a5d-ae7c-daac5a00a801/index.html" type="text/html"/></item><item><title>Block ransomware from writing to your Windows Veeam backup server</title><itunes:title>Block ransomware from writing to your Windows Veeam backup server</itunes:title><description><![CDATA[<p>We've talked a bit on this podcast about ransomware groups targeting Windows-based backup servers, and <a href="https://threatpost.com/conti-ransomware-backups/175114/" rel="noopener noreferrer" target="_blank">Veeam specifically</a>.  There's a new product on the market targeted at this problem, and it's called Blocky for Veeam from Grau Data.  Today we have the founder &amp; CEO of Grau Data, Herbert Grau, and their head of North American operations, David Cerf.  What we didn't know until recording this episode is that these are the same people that used to make the gigantic Grau tape libraries that is used covet back in the 90s! They got out of the hardware business and have been making software ever since.  Blocky for Veeam is a new application of another battle-tested product.  Fascinating story, and one that will have other applications in the future. </p>]]></description><content:encoded><![CDATA[<p>We've talked a bit on this podcast about ransomware groups targeting Windows-based backup servers, and <a href="https://threatpost.com/conti-ransomware-backups/175114/" rel="noopener noreferrer" target="_blank">Veeam specifically</a>.  There's a new product on the market targeted at this problem, and it's called Blocky for Veeam from Grau Data.  Today we have the founder &amp; CEO of Grau Data, Herbert Grau, and their head of North American operations, David Cerf.  What we didn't know until recording this episode is that these are the same people that used to make the gigantic Grau tape libraries that is used covet back in the 90s! They got out of the hardware business and have been making software ever since.  Blocky for Veeam is a new application of another battle-tested product.  Fascinating story, and one that will have other applications in the future. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/block-ransomware-from-writing-to-your-windows-veeam-backup-server/]]></link><guid isPermaLink="false">07e8193e-4413-4e8c-8b8d-0a7f240684cf</guid><itunes:image href="https://artwork.captivate.fm/cb15966c-5b70-4e1f-ba99-e33f172c0551/UOrXMidPTN6_Hr3udNSFiTGK.png"/><pubDate>Mon, 06 Feb 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/963b327e-0c5c-4d94-b372-a793e4e1f60d/RIA-Grau3.mp3" length="32745098" type="audio/mpeg"/><itunes:duration>45:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/0e548708-9ac4-4959-bfbc-e2c15e0fb1ed/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0e548708-9ac4-4959-bfbc-e2c15e0fb1ed/index.html" type="text/html"/></item><item><title>Don&apos;t be like LastPass</title><itunes:title>Don&apos;t be like LastPass</itunes:title><description><![CDATA[<p>LastPass made some serious blunders: how they responded to the hack in August, code they created before August, and how they configured their backup system. All of that came to a head at the end of 2023 when the hackers from August used stolen credentials to download a backed up copy of customer information.  Most of it was encrypted, but they still gained a lot of information. Many are calling for customers to leave the product.  However, even if you're not a lastpass customer, there are lessons to be learned here.  Learn those lessons and don't be like LastPass.</p>]]></description><content:encoded><![CDATA[<p>LastPass made some serious blunders: how they responded to the hack in August, code they created before August, and how they configured their backup system. All of that came to a head at the end of 2023 when the hackers from August used stolen credentials to download a backed up copy of customer information.  Most of it was encrypted, but they still gained a lot of information. Many are calling for customers to leave the product.  However, even if you're not a lastpass customer, there are lessons to be learned here.  Learn those lessons and don't be like LastPass.</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">015bf07f-ec54-411c-b350-23f553b4a88c</guid><itunes:image href="https://artwork.captivate.fm/0eb90d93-dbec-4613-a779-c4c95e1d933f/BYcqFFA8LdtyLg8vZR1o2949.jpg"/><pubDate>Mon, 30 Jan 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/73053607-5d2b-42c7-988c-e96ad226901c/Lastpass-hack.mp3" length="28664044" type="audio/mpeg"/><itunes:duration>39:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/80a0894c-0768-46a6-9f27-ddd733b4c0ee/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/80a0894c-0768-46a6-9f27-ddd733b4c0ee/index.html" type="text/html"/></item><item><title>Mr. Backup reflects on 30-year career</title><itunes:title>Mr. Backup reflects on 30-year career</itunes:title><description><![CDATA[<p>Today (Jan 23) marks 30 years to the day that W. Curtis Preston joined the backup industry. Fresh out of the US Navy and wanting to make a name for himself, he joined MBNA, a 35-billion dollar credit card company as "the backup guy." Within seven years he would write the industry's first book dedicated to backup, and since that time, he's gone on to be the world's leading expert in backup and recovery.  What were backups like in 1993?  How have things changed over the years?  And how did he apapt to all of those changes?  Prasanna takes the lead as host for this episode, asking Curtis a number of very insightful questions.  Be sure to join us for this very special episode. </p>]]></description><content:encoded><![CDATA[<p>Today (Jan 23) marks 30 years to the day that W. Curtis Preston joined the backup industry. Fresh out of the US Navy and wanting to make a name for himself, he joined MBNA, a 35-billion dollar credit card company as "the backup guy." Within seven years he would write the industry's first book dedicated to backup, and since that time, he's gone on to be the world's leading expert in backup and recovery.  What were backups like in 1993?  How have things changed over the years?  And how did he apapt to all of those changes?  Prasanna takes the lead as host for this episode, asking Curtis a number of very insightful questions.  Be sure to join us for this very special episode. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/mr-backup-reflects-on-30-year-career/]]></link><guid isPermaLink="false">c3575c76-9c10-4805-8fc2-3c93eb1544d9</guid><itunes:image href="https://artwork.captivate.fm/00453a9d-5729-4de7-80e2-85ca5162707c/omlMocY5BaqSXzWy0dZY7I4O.jpg"/><pubDate>Mon, 23 Jan 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1c811485-122f-4677-a78d-617b3b86ad72/RIA-30-Years.mp3" length="38316706" type="audio/mpeg"/><itunes:duration>53:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/654d725d-40f0-4459-a896-1e3dce41ac07/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/654d725d-40f0-4459-a896-1e3dce41ac07/index.html" type="text/html"/></item><item><title>Protecting backups from ransomware (Backup to Basics)</title><itunes:title>Protecting backups from ransomware (Backup to Basics)</itunes:title><description><![CDATA[<p>The latest in our Backup to Basics series is about making sure hackers don't delete, encrypt, or exfiltrate your backups as part of a ransomware attack. (Our Backup to Basics series reviews topics from Curtis' latest book Modern Data Protection, which you can download at <a href="druva.com/e-book" rel="noopener noreferrer" target="_blank">druva.com/e-book</a>.) We talk about how and why hackers are specifically targeting your backup system to either disable it or use it as a source for exfiltration.  Then we talk about a number of things you can do to defend your backup system against these attacks.  This is our most important episode in a while. </p>]]></description><content:encoded><![CDATA[<p>The latest in our Backup to Basics series is about making sure hackers don't delete, encrypt, or exfiltrate your backups as part of a ransomware attack. (Our Backup to Basics series reviews topics from Curtis' latest book Modern Data Protection, which you can download at <a href="druva.com/e-book" rel="noopener noreferrer" target="_blank">druva.com/e-book</a>.) We talk about how and why hackers are specifically targeting your backup system to either disable it or use it as a source for exfiltration.  Then we talk about a number of things you can do to defend your backup system against these attacks.  This is our most important episode in a while. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/protecting-backups-from-ransomware-backup-to-basics/]]></link><guid isPermaLink="false">df0fef48-d8e4-424a-8be5-1cf011c8292b</guid><itunes:image href="https://artwork.captivate.fm/27be9687-8fb1-4344-82dd-801972aa9446/rSXFS41EpkAcuq-v9eFKWxZJ.jpg"/><pubDate>Mon, 16 Jan 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cb24dd60-26d5-4200-9bf5-7bbc94e33cd0/RIA-Protecting-Backups.mp3" length="33604958" type="audio/mpeg"/><itunes:duration>46:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/cb0b21ab-6e48-4b8d-8775-64bdf18b2a6d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/cb0b21ab-6e48-4b8d-8775-64bdf18b2a6d/index.html" type="text/html"/></item><item><title>Backup team completes two-year project in three months</title><itunes:title>Backup team completes two-year project in three months</itunes:title><description><![CDATA[<p>Hear the incredible story of <a href="https://www.linkedin.com/in/mralbertuy/" rel="noopener noreferrer" target="_blank">Albert Uy</a>, who was handed a two-year project that had already wasted 18 months.  They told him he had four months to complete it.  He looked at that timeline and told them there was only one way he could do, by switching horses in mid-stream.  Not only did they finish it in time; they finished it early.  Albert has also managed backup teams for many years, so before we cover this project story, we talk about backup has progressed over the years.  We also talk about how much easier his job got once he started using Druva has his backup solution.</p>]]></description><content:encoded><![CDATA[<p>Hear the incredible story of <a href="https://www.linkedin.com/in/mralbertuy/" rel="noopener noreferrer" target="_blank">Albert Uy</a>, who was handed a two-year project that had already wasted 18 months.  They told him he had four months to complete it.  He looked at that timeline and told them there was only one way he could do, by switching horses in mid-stream.  Not only did they finish it in time; they finished it early.  Albert has also managed backup teams for many years, so before we cover this project story, we talk about backup has progressed over the years.  We also talk about how much easier his job got once he started using Druva has his backup solution.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-team-completes-two-year-project-in-three-months/]]></link><guid isPermaLink="false">56f52fab-5e4e-4704-a9d0-0b16fb329c88</guid><itunes:image href="https://artwork.captivate.fm/76694bf8-96d0-4980-a63f-2d941cae81a4/7a82KfZfNnY2bEF1pTnXPnOT.jpg"/><pubDate>Mon, 09 Jan 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b14b5d8a-85b1-4ca7-bcec-46df4aed5a1b/RIA-Albert-Uy.mp3" length="37092923" type="audio/mpeg"/><itunes:duration>51:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/a8281fc5-70c7-4d1f-8fcf-0790bc507ded/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a8281fc5-70c7-4d1f-8fcf-0790bc507ded/index.html" type="text/html"/></item><item><title>Best of 2022 - Backups, Security, and Ransomware</title><itunes:title>Best of 2022 - Backups, Security, and Ransomware</itunes:title><description><![CDATA[<p>Nothing but the best for our listeners!  Curtis and Prasanna review their favorite episodes from 2022, from the time Curtis had to restore Backup Central to the shocking outage at Rackspace (	which is still ongoing!).  This is your chance to catch up on what you missed last year as we prepare for a new year!  Here are links to all the episodes discussed. Happy New Year!</p><p><a href="https://www.backupcentral.com/mr-backup-forced-to-restore-backupcentral-com-restore-it-all-podcast-143/" rel="noopener noreferrer" target="_blank">Mr. Backup Forced to Restore Backup Central</a></p><p><a href="https://www.backupcentral.com/restore-test-failed-due-to-bad-documentation-restore-it-all-podcast-147/" rel="noopener noreferrer" target="_blank">Restore Test Failed to Bad Documentation</a></p><p><a href="https://www.backupcentral.com/security-expert-rips-okta-for-their-response-to-hack/" rel="noopener noreferrer" target="_blank">Security expert rips Okta for their response to hack</a></p><p><a href="https://www.backupcentral.com/how-to-prevent-ransomware-slow-its-spread-and-respond-if-you-get-it/" rel="noopener noreferrer" target="_blank">How to prevent ransomware, slow its spread, and respond if you get it</a></p><p><a href="https://www.backupcentral.com/how-to-prepare-for-an-emergency-at-home-and-work/" rel="noopener noreferrer" target="_blank">How to prepare for an emergency (at home and work)</a></p><p><a href="https://www.backupcentral.com/backup-practitioner-tells-stories-from-the-trenches/" rel="noopener noreferrer" target="_blank">Backup practitioner tells stories from the trenches</a></p><p><a href="https://www.backupcentral.com/top-5-security-mistakes-youre-making-in-the-cloud/" rel="noopener noreferrer" target="_blank">Top 5 security mistakes you're making in the cloud</a></p><p><a href="https://www.backupcentral.com/international-lawyer-discusses-e-discovery-in-us-other-countries/" rel="noopener noreferrer" target="_blank">International lawyer discusses e-discovery in US &amp; other countries</a></p><p><a href="https://www.backupcentral.com/shocking-rackspace-hosted-exchange-ransomware-attack/" rel="noopener noreferrer" target="_blank">Shocking RackSpace Hosted Exchange Ransomware Attack</a></p>]]></description><content:encoded><![CDATA[<p>Nothing but the best for our listeners!  Curtis and Prasanna review their favorite episodes from 2022, from the time Curtis had to restore Backup Central to the shocking outage at Rackspace (	which is still ongoing!).  This is your chance to catch up on what you missed last year as we prepare for a new year!  Here are links to all the episodes discussed. Happy New Year!</p><p><a href="https://www.backupcentral.com/mr-backup-forced-to-restore-backupcentral-com-restore-it-all-podcast-143/" rel="noopener noreferrer" target="_blank">Mr. Backup Forced to Restore Backup Central</a></p><p><a href="https://www.backupcentral.com/restore-test-failed-due-to-bad-documentation-restore-it-all-podcast-147/" rel="noopener noreferrer" target="_blank">Restore Test Failed to Bad Documentation</a></p><p><a href="https://www.backupcentral.com/security-expert-rips-okta-for-their-response-to-hack/" rel="noopener noreferrer" target="_blank">Security expert rips Okta for their response to hack</a></p><p><a href="https://www.backupcentral.com/how-to-prevent-ransomware-slow-its-spread-and-respond-if-you-get-it/" rel="noopener noreferrer" target="_blank">How to prevent ransomware, slow its spread, and respond if you get it</a></p><p><a href="https://www.backupcentral.com/how-to-prepare-for-an-emergency-at-home-and-work/" rel="noopener noreferrer" target="_blank">How to prepare for an emergency (at home and work)</a></p><p><a href="https://www.backupcentral.com/backup-practitioner-tells-stories-from-the-trenches/" rel="noopener noreferrer" target="_blank">Backup practitioner tells stories from the trenches</a></p><p><a href="https://www.backupcentral.com/top-5-security-mistakes-youre-making-in-the-cloud/" rel="noopener noreferrer" target="_blank">Top 5 security mistakes you're making in the cloud</a></p><p><a href="https://www.backupcentral.com/international-lawyer-discusses-e-discovery-in-us-other-countries/" rel="noopener noreferrer" target="_blank">International lawyer discusses e-discovery in US &amp; other countries</a></p><p><a href="https://www.backupcentral.com/shocking-rackspace-hosted-exchange-ransomware-attack/" rel="noopener noreferrer" target="_blank">Shocking RackSpace Hosted Exchange Ransomware Attack</a></p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/best-of-2022-backups-security-and-ransomware/]]></link><guid isPermaLink="false">b20f110c-a8a9-41b1-bd4a-71630e7d7320</guid><itunes:image href="https://artwork.captivate.fm/cea11445-dcbf-4b68-b615-b6869c3d6e5a/BYm1cxVgGUS2diChh7tRLHEB.jpg"/><pubDate>Mon, 02 Jan 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/2fc9f066-3882-4b10-9555-11fa13a832a0/RIA-2022.mp3" length="20181244" type="audio/mpeg"/><itunes:duration>28:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/99afb307-211c-499e-877d-d8d6c02fd14d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/99afb307-211c-499e-877d-d8d6c02fd14d/index.html" type="text/html"/></item><item><title>Shocking RackSpace Hosted Exchange Ransomware Attack</title><itunes:title>Shocking RackSpace Hosted Exchange Ransomware Attack</itunes:title><description><![CDATA[<p>Tomorrow marks two weeks from when the RackSpace outage started on Dec 2, 2022. They confirmed it was via a ransomware attack and it is not. going. well.  We're going to do a deeper dive into this once it is all over, but this is a first-blush look at what is happening and RackSpace's reaction to it.  When we recorded this episode, their reaction was not looking good.  I'm sad to say it's gotten even worse.  Check it out!</p>]]></description><content:encoded><![CDATA[<p>Tomorrow marks two weeks from when the RackSpace outage started on Dec 2, 2022. They confirmed it was via a ransomware attack and it is not. going. well.  We're going to do a deeper dive into this once it is all over, but this is a first-blush look at what is happening and RackSpace's reaction to it.  When we recorded this episode, their reaction was not looking good.  I'm sad to say it's gotten even worse.  Check it out!</p>]]></content:encoded><link><![CDATA[https://www.backupwrapup.com]]></link><guid isPermaLink="false">9f986ec1-c4c2-47ed-bedd-7632c30f3780</guid><itunes:image href="https://artwork.captivate.fm/9dfd6888-ad4e-408f-afe6-0527cb8c6182/YgsMsnuCuYtVlcIUo6xllOz7.jpg"/><pubDate>Mon, 19 Dec 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e60d4f94-b5e2-4629-8c3e-3a88ac20e82e/Rackspace.mp3" length="31680243" type="audio/mpeg"/><itunes:duration>44:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/5842d959-a26b-4807-b504-88f7b44f3da1/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5842d959-a26b-4807-b504-88f7b44f3da1/index.html" type="text/html"/></item><item><title>Understanding Backup Levels (Backup to Basics Series)</title><itunes:title>Understanding Backup Levels (Backup to Basics Series)</itunes:title><description><![CDATA[<p>Ok, so maybe not the most interesting topic. ;) But we promise you, this episode has a great story that involves Mr. Backup being kidnapped by a client, basically because he had a backup level issue.  Learn about full backups, incrementals, cumulative incrementals, differentials, numbered levels, tower of hanoi backups, and why all this matters.  It turns out it matters a lot more these days for structured backups than filesystem backups, which have typically gone to an incremental forever setup.  </p>]]></description><content:encoded><![CDATA[<p>Ok, so maybe not the most interesting topic. ;) But we promise you, this episode has a great story that involves Mr. Backup being kidnapped by a client, basically because he had a backup level issue.  Learn about full backups, incrementals, cumulative incrementals, differentials, numbered levels, tower of hanoi backups, and why all this matters.  It turns out it matters a lot more these days for structured backups than filesystem backups, which have typically gone to an incremental forever setup.  </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/understanding-backup-levels-backup-to-basics-series/]]></link><guid isPermaLink="false">5397eeed-6195-4826-8eb5-1a64bd338f18</guid><itunes:image href="https://artwork.captivate.fm/b6395f31-308c-4c51-9cf6-697bb68cd1ff/121pjambB9pG0AMPrgYGiCK3.jpg"/><pubDate>Mon, 12 Dec 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0c0f30c6-e94c-43e3-b565-b2ea871b2325/RIA-Levels.mp3" length="26846858" type="audio/mpeg"/><itunes:duration>37:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/d74b26d7-1675-4d25-834a-980bebac3d52/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d74b26d7-1675-4d25-834a-980bebac3d52/index.html" type="text/html"/></item><item><title>Risk Management Advice from an industry expert</title><itunes:title>Risk Management Advice from an industry expert</itunes:title><description><![CDATA[<p>This episode we have Boris Agranovich, who has been a risk manager for decades, and speaks SIX languages (Russian, Ukrainian, Hebrew, Dutch, English, and Spanish).  How amazing is that?  He started the Global Risk Community, the largest online community for risk managers, and it's doing very well.  We talk about the differences between what we do (as IT risk managers) and what he does, where he's managing risk for the entire organization.  Fascinating guy with a unique perspective. </p>]]></description><content:encoded><![CDATA[<p>This episode we have Boris Agranovich, who has been a risk manager for decades, and speaks SIX languages (Russian, Ukrainian, Hebrew, Dutch, English, and Spanish).  How amazing is that?  He started the Global Risk Community, the largest online community for risk managers, and it's doing very well.  We talk about the differences between what we do (as IT risk managers) and what he does, where he's managing risk for the entire organization.  Fascinating guy with a unique perspective. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/risk-management-advice-from-an-industry-expert/]]></link><guid isPermaLink="false">583f875b-ebbb-4223-a93d-fba8a3609473</guid><itunes:image href="https://artwork.captivate.fm/2e43c278-d332-410c-a320-d3ee331efb7f/WmwtUpOLz8S0pACCVotZo08V.jpg"/><pubDate>Mon, 05 Dec 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/3ead4224-aeb5-4d20-96d4-c4a3c87951fc/Boris-Agranovich.mp3" length="27519884" type="audio/mpeg"/><itunes:duration>38:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/380a4af5-3fda-4e85-a2b0-b7638030d8d7/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/380a4af5-3fda-4e85-a2b0-b7638030d8d7/index.html" type="text/html"/></item><item><title>What is archive and retrieve? (Backup to Basics)</title><itunes:title>What is archive and retrieve? (Backup to Basics)</itunes:title><description><![CDATA[<p>Archive is NOT backup, and hopefully this episode will help you understand how/why that is the case.  In this continued romp through W. Curtis Preston's Modern Data Protection, we explore the definition of archive, and how different it is from backup.  You should have no trouble understanding the difference between the two after listening to this episode.   As usual,  Mr. Backup fills in the definition with interesting stories of what happens when you confuse backup and archive.  Enjoy!</p>]]></description><content:encoded><![CDATA[<p>Archive is NOT backup, and hopefully this episode will help you understand how/why that is the case.  In this continued romp through W. Curtis Preston's Modern Data Protection, we explore the definition of archive, and how different it is from backup.  You should have no trouble understanding the difference between the two after listening to this episode.   As usual,  Mr. Backup fills in the definition with interesting stories of what happens when you confuse backup and archive.  Enjoy!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-is-archive-and-retrieve-backup-to-basics/]]></link><guid isPermaLink="false">01bfb3cc-5a2d-4428-9f26-ecd261e50a5a</guid><itunes:image href="https://artwork.captivate.fm/ff471704-99fb-45cc-b788-23f6c108a173/ZvHOEPVLQuzEB_asoC1lgRBj.jpg"/><pubDate>Mon, 28 Nov 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d92d131b-0455-4225-b422-c57507e98f44/RIA-What-20is-20archive.mp3" length="32092466" type="audio/mpeg"/><itunes:duration>44:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/fa6036b8-ead0-4b29-a254-c1e140050960/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/fa6036b8-ead0-4b29-a254-c1e140050960/index.html" type="text/html"/></item><item><title>What is backup and restore? (Backup to Basics Series)</title><itunes:title>What is backup and restore? (Backup to Basics Series)</itunes:title><description><![CDATA[<p>As we continue our "Backup to Basics" series, we touch on one of the most important questions of all: what is backup and restore? (And how does it different than archive and retrieve?) The answer to these questions are both simple and nuanced. It's important to have a solid understanding of backup and restore in order to understand how archive is different. </p><p>Reminder: You can download a complimentary copy of Mr. Backup's latest book, Modern Data Protection here: <a href="https://druva.com/ebook" rel="noopener noreferrer" target="_blank">https://druva.com/ebook</a>.</p>]]></description><content:encoded><![CDATA[<p>As we continue our "Backup to Basics" series, we touch on one of the most important questions of all: what is backup and restore? (And how does it different than archive and retrieve?) The answer to these questions are both simple and nuanced. It's important to have a solid understanding of backup and restore in order to understand how archive is different. </p><p>Reminder: You can download a complimentary copy of Mr. Backup's latest book, Modern Data Protection here: <a href="https://druva.com/ebook" rel="noopener noreferrer" target="_blank">https://druva.com/ebook</a>.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-is-backup-and-restore-backup-to-basics-series/]]></link><guid isPermaLink="false">68a7aade-b969-4817-bb16-c1fb8cc28526</guid><itunes:image href="https://artwork.captivate.fm/d6f5dffd-13a8-438c-bfad-3d26c657b592/5ApfJ_yIoEfA-1Pbcwjqa7HT.jpg"/><pubDate>Mon, 21 Nov 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/861f93a5-3c05-4fa4-8a99-b21dd70d72b9/RIA-20-20What-20is-20backup.mp3" length="32499350" type="audio/mpeg"/><itunes:duration>45:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/f81bbcc5-de34-4612-aa01-9d6328f10363/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f81bbcc5-de34-4612-aa01-9d6328f10363/index.html" type="text/html"/></item><item><title>Divining Requirements out of the Organization</title><itunes:title>Divining Requirements out of the Organization</itunes:title><description><![CDATA[<p>This episode follows the previous one in a very interesting way.  We have a guest, Eric Bursley, whose job is to divine business and technical requirements from a vendor perspective at Presidio, an IT solutions provider.  He consults with customers and helps them get from "I want" to "I need."  This was a fascinating conversation that took a turn into (surprise) ransomware.  Eric is a fan of the pod and knows his stuff.  </p><p>As mentioned in the podcast, here is a link to the music video that is the theme song of the podcast: </p><p>https://www.youtube.com/watch?v=fPoE7nlgYe4</p><p>The episode where we meet the voice behind the song: https://player.captivate.fm/episode/b60b207b-2dfc-4b38-b5ea-1cd4c6231025</p>]]></description><content:encoded><![CDATA[<p>This episode follows the previous one in a very interesting way.  We have a guest, Eric Bursley, whose job is to divine business and technical requirements from a vendor perspective at Presidio, an IT solutions provider.  He consults with customers and helps them get from "I want" to "I need."  This was a fascinating conversation that took a turn into (surprise) ransomware.  Eric is a fan of the pod and knows his stuff.  </p><p>As mentioned in the podcast, here is a link to the music video that is the theme song of the podcast: </p><p>https://www.youtube.com/watch?v=fPoE7nlgYe4</p><p>The episode where we meet the voice behind the song: https://player.captivate.fm/episode/b60b207b-2dfc-4b38-b5ea-1cd4c6231025</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/divining-requirements-out-of-the-organization/]]></link><guid isPermaLink="false">afce5788-4396-4129-96d2-f911e5017d98</guid><itunes:image href="https://artwork.captivate.fm/24ec1dbc-2571-413f-817c-ad097755d1a3/D__k-hyUozoKjkjw9pdgpBHZ.jpg"/><pubDate>Mon, 14 Nov 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/9169a76a-b39a-4e3d-8abd-db48c2f88a92/Eric-20Bursley.mp3" length="28593199" type="audio/mpeg"/><itunes:duration>39:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/8576a6fa-d5f8-449f-b97a-bf7ca646a408/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8576a6fa-d5f8-449f-b97a-bf7ca646a408/index.html" type="text/html"/></item><item><title>Getting approval for a new backup design (Backup to Basics Series)</title><itunes:title>Getting approval for a new backup design (Backup to Basics Series)</itunes:title><description><![CDATA[<p>We say it all the time: your backup requirements must be based on business/organizational needs.  If you keep that mind, not only will your organization be better off, it'll be easier to get approval for the new backup system you want.  This episode of our Backup to Basics series goes right to that core idea, and we get advice directly from one of our favorite guests: Jeff Rochlin.  He is now the Head of Technical Operations at the LA Studio of Framestore, a visual effects company. In his 30+ year career he has designed and implemented dozens of systems (at least one of them with Mr. Backup).  He shares with us his tips on how to design the system AND how to get it approved.  </p><p>If you'd like to see what Jeff and Curtis do for fun, check out their other podcast, <a href="https://podcasts.apple.com/us/podcast/the-things-that-entertain-us/id1619856804" rel="noopener noreferrer" target="_blank">The Things That Entertain Us.</a></p>]]></description><content:encoded><![CDATA[<p>We say it all the time: your backup requirements must be based on business/organizational needs.  If you keep that mind, not only will your organization be better off, it'll be easier to get approval for the new backup system you want.  This episode of our Backup to Basics series goes right to that core idea, and we get advice directly from one of our favorite guests: Jeff Rochlin.  He is now the Head of Technical Operations at the LA Studio of Framestore, a visual effects company. In his 30+ year career he has designed and implemented dozens of systems (at least one of them with Mr. Backup).  He shares with us his tips on how to design the system AND how to get it approved.  </p><p>If you'd like to see what Jeff and Curtis do for fun, check out their other podcast, <a href="https://podcasts.apple.com/us/podcast/the-things-that-entertain-us/id1619856804" rel="noopener noreferrer" target="_blank">The Things That Entertain Us.</a></p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/getting-approval-for-a-new-backup-design-backup-to-basics-series/]]></link><guid isPermaLink="false">3076a672-74e5-405e-b2e9-067b626243d0</guid><itunes:image href="https://artwork.captivate.fm/ab53101e-f81d-4313-82d0-be1efbd285d4/iH7db_MffcYybrFh4zwFY-k3.jpg"/><pubDate>Mon, 31 Oct 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/85f0232d-4c2b-4b04-913a-4fb025eeab8d/RIA-20Jeff-20Rochlin-20Business.mp3" length="33835047" type="audio/mpeg"/><itunes:duration>47:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/1fc6a4d1-2aba-42a6-bdbe-cde270a6fc53/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/1fc6a4d1-2aba-42a6-bdbe-cde270a6fc53/index.html" type="text/html"/></item><item><title>When to use public or private cloud AND how to protect it</title><itunes:title>When to use public or private cloud AND how to protect it</itunes:title><description><![CDATA[<p>If you have sometimes wondered if your apps should be in a public cloud, private cloud, or in your own datacenter, have we got the episode for you.  And we'll also talk about how to protect those apps regardless of where they reside. We looked hard for an unbiased cloud expert, and I think we hit gold.  We found Sagi Brody, the CTO of Opti9, an MSP that supports both public and private clouds, as well as on-premises backup infrastructure!  We talk extensively about which types of things are appropriate (from a cost and risk perspective) to go into the public cloud, private cloud, SaaS apps, and even your own datacenter. It was an informative and entertaining conversation that we're sure you will enjoy. </p>]]></description><content:encoded><![CDATA[<p>If you have sometimes wondered if your apps should be in a public cloud, private cloud, or in your own datacenter, have we got the episode for you.  And we'll also talk about how to protect those apps regardless of where they reside. We looked hard for an unbiased cloud expert, and I think we hit gold.  We found Sagi Brody, the CTO of Opti9, an MSP that supports both public and private clouds, as well as on-premises backup infrastructure!  We talk extensively about which types of things are appropriate (from a cost and risk perspective) to go into the public cloud, private cloud, SaaS apps, and even your own datacenter. It was an informative and entertaining conversation that we're sure you will enjoy. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/when-to-use-public-or-private-cloud-and-how-to-protect-it/]]></link><guid isPermaLink="false">286ae3fd-25b4-4b10-82a4-063f6580dfc4</guid><itunes:image href="https://artwork.captivate.fm/f640fb46-785f-42fc-a859-c1e2d2e55911/jwNAZkqngOF283Og6okB1YQj.jpg"/><pubDate>Mon, 24 Oct 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/9af5820d-cb78-436f-871f-8c4772f65332/RIA-20Sagi-20Brody.mp3" length="30799399" type="audio/mpeg"/><itunes:duration>42:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/52e53215-3aff-4788-86e4-fa81f370a046/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/52e53215-3aff-4788-86e4-fa81f370a046/index.html" type="text/html"/></item><item><title>Why do we even back up?  (Backup to Basics Series)</title><itunes:title>Why do we even back up?  (Backup to Basics Series)</itunes:title><description><![CDATA[<p>We get right to the heart of the matter in this next episode of our Backup to Basics series.  (See what we did there?). Why do we even back up?   It is expensive, time consuming, and no one seems to want to be in charge of it, so we do we even do it anyway.   This episode is based on Chapter 1 of W. Curtis Preston's latest O'Reilly book, Modern Data Protection, which you can download for <a href="druva.com/podcast" rel="noopener noreferrer" target="_blank">free courtesy of Curtis' employer, Druva</a>.  Curtis believes there are three categories of reasons: human disasters, mechanical failures, and natural disasters.  We talk about the odds of each of these happening, and how that's changed over the years.</p><p>The episode also starts with Mr. Backup telling the story of how he got into backup in the first place, as well as telling the story of the first time he lost data.  It's the whole reason he ended up dedicating his career to backup, and he learned a lot of things from that failure.  </p><p>Here are the links to other episodes we discuss in this episode of the pod.</p><p><a href="https://www.backupcentral.com/real-life-hurricane-disaster-recover-story/" rel="noopener noreferrer" target="_blank">Real Life Hurricane Disaster Recovery Story</a></p><p><a href="https://www.backupcentral.com/disaster-recovery-after-a-hurricane-a-first-hand-account-restore-it-all-podcast-82/" rel="noopener noreferrer" target="_blank">Disaster Recovery after a hurricane - a First Hand Account</a></p><p><a href="https://www.backupcentral.com/stop-ransomware-attacks-in-seconds-restore-it-all-podcast-126/" rel="noopener noreferrer" target="_blank">Stop Ransomware Attacks in Seconds</a>. (Includes the Derecho story)</p>]]></description><content:encoded><![CDATA[<p>We get right to the heart of the matter in this next episode of our Backup to Basics series.  (See what we did there?). Why do we even back up?   It is expensive, time consuming, and no one seems to want to be in charge of it, so we do we even do it anyway.   This episode is based on Chapter 1 of W. Curtis Preston's latest O'Reilly book, Modern Data Protection, which you can download for <a href="druva.com/podcast" rel="noopener noreferrer" target="_blank">free courtesy of Curtis' employer, Druva</a>.  Curtis believes there are three categories of reasons: human disasters, mechanical failures, and natural disasters.  We talk about the odds of each of these happening, and how that's changed over the years.</p><p>The episode also starts with Mr. Backup telling the story of how he got into backup in the first place, as well as telling the story of the first time he lost data.  It's the whole reason he ended up dedicating his career to backup, and he learned a lot of things from that failure.  </p><p>Here are the links to other episodes we discuss in this episode of the pod.</p><p><a href="https://www.backupcentral.com/real-life-hurricane-disaster-recover-story/" rel="noopener noreferrer" target="_blank">Real Life Hurricane Disaster Recovery Story</a></p><p><a href="https://www.backupcentral.com/disaster-recovery-after-a-hurricane-a-first-hand-account-restore-it-all-podcast-82/" rel="noopener noreferrer" target="_blank">Disaster Recovery after a hurricane - a First Hand Account</a></p><p><a href="https://www.backupcentral.com/stop-ransomware-attacks-in-seconds-restore-it-all-podcast-126/" rel="noopener noreferrer" target="_blank">Stop Ransomware Attacks in Seconds</a>. (Includes the Derecho story)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/why-do-we-even-back-up-backup-to-basics-series/]]></link><guid isPermaLink="false">9f4905cb-702d-4a0e-a54d-0e1bae4c6230</guid><itunes:image href="https://artwork.captivate.fm/36e0fe1d-be84-4b29-905e-d22652f1bd45/WoubzRpJ4meGCh9QVZskOsxl.jpg"/><pubDate>Mon, 17 Oct 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f6d7f035-e43b-456c-ba67-e734685c375e/Why-20we-20back-20up.mp3" length="28493204" type="audio/mpeg"/><itunes:duration>39:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/b7cf5336-a182-41b2-a0cf-8896e618e681/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b7cf5336-a182-41b2-a0cf-8896e618e681/index.html" type="text/html"/></item><item><title>International lawyer discusses e-discovery in US &amp; other countries</title><itunes:title>International lawyer discusses e-discovery in US &amp; other countries</itunes:title><description><![CDATA[<p>This week are we pleased to announce we have Joe Dehner, specialist in International Law, to discuss the legal side of e-discovery and all the things that go with it.  For the first time on Restore it All, we have a lawyer discussing legal things!  (Usually we just tell you we're not lawyers!) My favorite part was listening to him tell stories from actual cases that make the various points we discuss.  I also enjoyed when we talk about the e-discovery boogey man, adverse inference.  If you have heard me talk about this before, it's usually around the context of backup and archive –&nbsp;and how they are different!  Hear it from the horse's mouth, so to speak. </p>]]></description><content:encoded><![CDATA[<p>This week are we pleased to announce we have Joe Dehner, specialist in International Law, to discuss the legal side of e-discovery and all the things that go with it.  For the first time on Restore it All, we have a lawyer discussing legal things!  (Usually we just tell you we're not lawyers!) My favorite part was listening to him tell stories from actual cases that make the various points we discuss.  I also enjoyed when we talk about the e-discovery boogey man, adverse inference.  If you have heard me talk about this before, it's usually around the context of backup and archive –&nbsp;and how they are different!  Hear it from the horse's mouth, so to speak. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/international-lawyer-discusses-e-discovery-in-us-other-countries/]]></link><guid isPermaLink="false">9d530791-1d8b-4141-a4fa-2d3825270b53</guid><itunes:image href="https://artwork.captivate.fm/419c1bbc-d1ac-403c-ab95-da7e0d0d41ab/Hq-REqjaGMso5RxRjQRhLwPP.jpg"/><pubDate>Mon, 10 Oct 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d02a9ba7-a3e8-493b-8213-985efabb453b/Joe-20Dehner.mp3" length="32531313" type="audio/mpeg"/><itunes:duration>45:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/48a69a42-a648-4580-bf94-3192f3fe9614/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/48a69a42-a648-4580-bf94-3192f3fe9614/index.html" type="text/html"/></item><item><title>Your cyber insurance doesn&apos;t want to pay for your hack</title><itunes:title>Your cyber insurance doesn&apos;t want to pay for your hack</itunes:title><description><![CDATA[<p>This is a trend that's happening around the globe, and the news we got from Lloyd's of London Insurance in August is just the latest example.  They're looking to exclude payments for "catastropic" and "state-sponsored" attacks. We talk about what that means.  We also discuss how a plaintiff lost a recent lawsuit against their insurance company, getting $100K when what they wanted was $600K.  It was how their policy was written.  We also talk about a new show (streaming on Peacock in the US) called "The Undeclared War" that is technically fictional but seems all too real.   We finish up with a discussion of how we see the roll of cyber insurance in this scary world of ransomware.  Saddle up and listen up!</p>]]></description><content:encoded><![CDATA[<p>This is a trend that's happening around the globe, and the news we got from Lloyd's of London Insurance in August is just the latest example.  They're looking to exclude payments for "catastropic" and "state-sponsored" attacks. We talk about what that means.  We also discuss how a plaintiff lost a recent lawsuit against their insurance company, getting $100K when what they wanted was $600K.  It was how their policy was written.  We also talk about a new show (streaming on Peacock in the US) called "The Undeclared War" that is technically fictional but seems all too real.   We finish up with a discussion of how we see the roll of cyber insurance in this scary world of ransomware.  Saddle up and listen up!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/your-cyber-insurance-doesnt-want-to-pay-for-your-hack/]]></link><guid isPermaLink="false">f52d72c0-d1a7-4c71-8af5-ac08dfc2adcb</guid><itunes:image href="https://artwork.captivate.fm/8e31c079-c0e2-4b8f-95a0-78eab5dac315/hkrMRDqZiuzvyhIa_6jU0nww.jpg"/><pubDate>Mon, 03 Oct 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/602e82ca-3ba2-4b62-9b0a-c301f28f3c1c/RIA-20Cyber-20Insurance.mp3" length="27844014" type="audio/mpeg"/><itunes:duration>38:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/652706c1-4e62-4670-bdbe-1afae714cf37/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/652706c1-4e62-4670-bdbe-1afae714cf37/index.html" type="text/html"/></item><item><title>Learning lessons from the Uber and LA USD cyberattacks</title><itunes:title>Learning lessons from the Uber and LA USD cyberattacks</itunes:title><description><![CDATA[<p>The Uber attack is huge.  The initial penetration teaches about MFA, and how they were able to escalate their privileges from there is simply wrong, wrong, wrong.  What can you learn from this?  Well, we have a cybersecurity expert, and host of the Tech and Main podcast, on the pod this week to help us figure that out.  We had planned to just talk about the Uber attack, but he also wanted to talk about what happened to the LA Unified School District.  Do you have kids in school, or know someone employed in K-12 education?  Shaun St. Hill makes a solid point or two about what they should be doing.   All that and Curtis complaining about how much he spent on his vacation to Hawaii.  Boo hoo, right? </p>]]></description><content:encoded><![CDATA[<p>The Uber attack is huge.  The initial penetration teaches about MFA, and how they were able to escalate their privileges from there is simply wrong, wrong, wrong.  What can you learn from this?  Well, we have a cybersecurity expert, and host of the Tech and Main podcast, on the pod this week to help us figure that out.  We had planned to just talk about the Uber attack, but he also wanted to talk about what happened to the LA Unified School District.  Do you have kids in school, or know someone employed in K-12 education?  Shaun St. Hill makes a solid point or two about what they should be doing.   All that and Curtis complaining about how much he spent on his vacation to Hawaii.  Boo hoo, right? </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/learning-lessons-from-the-uber-and-la-usd-cyberattacks/]]></link><guid isPermaLink="false">29f11fb3-faee-4193-bbc0-a3018560061c</guid><itunes:image href="https://artwork.captivate.fm/50cddf80-e2ad-4f1f-a505-7db7d3661ac3/ZKS4LtOR5fPQOw54uiCr-_tJ.jpg"/><pubDate>Mon, 26 Sep 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/7c0f35c1-083e-4e85-b6fc-0bfa24d5d14b/Uber-20-20LAUSD-20attacks.mp3" length="29887836" type="audio/mpeg"/><itunes:duration>41:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/ec865c3e-db0c-400a-81b8-15e6cbf5044e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/ec865c3e-db0c-400a-81b8-15e6cbf5044e/index.html" type="text/html"/></item><item><title>Top 5 security mistakes you&apos;re making in the cloud</title><itunes:title>Top 5 security mistakes you&apos;re making in the cloud</itunes:title><description><![CDATA[<p>Cyber security attacks are everywhere, and they're definitely going after what you have running in your favorite hyperscaler. Today we are joined by Paul Hadgy, CEO of Horangi Security, a cyber security company specializing in securing your cloud infrastructure.  We talk about a number of things, but at one point, Mr. Backup asked him what the thought was the five biggest security mistakes people make when building out their cloud infrastructure.  He gave us a pretty good list, and then talked about how they're able to secure it AND make sure you're properly utilizing it. (They can tell you resources you're paying for that you shouldn't be!) Great interview with Paul.</p>]]></description><content:encoded><![CDATA[<p>Cyber security attacks are everywhere, and they're definitely going after what you have running in your favorite hyperscaler. Today we are joined by Paul Hadgy, CEO of Horangi Security, a cyber security company specializing in securing your cloud infrastructure.  We talk about a number of things, but at one point, Mr. Backup asked him what the thought was the five biggest security mistakes people make when building out their cloud infrastructure.  He gave us a pretty good list, and then talked about how they're able to secure it AND make sure you're properly utilizing it. (They can tell you resources you're paying for that you shouldn't be!) Great interview with Paul.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/top-5-security-mistakes-youre-making-in-the-cloud/]]></link><guid isPermaLink="false">a962e8b7-c5c2-4ceb-9d85-ae94b8391f38</guid><itunes:image href="https://artwork.captivate.fm/eed36640-2125-40f0-9141-4e7c7192a1f2/l3uPmQy5Qenx8FvqCHrshXT0.jpg"/><pubDate>Mon, 19 Sep 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/be0848bd-f66f-4b38-bb78-a5d973d7b245/Paul-20Hadgy-20Main.mp3" length="31150799" type="audio/mpeg"/><itunes:duration>43:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>How to back up Jira</title><itunes:title>How to back up Jira</itunes:title><description><![CDATA[<p>Jira is yet another service that could be at the center of your organization, and losing the data stored in there could cost you a lot. Did you know it doesn't even have an audit trail for many things?  Not only can you lose data, you might not know what was deleted or who did it! We are joined this week from two representatives from Revyz, a new service to back up Jira.  They talk about what to back up and what you can do for free, along with what functionality that misses out on.  They then explain how their new service works and what it offers. Great episode where I learned a lot. Even if you don't use Jira, you will find a lot of useful info in this episode. </p>]]></description><content:encoded><![CDATA[<p>Jira is yet another service that could be at the center of your organization, and losing the data stored in there could cost you a lot. Did you know it doesn't even have an audit trail for many things?  Not only can you lose data, you might not know what was deleted or who did it! We are joined this week from two representatives from Revyz, a new service to back up Jira.  They talk about what to back up and what you can do for free, along with what functionality that misses out on.  They then explain how their new service works and what it offers. Great episode where I learned a lot. Even if you don't use Jira, you will find a lot of useful info in this episode. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-back-up-jira/]]></link><guid isPermaLink="false">d9f547fb-7a4d-405f-acad-81d61970c386</guid><itunes:image href="https://artwork.captivate.fm/f4e5dac6-fd47-4ae0-8a21-26f95bd82a86/2Vey6ZSoprg8zsh7AT-rs-ER.jpg"/><pubDate>Mon, 12 Sep 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c3d7c1c3-db75-40db-9969-abb9512b8e26/Vish-Sanket.mp3" length="32725352" type="audio/mpeg"/><itunes:duration>45:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2cdfcc93-5940-4e43-acd9-6774a3aeb7c6/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2cdfcc93-5940-4e43-acd9-6774a3aeb7c6/index.html" type="text/html"/></item><item><title>What are RTO and RPO &amp; how do they drive backup design?</title><itunes:title>What are RTO and RPO &amp; how do they drive backup design?</itunes:title><description><![CDATA[<p>If you don't meet your company's Recovery time objective (RTO) and Recovery Point Objective with your backup design, nothing else matters.  Seriously.  No one cares if you can back up – only that you can restore in a timeframe they consider reasonable.  The only way that's going to happen is if you agree to these times UPFRONT.  In this episode in our new back to basics series, we'll jump right into this extremely important topic.  We'll explain what RTO &amp; RPO are, what recovery time and recovery point actual are, and how they relate to RTO &amp; RPO.  We'll also explain how to get your company to agree to them. </p>]]></description><content:encoded><![CDATA[<p>If you don't meet your company's Recovery time objective (RTO) and Recovery Point Objective with your backup design, nothing else matters.  Seriously.  No one cares if you can back up – only that you can restore in a timeframe they consider reasonable.  The only way that's going to happen is if you agree to these times UPFRONT.  In this episode in our new back to basics series, we'll jump right into this extremely important topic.  We'll explain what RTO &amp; RPO are, what recovery time and recovery point actual are, and how they relate to RTO &amp; RPO.  We'll also explain how to get your company to agree to them. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-are-rto-and-rpo-and-how-do-they-drive-backup-design/]]></link><guid isPermaLink="false">2c794be3-0814-4368-a604-4f3a69a97742</guid><itunes:image href="https://artwork.captivate.fm/f7fb9c09-210a-4c70-a77a-7f0d0c7b218b/ZFbUmw8FGVCrWsjpZWHemIxx.jpg"/><pubDate>Tue, 06 Sep 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/8e6cf6a6-f444-4c99-af61-3fc73007c316/RTO-RPO.mp3" length="30163049" type="audio/mpeg"/><itunes:duration>41:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/c67e8af6-e1d8-4e99-8a55-97eab50e6c85/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c67e8af6-e1d8-4e99-8a55-97eab50e6c85/index.html" type="text/html"/></item><item><title>Why you need a password manager</title><itunes:title>Why you need a password manager</itunes:title><description><![CDATA[<p>Why don't you have a password manager already?  Our guest this week, Chris Hayner, blogger at hayner.net and host of the Chaos Lever podcast, wrote a great blog called Yes, you need a password manager. "Yes, You Do Need A Password Manager, Brett. Yes You Do!"  Both Prasanna and Curtis DO have password managers, so he's preaching to the choir.  But if you'd like to hear the argument for why you need one, and arguments against many of the usual excuses for not having one, then this is the episode you need. And, as usual, we have a little fun along the way. </p>]]></description><content:encoded><![CDATA[<p>Why don't you have a password manager already?  Our guest this week, Chris Hayner, blogger at hayner.net and host of the Chaos Lever podcast, wrote a great blog called Yes, you need a password manager. "Yes, You Do Need A Password Manager, Brett. Yes You Do!"  Both Prasanna and Curtis DO have password managers, so he's preaching to the choir.  But if you'd like to hear the argument for why you need one, and arguments against many of the usual excuses for not having one, then this is the episode you need. And, as usual, we have a little fun along the way. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/why-you-need-a-password-manager/]]></link><guid isPermaLink="false">93ffb1e9-be77-4c75-b49a-02b5a039907f</guid><itunes:image href="https://artwork.captivate.fm/6a784544-df4f-4cab-a546-e02817e9ed58/wNeZbkPHo6oE1JbUtnd607VR.jpg"/><pubDate>Mon, 29 Aug 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/61ed2933-de6b-4e4b-87b0-db9bcfbd007b/Password-20managers.mp3" length="34267314" type="audio/mpeg"/><itunes:duration>47:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/44a15c20-556d-4110-a4aa-891465a4adde/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/44a15c20-556d-4110-a4aa-891465a4adde/index.html" type="text/html"/></item><item><title>Datacore becomes leader in container-attached storage</title><itunes:title>Datacore becomes leader in container-attached storage</itunes:title><description><![CDATA[<p>Datacore has been one of the storage industry's best-kept secrets for a long time, quietly growing a dedicated customer base in Fort Lauderdale.  Their CEO, Dave Zabrowski, joins us on this episode to explain their background, and tells us about how their technology and some savvy business decisions resulted in them owning Open EBS, the most popular container-attached storage platform.  Datacore is a software-defined storage product that virtualizing pretty much any kind of storage into any other kind of storage, giving you exactly what you need, without vendor lock-in.  Join us on this podcast to hear what's special about Datacore.</p>]]></description><content:encoded><![CDATA[<p>Datacore has been one of the storage industry's best-kept secrets for a long time, quietly growing a dedicated customer base in Fort Lauderdale.  Their CEO, Dave Zabrowski, joins us on this episode to explain their background, and tells us about how their technology and some savvy business decisions resulted in them owning Open EBS, the most popular container-attached storage platform.  Datacore is a software-defined storage product that virtualizing pretty much any kind of storage into any other kind of storage, giving you exactly what you need, without vendor lock-in.  Join us on this podcast to hear what's special about Datacore.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/datacore-becomes-leader-in-container-attached-storage/]]></link><guid isPermaLink="false">ec4d9226-4dc5-4ec3-a184-603ca0647044</guid><itunes:image href="https://artwork.captivate.fm/fe0a7222-4af9-4b72-9453-116f2a5219a4/TAUoOZqGZBqaAq9yZCd5lCBY.jpg"/><pubDate>Mon, 22 Aug 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e561586a-650c-4b1b-ba8a-7569d108c6f6/Datacore.mp3" length="30968039" type="audio/mpeg"/><itunes:duration>43:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/2ef1aef2-806d-4ef8-8102-fedfdd4531f9/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2ef1aef2-806d-4ef8-8102-fedfdd4531f9/index.html" type="text/html"/></item><item><title>M-disc founder explains how it keeps data for 1000 years</title><itunes:title>M-disc founder explains how it keeps data for 1000 years</itunes:title><description><![CDATA[<p>This week we have Barry Lunt, one of two founders of Milleniata, the creators of M-Disc.  The company may be gone, but the format lives on.  Most modern DVD and Blu-Ray drives can write to M-Disc, and Verbatim still sells it.  Barry explains to us why they decided to make M-Disc, and why it's different than any other optical product.  He also offers a shocker: a study done many years ago that shows that recordable DVDs are nowhere near as good at holding onto data as they claim.  There is a lot of good info in this episode.  Hope you like it. </p>]]></description><content:encoded><![CDATA[<p>This week we have Barry Lunt, one of two founders of Milleniata, the creators of M-Disc.  The company may be gone, but the format lives on.  Most modern DVD and Blu-Ray drives can write to M-Disc, and Verbatim still sells it.  Barry explains to us why they decided to make M-Disc, and why it's different than any other optical product.  He also offers a shocker: a study done many years ago that shows that recordable DVDs are nowhere near as good at holding onto data as they claim.  There is a lot of good info in this episode.  Hope you like it. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/m-disc-founder-explains-how-it-keeps-data-for-1000-years/]]></link><guid isPermaLink="false">d539d2fd-7c02-4394-95c9-64f1aa337ae6</guid><itunes:image href="https://artwork.captivate.fm/a91037ca-fc2e-4b0a-b545-cecd20d041df/BUDsNTPOCFv28Ahaw-IWQHEm.jpg"/><pubDate>Mon, 15 Aug 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1fca6856-fc89-4e11-9562-b179c32622c2/Barry-20Lunt-20Mdisc.mp3" length="32666111" type="audio/mpeg"/><itunes:duration>45:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/b18e70d2-3cd0-45e8-8d16-e88e3f689760/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b18e70d2-3cd0-45e8-8d16-e88e3f689760/index.html" type="text/html"/></item><item><title>The industry&apos;s first $10M data resiliency guarantee (From Druva)</title><itunes:title>The industry&apos;s first $10M data resiliency guarantee (From Druva)</itunes:title><description><![CDATA[<p>Druva's new data resiliency guarantee covers more than any other guarantee in the data protection/data resilience segment.  It also was written with no silly exclusions (like some other guarantees) that are simply there to keep from having to pay anyone. It requires only a certain service level and that the customer follows Druva's best practices.  It protects against the five areas of risk, including cyber, human, application, operational, and environmental.  It includes SLAs for uptime, backup success, restore success, immutability, and confidentiality.  This week we have Stephen Manley, Druva's CTO, to tell us about this new guarantee.   Check out the new guarantee here: <a href="https://www.druva.com/resilience-guarantee/" rel="noopener noreferrer" target="_blank">https://www.druva.com/resilience-guarantee/</a></p>]]></description><content:encoded><![CDATA[<p>Druva's new data resiliency guarantee covers more than any other guarantee in the data protection/data resilience segment.  It also was written with no silly exclusions (like some other guarantees) that are simply there to keep from having to pay anyone. It requires only a certain service level and that the customer follows Druva's best practices.  It protects against the five areas of risk, including cyber, human, application, operational, and environmental.  It includes SLAs for uptime, backup success, restore success, immutability, and confidentiality.  This week we have Stephen Manley, Druva's CTO, to tell us about this new guarantee.   Check out the new guarantee here: <a href="https://www.druva.com/resilience-guarantee/" rel="noopener noreferrer" target="_blank">https://www.druva.com/resilience-guarantee/</a></p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/the-industrys-first-10m-data-resiliency-guarantee-from-druva/]]></link><guid isPermaLink="false">2a3f45b8-4a3a-4418-b715-d1836aa7294b</guid><itunes:image href="https://artwork.captivate.fm/e354be5d-c732-44a0-9c97-72c9a1848f84/8JPGX34kvhuFOFnrkj6sebbT.png"/><pubDate>Mon, 08 Aug 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/47897dce-7562-416c-83ae-f6186644c46e/RIA-20DRG.mp3" length="30219160" type="audio/mpeg"/><itunes:duration>41:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/59e8ca16-ea2b-4d91-a501-ebcc4a3dc9f5/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/59e8ca16-ea2b-4d91-a501-ebcc4a3dc9f5/index.html" type="text/html"/></item><item><title>Warshipping: The latest trick in the bad actor&apos;s playbook</title><itunes:title>Warshipping: The latest trick in the bad actor&apos;s playbook</itunes:title><description><![CDATA[<p>Warshipping is yet another way hackers are taking advantage of how the pandemic has changed the workplace. Did you know you could be hacked by UPS, Fedex, or the postal service?  Warshipping is shipping a self-powered device in a package so that it arrives at your office and is left unattended. (It's sent to someone working from home.) The device then sits there, sniffing the wifi, and eventually cracking your WiFi network and attempting to steal secrets.  This isn't science fiction; it's reality.  It's enabled by so much remote work, and by technology such as the Raspberry Pi.  Read all about it in this article in DarkReading.com: https://www.darkreading.com/edge-articles/i-built-a-cheap-warshipping-device-in-just-three-hours-and-so-can-you</p><p>In this episode, Prasanna and Curtis discuss what this is, how it works, and what you need to do to stop this new attack vector.  </p>]]></description><content:encoded><![CDATA[<p>Warshipping is yet another way hackers are taking advantage of how the pandemic has changed the workplace. Did you know you could be hacked by UPS, Fedex, or the postal service?  Warshipping is shipping a self-powered device in a package so that it arrives at your office and is left unattended. (It's sent to someone working from home.) The device then sits there, sniffing the wifi, and eventually cracking your WiFi network and attempting to steal secrets.  This isn't science fiction; it's reality.  It's enabled by so much remote work, and by technology such as the Raspberry Pi.  Read all about it in this article in DarkReading.com: https://www.darkreading.com/edge-articles/i-built-a-cheap-warshipping-device-in-just-three-hours-and-so-can-you</p><p>In this episode, Prasanna and Curtis discuss what this is, how it works, and what you need to do to stop this new attack vector.  </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/warshipping-the-latest-trick-in-the-bad-actors-playbook/]]></link><guid isPermaLink="false">5a0689a7-334c-4df0-b87b-fc8c9297c4a4</guid><itunes:image href="https://artwork.captivate.fm/3903687a-acfa-4299-ae94-ed1870141ea9/7ZlDM2aNIOCVtFUZbKr1r5G4.jpg"/><pubDate>Mon, 01 Aug 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/04db085e-d88d-42bf-b071-006ca23ee216/Warshipping-20Main.mp3" length="27149363" type="audio/mpeg"/><itunes:duration>37:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/04584507-4dc2-48e8-bbb2-f53ba85880a2/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/04584507-4dc2-48e8-bbb2-f53ba85880a2/index.html" type="text/html"/></item><item><title>Really inexpensive AND secure storage systems for backup</title><itunes:title>Really inexpensive AND secure storage systems for backup</itunes:title><description><![CDATA[<p>If you're one of those people that look at typical storage offerings for backup and recovery and say, "I can't afford this," you're not alone.  A lot of ready-to-go storage solutions can get very expensive very quickly.  Our guest this week (Erik Ableson from <a href="https://www.Infrageeks.com" rel="noopener noreferrer" target="_blank">Infrageeks.com</a>) ran into this a lot with his small-government customers and SMBs in France, and knew he had to get creative.  He wanted to build a hardened Linux repository for Veeam backups, and he also wanted an S3 object storage system to serve as the second copy.  His customers couldn't easily buy cloud services, so he needed something they could own and manage themselves.  (He explains the unique reason they can't buy cloud services.) He built the Linux repository using a Synology box to run both the storage and a Linux VM, and he built the object storage system out of the free version of MinIO and what I will call a very unique build of hardware.  Learn the details in this fun episode of a real practitioner's solution to a unique and challenging problem. </p>]]></description><content:encoded><![CDATA[<p>If you're one of those people that look at typical storage offerings for backup and recovery and say, "I can't afford this," you're not alone.  A lot of ready-to-go storage solutions can get very expensive very quickly.  Our guest this week (Erik Ableson from <a href="https://www.Infrageeks.com" rel="noopener noreferrer" target="_blank">Infrageeks.com</a>) ran into this a lot with his small-government customers and SMBs in France, and knew he had to get creative.  He wanted to build a hardened Linux repository for Veeam backups, and he also wanted an S3 object storage system to serve as the second copy.  His customers couldn't easily buy cloud services, so he needed something they could own and manage themselves.  (He explains the unique reason they can't buy cloud services.) He built the Linux repository using a Synology box to run both the storage and a Linux VM, and he built the object storage system out of the free version of MinIO and what I will call a very unique build of hardware.  Learn the details in this fun episode of a real practitioner's solution to a unique and challenging problem. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/really-inexpensive-and-secure-storage-systems-backup/]]></link><guid isPermaLink="false">ca9a54ab-b7de-4beb-adfc-47fa82f56f25</guid><itunes:image href="https://artwork.captivate.fm/e9c548ff-b35b-44fc-bab7-b042b630c95b/8fRQYoXgsW9VON_5_Xc7jNbJ.jpg"/><pubDate>Mon, 25 Jul 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5ebf48ff-c9f1-4482-9f71-fff434554eed/Erik-20main.mp3" length="37138685" type="audio/mpeg"/><itunes:duration>51:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Using and backing up Hammerspace&apos;s global filesystem</title><itunes:title>Using and backing up Hammerspace&apos;s global filesystem</itunes:title><description><![CDATA[<p>Hammerspace offers a global filesystem that creates a single namespace across multiple storage systems and cloud storage providers.  Hammerspace's name is inspired by the name for the magical place that cartoon characters get them from (e.g. Bugs Bunny pulling a huge hammer out of his pocket).  They've taken a different approach to a global filesystem, using metadata to significantly minimize actual data movement and increase performance.  Molly Presley, their SVP of Marketing (and friend of the pod!), explains the interesting use cases for this technology.</p>]]></description><content:encoded><![CDATA[<p>Hammerspace offers a global filesystem that creates a single namespace across multiple storage systems and cloud storage providers.  Hammerspace's name is inspired by the name for the magical place that cartoon characters get them from (e.g. Bugs Bunny pulling a huge hammer out of his pocket).  They've taken a different approach to a global filesystem, using metadata to significantly minimize actual data movement and increase performance.  Molly Presley, their SVP of Marketing (and friend of the pod!), explains the interesting use cases for this technology.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/is-m-disc-the-ultimate-archive-medium-for-smbs-and-home-users/]]></link><guid isPermaLink="false">c648b617-3026-4763-ada1-95e6e87bff71</guid><itunes:image href="https://artwork.captivate.fm/e8d3f286-2c6d-44d8-b034-ec718b07059e/X7MqI86E6mvxJXMxY4ybvosG.jpg"/><pubDate>Mon, 18 Jul 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d7a84a25-5157-415e-8ab5-78b7b2965632/My-20Video-2019-20Sequence.mp3" length="25894236" type="audio/mpeg"/><itunes:duration>35:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/d0ef2ab0-662a-4ac1-ada1-2dd0ee09ff80/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d0ef2ab0-662a-4ac1-ada1-2dd0ee09ff80/index.html" type="text/html"/></item><item><title>The Five Most Dangerous New Cyber Attack Techniques (A review of the RSA Keynote)</title><itunes:title>The Five Most Dangerous New Cyber Attack Techniques (A review of the RSA Keynote)</itunes:title><description><![CDATA[<p>2022 is a new world in the cyber attack space, and Katie Nickels, SANS instructor, and director of intelligence at threat detection vendor Red Canary, describes the top five new attack they are seeing in the space. Spoiler alert: one of them is attacks against backups! Learn from an expert as we discuss the top five attacks they are seeing right now.  We talk about living off the cloud, MFA exploits, an increase in nation-state hackers, the increased use of stalkerware, and YES: attacks against backup infrastructure.  We discuss each of these in this important episode of Restore it All!</p>]]></description><content:encoded><![CDATA[<p>2022 is a new world in the cyber attack space, and Katie Nickels, SANS instructor, and director of intelligence at threat detection vendor Red Canary, describes the top five new attack they are seeing in the space. Spoiler alert: one of them is attacks against backups! Learn from an expert as we discuss the top five attacks they are seeing right now.  We talk about living off the cloud, MFA exploits, an increase in nation-state hackers, the increased use of stalkerware, and YES: attacks against backup infrastructure.  We discuss each of these in this important episode of Restore it All!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/the-five-most-dangerous-new-cyber-attack-techniques-a-review-of-the-rsa-keynote/]]></link><guid isPermaLink="false">03baadf0-eef8-4c9c-9815-63acb395c889</guid><itunes:image href="https://artwork.captivate.fm/03119415-84fb-469f-a199-906fb62d8bda/EM6yHqxM0q6_aGyCiyGt54p0.jpg"/><pubDate>Mon, 11 Jul 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/71bfceb3-3d9d-40e1-82b7-30a46ab391dc/RIA-SANS.mp3" length="29451474" type="audio/mpeg"/><itunes:duration>40:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/ce74758b-3698-4568-8bd7-f22310dccd0f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/ce74758b-3698-4568-8bd7-f22310dccd0f/index.html" type="text/html"/></item><item><title>Is M-Disc the ultimate archive medium for SMBs and home users?</title><itunes:title>Is M-Disc the ultimate archive medium for SMBs and home users?</itunes:title><description><![CDATA[<p>This week we talk about this exciting "new" medium for archiving data that is especially attractive to SMBs and home users.  It's an optical disc that looks like a DVD and is readable in all Blu-Ray drives, but underneath it's something very different.  If you haven't heard of it, then you're in luck!  Thanks to Daniel Rosehill, backup anorak and friend of the show, we're going to talk about it – and its competitors on this week's episode! We discuss the good and bad about using all of the following for archiving: paper, SSD, disk, tape, DVD, Blu-Ray, ending with M-Disc.  Learn what's wrong with these other mediums, and what's so great about this one in another fun episode of Restore it All! </p>]]></description><content:encoded><![CDATA[<p>This week we talk about this exciting "new" medium for archiving data that is especially attractive to SMBs and home users.  It's an optical disc that looks like a DVD and is readable in all Blu-Ray drives, but underneath it's something very different.  If you haven't heard of it, then you're in luck!  Thanks to Daniel Rosehill, backup anorak and friend of the show, we're going to talk about it – and its competitors on this week's episode! We discuss the good and bad about using all of the following for archiving: paper, SSD, disk, tape, DVD, Blu-Ray, ending with M-Disc.  Learn what's wrong with these other mediums, and what's so great about this one in another fun episode of Restore it All! </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/is-m-disc-the-ultimate-archive-medium-for-smbs-and-home-users/]]></link><guid isPermaLink="false">ebe4476e-b670-4581-bdea-daa31d7efeae</guid><itunes:image href="https://artwork.captivate.fm/064caf89-9d1a-4cd2-8a09-21ccd5deee24/8QdkHcc-TpsqbeHtAschG01J.jpg"/><pubDate>Mon, 27 Jun 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ab0332f9-1e1a-4aba-902d-55d4aaafead4/M-disc-20Main.mp3" length="33720930" type="audio/mpeg"/><itunes:duration>46:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/4a83e3b7-2ae2-44a2-875c-3b175de6d36c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/4a83e3b7-2ae2-44a2-875c-3b175de6d36c/index.html" type="text/html"/></item><item><title>Backup practitioner tells stories from the trenches</title><itunes:title>Backup practitioner tells stories from the trenches</itunes:title><description><![CDATA[<p>Someone that knew Bill Gates when he was a boy in on the podcast this week, although we only talk about Bill Gates for a moment. He has 30+ years in backup experience and tells us what it's been like to adapt to all of the backup changes over the years. His first backup was to punch cards and punch tape, and he was in the same Boy Scout troop as Bill Gates. Fans of the podcast know his name already, as it comes up randomly on the show as a friend of Curtis.  But this is the first time Stuart Liddle has graced us with his presence.</p><p>Like Mr. Backup, his career starts with a data loss story that actually involved people having to re-enter data.  We discuss a lot of configuring and running backups, including deciding on retention periods, treating all backups the same (or not), virtual tape libraries and other dedupe systems, and how important a change management data database (CMDB) is. We also talk about the danger of becoming entrenched in a specialty like backup, knowing only one specialty or product.  We talk about how it's not good for you or your company. </p><p>Finally we talk about the different way people are using the cloud today for IT and backup, and how that affects cost.  Curtis and Prasanna use a great analogy that helps it make sense.</p><p>This week's episode is fully of useful information. </p>]]></description><content:encoded><![CDATA[<p>Someone that knew Bill Gates when he was a boy in on the podcast this week, although we only talk about Bill Gates for a moment. He has 30+ years in backup experience and tells us what it's been like to adapt to all of the backup changes over the years. His first backup was to punch cards and punch tape, and he was in the same Boy Scout troop as Bill Gates. Fans of the podcast know his name already, as it comes up randomly on the show as a friend of Curtis.  But this is the first time Stuart Liddle has graced us with his presence.</p><p>Like Mr. Backup, his career starts with a data loss story that actually involved people having to re-enter data.  We discuss a lot of configuring and running backups, including deciding on retention periods, treating all backups the same (or not), virtual tape libraries and other dedupe systems, and how important a change management data database (CMDB) is. We also talk about the danger of becoming entrenched in a specialty like backup, knowing only one specialty or product.  We talk about how it's not good for you or your company. </p><p>Finally we talk about the different way people are using the cloud today for IT and backup, and how that affects cost.  Curtis and Prasanna use a great analogy that helps it make sense.</p><p>This week's episode is fully of useful information. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-practitioner-tells-stories-from-the-trenches/]]></link><guid isPermaLink="false">93ad64ed-8efa-4bf6-9c90-ac166b159dc6</guid><itunes:image href="https://artwork.captivate.fm/8ba8967d-f305-4daa-bc9d-e9853b20f7af/IGzphkS9tGVpC_ndUvu2y8x1.jpg"/><pubDate>Mon, 20 Jun 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/78901c01-07c8-48fb-996a-788a1a697e87/stuart.mp3" length="34380479" type="audio/mpeg"/><itunes:duration>47:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/43877242-9895-4a6b-a7bc-665f368c3e03/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/43877242-9895-4a6b-a7bc-665f368c3e03/index.html" type="text/html"/></item><item><title>Just do something!  (about your security and your backups)</title><itunes:title>Just do something!  (about your security and your backups)</itunes:title><description><![CDATA[<p>Today we are joined by security expert and host of the <a href="http://www.securetalkpodcast.com/" rel="noopener noreferrer" target="_blank">Secure Talk podcast</a>, Mark Shriner, to discuss information security.  (Make sure to check out his podcast here: http://www.securetalkpodcast.com/)</p><p>We talk about it from a personal perspective, as well as for organizations.  Mark, Curtis, and Prasanna talk about what are the bare minimum things you should be doing as an individual to protect your personal information and data, both from a security and backup perspective.  We then move on to talking about it from a company perspective, and how very important things like MFA (while good) do not solve everything, and then we talk about many other things you could be doing. Then there was the moment that created the title of the podcast, where Prasanna disagreed with Curtis – but not quite.  When it comes to information security and data protection (and many things in life), perfect is the enemy of good.  Try not to be overwhelmed with all the things you could or should be doing; just pick something and do something.  Something is always better than nothing when it comes to these areas.  This episode is jam-packed with good information you won't want to miss. </p>]]></description><content:encoded><![CDATA[<p>Today we are joined by security expert and host of the <a href="http://www.securetalkpodcast.com/" rel="noopener noreferrer" target="_blank">Secure Talk podcast</a>, Mark Shriner, to discuss information security.  (Make sure to check out his podcast here: http://www.securetalkpodcast.com/)</p><p>We talk about it from a personal perspective, as well as for organizations.  Mark, Curtis, and Prasanna talk about what are the bare minimum things you should be doing as an individual to protect your personal information and data, both from a security and backup perspective.  We then move on to talking about it from a company perspective, and how very important things like MFA (while good) do not solve everything, and then we talk about many other things you could be doing. Then there was the moment that created the title of the podcast, where Prasanna disagreed with Curtis – but not quite.  When it comes to information security and data protection (and many things in life), perfect is the enemy of good.  Try not to be overwhelmed with all the things you could or should be doing; just pick something and do something.  Something is always better than nothing when it comes to these areas.  This episode is jam-packed with good information you won't want to miss. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/just-do-something-about-your-security-and-your-backups/]]></link><guid isPermaLink="false">c6e36264-262e-4a2d-b369-148fa4c0c3ec</guid><itunes:image href="https://artwork.captivate.fm/045ad90c-00a7-4a08-9f6d-cfe8065c9c37/dfoKeytOMs1XXxPS_2n8BT8O.jpg"/><pubDate>Mon, 13 Jun 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/8009d8d3-7bdb-4630-a1f6-f2b63a6083c5/Just-20do-20someting.mp3" length="33896478" type="audio/mpeg"/><itunes:duration>47:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/970aa2a6-34dd-4b50-b281-98335defb11d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/970aa2a6-34dd-4b50-b281-98335defb11d/index.html" type="text/html"/></item><item><title>Seven reasons why your restore may slower than your backup</title><itunes:title>Seven reasons why your restore may slower than your backup</itunes:title><description><![CDATA[<p>So many people are surprised when their restore is slower than their backup.  You shouldn't be, as it's quite common.  The good news is there are things you can do to make it faster – if you know them in advance.  W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi tackle the seven reasons why your restore may be slower than your backup.  Topics covered include RAID penalties, tape issues, database concerns, and others.  You'll walk away knowing what to do in order to find out how slow your restores are – and how to fix them.  This podcast is packed with good info!  (And the death of a USB hub.) </p>]]></description><content:encoded><![CDATA[<p>So many people are surprised when their restore is slower than their backup.  You shouldn't be, as it's quite common.  The good news is there are things you can do to make it faster – if you know them in advance.  W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi tackle the seven reasons why your restore may be slower than your backup.  Topics covered include RAID penalties, tape issues, database concerns, and others.  You'll walk away knowing what to do in order to find out how slow your restores are – and how to fix them.  This podcast is packed with good info!  (And the death of a USB hub.) </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/seven-reasons-why-your-restore-may-slower-than-your-backup/]]></link><guid isPermaLink="false">8215747f-8d10-4232-9805-40fc594c72d7</guid><itunes:image href="https://artwork.captivate.fm/02330898-caf0-4fe6-ac4f-bdb3e273f8c2/ogFAhzRDvbxUyeY4a4x9wSE_.jpg"/><pubDate>Mon, 06 Jun 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c6b4b924-81a0-4713-a738-3d7730935abf/Slow-20Restores-20Main.mp3" length="34146633" type="audio/mpeg"/><itunes:duration>47:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/22503c60-9ee3-4717-b25e-b2a02834c77f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/22503c60-9ee3-4717-b25e-b2a02834c77f/index.html" type="text/html"/></item><item><title>Data protection warrior explains LTO &amp; RDX</title><itunes:title>Data protection warrior explains LTO &amp; RDX</itunes:title><description><![CDATA[<p>Pat Mayock is a Data Protection Warrior for HPE, and he helped us to understand where he thinks LTO &amp; RDX (a removable disk technology) sit in the market.  He explains how much tape is used today in enterprise and cloud environments, especially in the public cloud that so many think is a tapeless world. He says the cloud vendors are some of LTO's biggest customers!  We talk about what LTO is good at, what it's not so good at, and what that means for how you should use it. Then we shift gears to talk about RDX, a removable disk product that has been around for roughly 15 years. It consists of a docking station and a disk-based cartridge that is built to kind of resemble a tape!  Each cartridge contains a single disk drive that you can use very much like you would use a tape, except it appears as a drive letter (mounted filesystem) versus a tape drive. He explains what its target market is and how it meets a niche in the removable storage market in between removable USB disks and a standalone LTO tape drive. This is a fascinating episode you won't want to miss. </p>]]></description><content:encoded><![CDATA[<p>Pat Mayock is a Data Protection Warrior for HPE, and he helped us to understand where he thinks LTO &amp; RDX (a removable disk technology) sit in the market.  He explains how much tape is used today in enterprise and cloud environments, especially in the public cloud that so many think is a tapeless world. He says the cloud vendors are some of LTO's biggest customers!  We talk about what LTO is good at, what it's not so good at, and what that means for how you should use it. Then we shift gears to talk about RDX, a removable disk product that has been around for roughly 15 years. It consists of a docking station and a disk-based cartridge that is built to kind of resemble a tape!  Each cartridge contains a single disk drive that you can use very much like you would use a tape, except it appears as a drive letter (mounted filesystem) versus a tape drive. He explains what its target market is and how it meets a niche in the removable storage market in between removable USB disks and a standalone LTO tape drive. This is a fascinating episode you won't want to miss. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/data-protection-warrior-explains-lto-rdx/]]></link><guid isPermaLink="false">409cd3aa-9de6-46ea-b9e7-ab1ce1fcc42f</guid><itunes:image href="https://artwork.captivate.fm/65e3f09b-9542-4c10-8ed3-a688ce5da010/pyojfkWilbqs4NBNmeYnorp2.png"/><pubDate>Mon, 23 May 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/27499feb-fc3f-4520-9c4d-abecdccafcb5/My-20Video-202-20Sequence.mp3" length="65401095" type="audio/mpeg"/><itunes:duration>01:30:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/8092ecae-24d7-4f24-a950-6f0c061df217/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8092ecae-24d7-4f24-a950-6f0c061df217/index.html" type="text/html"/></item><item><title>Top seven things you must stop doing with your backups</title><itunes:title>Top seven things you must stop doing with your backups</itunes:title><description><![CDATA[<p>This whole episode is a Mr. Backup rant, where he talks about things that people should really stop doing with their backup systems, starting with backing up directly to tape.  There is a place for tape, but it is NOT at the front end of the backup system.  Curtis and Prasanna passionately discuss and explain several relics of the ways we used to do things, and why they no longer make sense.  Another one is repeated full backups - synthetic or otherwise.  Many of them can be addressed by just changing how you use your backup product, but a few of them may cause you to think about making a change.  (Hint: if your backup product has been around for more than 20 years, it probably can't get away from some of the relics of the past.)</p>]]></description><content:encoded><![CDATA[<p>This whole episode is a Mr. Backup rant, where he talks about things that people should really stop doing with their backup systems, starting with backing up directly to tape.  There is a place for tape, but it is NOT at the front end of the backup system.  Curtis and Prasanna passionately discuss and explain several relics of the ways we used to do things, and why they no longer make sense.  Another one is repeated full backups - synthetic or otherwise.  Many of them can be addressed by just changing how you use your backup product, but a few of them may cause you to think about making a change.  (Hint: if your backup product has been around for more than 20 years, it probably can't get away from some of the relics of the past.)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/top-seven-things-you-must-stop-doing-with-your-backups/]]></link><guid isPermaLink="false">c714c957-39b0-40ae-84e3-4c4a3036d1d9</guid><itunes:image href="https://artwork.captivate.fm/1414b38b-01dc-4fd8-a141-1dcb0c3d458f/20nIs4c8w8SwX7hbuKGXbzS_.jpg"/><pubDate>Mon, 16 May 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/44772758-6f02-48c6-bbc5-e933a7f6ad1d/My-20Video-20Sequence.mp3" length="35026850" type="audio/mpeg"/><itunes:duration>48:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/067f0b6c-af71-4688-8a72-3281ab033f7b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/067f0b6c-af71-4688-8a72-3281ab033f7b/index.html" type="text/html"/></item><item><title>How to prepare for an emergency (at home and work)</title><itunes:title>How to prepare for an emergency (at home and work)</itunes:title><description><![CDATA[<p>This week we are joined by emergency preparedness expert and prolific author and speaker, Virginia Nicols, webmaster of EmergencyPlanGuide.org.  We talk about why and how to prepare for a disaster/emergency in your personal life, as well as how to do it for a small business.  This is a bit different than our usual episode, as there is very little talk about backup and recovery.  We talk about where to start when assessing what to do, and what steps you can take right away to prepare.  Virginia is extremely knowledgeable on the subject and we learned a lot.  You will too!</p>]]></description><content:encoded><![CDATA[<p>This week we are joined by emergency preparedness expert and prolific author and speaker, Virginia Nicols, webmaster of EmergencyPlanGuide.org.  We talk about why and how to prepare for a disaster/emergency in your personal life, as well as how to do it for a small business.  This is a bit different than our usual episode, as there is very little talk about backup and recovery.  We talk about where to start when assessing what to do, and what steps you can take right away to prepare.  Virginia is extremely knowledgeable on the subject and we learned a lot.  You will too!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-prepare-for-an-emergency-at-home-and-work/]]></link><guid isPermaLink="false">b599144c-367d-47cd-9466-c51260538279</guid><itunes:image href="https://artwork.captivate.fm/049af0dd-343c-46b8-9c56-cd538a2faf0f/luaTfXjwE5g5CSjDWwxaZHur.jpg"/><pubDate>Mon, 09 May 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d43e5a6e-d23a-4fb0-8387-a4f334ce4516/Virginia-20Main.mp3" length="34172955" type="audio/mpeg"/><itunes:duration>47:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/207628a4-dc7b-4d22-8334-ac1703204b28/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/207628a4-dc7b-4d22-8334-ac1703204b28/index.html" type="text/html"/></item><item><title>Snorkel42, security expert from reddit, explains his security cadence series</title><itunes:title>Snorkel42, security expert from reddit, explains his security cadence series</itunes:title><description><![CDATA[<p>If you liked last week's episode where we talked about this "so let's talk about ransomware" series on reddit, you'll love this week.  We have the author, Snorkel42, to talk about the origins behind the security cadence series, and why he decided to finally write some on ransomware.  (He explains that everything he talks about his ransomware, but he admits he's been "Mr. Myagi'ing" it for a while.). This guy knows his stuff, and this is the second time he has been on the podcast.  He's knowledgeable and entertaining.  One of those rare combinations. This is a great episode you will not want to miss. </p><p>Here are the three posts:</p><p>https://www.reddit.com/r/sysadmin/comments/tdvbp4/security_cadence_okay_fine_lets_talk_ransomware/</p><p>https://www.reddit.com/r/SecurityCadence/comments/tedapy/security_cadence_ransomware_part_2_actions_on/</p><p>https://www.reddit.com/r/SecurityCadence/comments/tfm927/security_cadence_ransomware_part_3_the_worst_case/</p><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>If you liked last week's episode where we talked about this "so let's talk about ransomware" series on reddit, you'll love this week.  We have the author, Snorkel42, to talk about the origins behind the security cadence series, and why he decided to finally write some on ransomware.  (He explains that everything he talks about his ransomware, but he admits he's been "Mr. Myagi'ing" it for a while.). This guy knows his stuff, and this is the second time he has been on the podcast.  He's knowledgeable and entertaining.  One of those rare combinations. This is a great episode you will not want to miss. </p><p>Here are the three posts:</p><p>https://www.reddit.com/r/sysadmin/comments/tdvbp4/security_cadence_okay_fine_lets_talk_ransomware/</p><p>https://www.reddit.com/r/SecurityCadence/comments/tedapy/security_cadence_ransomware_part_2_actions_on/</p><p>https://www.reddit.com/r/SecurityCadence/comments/tfm927/security_cadence_ransomware_part_3_the_worst_case/</p><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/snorkel42-security-expert-from-reddit-explains-his-security-cadence-series]]></link><guid isPermaLink="false">f6af2cc3-4d27-454b-ab0d-de83215b0174</guid><itunes:image href="https://artwork.captivate.fm/dea9fba9-8733-486b-b680-3e11d804385c/HU2s218agUgi6dYVCUX1VTzi.jpg"/><pubDate>Mon, 02 May 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5109df0f-97d2-44aa-9e49-8ec28e24e28f/Snorkel42-1-Reddit-Thread.mp3" length="38880964" type="audio/mpeg"/><itunes:duration>54:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>How to prevent ransomware, slow its spread, and respond if you get it</title><itunes:title>How to prevent ransomware, slow its spread, and respond if you get it</itunes:title><description><![CDATA[<p>This week, Prasanna and Mr. Backup (W. Curtis Preston) review a series of posts made by Snorkel42, who previously appeared on this podcast in the episode called "Security expert rips Okta for their response to hack." Things were recorded out of order, so this is the episode where we discovered him on Reddit, and tried our best to distill several thousand words into about 30 mins of advice on how to protect against ransomware.  We talk about how to prevent getting it in the first place, how to limit its damage if you do get it, and how to respond and restore your data once that happens.   There is a ton of really good advice here, so check it out! </p><p>Here are the three posts:</p><p>https://www.reddit.com/r/sysadmin/comments/tdvbp4/security_cadence_okay_fine_lets_talk_ransomware/</p><p>https://www.reddit.com/r/SecurityCadence/comments/tedapy/security_cadence_ransomware_part_2_actions_on/</p><p>https://www.reddit.com/r/SecurityCadence/comments/tfm927/security_cadence_ransomware_part_3_the_worst_case/</p><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>This week, Prasanna and Mr. Backup (W. Curtis Preston) review a series of posts made by Snorkel42, who previously appeared on this podcast in the episode called "Security expert rips Okta for their response to hack." Things were recorded out of order, so this is the episode where we discovered him on Reddit, and tried our best to distill several thousand words into about 30 mins of advice on how to protect against ransomware.  We talk about how to prevent getting it in the first place, how to limit its damage if you do get it, and how to respond and restore your data once that happens.   There is a ton of really good advice here, so check it out! </p><p>Here are the three posts:</p><p>https://www.reddit.com/r/sysadmin/comments/tdvbp4/security_cadence_okay_fine_lets_talk_ransomware/</p><p>https://www.reddit.com/r/SecurityCadence/comments/tedapy/security_cadence_ransomware_part_2_actions_on/</p><p>https://www.reddit.com/r/SecurityCadence/comments/tfm927/security_cadence_ransomware_part_3_the_worst_case/</p><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-prevent-ransomware-slow-its-spread-and-respond-if-you-get-it/]]></link><guid isPermaLink="false">e2b2a840-df3e-4177-b30f-1745a015dcc2</guid><itunes:image href="https://artwork.captivate.fm/5f957149-0a17-4401-83ee-68b9fd8c3250/Z2udntS3aUW9TIQUeDPFw4Ge.jpg"/><pubDate>Mon, 25 Apr 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ac968436-d499-49df-833f-3c70644da3cd/Reddit-20Main.mp3" length="28112023" type="audio/mpeg"/><itunes:duration>39:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/e238dbb5-9387-442f-8208-6bfa847cdfc4/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e238dbb5-9387-442f-8208-6bfa847cdfc4/index.html" type="text/html"/></item><item><title>Vast Data really does appear to be &quot;vast&quot;</title><itunes:title>Vast Data really does appear to be &quot;vast&quot;</itunes:title><description><![CDATA[<p>Vast is a massively-scalable storage system designed around multiple pieces of technology that weren't available just a few years ago (e.g. NVMe, Storage class memory, QLC) that offers both file and object functionality, immutable snapshots, and integration with the cloud to address the "smoking hole" problem.  Their typical sale (of which they've made many) is north of $1 million, and they have many exabytes of disk in the wild. It's a scale-out storage system without all the typical East-West traffic such systems have.  We do our best to poke holes in their offering, but Howard Marks goes toe-to-toe quite well. This one went a little long (one hour) but we truly were fascinated with the Vast story Howard was telling. </p>]]></description><content:encoded><![CDATA[<p>Vast is a massively-scalable storage system designed around multiple pieces of technology that weren't available just a few years ago (e.g. NVMe, Storage class memory, QLC) that offers both file and object functionality, immutable snapshots, and integration with the cloud to address the "smoking hole" problem.  Their typical sale (of which they've made many) is north of $1 million, and they have many exabytes of disk in the wild. It's a scale-out storage system without all the typical East-West traffic such systems have.  We do our best to poke holes in their offering, but Howard Marks goes toe-to-toe quite well. This one went a little long (one hour) but we truly were fascinated with the Vast story Howard was telling. </p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/vast-data-really-is-vast/]]></link><guid isPermaLink="false">a4137d15-927e-46d2-bfbd-06d60abca41e</guid><itunes:image href="https://artwork.captivate.fm/a5b43f8b-eb00-4656-966a-45345febc479/MB7Sh1qIxWEaFiVfYxkqhZFv.png"/><pubDate>Mon, 18 Apr 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6b27eb1b-d7d1-4123-bdef-1a104b7e509e/Howard-20Main.mp3" length="43689572" type="audio/mpeg"/><itunes:duration>01:00:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/e1b0ad2d-5df4-4a92-9840-7e74fd8b6863/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e1b0ad2d-5df4-4a92-9840-7e74fd8b6863/index.html" type="text/html"/></item><item><title>A look inside the Conti ransomware group</title><itunes:title>A look inside the Conti ransomware group</itunes:title><description><![CDATA[<p>This episode is a unique look inside the Conti ransomware group, courtesy of a four-part series from Krebs on Security.  We review the interesting takeaways from Brian Kreb's series of over 12,000-words from quite a bit of research.  The series was inspired by a hack of Conti that resulted in a traunch of internal documents being made public.  This gives a unique view into how the organization thinks, how it is laid out just like any other business, the weapons it uses to spread ransomware, and its attempts to branch out to other areas of cybercrime. </p><p>If you enjoy the episode, be sure to check out the articles that inspired it:</p><p><a href="https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion</a></p><p><a href="https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office</a></p><p><a href="https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry</a></p><p><a href="https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iv-cryptocrime" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iv-cryptocrime</a></p>]]></description><content:encoded><![CDATA[<p>This episode is a unique look inside the Conti ransomware group, courtesy of a four-part series from Krebs on Security.  We review the interesting takeaways from Brian Kreb's series of over 12,000-words from quite a bit of research.  The series was inspired by a hack of Conti that resulted in a traunch of internal documents being made public.  This gives a unique view into how the organization thinks, how it is laid out just like any other business, the weapons it uses to spread ransomware, and its attempts to branch out to other areas of cybercrime. </p><p>If you enjoy the episode, be sure to check out the articles that inspired it:</p><p><a href="https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion</a></p><p><a href="https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office</a></p><p><a href="https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry</a></p><p><a href="https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iv-cryptocrime" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iv-cryptocrime</a></p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/a-look-inside-the-conti-ransomware-group/]]></link><guid isPermaLink="false">39fbfeb8-0e89-4960-84db-fbc71444964a</guid><itunes:image href="https://artwork.captivate.fm/5e705d12-df44-433b-9a5e-1cd04c78e206/hTu_KkBkQAuqJILkmJwzeGLa.jpg"/><pubDate>Mon, 11 Apr 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/233fd866-1283-41cb-b573-127d317b77b4/Krebs.mp3" length="31112859" type="audio/mpeg"/><itunes:duration>43:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item><item><title>Backup is evil (or at least how many people do it is)</title><itunes:title>Backup is evil (or at least how many people do it is)</itunes:title><description><![CDATA[<p>This week we are joined by John "Ricky" Martin, Director of Strategy at NetApp (and former owner of a tape recovery business), to talk about his paper that declares that backup is fundamentally evil and done in an unintelligent way. Mr. Backup wasn't sure how this one was going to go, and there were at least one or two arguments along the way.  No blows were thrown, though. We definitely talk about what a tape recovery business is, and what it was like to do that. We also talk about tape backup, full backups, multiplexing, tape handling, and other elements of how backup is still done today by many people. It's a fun episode where you should learn a lot.</p>]]></description><content:encoded><![CDATA[<p>This week we are joined by John "Ricky" Martin, Director of Strategy at NetApp (and former owner of a tape recovery business), to talk about his paper that declares that backup is fundamentally evil and done in an unintelligent way. Mr. Backup wasn't sure how this one was going to go, and there were at least one or two arguments along the way.  No blows were thrown, though. We definitely talk about what a tape recovery business is, and what it was like to do that. We also talk about tape backup, full backups, multiplexing, tape handling, and other elements of how backup is still done today by many people. It's a fun episode where you should learn a lot.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-is-evil-or-at-least-how-many-people-do-it-is/]]></link><guid isPermaLink="false">482ce69b-e684-4308-ab37-0a3c806b5f3a</guid><itunes:image href="https://artwork.captivate.fm/cad43952-a12e-4f22-b0dc-df8f9ba3db3f/GqTTuH91FafIAnKJP5wgTT6P.jpg"/><pubDate>Mon, 04 Apr 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1ba350a1-cedc-458b-b709-37c5b8453e0e/Rick-20Martin-20Main.mp3" length="35185464" type="audio/mpeg"/><itunes:duration>48:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/78478da2-cd21-4104-a05e-15d2b37a51df/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/78478da2-cd21-4104-a05e-15d2b37a51df/index.html" type="text/html"/></item><item><title>Security expert rips Okta for their response to hack</title><itunes:title>Security expert rips Okta for their response to hack</itunes:title><description><![CDATA[<p>We have none other than Snorkel42 from Reddit on the podcast today.  He has 20 years experience in InfoSec, and is a prolific writer on Reddit under the handle Snorkel42.  (Check out his posts here: https://www.reddit.com/user/snorkel42/).  (We will not be using his given name during the recording.).</p><p>He thinks Okta managed to turn a mole hill into a mountain by incorrectly handling the hack that happened in January – that we just learned about last week.  That's right, we just found out about a hack that actually happened in January! </p><p>We dive deep into what happened, what it means, and how the worst problem of all is how Okta responded to it.  Our expert says he no longer trusts Okta, and gives advice to customers on what to do next. </p><p>This is a very timely episode that you will really enjoy –&nbsp;unless you're an Okta customer or employee.</p>]]></description><content:encoded><![CDATA[<p>We have none other than Snorkel42 from Reddit on the podcast today.  He has 20 years experience in InfoSec, and is a prolific writer on Reddit under the handle Snorkel42.  (Check out his posts here: https://www.reddit.com/user/snorkel42/).  (We will not be using his given name during the recording.).</p><p>He thinks Okta managed to turn a mole hill into a mountain by incorrectly handling the hack that happened in January – that we just learned about last week.  That's right, we just found out about a hack that actually happened in January! </p><p>We dive deep into what happened, what it means, and how the worst problem of all is how Okta responded to it.  Our expert says he no longer trusts Okta, and gives advice to customers on what to do next. </p><p>This is a very timely episode that you will really enjoy –&nbsp;unless you're an Okta customer or employee.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/security-expert-rips-okta-for-their-response-to-hack/]]></link><guid isPermaLink="false">340dd817-5cab-42b0-908c-fcc13253c65d</guid><itunes:image href="https://artwork.captivate.fm/67eeccb2-f58a-42f5-ad34-ab4124035924/EDu2a0PmtEEXb3uXVUz4-j-V.jpg"/><pubDate>Mon, 28 Mar 2022 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0ea73015-4cc6-4e99-a31d-82c1d7511556/Snorkel42-Okta-Thread.mp3" length="24496477" type="audio/mpeg"/><itunes:duration>34:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/34feec0d-e435-463f-9cec-9461282205f2/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/34feec0d-e435-463f-9cec-9461282205f2/index.html" type="text/html"/></item><item><title>Restore test fails due to bad documentation</title><itunes:title>Restore test fails due to bad documentation</itunes:title><description><![CDATA[<p>Gary Williams tells a great story about earlier in his career that taught him the value of testing backups and updating documentation.  He explains how he thought his backups were fine, until a "new guy" came onto the scene and dared to ask the question, "When was the last time you tested your backups?"  As Gary explains, sometimes new people have the best perspective. They let him do the first test, and .... it failed spectacularly! It all came down to the documentation they were so proud of.  Hear Gary's story and learn from his mistake – one that defined his career.  (Mr. Backup also tells the story that defined his career as well!)</p>]]></description><content:encoded><![CDATA[<p>Gary Williams tells a great story about earlier in his career that taught him the value of testing backups and updating documentation.  He explains how he thought his backups were fine, until a "new guy" came onto the scene and dared to ask the question, "When was the last time you tested your backups?"  As Gary explains, sometimes new people have the best perspective. They let him do the first test, and .... it failed spectacularly! It all came down to the documentation they were so proud of.  Hear Gary's story and learn from his mistake – one that defined his career.  (Mr. Backup also tells the story that defined his career as well!)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/restore-test-failed-due-to-bad-documentation-restore-it-all-podcast-147/]]></link><guid isPermaLink="false">0f289bb2-308b-4ce9-903d-b33a5ab1cca1</guid><itunes:image href="https://artwork.captivate.fm/e0514351-48bf-43eb-9184-79a5b9a49597/795oZU7JaQhPKlLzawFUvGB4.jpg"/><pubDate>Thu, 24 Mar 2022 19:52:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/53d595f8-c4af-4f43-8027-5e4a4114b660/Restore-Test-Gone-Wrong.mp3" length="33195254" type="audio/mpeg"/><itunes:duration>46:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><podcast:transcript url="https://transcripts.captivate.fm/transcript/5775f424-39f7-4960-a2ec-17ea2fcfe174/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5775f424-39f7-4960-a2ec-17ea2fcfe174/index.html" type="text/html"/></item><item><title>Should you backup SaaS with BaaS?</title><itunes:title>Should you backup SaaS with BaaS?</itunes:title><description><![CDATA[<p>When you back up your SaaS apps (because you know you are supposed to), should you back them up to a SaaS service or on on-premises backup system? After defining what SaaS is and isn't, Prasanna and Curtis discuss this important question.  First they look at how sizing a SaaS system for backup is different than when you do it in a datacenter, and how that creates challenges for backup design. Does it make sense to use on-premises backup to backup a cloud resource like SaaS?</p>]]></description><content:encoded><![CDATA[<p>When you back up your SaaS apps (because you know you are supposed to), should you back them up to a SaaS service or on on-premises backup system? After defining what SaaS is and isn't, Prasanna and Curtis discuss this important question.  First they look at how sizing a SaaS system for backup is different than when you do it in a datacenter, and how that creates challenges for backup design. Does it make sense to use on-premises backup to backup a cloud resource like SaaS?</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/should-you-backup-saas-with-baas-restore-it-all-podcast-146/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1230294328</guid><itunes:image href="https://artwork.captivate.fm/d9c3e808-f781-4c5b-993f-e6995a468891/oZvvE0HYqHxA_7kkfT5lry_q.jpg"/><pubDate>Mon, 14 Mar 2022 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6897990d-ea37-4c38-8660-e40987c45152/1230294328-restoreitall-should-you-backup-saas-with-baas.mp3" length="34184880" type="audio/mpeg"/><itunes:duration>35:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>When you back up your SaaS apps (because you know you are supposed to), should you back them up to a SaaS service or on on-premises backup system? After defining what SaaS is and isn&apos;t, Prasanna and Curtis discuss this important question.  First they look at how sizing a SaaS system for backup is different than when you do it in a datacenter, and how that creates challenges for backup design. Does it make sense to use on-premises backup to backup a cloud resource like SaaS?</itunes:summary><podcast:transcript url="https://transcripts.captivate.fm/transcript/82656c86-7e96-4b01-af69-f1b7af92b49b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/82656c86-7e96-4b01-af69-f1b7af92b49b/index.html" type="text/html"/></item><item><title>Top 10 Ransomware Attacks of 2021</title><itunes:title>Top 10 Ransomware Attacks of 2021</itunes:title><description><![CDATA[<p>Learn from others' mistakes by reviewing last year's worst ransomware attacks with Mr. Backup and Prasanna Malaiyandi. Listen to them review the 10 worst attacks from 2021, then discuss lessons learned: Colonial Pipeline, BrennTag, Acer, JBS, Quanta, NBA,AXA, CNA, CD Projekt, and Kaseya. Then they discuss the trends they see, and the lessons we can all learn from these horrible attacks.</p>]]></description><content:encoded><![CDATA[<p>Learn from others' mistakes by reviewing last year's worst ransomware attacks with Mr. Backup and Prasanna Malaiyandi. Listen to them review the 10 worst attacks from 2021, then discuss lessons learned: Colonial Pipeline, BrennTag, Acer, JBS, Quanta, NBA,AXA, CNA, CD Projekt, and Kaseya. Then they discuss the trends they see, and the lessons we can all learn from these horrible attacks.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/top-10-ransomware-attacks-of-2021-restore-it-all-podcast-145/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1226472982</guid><itunes:image href="https://artwork.captivate.fm/5eeb576c-2956-42c7-bff9-7532bd9dabc4/R_PupsL7VZ3gmwEhEzBTvwAo.jpg"/><pubDate>Mon, 07 Mar 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d3dc7a34-64b5-4179-9feb-93ae796da9ea/1226472982-restoreitall-top-10-ransomware-attacks-of-2021.mp3" length="64895854" type="audio/mpeg"/><itunes:duration>33:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Learn from others&apos; mistakes by reviewing last year&apos;s worst ransomware attacks with Mr. Backup and Prasanna Malaiyandi. Listen to them review the 10 worst attacks from 2021, then discuss lessons learned: Colonial Pipeline, BrennTag, Acer, JBS, Quanta, NBA,AXA, CNA, CD Projekt, and Kaseya. Then they discuss the trends they see, and the lessons we can all learn from these horrible attacks.</itunes:summary></item><item><title>Mr. Backup takes on reddit about Microsoft 365 backup</title><itunes:title>Mr. Backup takes on reddit about Microsoft 365 backup</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi weigh in on a reddit thread that started with a simple question from a user.  He has MSPs trying to sell him a solution to back up Microsoft 365, and he's wondering if that's even necessary.  As usual on reddit, there are many opinions.  Mr. Backup debates the various points being made by the anit-backup crowd, including an article arguing the same point.   We start with an overview of why it's important, then we take on the various arguments used to support not backing it up.  We talk about how retention policies are not backup, and why.  Even retention lock doesn't help, and neither do lagged copies of Exchange Online. We also talk about how the e-discovery tool is NOT a restore tool and will not give you what you're looking for.  Finally, we talk about the idea that backup tools can't do DR for Exchange online, and how that is used to bash them as well.  Great discussion on this one.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi weigh in on a reddit thread that started with a simple question from a user.  He has MSPs trying to sell him a solution to back up Microsoft 365, and he's wondering if that's even necessary.  As usual on reddit, there are many opinions.  Mr. Backup debates the various points being made by the anit-backup crowd, including an article arguing the same point.   We start with an overview of why it's important, then we take on the various arguments used to support not backing it up.  We talk about how retention policies are not backup, and why.  Even retention lock doesn't help, and neither do lagged copies of Exchange Online. We also talk about how the e-discovery tool is NOT a restore tool and will not give you what you're looking for.  Finally, we talk about the idea that backup tools can't do DR for Exchange online, and how that is used to bash them as well.  Great discussion on this one.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/mr-backup-takes-on-reddit-about-microsoft-365-backup-restore-it-all-144/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1223596228</guid><itunes:image href="https://artwork.captivate.fm/824261bc-adcb-4ab3-830d-56f8dd284d07/r-oWF-rfjrw-DtAQnY8Ct5Su.png"/><pubDate>Mon, 28 Feb 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/8eff07e2-c305-452d-a499-e212e350aefc/M365-rant-2.mp3" length="28872186" type="audio/mpeg"/><itunes:duration>40:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi weigh in on a reddit thread that started with a simple question from a user.  He has MSPs trying to sell him a solution to back up Microsoft 365, and he&apos;s wondering if that&apos;s even necessary.  As usual on reddit, there are many opinions.  Mr. Backup debates the various points being made by the anit-backup crowd, including an article arguing the same point.   We start with an overview of why it&apos;s important, then we take on the various arguments used to support not backing it up.  We talk about how retention policies are not backup, and why.  Even retention lock doesn&apos;t help, and neither do lagged copies of Exchange Online. We also talk about how the e-discovery tool is NOT a restore tool and will not give you what you&apos;re looking for.  Finally, we talk about the idea that backup tools can&apos;t do DR for Exchange online, and how that is used to bash them as well.  Great discussion on this one.</itunes:summary><podcast:transcript url="https://transcripts.captivate.fm/transcript/13e11812-47ff-4ff5-be61-c321ba7c7aae/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/13e11812-47ff-4ff5-be61-c321ba7c7aae/index.html" type="text/html"/></item><item><title>Mr. Backup Forced to Restore BackupCentral.com!</title><itunes:title>Mr. Backup Forced to Restore BackupCentral.com!</itunes:title><description><![CDATA[<p>On this week's episode of Backup Central's Restore it All, Mr. Backup himself becomes the guest, while Prasanna Malaiyandi takes over as host.  W. Curtis Preston explains the backup configuration of the website behind the Restore it All podcast, and how bit rot caused him to have to restore part of it.  We talk about bit rot, the 3-2-1 rule, off-site backups, backups stored in S3 and Google Drive, and what it's like to restore part of a MySQL database.  Luckily, the folks at LiquidWeb were very helpful.  Watch Curtis explain how practices what he preaches over at BackupCentral.com.</p><p>If you want to watch the video version of this episode, it's here: https://www.youtube.com/watch?v=I3285etiYBs</p>]]></description><content:encoded><![CDATA[<p>On this week's episode of Backup Central's Restore it All, Mr. Backup himself becomes the guest, while Prasanna Malaiyandi takes over as host.  W. Curtis Preston explains the backup configuration of the website behind the Restore it All podcast, and how bit rot caused him to have to restore part of it.  We talk about bit rot, the 3-2-1 rule, off-site backups, backups stored in S3 and Google Drive, and what it's like to restore part of a MySQL database.  Luckily, the folks at LiquidWeb were very helpful.  Watch Curtis explain how practices what he preaches over at BackupCentral.com.</p><p>If you want to watch the video version of this episode, it's here: https://www.youtube.com/watch?v=I3285etiYBs</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/mr-backup-forced-to-restore-backupcentral-com-restore-it-all-podcast-143/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1219114804</guid><itunes:image href="https://artwork.captivate.fm/6a10f160-efc6-4b34-9c9d-8efb0f054ecc/mF77p7Wm4-40Jz8xyPzZVriG.jpg"/><pubDate>Mon, 21 Feb 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/abf4cca8-3489-4a9a-a2d6-2aa3a966e992/1219114804-restoreitall-mr-backup-forced-to-restore-backupcentr.mp3" length="94905754" type="audio/mpeg"/><itunes:duration>49:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this week&apos;s episode of Backup Central&apos;s Restore it All, Mr. Backup himself becomes the guest, while Prasanna Malaiyandi takes over as host.  W. Curtis Preston explains the backup configuration of the website behind the Restore it All podcast, and how bit rot caused him to have to restore part of it.  We talk about bit rot, the 3-2-1 rule, off-site backups, backups stored in S3 and Google Drive, and what it&apos;s like to restore part of a MySQL database.  Luckily, the folks at LiquidWeb were very helpful.  Watch Curtis explain how practices what he preaches over at BackupCentral.com.

If you want to watch the video version of this episode, it&apos;s here: https://www.youtube.com/watch?v=I3285etiYBs</itunes:summary></item><item><title>Should DR/backup folks report to the security team?</title><itunes:title>Should DR/backup folks report to the security team?</itunes:title><description><![CDATA[<p>This is a response to Tom Hollingsworth's (@networkingnerd) video "Disaster Recovery is a Security Function," found here: https://gestaltit.com/tomversations/tom/disaster-recovery-is-a-security-function-tomversations-episode-25/.  </p><p>I respectfully disagree w/Tom's assertions in his video, and decided to use this as the first episode I'm going to publish a video version of. You can listen to the podcast on all the usual podcast channels, or watch the video version on youtube here: https://youtu.be/ym_ibNWVjgA</p><p>Tom said that backup and security are very closely related, and suggested that if we reported to the same team, we could perhaps accomplish more together. While I understand the point he is making, I disagree with it, and Prasanna and I discuss it on this episode. We believe Tom's opinion comes from an outdated concept of how security works in backup systems; we haven't worked like that in quite some time.  I explain how modern backup systems work from a security perspective, then talk about the idea of backup folks reporting to security folks.  I think it's a bad idea for several reasons.</p>]]></description><content:encoded><![CDATA[<p>This is a response to Tom Hollingsworth's (@networkingnerd) video "Disaster Recovery is a Security Function," found here: https://gestaltit.com/tomversations/tom/disaster-recovery-is-a-security-function-tomversations-episode-25/.  </p><p>I respectfully disagree w/Tom's assertions in his video, and decided to use this as the first episode I'm going to publish a video version of. You can listen to the podcast on all the usual podcast channels, or watch the video version on youtube here: https://youtu.be/ym_ibNWVjgA</p><p>Tom said that backup and security are very closely related, and suggested that if we reported to the same team, we could perhaps accomplish more together. While I understand the point he is making, I disagree with it, and Prasanna and I discuss it on this episode. We believe Tom's opinion comes from an outdated concept of how security works in backup systems; we haven't worked like that in quite some time.  I explain how modern backup systems work from a security perspective, then talk about the idea of backup folks reporting to security folks.  I think it's a bad idea for several reasons.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/should-dr-backup-folks-report-to-the-security-team-restore-it-all-podcast-142/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1215435142</guid><itunes:image href="https://artwork.captivate.fm/f6346b59-fc58-49eb-ad1b-573275c72ac8/_M8bY4SE6rcQt8qDTGNDyWeI.jpg"/><pubDate>Mon, 14 Feb 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d8594b4b-24b6-48f7-a058-2f81556930bd/1215435142-restoreitall-should-drbackup-folks-report-to-the-sec.mp3" length="130498464" type="audio/mpeg"/><itunes:duration>01:08:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This is a response to Tom Hollingsworth&apos;s (@networkingnerd) video &quot;Disaster Recovery is a Security Function,&quot; found here: https://gestaltit.com/tomversations/tom/disaster-recovery-is-a-security-function-tomversations-episode-25/.  

I respectfully disagree w/Tom&apos;s assertions in his video, and decided to use this as the first episode I&apos;m going to publish a video version of. You can listen to the podcast on all the usual podcast channels, or watch the video version on youtube here: https://youtu.be/ym_ibNWVjgA

Tom said that backup and security are very closely related, and suggested that if we reported to the same team, we could perhaps accomplish more together. While I understand the point he is making, I disagree with it, and Prasanna and I discuss it on this episode. We believe Tom&apos;s opinion comes from an outdated concept of how security works in backup systems; we haven&apos;t worked like that in quite some time.  I explain how modern backup systems work from a security perspective, then talk about the idea of backup folks reporting to security folks.  I think it&apos;s a bad idea for several reasons.</itunes:summary></item><item><title>What Can We Learn From University of Kyoto Losing 77 TB of Research Data?</title><itunes:title>What Can We Learn From University of Kyoto Losing 77 TB of Research Data?</itunes:title><description><![CDATA[<p>This week's episode is about an incident that happened at the University of Kyoto, Japan, where they lost 77 TB of research data forever. What can we learn from what happened to them? First we discuss the concept of "we can't afford backup," that seems to be prevalent in a lot of universities and research institutions. We then ask and answer the question of whether or not it is every OK to not backup data, along with whose responsibility is it?  We pause the recording for what appears at first to be a spam call, but you'll have to listen to hear that. We talk about what happened there, including a letter from HPE apologizing for what happened.  Kudos to HPE for that. We also discuss a story from my very first week on the job in 1993; it's not pretty.</p>]]></description><content:encoded><![CDATA[<p>This week's episode is about an incident that happened at the University of Kyoto, Japan, where they lost 77 TB of research data forever. What can we learn from what happened to them? First we discuss the concept of "we can't afford backup," that seems to be prevalent in a lot of universities and research institutions. We then ask and answer the question of whether or not it is every OK to not backup data, along with whose responsibility is it?  We pause the recording for what appears at first to be a spam call, but you'll have to listen to hear that. We talk about what happened there, including a letter from HPE apologizing for what happened.  Kudos to HPE for that. We also discuss a story from my very first week on the job in 1993; it's not pretty.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-can-we-learn-from-university-of-kyoto-losing-77-tb-of-research-data-restore-it-all-podcast-141/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1210010707</guid><itunes:image href="https://artwork.captivate.fm/ffe24ace-bb48-4d8a-a7e0-d58ec58591c3/abyO3Y0DFTUKzOkRE-DKb7Uh.jpeg"/><pubDate>Mon, 07 Feb 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b25ad92d-c0ba-410f-a1bd-ca47e83eeeac/1210010707-restoreitall-university-of-kyoto-loses-77-tb-of-rese.mp3" length="51207406" type="audio/mpeg"/><itunes:duration>53:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week&apos;s episode is about an incident that happened at the University of Kyoto, Japan, where they lost 77 TB of research data forever. What can we learn from what happened to them? First we discuss the concept of &quot;we can&apos;t afford backup,&quot; that seems to be prevalent in a lot of universities and research institutions. We then ask and answer the question of whether or not it is every OK to not backup data, along with whose responsibility is it?  We pause the recording for what appears at first to be a spam call, but you&apos;ll have to listen to hear that. We talk about what happened there, including a letter from HPE apologizing for what happened.  Kudos to HPE for that. We also discuss a story from my very first week on the job in 1993; it&apos;s not pretty.</itunes:summary></item><item><title>Free backup tools for MySQL &amp; MongoDB explained by author of Learning MySQL</title><itunes:title>Free backup tools for MySQL &amp; MongoDB explained by author of Learning MySQL</itunes:title><description><![CDATA[<p>Vinicius "Vinny" Grippa, the co-author of O'Reilly's Learning MySQL (now in its second edition) talks MySQL and MongoDB, as well as that all-important topic of how to back them up!  We first learn a little bit about Percona, where Vinny works, as they consult in the database space. We then discussed a hot topic from Curtis, which is this idea of companies that say they don't want an IT department. We then discuss the book, Learning MySQL 2nd edition, and Vinny's top 3 performance suggestions for MySQL, including a discussion about the differences between MyISAM and InnoDB tables. We then discuss the typical ways people back up MySQL and MongoDB, followed by a discussion of two free tools that Percona makes available: Xtrabackup and PerconaBackup for MongoDB.  It is a fascinating discussion you won't want to miss.</p>]]></description><content:encoded><![CDATA[<p>Vinicius "Vinny" Grippa, the co-author of O'Reilly's Learning MySQL (now in its second edition) talks MySQL and MongoDB, as well as that all-important topic of how to back them up!  We first learn a little bit about Percona, where Vinny works, as they consult in the database space. We then discussed a hot topic from Curtis, which is this idea of companies that say they don't want an IT department. We then discuss the book, Learning MySQL 2nd edition, and Vinny's top 3 performance suggestions for MySQL, including a discussion about the differences between MyISAM and InnoDB tables. We then discuss the typical ways people back up MySQL and MongoDB, followed by a discussion of two free tools that Percona makes available: Xtrabackup and PerconaBackup for MongoDB.  It is a fascinating discussion you won't want to miss.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/free-backup-tools-for-mysql-mongodb-explained-by-author-of-learning-mysql-restore-it-all-podcast-140/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1206934972</guid><itunes:image href="https://artwork.captivate.fm/c34f92a7-008e-4956-832c-811c47aa9a28/tWctgNWoxIzeOh3nZ5bYyzNS.png"/><pubDate>Mon, 31 Jan 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1ecb281b-ebd6-48a6-8307-a40534050043/1206934972-restoreitall-free-backup-tools-for-mysql-mongodb-exp.mp3" length="65803050" type="audio/mpeg"/><itunes:duration>58:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Vinicius &quot;Vinny&quot; Grippa, the co-author of O&apos;Reilly&apos;s Learning MySQL (now in its second edition) talks MySQL and MongoDB, as well as that all-important topic of how to back them up!  We first learn a little bit about Percona, where Vinny works, as they consult in the database space. We then discussed a hot topic from Curtis, which is this idea of companies that say they don&apos;t want an IT department. We then discuss the book, Learning MySQL 2nd edition, and Vinny&apos;s top 3 performance suggestions for MySQL, including a discussion about the differences between MyISAM and InnoDB tables. We then discuss the typical ways people back up MySQL and MongoDB, followed by a discussion of two free tools that Percona makes available: Xtrabackup and PerconaBackup for MongoDB.  It is a fascinating discussion you won&apos;t want to miss.</itunes:summary></item><item><title>Happy Data Privacy Day!</title><itunes:title>Happy Data Privacy Day!</itunes:title><description><![CDATA[<p>This week we celebrate Data Privacy Day, which is an international event that occurs every year on 28 January. According to its website, "The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, Nigeria, Israel and 47 European countries."  Prasanna and Curtis discuss the latest in privacy practices and regulations, drawing on Prasanna's new experience protecting the privacy of Zoom's customers. We talk about the difference between PII and Personal Data, different regulations around the world, and some new tech features you can use to protect your privacy.  We also discuss a few gotchas out there, such as Verizon's new system that they require you to opt out of!  Happy Data Privacy Day, everyone!</p>]]></description><content:encoded><![CDATA[<p>This week we celebrate Data Privacy Day, which is an international event that occurs every year on 28 January. According to its website, "The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, Nigeria, Israel and 47 European countries."  Prasanna and Curtis discuss the latest in privacy practices and regulations, drawing on Prasanna's new experience protecting the privacy of Zoom's customers. We talk about the difference between PII and Personal Data, different regulations around the world, and some new tech features you can use to protect your privacy.  We also discuss a few gotchas out there, such as Verizon's new system that they require you to opt out of!  Happy Data Privacy Day, everyone!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/happy-data-privacy-day-restore-it-all-podcast-139/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1202351242</guid><itunes:image href="https://artwork.captivate.fm/40be71b7-ff09-4ffc-be96-6a24321b0e2e/SVMclIIwa-gvbexQBhzpGVMw.jpg"/><pubDate>Mon, 24 Jan 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/71ac71dc-2410-44a3-8370-ae1c67612e18/1202351242-restoreitall-happy-data-privacy-day.mp3" length="39822792" type="audio/mpeg"/><itunes:duration>40:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week we celebrate Data Privacy Day, which is an international event that occurs every year on 28 January. According to its website, &quot;The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, Nigeria, Israel and 47 European countries.&quot;  Prasanna and Curtis discuss the latest in privacy practices and regulations, drawing on Prasanna&apos;s new experience protecting the privacy of Zoom&apos;s customers. We talk about the difference between PII and Personal Data, different regulations around the world, and some new tech features you can use to protect your privacy.  We also discuss a few gotchas out there, such as Verizon&apos;s new system that they require you to opt out of!  Happy Data Privacy Day, everyone!</itunes:summary></item><item><title>Does K8s still need DR? O&apos;Reilly K8s Author On the Hot Seat!</title><itunes:title>Does K8s still need DR? O&apos;Reilly K8s Author On the Hot Seat!</itunes:title><description><![CDATA[<p>Things got a little tense on this week's podcast when James Strong (@strongjz, Co-Author of O'Reilly's Networking &amp; Kubernetes) hinted at DR being a thing of the past with K8s.  Mr. Backups was having none of that.  No blows were thrown, mostly because it was all online, but it was a really good conversation that K8s and DR enthusiasts alike will find interesting.  We also cover the new book, Networking and Kubernetes, by James Strong and Vallery Lancey, including why the decided to write it, and what it covers. We talk about monitoring K8s networking, and James uses at least 25 acronyms that may be new to some listeners.  Don't worry: we make him explain all of them.</p>]]></description><content:encoded><![CDATA[<p>Things got a little tense on this week's podcast when James Strong (@strongjz, Co-Author of O'Reilly's Networking &amp; Kubernetes) hinted at DR being a thing of the past with K8s.  Mr. Backups was having none of that.  No blows were thrown, mostly because it was all online, but it was a really good conversation that K8s and DR enthusiasts alike will find interesting.  We also cover the new book, Networking and Kubernetes, by James Strong and Vallery Lancey, including why the decided to write it, and what it covers. We talk about monitoring K8s networking, and James uses at least 25 acronyms that may be new to some listeners.  Don't worry: we make him explain all of them.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/does-k8s-still-need-dr-oreilly-k8s-author-on-the-hot-seat-restore-it-all-podcast-138/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1198363891</guid><itunes:image href="https://artwork.captivate.fm/ce695698-771a-4325-a4a3-de3d565dbe65/WDBMZatjcHgHCAPgyOH0opBV.jpg"/><pubDate>Tue, 18 Jan 2022 00:14:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a8ba14f5-c44d-4cf6-8133-10bd4041e76d/1198363891-restoreitall-does-k8s-still-need-dr-oreilly-k8s-auth.mp3" length="47401779" type="audio/mpeg"/><itunes:duration>57:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Things got a little tense on this week&apos;s podcast when James Strong (@strongjz, Co-Author of O&apos;Reilly&apos;s Networking &amp; Kubernetes) hinted at DR being a thing of the past with K8s.  Mr. Backups was having none of that.  No blows were thrown, mostly because it was all online, but it was a really good conversation that K8s and DR enthusiasts alike will find interesting.  We also cover the new book, Networking and Kubernetes, by James Strong and Vallery Lancey, including why the decided to write it, and what it covers. We talk about monitoring K8s networking, and James uses at least 25 acronyms that may be new to some listeners.  Don&apos;t worry: we make him explain all of them.</itunes:summary></item><item><title>Resiliency expert reviews Major Facebook Outage</title><itunes:title>Resiliency expert reviews Major Facebook Outage</itunes:title><description><![CDATA[<p>Bob Plankers, resiliency specialist from VMware, joins us on this week's podcast, as we examine last year's major Facebook outage that took out Facebook, WhatsApp, and Instagram all at once.  We discuss what we believe happened, just how bad it got, and our thoughts as to what we can learn from this huge outage.  This isn't schadenfreude, and we acknowledge that we are Monday morning quarterbacking.  It's an attempt to LEARN from the misfortunes of others –&nbsp;not to take joy in them.  Solid discussion with @plankers.</p>]]></description><content:encoded><![CDATA[<p>Bob Plankers, resiliency specialist from VMware, joins us on this week's podcast, as we examine last year's major Facebook outage that took out Facebook, WhatsApp, and Instagram all at once.  We discuss what we believe happened, just how bad it got, and our thoughts as to what we can learn from this huge outage.  This isn't schadenfreude, and we acknowledge that we are Monday morning quarterbacking.  It's an attempt to LEARN from the misfortunes of others –&nbsp;not to take joy in them.  Solid discussion with @plankers.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/resliency-expert-reviews-major-facebook-outage-restore-it-all-podcast-137/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1193512114</guid><itunes:image href="https://artwork.captivate.fm/d1b26a46-91f7-4ceb-9259-f58820ea5b06/Je89XLhPjDAaf2qJaOcdKXSk.jpeg"/><pubDate>Mon, 10 Jan 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/250ee0f1-f472-4d1c-9837-bc51c8b519d3/1193512114-restoreitall-resliency-expert-reviews-major-facebook.mp3" length="58990525" type="audio/mpeg"/><itunes:duration>56:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Bob Plankers, resiliency specialist from VMware, joins us on this week&apos;s podcast, as we examine last year&apos;s major Facebook outage that took out Facebook, WhatsApp, and Instagram all at once.  We discuss what we believe happened, just how bad it got, and our thoughts as to what we can learn from this huge outage.  This isn&apos;t schadenfreude, and we acknowledge that we are Monday morning quarterbacking.  It&apos;s an attempt to LEARN from the misfortunes of others – not to take joy in them.  Solid discussion with @plankers.</itunes:summary></item><item><title>Remembering the Best and Worst of 2021</title><itunes:title>Remembering the Best and Worst of 2021</itunes:title><description><![CDATA[<p>On this first business day of 2022, let’s take a look back at the year that was.  It was, of course, another year of COVID.  In fact, Curtis contracted COVID right at the end, despite being boosted. This is also the year of the OVH fire that we talked about for three episodes: </p><p>https://www.backupcentral.com/datacenter-manager-dan-frith-discusses-the-ovh-fire-restore-it-all-podcast-105/</p><p>https://www.backupcentral.com/how-do-you-prove-your-backup-service-is-real-restore-it-all-podcast-106/</p><p>https://www.backupcentral.com/ovhs-backup-service-didnt-work-restore-it-all-podcast-107/</p><p>We think our most interesting episode of the year goes to Paul VanDyke from Kodiak Island, who deleted his whole environment and then tested his backups:   https://www.backupcentral.com/it-admin-deletes-entire-datacenter-then-tests-his-backups-restore-it-all-podcast-135/</p><p>We even had a barbecue episode.  No backups, just beef and BBQ. https://www.backupcentral.com/no-backups-just-beef-bbq-restore-it-all-bonus-episode/</p><p><br></p><p><br></p><p>Prasanna said he learned a lot about tape this year from these three episodes:</p><p>https://www.backupcentral.com/tape-drive-designer-schools-mr-backup-on-tape-restore-it-all-podcast-111/</p><p>https://www.backupcentral.com/deep-dive-into-why-tape-still-has-a-future-in-storage-restore-it-all-podcast-129/</p><p>https://www.backupcentral.com/fujifilm-tape-evangelist-explains-past-present-future-of-tape-lto-restore-it-all-podcast-132/</p><p><br></p><p><br></p><p>We think our best “get” was Peter Krogh, who talked about how he coined the term “3-2-1 Rule” while writing the first edition of The DAM Book: Digital Asset Management for Photographers. </p><p>https://www.backupcentral.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast-restore-it-all-podcast-131/</p><p><br></p><p>This led to a brief discussion about solar flares, where I mention a talk I watched by Intel.  This is a link to that talk:</p><p>https://techfieldday.com/event/eicd16/</p><p><br></p><p>We also had two Druva competitors on this year, Veeam and HYCU.</p><p>https://www.backupcentral.com/dave-russell-answers-our-questions-about-veeam-restore-it-all-podcast-104/</p><p>https://www.backupcentral.com/veeam-reps-explain-defense-against-conti-ransomware-restore-it-all-podcast-127/</p><p>https://www.backupcentral.com/hycu-vp-explains-their-service-to-mr-backup-2/</p><p><br></p><p>The big winner of the year was ransomware.  We talked about it a lot:</p><p>https://www.backupcentral.com/ransomware-victim-tells-his-story-restore-it-all-podcast-96/</p><p>https://www.backupcentral.com/is-entity-level-encryption-the-answer-to-exfiltration-ransomware-restore-it-all-podast-119/</p><p>https://www.backupcentral.com/protecting-your-network-from-ransomware-restore-it-all-podcast-122/</p><p>https://www.backupcentral.com/restoring-quickly-from-a-ransomare-attack-with-a-long-dwell-time-restore-it-all-podcast-123/</p><p>https://www.backupcentral.com/veeam-reps-explain-defense-against-conti-ransomware-restore-it-all-podcast-127/</p><p><br></p><p>Curtis this everyone should be looking into an intelligent DDI (DNS, DHCP, IP management) system that will spot (and stop) ransomware when it tries to reach out to its command and control servers.  </p><p>https://www.backupcentral.com/stop-ransomware-in-its-tracks-with-dns-dhcp-ipam-restore-it-all-podcast-87/</p><p><br></p><p><br></p><p>You also need to monitor your bandwidth to look for exfiltration:</p><p>https://www.backupcentral.com/securing-speeding-up-network-traffic/</p><p>https://www.backupcentral.com/stop-ransomware-attacks-in-seconds-restore-it-all-podcast-126/</p><p><br></p><p><br></p><p>Finally, we talked a little about the book, and the upcoming 2022. </p><p>https://www.backupcentral.com/why-you-need-a-copy-of-modern-data-protection-restore-it-all-podcast-110/</p><p><br></p><p>Happy New Year, everyone!  Here’s to a better 2022!</p>]]></description><content:encoded><![CDATA[<p>On this first business day of 2022, let’s take a look back at the year that was.  It was, of course, another year of COVID.  In fact, Curtis contracted COVID right at the end, despite being boosted. This is also the year of the OVH fire that we talked about for three episodes: </p><p>https://www.backupcentral.com/datacenter-manager-dan-frith-discusses-the-ovh-fire-restore-it-all-podcast-105/</p><p>https://www.backupcentral.com/how-do-you-prove-your-backup-service-is-real-restore-it-all-podcast-106/</p><p>https://www.backupcentral.com/ovhs-backup-service-didnt-work-restore-it-all-podcast-107/</p><p>We think our most interesting episode of the year goes to Paul VanDyke from Kodiak Island, who deleted his whole environment and then tested his backups:   https://www.backupcentral.com/it-admin-deletes-entire-datacenter-then-tests-his-backups-restore-it-all-podcast-135/</p><p>We even had a barbecue episode.  No backups, just beef and BBQ. https://www.backupcentral.com/no-backups-just-beef-bbq-restore-it-all-bonus-episode/</p><p><br></p><p><br></p><p>Prasanna said he learned a lot about tape this year from these three episodes:</p><p>https://www.backupcentral.com/tape-drive-designer-schools-mr-backup-on-tape-restore-it-all-podcast-111/</p><p>https://www.backupcentral.com/deep-dive-into-why-tape-still-has-a-future-in-storage-restore-it-all-podcast-129/</p><p>https://www.backupcentral.com/fujifilm-tape-evangelist-explains-past-present-future-of-tape-lto-restore-it-all-podcast-132/</p><p><br></p><p><br></p><p>We think our best “get” was Peter Krogh, who talked about how he coined the term “3-2-1 Rule” while writing the first edition of The DAM Book: Digital Asset Management for Photographers. </p><p>https://www.backupcentral.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast-restore-it-all-podcast-131/</p><p><br></p><p>This led to a brief discussion about solar flares, where I mention a talk I watched by Intel.  This is a link to that talk:</p><p>https://techfieldday.com/event/eicd16/</p><p><br></p><p>We also had two Druva competitors on this year, Veeam and HYCU.</p><p>https://www.backupcentral.com/dave-russell-answers-our-questions-about-veeam-restore-it-all-podcast-104/</p><p>https://www.backupcentral.com/veeam-reps-explain-defense-against-conti-ransomware-restore-it-all-podcast-127/</p><p>https://www.backupcentral.com/hycu-vp-explains-their-service-to-mr-backup-2/</p><p><br></p><p>The big winner of the year was ransomware.  We talked about it a lot:</p><p>https://www.backupcentral.com/ransomware-victim-tells-his-story-restore-it-all-podcast-96/</p><p>https://www.backupcentral.com/is-entity-level-encryption-the-answer-to-exfiltration-ransomware-restore-it-all-podast-119/</p><p>https://www.backupcentral.com/protecting-your-network-from-ransomware-restore-it-all-podcast-122/</p><p>https://www.backupcentral.com/restoring-quickly-from-a-ransomare-attack-with-a-long-dwell-time-restore-it-all-podcast-123/</p><p>https://www.backupcentral.com/veeam-reps-explain-defense-against-conti-ransomware-restore-it-all-podcast-127/</p><p><br></p><p>Curtis this everyone should be looking into an intelligent DDI (DNS, DHCP, IP management) system that will spot (and stop) ransomware when it tries to reach out to its command and control servers.  </p><p>https://www.backupcentral.com/stop-ransomware-in-its-tracks-with-dns-dhcp-ipam-restore-it-all-podcast-87/</p><p><br></p><p><br></p><p>You also need to monitor your bandwidth to look for exfiltration:</p><p>https://www.backupcentral.com/securing-speeding-up-network-traffic/</p><p>https://www.backupcentral.com/stop-ransomware-attacks-in-seconds-restore-it-all-podcast-126/</p><p><br></p><p><br></p><p>Finally, we talked a little about the book, and the upcoming 2022. </p><p>https://www.backupcentral.com/why-you-need-a-copy-of-modern-data-protection-restore-it-all-podcast-110/</p><p><br></p><p>Happy New Year, everyone!  Here’s to a better 2022!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/remembering-the-best-and-worst-of-2021-restore-it-all-podcast-136/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1189209346</guid><itunes:image href="https://artwork.captivate.fm/d027b971-b6b8-465e-9b59-44609fc3ddfc/wvVLPTMpIgnXD7w6Sul2vgS3.jpg"/><pubDate>Mon, 03 Jan 2022 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a4c0bb08-4e4f-4140-a779-a417161c2f83/1189209346-restoreitall-remembering-the-best-and-worst-of-2021.mp3" length="58498527" type="audio/mpeg"/><itunes:duration>58:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this first business day of 2022, let’s take a look back at the year that was.  It was, of course, another year of COVID.  In fact, Curtis contracted COVID right at the end, despite being boosted. This is also the year of the OVH fire that we talked about for three episodes: 
https://www.backupcentral.com/datacenter-manager-dan-frith-discusses-the-ovh-fire-restore-it-all-podcast-105/
https://www.backupcentral.com/how-do-you-prove-your-backup-service-is-real-restore-it-all-podcast-106/
https://www.backupcentral.com/ovhs-backup-service-didnt-work-restore-it-all-podcast-107/

We think our most interesting episode of the year goes to Paul VanDyke from Kodiak Island, who deleted his whole environment and then tested his backups:   https://www.backupcentral.com/it-admin-deletes-entire-datacenter-then-tests-his-backups-restore-it-all-podcast-135/

We even had a barbecue episode.  No backups, just beef and BBQ. https://www.backupcentral.com/no-backups-just-beef-bbq-restore-it-all-bonus-episode/


Prasanna said he learned a lot about tape this year from these three episodes:
https://www.backupcentral.com/tape-drive-designer-schools-mr-backup-on-tape-restore-it-all-podcast-111/
https://www.backupcentral.com/deep-dive-into-why-tape-still-has-a-future-in-storage-restore-it-all-podcast-129/
https://www.backupcentral.com/fujifilm-tape-evangelist-explains-past-present-future-of-tape-lto-restore-it-all-podcast-132/


We think our best “get” was Peter Krogh, who talked about how he coined the term “3-2-1 Rule” while writing the first edition of The DAM Book: Digital Asset Management for Photographers. 
https://www.backupcentral.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast-restore-it-all-podcast-131/

This led to a brief discussion about solar flares, where I mention a talk I watched by Intel.  This is a link to that talk:
https://techfieldday.com/event/eicd16/

We also had two Druva competitors on this year, Veeam and HYCU.
https://www.backupcentral.com/dave-russell-answers-our-questions-about-veeam-restore-it-all-podcast-104/
https://www.backupcentral.com/veeam-reps-explain-defense-against-conti-ransomware-restore-it-all-podcast-127/
https://www.backupcentral.com/hycu-vp-explains-their-service-to-mr-backup-2/

The big winner of the year was ransomware.  We talked about it a lot:
https://www.backupcentral.com/ransomware-victim-tells-his-story-restore-it-all-podcast-96/
https://www.backupcentral.com/is-entity-level-encryption-the-answer-to-exfiltration-ransomware-restore-it-all-podast-119/
https://www.backupcentral.com/protecting-your-network-from-ransomware-restore-it-all-podcast-122/
https://www.backupcentral.com/restoring-quickly-from-a-ransomare-attack-with-a-long-dwell-time-restore-it-all-podcast-123/
https://www.backupcentral.com/veeam-reps-explain-defense-against-conti-ransomware-restore-it-all-podcast-127/

Curtis this everyone should be looking into an intelligent DDI (DNS, DHCP, IP management) system that will spot (and stop) ransomware when it tries to reach out to its command and control servers.  
https://www.backupcentral.com/stop-ransomware-in-its-tracks-with-dns-dhcp-ipam-restore-it-all-podcast-87/


You also need to monitor your bandwidth to look for exfiltration:
https://www.backupcentral.com/securing-speeding-up-network-traffic/
https://www.backupcentral.com/stop-ransomware-attacks-in-seconds-restore-it-all-podcast-126/


Finally, we talked a little about the book, and the upcoming 2022. 
https://www.backupcentral.com/why-you-need-a-copy-of-modern-data-protection-restore-it-all-podcast-110/

Happy New Year, everyone!  Here’s to a better 2022!</itunes:summary></item><item><title>IT Admin deletes entire datacenter THEN tests his backups!</title><itunes:title>IT Admin deletes entire datacenter THEN tests his backups!</itunes:title><description><![CDATA[<p>This week’s guest tells the most incredible story we’ve ever had on the podcast.  We’ve had ransomware restores, disaster recoveries after a hurricane, but we’ve never had someone who deleted their entire computing environment and then restored it using their backups.  (Backups that had never been tested to this degree, BTW.) </p><p>Paul VanDyke is the IT Supervisor at the Kodiak Island Borough in Alaska, which is the second largest island in the US and has to satisfy its backup and DR needs while staying on the island.  Cloud resources are not a possibility due to bandwidth concerns, so he’s doing things “old school.” We first talk about the kinds of things they are protecting from, including tsunamis, fires, and strong winds. They are primarily based on tape, and for DR they store copies of all backups in a nearby safe.  We discussed ways they could improve their resilience, such as shipping some tapes to a location on the mainland. </p><p>But the highlight of this episode is the story of when Paul intentionally destroyed his entire environment and then tested his backup system!  He learned many valuable lessons, starting with “don’t ever do that again!”  Luckily, his test was successful, albeit not without some challenges. He wiped the storage arrays on five servers: two domain controllers, an email server, a file server, and an application server and then restored them.  (He had his reasons for doing it this way, which he goes into in the podcast.)  </p><p><br></p><p>One big thing he learned was how restores are often slower than backups.  So he prioritized critical apps (e.g. email, fileserver, logins) and got them up by Monday morning. Then it took him a few more days to get the application server up and running due to a more complicated restore. We have a really good discussion on how Paul could have done things better, including a really good idea that Prasanna came up with it. Curtis also tells a similar story about the first time he “tested” backups when he actually needed them, versus doing it in advance. </p><p><br></p><p>We cover a number of topics and questions on this podcast:</p><p>What was an Exabyte Mammoth (M2) tape drive?</p><p>What is a helical scan tape drive?</p><p>What is multiplexing?</p><p>Why can restores be slower than backups?</p><p>What happens when you rebuild a RAID array?</p><p>Should you have a post-mortem after a large incident?   </p><p>How important is recovery testing? </p><p>How important is it to set expectations in IT, especially when it comes to recovery times?</p>]]></description><content:encoded><![CDATA[<p>This week’s guest tells the most incredible story we’ve ever had on the podcast.  We’ve had ransomware restores, disaster recoveries after a hurricane, but we’ve never had someone who deleted their entire computing environment and then restored it using their backups.  (Backups that had never been tested to this degree, BTW.) </p><p>Paul VanDyke is the IT Supervisor at the Kodiak Island Borough in Alaska, which is the second largest island in the US and has to satisfy its backup and DR needs while staying on the island.  Cloud resources are not a possibility due to bandwidth concerns, so he’s doing things “old school.” We first talk about the kinds of things they are protecting from, including tsunamis, fires, and strong winds. They are primarily based on tape, and for DR they store copies of all backups in a nearby safe.  We discussed ways they could improve their resilience, such as shipping some tapes to a location on the mainland. </p><p>But the highlight of this episode is the story of when Paul intentionally destroyed his entire environment and then tested his backup system!  He learned many valuable lessons, starting with “don’t ever do that again!”  Luckily, his test was successful, albeit not without some challenges. He wiped the storage arrays on five servers: two domain controllers, an email server, a file server, and an application server and then restored them.  (He had his reasons for doing it this way, which he goes into in the podcast.)  </p><p><br></p><p>One big thing he learned was how restores are often slower than backups.  So he prioritized critical apps (e.g. email, fileserver, logins) and got them up by Monday morning. Then it took him a few more days to get the application server up and running due to a more complicated restore. We have a really good discussion on how Paul could have done things better, including a really good idea that Prasanna came up with it. Curtis also tells a similar story about the first time he “tested” backups when he actually needed them, versus doing it in advance. </p><p><br></p><p>We cover a number of topics and questions on this podcast:</p><p>What was an Exabyte Mammoth (M2) tape drive?</p><p>What is a helical scan tape drive?</p><p>What is multiplexing?</p><p>Why can restores be slower than backups?</p><p>What happens when you rebuild a RAID array?</p><p>Should you have a post-mortem after a large incident?   </p><p>How important is recovery testing? </p><p>How important is it to set expectations in IT, especially when it comes to recovery times?</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/it-admin-deletes-entire-datacenter-then-tests-his-backups-restore-it-all-podcast-135/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1181014762</guid><itunes:image href="https://artwork.captivate.fm/ed581ea8-a932-4cb2-8592-cb03cd9fb58b/bA0Oey-yvI0CjTl349spekze.jpg"/><pubDate>Mon, 20 Dec 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/59248e01-e4e0-496d-a3d3-d50625b7726c/1181014762-restoreitall-it-admin-deletes-entire-datacenter-then.mp3" length="56114833" type="audio/mpeg"/><itunes:duration>58:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week’s guest tells the most incredible story we’ve ever had on the podcast.  We’ve had ransomware restores, disaster recoveries after a hurricane, but we’ve never had someone who deleted their entire computing environment and then restored it using their backups.  (Backups that had never been tested to this degree, BTW.) 

Paul VanDyke is the IT Supervisor at the Kodiak Island Borough in Alaska, which is the second largest island in the US and has to satisfy its backup and DR needs while staying on the island.  Cloud resources are not a possibility due to bandwidth concerns, so he’s doing things “old school.” We first talk about the kinds of things they are protecting from, including tsunamis, fires, and strong winds. They are primarily based on tape, and for DR they store copies of all backups in a nearby safe.  We discussed ways they could improve their resilience, such as shipping some tapes to a location on the mainland. 

But the highlight of this episode is the story of when Paul intentionally destroyed his entire environment and then tested his backup system!  He learned many valuable lessons, starting with “don’t ever do that again!”  Luckily, his test was successful, albeit not without some challenges. He wiped the storage arrays on five servers: two domain controllers, an email server, a file server, and an application server and then restored them.  (He had his reasons for doing it this way, which he goes into in the podcast.)  

One big thing he learned was how restores are often slower than backups.  So he prioritized critical apps (e.g. email, fileserver, logins) and got them up by Monday morning. Then it took him a few more days to get the application server up and running due to a more complicated restore. We have a really good discussion on how Paul could have done things better, including a really good idea that Prasanna came up with it. Curtis also tells a similar story about the first time he “tested” backups when he actually needed them, versus doing it in advance. 

We cover a number of topics and questions on this podcast:
What was an Exabyte Mammoth (M2) tape drive?
What is a helical scan tape drive?
What is multiplexing?
Why can restores be slower than backups?
What happens when you rebuild a RAID array?
Should you have a post-mortem after a large incident?   
How important is recovery testing? 
How important is it to set expectations in IT, especially when it comes to recovery times?</itunes:summary></item><item><title>ZFS filesystem in the cloud – just for your backups</title><itunes:title>ZFS filesystem in the cloud – just for your backups</itunes:title><description><![CDATA[<p>The founder of rsync.net, John Kozubik,  joins us on the podcast this week.  It's a unique offering: a ZFS filesystem running in a private cloud – accessible only via SSH – that is designed just for sending your backup data to. They support anything that can run over SSH.  Use rsync, scp, etc. to copy your data unencrypted, or something like restic, duplicity, or borg, if you want your backups to be encrypted. (All backups are encrypted in flight, of course, because they are all over SSH.). </p><p>The servers are completely locked down except for the SSH port, so they're about as secure as they can be for what they are.  You can configure ssh to behave the way you want it (e.g. passphrase, MFA, etc.), and the ZFS filesystem automatically creates daily snapshots of the backups you send there.  (More complicated schedules can also be created.)</p><p>You pay by the gigabyte ($.025/GB/mth) for the size of the ZFS filesystem and its associated snapshots, but they urge you to NOT over-provision.  Provisioning is easy and non-disruptive, so only add storage when you need it.  For an extra fee ($.017/GB/mth), they can also replicate your backups to another region.</p><p><br></p><p>It's a no-nonsense offering that seems to be unique out there – especially when you add the ZFS features.  Check out the website and rsync.net, and you'll see they aren't spending any money on being flashy.  They just want to build a rock-solid ZFS syncing destination that is separate from any cloud provides.</p>]]></description><content:encoded><![CDATA[<p>The founder of rsync.net, John Kozubik,  joins us on the podcast this week.  It's a unique offering: a ZFS filesystem running in a private cloud – accessible only via SSH – that is designed just for sending your backup data to. They support anything that can run over SSH.  Use rsync, scp, etc. to copy your data unencrypted, or something like restic, duplicity, or borg, if you want your backups to be encrypted. (All backups are encrypted in flight, of course, because they are all over SSH.). </p><p>The servers are completely locked down except for the SSH port, so they're about as secure as they can be for what they are.  You can configure ssh to behave the way you want it (e.g. passphrase, MFA, etc.), and the ZFS filesystem automatically creates daily snapshots of the backups you send there.  (More complicated schedules can also be created.)</p><p>You pay by the gigabyte ($.025/GB/mth) for the size of the ZFS filesystem and its associated snapshots, but they urge you to NOT over-provision.  Provisioning is easy and non-disruptive, so only add storage when you need it.  For an extra fee ($.017/GB/mth), they can also replicate your backups to another region.</p><p><br></p><p>It's a no-nonsense offering that seems to be unique out there – especially when you add the ZFS features.  Check out the website and rsync.net, and you'll see they aren't spending any money on being flashy.  They just want to build a rock-solid ZFS syncing destination that is separate from any cloud provides.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/zfs-filesystem-in-the-cloud-just-for-your-backups-restore-it-all-podcast-134/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1176757687</guid><itunes:image href="https://artwork.captivate.fm/19067c36-c89a-4e7f-9288-95cc834e1316/0HKlmhC2uf2SL8ANiwmkD28G.jpg"/><pubDate>Mon, 13 Dec 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5e9e9470-1f19-47aa-88d7-0883df4832c9/1176757687-restoreitall-zfs-filesystem-in-the-cloud-just-for-yo.mp3" length="57217025" type="audio/mpeg"/><itunes:duration>01:04:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>The founder of rsync.net, John Kozubik,  joins us on the podcast this week.  It&apos;s a unique offering: a ZFS filesystem running in a private cloud – accessible only via SSH – that is designed just for sending your backup data to. They support anything that can run over SSH.  Use rsync, scp, etc. to copy your data unencrypted, or something like restic, duplicity, or borg, if you want your backups to be encrypted. (All backups are encrypted in flight, of course, because they are all over SSH.). 

The servers are completely locked down except for the SSH port, so they&apos;re about as secure as they can be for what they are.  You can configure ssh to behave the way you want it (e.g. passphrase, MFA, etc.), and the ZFS filesystem automatically creates daily snapshots of the backups you send there.  (More complicated schedules can also be created.)

You pay by the gigabyte ($.025/GB/mth) for the size of the ZFS filesystem and its associated snapshots, but they urge you to NOT over-provision.  Provisioning is easy and non-disruptive, so only add storage when you need it.  For an extra fee ($.017/GB/mth), they can also replicate your backups to another region.

It&apos;s a no-nonsense offering that seems to be unique out there – especially when you add the ZFS features.  Check out the website and rsync.net, and you&apos;ll see they aren&apos;t spending any money on being flashy.  They just want to build a rock-solid ZFS syncing destination that is separate from any cloud provides.</itunes:summary></item><item><title>Rclone creator Nick Craig-Wood Explains This Powerful Tool</title><itunes:title>Rclone creator Nick Craig-Wood Explains This Powerful Tool</itunes:title><description><![CDATA[<p>This week, we talk to Nick Craigwood, the creator and principal developer of rclone, a very popular open-source tool for copying data to and from cloud providers. Rclone is downloaded roughly 250,000 times each month, and has over 30,000 stars on GitHub.  There are six core developers, and a great community of users and other developers at rclone.org.   </p><p>We talk a little bit about Nick’s development philosophy, which is that he doesn’t mind adding features - as long as they don’t break backwards compatibility.  Then we talk about how rclone works, and what it’s like to sync a filesystem to an object store – including support for multi-part uploads and downloads. We also talk about rclone’s encryption support, while Nick was “relaxing” on holiday.  We then talked about how rclone can be used to minimize the risk of backing up to any one cloud provider, preventing things like what happened during the OVH fire earlier in 2021.  We also discuss some strategies, such as backing up directly to two different clouds, versus backing up to one, then syncing to another – and how CloudFlare’s R2 might figure into things.  Finally, we talk about Nick’s plans for rclone’s future, such as making their web UI better to increase usability for many more people – while not sacrificing the command line. Join us for a fascinating episode, the first one where we’re talking to the creator of the tool in question.</p><p>Don’t forget the drawing for a free e-book version of Modern Data Protection.  All you have to do to be eligible is sign up for my newsletter at https://www.backupcentral.com/subscribe-to-our-newsletter/</p>]]></description><content:encoded><![CDATA[<p>This week, we talk to Nick Craigwood, the creator and principal developer of rclone, a very popular open-source tool for copying data to and from cloud providers. Rclone is downloaded roughly 250,000 times each month, and has over 30,000 stars on GitHub.  There are six core developers, and a great community of users and other developers at rclone.org.   </p><p>We talk a little bit about Nick’s development philosophy, which is that he doesn’t mind adding features - as long as they don’t break backwards compatibility.  Then we talk about how rclone works, and what it’s like to sync a filesystem to an object store – including support for multi-part uploads and downloads. We also talk about rclone’s encryption support, while Nick was “relaxing” on holiday.  We then talked about how rclone can be used to minimize the risk of backing up to any one cloud provider, preventing things like what happened during the OVH fire earlier in 2021.  We also discuss some strategies, such as backing up directly to two different clouds, versus backing up to one, then syncing to another – and how CloudFlare’s R2 might figure into things.  Finally, we talk about Nick’s plans for rclone’s future, such as making their web UI better to increase usability for many more people – while not sacrificing the command line. Join us for a fascinating episode, the first one where we’re talking to the creator of the tool in question.</p><p>Don’t forget the drawing for a free e-book version of Modern Data Protection.  All you have to do to be eligible is sign up for my newsletter at https://www.backupcentral.com/subscribe-to-our-newsletter/</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/rclone-creator-nick-craig-wood-explains-this-powerfool-tool-restore-it-all-podcast-133/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1172544628</guid><itunes:image href="https://artwork.captivate.fm/3a92febb-af0c-4087-9df4-6b62340c6b6f/NkDBskyM4SwlkQVF2UEOPtb6.jpeg"/><pubDate>Mon, 06 Dec 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a2edde13-0965-47db-81d0-7081d30d2abb/1172544628-restoreitall-rclone-creator-nick-craig-wood-explains.mp3" length="45773621" type="audio/mpeg"/><itunes:duration>46:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week, we talk to Nick Craigwood, the creator and principal developer of rclone, a very popular open-source tool for copying data to and from cloud providers. Rclone is downloaded roughly 250,000 times each month, and has over 30,000 stars on GitHub.  There are six core developers, and a great community of users and other developers at rclone.org.   

We talk a little bit about Nick’s development philosophy, which is that he doesn’t mind adding features - as long as they don’t break backwards compatibility.  Then we talk about how rclone works, and what it’s like to sync a filesystem to an object store – including support for multi-part uploads and downloads. We also talk about rclone’s encryption support, while Nick was “relaxing” on holiday.  We then talked about how rclone can be used to minimize the risk of backing up to any one cloud provider, preventing things like what happened during the OVH fire earlier in 2021.  We also discuss some strategies, such as backing up directly to two different clouds, versus backing up to one, then syncing to another – and how CloudFlare’s R2 might figure into things.  Finally, we talk about Nick’s plans for rclone’s future, such as making their web UI better to increase usability for many more people – while not sacrificing the command line. Join us for a fascinating episode, the first one where we’re talking to the creator of the tool in question.

Don’t forget the drawing for a free e-book version of Modern Data Protection.  All you have to do to be eligible is sign up for my newsletter at https://www.backupcentral.com/subscribe-to-our-newsletter/</itunes:summary></item><item><title>FujiFilm Tape Evangelist Explains Past, Present &amp; Future of Tape/LTO</title><itunes:title>FujiFilm Tape Evangelist Explains Past, Present &amp; Future of Tape/LTO</itunes:title><description><![CDATA[<p>Fujifilm's tape evangelist, Rich Gadomski, joins us for an interesting discussion on tape and LTO.  We talk about the different subtrates that have been used over the years, and how that changed things.  We then talk about LTO-9 and what that brings to market.  We also talk about how tape has seen a bit of a resurgence in interest in the backup market due to the advent of ransomware.   Always fun to talk to someone that can talk at this depth on such things.</p>]]></description><content:encoded><![CDATA[<p>Fujifilm's tape evangelist, Rich Gadomski, joins us for an interesting discussion on tape and LTO.  We talk about the different subtrates that have been used over the years, and how that changed things.  We then talk about LTO-9 and what that brings to market.  We also talk about how tape has seen a bit of a resurgence in interest in the backup market due to the advent of ransomware.   Always fun to talk to someone that can talk at this depth on such things.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/fujifilm-tape-evangelist-explains-past-present-future-of-tape-lto-restore-it-all-podcast-132/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1168579951</guid><itunes:image href="https://artwork.captivate.fm/d8015dff-7334-409c-9c3e-ca9c962f3136/Wou20ab-F1acMjXIR1sjqxa7.png"/><pubDate>Mon, 29 Nov 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/78dd8deb-6816-4bfa-8118-fd0289dc1105/1168579951-restoreitall-fujifilm-tape-evangelist-explains-past.mp3" length="44360327" type="audio/mpeg"/><itunes:duration>52:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Fujifilm&apos;s tape evangelist, Rich Gadomski, joins us for an interesting discussion on tape and LTO.  We talk about the different subtrates that have been used over the years, and how that changed things.  We then talk about LTO-9 and what that brings to market.  We also talk about how tape has seen a bit of a resurgence in interest in the backup market due to the advent of ransomware.   Always fun to talk to someone that can talk at this depth on such things.</itunes:summary></item><item><title>Peter Krogh, who coined &quot;the 3-2-1 rule,&quot; on our podcast!</title><itunes:title>Peter Krogh, who coined &quot;the 3-2-1 rule,&quot; on our podcast!</itunes:title><description><![CDATA[<p>The term "3-2-1 rule" comes up on almost every episode, and we have the guy that coined it with us on the podcast!  How exciting! Peter Krogh coined the term fifteen years ago.  He is now Chief Product Officer at Tandem Vault, but this week he is talking to us. </p><p>He first talks about how he coined the term “3-2-1 Rule” while writing the first edition of The DAM Book: Digital Asset Management for Photographers, now in it’s 3rd edition. He didn’t invent the idea of three copies and offsite backup, but he did distill it down to what we now refer to as the 3-2-1 rule.  (Three copies on two media types, one of which is offsite.) We’ve played with it a bit over the years, but that is the core idea.) </p><p>He explains how digital photographers were some of the first to need significant amounts of storage -- and to have the need to protect that storage so they don’t lose everything. Hard drives were too small to hold your whole collection, so what do you do? </p><p><br></p><p>Like a lot of folks in this space, his love for good backups goes back to a moment when he thought he lost it all.  Curtis then tells his very similar story of how his company almost lost the company’s purchasing database, which also launched his career in backups. Peter then explains the incredible importance of metadata, and the huge importance it plays in the overall value of an image.</p><p><br></p><p>Then we get into the nitty-gritty of what the person who coined the term “3-2-1 rule” was thinking for each of the numbers.  And interestingly enough, Mr. Backup had a slightly different understanding of the 2! Peter feels that the “2” refers to different media types. (This led to a very interesting discussion about how you do what he’s asking for in today’s cloud world.) One idea he talked about is that if you have two hard drives on the same network, they’re still subject to many of the same risks, which isn’t really keeping in line with the original idea of the 2.  </p><p><br></p><p>We then talk about those that believe that RAID is backup, and follow that with a discussion about how SaaS services aren’t backing up your data – unless they specifically say they do so in your contract. Then we get into a discussion of Peter’s company, Tandem Vault, and how they have designed the next generation of Digital Asset Management and delivered it as a SaaS offering.</p>]]></description><content:encoded><![CDATA[<p>The term "3-2-1 rule" comes up on almost every episode, and we have the guy that coined it with us on the podcast!  How exciting! Peter Krogh coined the term fifteen years ago.  He is now Chief Product Officer at Tandem Vault, but this week he is talking to us. </p><p>He first talks about how he coined the term “3-2-1 Rule” while writing the first edition of The DAM Book: Digital Asset Management for Photographers, now in it’s 3rd edition. He didn’t invent the idea of three copies and offsite backup, but he did distill it down to what we now refer to as the 3-2-1 rule.  (Three copies on two media types, one of which is offsite.) We’ve played with it a bit over the years, but that is the core idea.) </p><p>He explains how digital photographers were some of the first to need significant amounts of storage -- and to have the need to protect that storage so they don’t lose everything. Hard drives were too small to hold your whole collection, so what do you do? </p><p><br></p><p>Like a lot of folks in this space, his love for good backups goes back to a moment when he thought he lost it all.  Curtis then tells his very similar story of how his company almost lost the company’s purchasing database, which also launched his career in backups. Peter then explains the incredible importance of metadata, and the huge importance it plays in the overall value of an image.</p><p><br></p><p>Then we get into the nitty-gritty of what the person who coined the term “3-2-1 rule” was thinking for each of the numbers.  And interestingly enough, Mr. Backup had a slightly different understanding of the 2! Peter feels that the “2” refers to different media types. (This led to a very interesting discussion about how you do what he’s asking for in today’s cloud world.) One idea he talked about is that if you have two hard drives on the same network, they’re still subject to many of the same risks, which isn’t really keeping in line with the original idea of the 2.  </p><p><br></p><p>We then talk about those that believe that RAID is backup, and follow that with a discussion about how SaaS services aren’t backing up your data – unless they specifically say they do so in your contract. Then we get into a discussion of Peter’s company, Tandem Vault, and how they have designed the next generation of Digital Asset Management and delivered it as a SaaS offering.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast-restore-it-all-podcast-131/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1164663442</guid><itunes:image href="https://artwork.captivate.fm/6ee9c99e-7691-434c-baf8-208811d125b1/A4rZoJKzr1GPd7yIwvN-6LM.jpg"/><pubDate>Mon, 22 Nov 2021 15:30:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5ac64d6d-180b-4c63-8426-66e83bda9c47/1164663442-restoreitall-peter-krogh-who-coined-the-3-2-1-rule.mp3" length="66377532" type="audio/mpeg"/><itunes:duration>58:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>The term &quot;3-2-1 rule&quot; comes up on almost every episode, and we have the guy that coined it with us on the podcast!  How exciting! Peter Krogh coined the term fifteen years ago.  He is now Chief Product Officer at Tandem Vault, but this week he is talking to us. 

He first talks about how he coined the term “3-2-1 Rule” while writing the first edition of The DAM Book: Digital Asset Management for Photographers, now in it’s 3rd edition. He didn’t invent the idea of three copies and offsite backup, but he did distill it down to what we now refer to as the 3-2-1 rule.  (Three copies on two media types, one of which is offsite.) We’ve played with it a bit over the years, but that is the core idea.) 

He explains how digital photographers were some of the first to need significant amounts of storage -- and to have the need to protect that storage so they don’t lose everything. Hard drives were too small to hold your whole collection, so what do you do? 

Like a lot of folks in this space, his love for good backups goes back to a moment when he thought he lost it all.  Curtis then tells his very similar story of how his company almost lost the company’s purchasing database, which also launched his career in backups. Peter then explains the incredible importance of metadata, and the huge importance it plays in the overall value of an image.

Then we get into the nitty-gritty of what the person who coined the term “3-2-1 rule” was thinking for each of the numbers.  And interestingly enough, Mr. Backup had a slightly different understanding of the 2! Peter feels that the “2” refers to different media types. (This led to a very interesting discussion about how you do what he’s asking for in today’s cloud world.) One idea he talked about is that if you have two hard drives on the same network, they’re still subject to many of the same risks, which isn’t really keeping in line with the original idea of the 2.  

We then talk about those that believe that RAID is backup, and follow that with a discussion about how SaaS services aren’t backing up your data – unless they specifically say they do so in your contract. Then we get into a discussion of Peter’s company, Tandem Vault, and how they have designed the next generation of Digital Asset Management and delivered it as a SaaS offering.</itunes:summary></item><item><title>Mr. Backup and Mr. SQL argue over how to backup SQL Server</title><itunes:title>Mr. Backup and Mr. SQL argue over how to backup SQL Server</itunes:title><description><![CDATA[<p>Ever had questions about SQL Server, Azure, SQL Server ON Azure, how to backup SQL Server, or how to backup Azure? This is the episode for you. Denny Cherry, a SQL Server and Azure specialist and author of seven books, talks to us about both of these technologies. Before talking about anything important, we tackle the mystery of how you pronounce Azure.  Surprise!  I was pronouncing it wrong, according to Denny, who talks to Microsoft people all the time.  </p><p>We first talk about performance tuning, and Denny explains some things that most DBAs can do to improve performance, starting with indexes. (He also explains what an index is for those that don’t know.)  We then talk about how bad query code needs to be in order to justify looking into that, and he gives us a few examples. </p><p>We also (of course) talk about backing up SQL Server, starting with the political discussion of WHO should own the backup process: a backup admin or a DBA?  Denny and Curtis clearly do not agree on this one, but the discussion is a good one.  Grab your popcorn!  One of Denny’s best quotes is that he feels one of the primary jobs of the DBA is to be able to restore the database if something happens and if you can’t do that, nothing else matters.  So beautiful. </p><p><br></p><p>Then the topic of dedupe comes up and things get heated again; our guest hates dedupe and Curtis loves it. That was another good discussion. Short version: make sure you have more than one copy of a deduped data store.</p><p><br></p><p>We continue the discussion of different ways to backup SQL Server, and Denny definitely prefers the native backup capabilities of SQL Server, and he explains why.  Curtis then makes a suggestion on a way for DBAs and backup admins to both get what they want, but it doesn’t sound like Denny is taking the bait.</p><p><br></p><p><br></p><p>After a brief discussion on SQL Server vs Oracle, we move into the various ways one can use SQL Server in Azure. Denny’s gives advice as to what makes sense for most customers – and his opinion on the question of whether or not you save money in the cloud. Short answer: not usually, but you get a lot more power, flexibility and ease of use. </p><p><br></p><p>Regarding Azure vs AWS, it appears that Azure is very equivalent to AWS in overall functionality at this point, and there appears to be a number of cost and functionality advantages to running SQL Server in the cloud. One of the biggest advantages is that you can use an on-prem license of SQL Server in the PaaS version of it in the cloud.  That’s pretty cool. We also talk about how roughly half of the VMs in Azure run Linux, and why that might be the case. </p><p><br></p><p>All-in-all it’s a really interesting podcast, even though we almost came to blows once or twice. (OK, not really.)  But really good discussions about SQL Server, Azure, and backups of both.</p>]]></description><content:encoded><![CDATA[<p>Ever had questions about SQL Server, Azure, SQL Server ON Azure, how to backup SQL Server, or how to backup Azure? This is the episode for you. Denny Cherry, a SQL Server and Azure specialist and author of seven books, talks to us about both of these technologies. Before talking about anything important, we tackle the mystery of how you pronounce Azure.  Surprise!  I was pronouncing it wrong, according to Denny, who talks to Microsoft people all the time.  </p><p>We first talk about performance tuning, and Denny explains some things that most DBAs can do to improve performance, starting with indexes. (He also explains what an index is for those that don’t know.)  We then talk about how bad query code needs to be in order to justify looking into that, and he gives us a few examples. </p><p>We also (of course) talk about backing up SQL Server, starting with the political discussion of WHO should own the backup process: a backup admin or a DBA?  Denny and Curtis clearly do not agree on this one, but the discussion is a good one.  Grab your popcorn!  One of Denny’s best quotes is that he feels one of the primary jobs of the DBA is to be able to restore the database if something happens and if you can’t do that, nothing else matters.  So beautiful. </p><p><br></p><p>Then the topic of dedupe comes up and things get heated again; our guest hates dedupe and Curtis loves it. That was another good discussion. Short version: make sure you have more than one copy of a deduped data store.</p><p><br></p><p>We continue the discussion of different ways to backup SQL Server, and Denny definitely prefers the native backup capabilities of SQL Server, and he explains why.  Curtis then makes a suggestion on a way for DBAs and backup admins to both get what they want, but it doesn’t sound like Denny is taking the bait.</p><p><br></p><p><br></p><p>After a brief discussion on SQL Server vs Oracle, we move into the various ways one can use SQL Server in Azure. Denny’s gives advice as to what makes sense for most customers – and his opinion on the question of whether or not you save money in the cloud. Short answer: not usually, but you get a lot more power, flexibility and ease of use. </p><p><br></p><p>Regarding Azure vs AWS, it appears that Azure is very equivalent to AWS in overall functionality at this point, and there appears to be a number of cost and functionality advantages to running SQL Server in the cloud. One of the biggest advantages is that you can use an on-prem license of SQL Server in the PaaS version of it in the cloud.  That’s pretty cool. We also talk about how roughly half of the VMs in Azure run Linux, and why that might be the case. </p><p><br></p><p>All-in-all it’s a really interesting podcast, even though we almost came to blows once or twice. (OK, not really.)  But really good discussions about SQL Server, Azure, and backups of both.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/mr-backup-and-mr-sql-argue-over-how-to-backup-sql-server-restore-it-all-podcast-130/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1159495708</guid><itunes:image href="https://artwork.captivate.fm/81d24582-3ff4-480c-9c7a-8a06daf66756/SPTvrOeSBfP3wkayURNRVSJi.jpg"/><pubDate>Mon, 15 Nov 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/84ebd5a7-2045-48a2-bf5b-998fdbaafc39/1159495708-restoreitall-mr-backup-and-mr-sql-argue-over-how-to.mp3" length="55833289" type="audio/mpeg"/><itunes:duration>55:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Ever had questions about SQL Server, Azure, SQL Server ON Azure, how to backup SQL Server, or how to backup Azure? This is the episode for you. Denny Cherry, a SQL Server and Azure specialist and author of seven books, talks to us about both of these technologies. Before talking about anything important, we tackle the mystery of how you pronounce Azure.  Surprise!  I was pronouncing it wrong, according to Denny, who talks to Microsoft people all the time.  

We first talk about performance tuning, and Denny explains some things that most DBAs can do to improve performance, starting with indexes. (He also explains what an index is for those that don’t know.)  We then talk about how bad query code needs to be in order to justify looking into that, and he gives us a few examples. 

We also (of course) talk about backing up SQL Server, starting with the political discussion of WHO should own the backup process: a backup admin or a DBA?  Denny and Curtis clearly do not agree on this one, but the discussion is a good one.  Grab your popcorn!  One of Denny’s best quotes is that he feels one of the primary jobs of the DBA is to be able to restore the database if something happens and if you can’t do that, nothing else matters.  So beautiful. 

Then the topic of dedupe comes up and things get heated again; our guest hates dedupe and Curtis loves it. That was another good discussion. Short version: make sure you have more than one copy of a deduped data store.

We continue the discussion of different ways to backup SQL Server, and Denny definitely prefers the native backup capabilities of SQL Server, and he explains why.  Curtis then makes a suggestion on a way for DBAs and backup admins to both get what they want, but it doesn’t sound like Denny is taking the bait.


After a brief discussion on SQL Server vs Oracle, we move into the various ways one can use SQL Server in Azure. Denny’s gives advice as to what makes sense for most customers – and his opinion on the question of whether or not you save money in the cloud. Short answer: not usually, but you get a lot more power, flexibility and ease of use. 

Regarding Azure vs AWS, it appears that Azure is very equivalent to AWS in overall functionality at this point, and there appears to be a number of cost and functionality advantages to running SQL Server in the cloud. One of the biggest advantages is that you can use an on-prem license of SQL Server in the PaaS version of it in the cloud.  That’s pretty cool. We also talk about how roughly half of the VMs in Azure run Linux, and why that might be the case. 

All-in-all it’s a really interesting podcast, even though we almost came to blows once or twice. (OK, not really.)  But really good discussions about SQL Server, Azure, and backups of both.</itunes:summary></item><item><title>Deep dive into why tape still has a future in storage</title><itunes:title>Deep dive into why tape still has a future in storage</itunes:title><description><![CDATA[<p>Mark Lantz, Manager CloudFPGA and Tape Technologies for IBM, joins us on this week’s podcast to talk about how he feels that tape still has a future in data storage. We talk about past and future advancements in the substrates tape uses, as well as how tape has not approached the superparamagnetic limit, the way we have with disk.  (This is the limit at which you cannot increase the storage capacity of a particular magnetic medium without creating more problems.) We have reached this limit on disk, where the magnetic grains have gotten so small, they can’t get any smaller without assistance. One such method of assistance is heat-assisted magnetic recording (HAMR), which we discuss – and how HAMR comes with its own problems.  By contrast, tape hasn’t come even close to the superparamagnetic limit.  In fact, tape can scale the aerial density 100X before it starts getting close. We also discuss coercivity and bit error rate (BER), which are extremely important concepts to understand. Another topic we talk about is how tape is getting better at scaling capacity faster than speed, because most people do not need faster tapes. (We talk about how and why we can’t stream the ones they have.) We finish out the podcast with an explanation of why helican scan drives (e.g. 8mm, 4mm, &amp; AIT) all disappeared overnight.  We cover a lot of territory in this episode, so buckle up!</p>]]></description><content:encoded><![CDATA[<p>Mark Lantz, Manager CloudFPGA and Tape Technologies for IBM, joins us on this week’s podcast to talk about how he feels that tape still has a future in data storage. We talk about past and future advancements in the substrates tape uses, as well as how tape has not approached the superparamagnetic limit, the way we have with disk.  (This is the limit at which you cannot increase the storage capacity of a particular magnetic medium without creating more problems.) We have reached this limit on disk, where the magnetic grains have gotten so small, they can’t get any smaller without assistance. One such method of assistance is heat-assisted magnetic recording (HAMR), which we discuss – and how HAMR comes with its own problems.  By contrast, tape hasn’t come even close to the superparamagnetic limit.  In fact, tape can scale the aerial density 100X before it starts getting close. We also discuss coercivity and bit error rate (BER), which are extremely important concepts to understand. Another topic we talk about is how tape is getting better at scaling capacity faster than speed, because most people do not need faster tapes. (We talk about how and why we can’t stream the ones they have.) We finish out the podcast with an explanation of why helican scan drives (e.g. 8mm, 4mm, &amp; AIT) all disappeared overnight.  We cover a lot of territory in this episode, so buckle up!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/deep-dive-into-why-tape-still-has-a-future-in-storage-restore-it-all-podcast-129/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1155709840</guid><itunes:image href="https://artwork.captivate.fm/8fa9cd42-2853-46e0-98b2-00a4545905e2/cbrpwiUPrm0EwhNm53BBiFkp.jpg"/><pubDate>Mon, 08 Nov 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/faae3539-5007-4ab3-8ff4-19757aec9842/1155709840-restoreitall-deep-dive-into-why-tape-still-has-a-fut.mp3" length="58428066" type="audio/mpeg"/><itunes:duration>54:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Mark Lantz, Manager CloudFPGA and Tape Technologies for IBM, joins us on this week’s podcast to talk about how he feels that tape still has a future in data storage. We talk about past and future advancements in the substrates tape uses, as well as how tape has not approached the superparamagnetic limit, the way we have with disk.  (This is the limit at which you cannot increase the storage capacity of a particular magnetic medium without creating more problems.) We have reached this limit on disk, where the magnetic grains have gotten so small, they can’t get any smaller without assistance. One such method of assistance is heat-assisted magnetic recording (HAMR), which we discuss – and how HAMR comes with its own problems.  By contrast, tape hasn’t come even close to the superparamagnetic limit.  In fact, tape can scale the aerial density 100X before it starts getting close. We also discuss coercivity and bit error rate (BER), which are extremely important concepts to understand. Another topic we talk about is how tape is getting better at scaling capacity faster than speed, because most people do not need faster tapes. (We talk about how and why we can’t stream the ones they have.) We finish out the podcast with an explanation of why helican scan drives (e.g. 8mm, 4mm, &amp; AIT) all disappeared overnight.  We cover a lot of territory in this episode, so buckle up!</itunes:summary></item><item><title>Transfer backups from one product to the next</title><itunes:title>Transfer backups from one product to the next</itunes:title><description><![CDATA[<p>Every wondered what you're supposed to do with all your old backups, now that you've moved on to another backup product?  Simon Brown from StoneRam believes he has the answer to this problem that has plagued backup customers (and vendors) for ages.  He's able to transfer backup data out of common backup formats and into your new product, or restore backups from your old product without having to maintain that infrastructure.  It's a fascinating approach to this age-old problem.  Check them out at https://www.stoneram.com.</p>]]></description><content:encoded><![CDATA[<p>Every wondered what you're supposed to do with all your old backups, now that you've moved on to another backup product?  Simon Brown from StoneRam believes he has the answer to this problem that has plagued backup customers (and vendors) for ages.  He's able to transfer backup data out of common backup formats and into your new product, or restore backups from your old product without having to maintain that infrastructure.  It's a fascinating approach to this age-old problem.  Check them out at https://www.stoneram.com.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/transfer-backups-from-one-product-to-the-next-restore-it-all-podcast-128/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1151685292</guid><itunes:image href="https://artwork.captivate.fm/73ea04a6-f645-4247-b6ad-c09919d6abde/bEtChNjVXVJsKdqhW3pSexX7.png"/><pubDate>Mon, 01 Nov 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f96f8c16-00b0-4def-ac25-dc6eeb9915d2/1151685292-restoreitall-transfer-backups-from-one-product-to-th.mp3" length="44370635" type="audio/mpeg"/><itunes:duration>43:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Every wondered what you&apos;re supposed to do with all your old backups, now that you&apos;ve moved on to another backup product?  Simon Brown from StoneRam believes he has the answer to this problem that has plagued backup customers (and vendors) for ages.  He&apos;s able to transfer backup data out of common backup formats and into your new product, or restore backups from your old product without having to maintain that infrastructure.  It&apos;s a fascinating approach to this age-old problem.  Check them out at https://www.stoneram.com.</itunes:summary></item><item><title>Veeam reps explain defense against Conti ransomware</title><itunes:title>Veeam reps explain defense against Conti ransomware</itunes:title><description><![CDATA[<p>After the recent stories about Veeam customers being directly targeted by the Conti ransomware group, we invited Rick Vanover and Dave Russell from Veeam to discuss the topic on the podcast. The stories in the press seemed to focus on the attack, as well as how ruthless the Conti ransomware gang tends to be. We thought we'd give Veeam a chance to explain exactly what Veeam customers can do to protect their backups from being exfiltrated and deleted.  It seems that Rick, Dave, and company are doing everything they can to explain to all Veeam customers that this is something they should pay attention to.  The following are two resources they said should prove useful: </p><p>Ransomware in 2022: 7 Capabilities You Need for Rapid and Reliable Recovery</p><p>https://bit.ly/3m32gI8</p><p>5 Ransomware Protection Best Practices</p><p>https://bit.ly/3nh7aAx</p>]]></description><content:encoded><![CDATA[<p>After the recent stories about Veeam customers being directly targeted by the Conti ransomware group, we invited Rick Vanover and Dave Russell from Veeam to discuss the topic on the podcast. The stories in the press seemed to focus on the attack, as well as how ruthless the Conti ransomware gang tends to be. We thought we'd give Veeam a chance to explain exactly what Veeam customers can do to protect their backups from being exfiltrated and deleted.  It seems that Rick, Dave, and company are doing everything they can to explain to all Veeam customers that this is something they should pay attention to.  The following are two resources they said should prove useful: </p><p>Ransomware in 2022: 7 Capabilities You Need for Rapid and Reliable Recovery</p><p>https://bit.ly/3m32gI8</p><p>5 Ransomware Protection Best Practices</p><p>https://bit.ly/3nh7aAx</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/veeam-reps-explain-defense-against-conti-ransomware-restore-it-all-podcast-127/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1146240268</guid><itunes:image href="https://artwork.captivate.fm/a255f51e-fad5-42cc-b6a3-2cd51ad1c17f/pgEi-XKTDUkgOw819EU3OTav.png"/><pubDate>Mon, 25 Oct 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c752dfe5-7ec2-4a44-a4d0-6831e4c14c5b/1146240268-restoreitall-veeam-reps-explain-defense-against-cont.mp3" length="51471664" type="audio/mpeg"/><itunes:duration>49:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>After the recent stories about Veeam customers being directly targeted by the Conti ransomware group, we invited Rick Vanover and Dave Russell from Veeam to discuss the topic on the podcast. The stories in the press seemed to focus on the attack, as well as how ruthless the Conti ransomware gang tends to be. We thought we&apos;d give Veeam a chance to explain exactly what Veeam customers can do to protect their backups from being exfiltrated and deleted.  It seems that Rick, Dave, and company are doing everything they can to explain to all Veeam customers that this is something they should pay attention to.  The following are two resources they said should prove useful: 

Ransomware in 2022: 7 Capabilities You Need for Rapid and Reliable Recovery
https://bit.ly/3m32gI8

5 Ransomware Protection Best Practices
https://bit.ly/3nh7aAx</itunes:summary></item><item><title>Stop Ransomware Attacks in Seconds</title><itunes:title>Stop Ransomware Attacks in Seconds</itunes:title><description><![CDATA[<p>This week we are joined by Greg Edwards, CEO and founder of CryptoStopper, to discuss once again the important topic of ransomware.  We talk about the challenges typically experienced by ransomware victims, especially exfiltration and potential exposure of sensitive data.  The only way to stop that particular attack is stop the data from being exfiltrated in the first place.  CryptoStopper has a way to detect that a ransomware attack has begun, but stopping it before it does any actual damage.</p>]]></description><content:encoded><![CDATA[<p>This week we are joined by Greg Edwards, CEO and founder of CryptoStopper, to discuss once again the important topic of ransomware.  We talk about the challenges typically experienced by ransomware victims, especially exfiltration and potential exposure of sensitive data.  The only way to stop that particular attack is stop the data from being exfiltrated in the first place.  CryptoStopper has a way to detect that a ransomware attack has begun, but stopping it before it does any actual damage.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/stop-ransomware-attacks-in-seconds-restore-it-all-podcast-126/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1143626014</guid><itunes:image href="https://artwork.captivate.fm/cfb95ca4-3e49-4118-968e-d6f309bc74f9/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 18 Oct 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/bdcbc6cf-2798-4a98-9ddc-5632fddb6722/1143626014-restoreitall-stop-ransomware-attacks-in-seconds.mp3" length="56405370" type="audio/mpeg"/><itunes:duration>53:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week we are joined by Greg Edwards, CEO and founder of CryptoStopper, to discuss once again the important topic of ransomware.  We talk about the challenges typically experienced by ransomware victims, especially exfiltration and potential exposure of sensitive data.  The only way to stop that particular attack is stop the data from being exfiltrated in the first place.  CryptoStopper has a way to detect that a ransomware attack has begun, but stopping it before it does any actual damage.</itunes:summary></item><item><title>ZFS is not magic - it needs backup and RAID</title><itunes:title>ZFS is not magic - it needs backup and RAID</itunes:title><description><![CDATA[<p>This one will get you talking! Jody Bruchon, author of “ZFS won’t save you: fancy filesystem fanatics need to get a clue about bit rot (and RAID-5),”, joins us on the podcast. The blog post went viral, resulting in three times as many words in the comments as the original article had.  We start with an explanation of bit rot, why it happens, and why ZFS won’t be able to fix all bit rot. (For more information on bit rot, check out Episode 111 of this podcast here: https://www.backupcentral.com/tape-drive-designer-schools-mr-backup-on-tape-restore-it-all-podcast-111/).  Jody then explains how ZFS needs disk redundancy in order for its self-healing features to work, and how if you don’t have that, you’re going to need backup to repair a ZFS volume damaged by bit rot. (We also talk about how it’s possible for a bit to be flipped without being noticed – even with ZFS.)  Jody’s main concern is that people talk about how ZFS can be used to repair data corruption – without explaining how you need RAID-Z (or something) to use those features. He also explains why he prefers RAID-5 or RAID-10 to RAID-6.  We then discuss “shucking,” the practice of buying external drives and ripping the drive out of them – to save money.  </p><p>Curtis (Mr. Backup) then gets into an argument with Jody about the merits of Blu-Ray vs disk vs tape as a backup medium. Jody has some good points, but Curtis was unconvinced. </p><p>If you want to read Jody Bruchon’s original article, you can do so here: https://www.jodybruchon.com/2017/03/07/zfs-wont-save-you-fancy-filesystem-fanatics-need-to-get-a-clue-about-bit-rot-and-raid-5/</p>]]></description><content:encoded><![CDATA[<p>This one will get you talking! Jody Bruchon, author of “ZFS won’t save you: fancy filesystem fanatics need to get a clue about bit rot (and RAID-5),”, joins us on the podcast. The blog post went viral, resulting in three times as many words in the comments as the original article had.  We start with an explanation of bit rot, why it happens, and why ZFS won’t be able to fix all bit rot. (For more information on bit rot, check out Episode 111 of this podcast here: https://www.backupcentral.com/tape-drive-designer-schools-mr-backup-on-tape-restore-it-all-podcast-111/).  Jody then explains how ZFS needs disk redundancy in order for its self-healing features to work, and how if you don’t have that, you’re going to need backup to repair a ZFS volume damaged by bit rot. (We also talk about how it’s possible for a bit to be flipped without being noticed – even with ZFS.)  Jody’s main concern is that people talk about how ZFS can be used to repair data corruption – without explaining how you need RAID-Z (or something) to use those features. He also explains why he prefers RAID-5 or RAID-10 to RAID-6.  We then discuss “shucking,” the practice of buying external drives and ripping the drive out of them – to save money.  </p><p>Curtis (Mr. Backup) then gets into an argument with Jody about the merits of Blu-Ray vs disk vs tape as a backup medium. Jody has some good points, but Curtis was unconvinced. </p><p>If you want to read Jody Bruchon’s original article, you can do so here: https://www.jodybruchon.com/2017/03/07/zfs-wont-save-you-fancy-filesystem-fanatics-need-to-get-a-clue-about-bit-rot-and-raid-5/</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/zfs-is-not-magic-it-needs-backup-and-raid-restore-it-all-podcast-125/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1139530564</guid><itunes:image href="https://artwork.captivate.fm/89f73ad1-e168-4757-a892-07ad4c2700f0/WB7lsfL2uHCigsAP3loLrJmI.jpg"/><pubDate>Mon, 11 Oct 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e311a17f-4829-4770-a878-dc6fedb397d7/1139530564-restoreitall-zfs-is-not-magic-it-needs-backup-and-ra.mp3" length="53873002" type="audio/mpeg"/><itunes:duration>52:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This one will get you talking! Jody Bruchon, author of “ZFS won’t save you: fancy filesystem fanatics need to get a clue about bit rot (and RAID-5),”, joins us on the podcast. The blog post went viral, resulting in three times as many words in the comments as the original article had.  We start with an explanation of bit rot, why it happens, and why ZFS won’t be able to fix all bit rot. (For more information on bit rot, check out Episode 111 of this podcast here: https://www.backupcentral.com/tape-drive-designer-schools-mr-backup-on-tape-restore-it-all-podcast-111/).  Jody then explains how ZFS needs disk redundancy in order for its self-healing features to work, and how if you don’t have that, you’re going to need backup to repair a ZFS volume damaged by bit rot. (We also talk about how it’s possible for a bit to be flipped without being noticed – even with ZFS.)  Jody’s main concern is that people talk about how ZFS can be used to repair data corruption – without explaining how you need RAID-Z (or something) to use those features. He also explains why he prefers RAID-5 or RAID-10 to RAID-6.  We then discuss “shucking,” the practice of buying external drives and ripping the drive out of them – to save money.  

Curtis (Mr. Backup) then gets into an argument with Jody about the merits of Blu-Ray vs disk vs tape as a backup medium. Jody has some good points, but Curtis was unconvinced. 

If you want to read Jody Bruchon’s original article, you can do so here: https://www.jodybruchon.com/2017/03/07/zfs-wont-save-you-fancy-filesystem-fanatics-need-to-get-a-clue-about-bit-rot-and-raid-5/</itunes:summary></item><item><title>How good is your backup system, really?</title><itunes:title>How good is your backup system, really?</itunes:title><description><![CDATA[<p>Inspired by the article "How good is your backup, really?" by Sandra Vogel, we discuss how to evaluate and potentially redesign your backup system.  We talk about different kinds of backup systems, and how that impacts how you evaluate them.  We also talk about how important it is these days to ensure that your backups are impervious to ransomware. We also talk about the importance of including recovery testing in your evaluation, and what kinds of restores to test.</p><p>Here's a link to the original article: https://www.itpro.com/server-storage/backup/357713/how-good-is-your-backup-really</p>]]></description><content:encoded><![CDATA[<p>Inspired by the article "How good is your backup, really?" by Sandra Vogel, we discuss how to evaluate and potentially redesign your backup system.  We talk about different kinds of backup systems, and how that impacts how you evaluate them.  We also talk about how important it is these days to ensure that your backups are impervious to ransomware. We also talk about the importance of including recovery testing in your evaluation, and what kinds of restores to test.</p><p>Here's a link to the original article: https://www.itpro.com/server-storage/backup/357713/how-good-is-your-backup-really</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-good-is-your-backup-system-really-restore-it-all-podcast-124/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1134497326</guid><itunes:image href="https://artwork.captivate.fm/c1d1cf8f-c0e9-43e7-a0de-f2312e9820c6/aNMN25Ypwo2KDdwlMufE6jlc.jpg"/><pubDate>Mon, 04 Oct 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a49d1c5e-5f9a-474c-90ef-bc930770c935/1134497326-restoreitall-how-good-is-your-backup-system-really.mp3" length="43723313" type="audio/mpeg"/><itunes:duration>39:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Inspired by the article &quot;How good is your backup, really?&quot; by Sandra Vogel, we discuss how to evaluate and potentially redesign your backup system.  We talk about different kinds of backup systems, and how that impacts how you evaluate them.  We also talk about how important it is these days to ensure that your backups are impervious to ransomware. We also talk about the importance of including recovery testing in your evaluation, and what kinds of restores to test.

Here&apos;s a link to the original article: https://www.itpro.com/server-storage/backup/357713/how-good-is-your-backup-really</itunes:summary></item><item><title>Restoring quickly from a ransomare attack with a long dwell time</title><itunes:title>Restoring quickly from a ransomare attack with a long dwell time</itunes:title><description><![CDATA[<p>We talk to Celeste Kinswood from Druva about cyber resilience, and specifically ransomware attacks that have long dwell times – which is most of them.  The median dwell time (the time between infection and you finding out you have ransomware) is 23 days, and the average is around 90.  It's encrypting files during that entire time, and responding to that is beyond difficult.  Celeste talks about a novel approach that Druva is taking to solve this growing challenge.</p>]]></description><content:encoded><![CDATA[<p>We talk to Celeste Kinswood from Druva about cyber resilience, and specifically ransomware attacks that have long dwell times – which is most of them.  The median dwell time (the time between infection and you finding out you have ransomware) is 23 days, and the average is around 90.  It's encrypting files during that entire time, and responding to that is beyond difficult.  Celeste talks about a novel approach that Druva is taking to solve this growing challenge.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/restoring-quickly-from-a-ransomare-attack-with-a-long-dwell-time-restore-it-all-podcast-123/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1131578455</guid><itunes:image href="https://artwork.captivate.fm/ff817187-9b22-4d54-8154-f48efb5db299/GBZUqzvTFhHTYt7eyJ4_WzX5.jpeg"/><pubDate>Mon, 27 Sep 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/783f8a2a-c409-458c-97c0-64c70563fbb0/1131578455-restoreitall-restoring-quickly-from-a-ransomare-atta.mp3" length="47735363" type="audio/mpeg"/><itunes:duration>49:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We talk to Celeste Kinswood from Druva about cyber resilience, and specifically ransomware attacks that have long dwell times – which is most of them.  The median dwell time (the time between infection and you finding out you have ransomware) is 23 days, and the average is around 90.  It&apos;s encrypting files during that entire time, and responding to that is beyond difficult.  Celeste talks about a novel approach that Druva is taking to solve this growing challenge.</itunes:summary></item><item><title>Protecting Your Network from Ransomware</title><itunes:title>Protecting Your Network from Ransomware</itunes:title><description><![CDATA[<p>We review and discuss Mark Dargin's Network World article "Credible threat: how to protect networks from ransomware."   His article lays out several steps, each of which we discuss and expand upon: train your people, update your servers and apps, antivirus tools on endpointsm backup your data (of course), test your backups, and conduct  vulnerability assessments (Pen tests).</p><p>Read the original article here: https://www.networkworld.com/article/3218708/how-to-protect-your-network-from-ransomware-attacks.html</p>]]></description><content:encoded><![CDATA[<p>We review and discuss Mark Dargin's Network World article "Credible threat: how to protect networks from ransomware."   His article lays out several steps, each of which we discuss and expand upon: train your people, update your servers and apps, antivirus tools on endpointsm backup your data (of course), test your backups, and conduct  vulnerability assessments (Pen tests).</p><p>Read the original article here: https://www.networkworld.com/article/3218708/how-to-protect-your-network-from-ransomware-attacks.html</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/protecting-your-network-from-ransomware-restore-it-all-podcast-122/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1127745547</guid><itunes:image href="https://artwork.captivate.fm/3004b72b-beba-4136-96b9-f15097d7d891/tojZWb19zjSG6HECTtaApOa3.png"/><pubDate>Mon, 20 Sep 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c6000333-ed51-4095-9c01-bc9f1dd2bf0b/1127745547-restoreitall-protecting-your-network-from-ransomware.mp3" length="48089512" type="audio/mpeg"/><itunes:duration>42:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We review and discuss Mark Dargin&apos;s Network World article &quot;Credible threat: how to protect networks from ransomware.&quot;   His article lays out several steps, each of which we discuss and expand upon: train your people, update your servers and apps, antivirus tools on endpointsm backup your data (of course), test your backups, and conduct  vulnerability assessments (Pen tests).

Read the original article here: https://www.networkworld.com/article/3218708/how-to-protect-your-network-from-ransomware-attacks.html</itunes:summary></item><item><title>We found a company that verifies backups as a service!</title><itunes:title>We found a company that verifies backups as a service!</itunes:title><description><![CDATA[<p>We all know how important it is to verify your backups.  But many companies simply lack the technical ability or time to do such a thing.  Chris Marshall's company, VerifiedBackups.com to the rescue.  They have a service that is aimed at companies with under 100 GB of SQL data. and will do an end-to-end verification of your SQL backups, guaranteeing that they are recoverable and safely stored offsite.  I'm a fan of "as a service" anything, but this really takes the cake. Such an important thing to do, and he makes it happen.</p>]]></description><content:encoded><![CDATA[<p>We all know how important it is to verify your backups.  But many companies simply lack the technical ability or time to do such a thing.  Chris Marshall's company, VerifiedBackups.com to the rescue.  They have a service that is aimed at companies with under 100 GB of SQL data. and will do an end-to-end verification of your SQL backups, guaranteeing that they are recoverable and safely stored offsite.  I'm a fan of "as a service" anything, but this really takes the cake. Such an important thing to do, and he makes it happen.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/we-found-a-company-that-verifies-backups-as-a-service-restore-it-all-podcast-120/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1117981420</guid><itunes:image href="https://artwork.captivate.fm/5ec18650-45ec-4dbe-bf8d-4f9f32cf4a83/ahUUXg3v66XZ0JnV7DGS-VZg.png"/><pubDate>Mon, 06 Sep 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/fa6eb0bf-c782-4ead-a639-7375cd8d885d/1117981420-restoreitall-we-found-a-company-that-verifies-backup.mp3" length="57054072" type="audio/mpeg"/><itunes:duration>50:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We all know how important it is to verify your backups.  But many companies simply lack the technical ability or time to do such a thing.  Chris Marshall&apos;s company, VerifiedBackups.com to the rescue.  They have a service that is aimed at companies with under 100 GB of SQL data. and will do an end-to-end verification of your SQL backups, guaranteeing that they are recoverable and safely stored offsite.  I&apos;m a fan of &quot;as a service&quot; anything, but this really takes the cake. Such an important thing to do, and he makes it happen.</itunes:summary></item><item><title>Is Entity-Level Encryption The Answer to Exfiltration Ransomware?</title><itunes:title>Is Entity-Level Encryption The Answer to Exfiltration Ransomware?</itunes:title><description><![CDATA[<p>Brian Greenberg and Cameron Laghaeian argue the point that individually encrypting each entity in a database storing personal information is the only true way to stop ransomware attacks that have exfiltrated data and threaten to release it. While Mr. Backup likes the idea, there was a pretty heated discussion on this episode, because he believes that doing this will roll back all advancements in backup in the last twenty years.  Thanks to an olive branch from Cameron, though, they may have come to a hybrid solution that makes both sides happy.  This is a great episode with heated discussion and good news for companies trying to protect themselves from ransomware attacks that include exfiltration of data.</p>]]></description><content:encoded><![CDATA[<p>Brian Greenberg and Cameron Laghaeian argue the point that individually encrypting each entity in a database storing personal information is the only true way to stop ransomware attacks that have exfiltrated data and threaten to release it. While Mr. Backup likes the idea, there was a pretty heated discussion on this episode, because he believes that doing this will roll back all advancements in backup in the last twenty years.  Thanks to an olive branch from Cameron, though, they may have come to a hybrid solution that makes both sides happy.  This is a great episode with heated discussion and good news for companies trying to protect themselves from ransomware attacks that include exfiltration of data.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/is-entity-level-encryption-the-answer-to-exfiltration-ransomware-restore-it-all-podast-119/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1115342944</guid><itunes:image href="https://artwork.captivate.fm/7ae21f66-6dc1-43cb-b382-917f37be9409/P2iu4GNe4YAKYIndcKVgGiVi.png"/><pubDate>Mon, 30 Aug 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/761d00b5-b13c-4a7c-8ede-60386f9f95dd/1115342944-restoreitall-is-entity-level-encryption-the-answer-t.mp3" length="61014926" type="audio/mpeg"/><itunes:duration>01:00:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Brian Greenberg and Cameron Laghaeian argue the point that individually encrypting each entity in a database storing personal information is the only true way to stop ransomware attacks that have exfiltrated data and threaten to release it. While Mr. Backup likes the idea, there was a pretty heated discussion on this episode, because he believes that doing this will roll back all advancements in backup in the last twenty years.  Thanks to an olive branch from Cameron, though, they may have come to a hybrid solution that makes both sides happy.  This is a great episode with heated discussion and good news for companies trying to protect themselves from ransomware attacks that include exfiltration of data.</itunes:summary></item><item><title>Is Apple Violating iPhone Users&apos; Privacy?</title><itunes:title>Is Apple Violating iPhone Users&apos; Privacy?</itunes:title><description><![CDATA[<p>In this privacy-themed podcast, we start with Apple's bombshell of a new feature, where they are scanning your pictures to see if you have any child porn on your Apple devices.  While stopping child porn is a laudable goal, we discuss the privacy ramifications of this feature. We also discuss how Apple's iCloud backups aren't encrypted!  The next topic is Luxembourg's huge $900M GDPR fine levied against Amazon for failure to get permission to track users.  Then finally we discuss Prasanna's experience with using CCPA to find out how a company got his cell phone number.  Spoiler alert: it's a sad ending.  We then round out the podcast by discussing whether or not we need a more Federal response to privacy in the US.</p>]]></description><content:encoded><![CDATA[<p>In this privacy-themed podcast, we start with Apple's bombshell of a new feature, where they are scanning your pictures to see if you have any child porn on your Apple devices.  While stopping child porn is a laudable goal, we discuss the privacy ramifications of this feature. We also discuss how Apple's iCloud backups aren't encrypted!  The next topic is Luxembourg's huge $900M GDPR fine levied against Amazon for failure to get permission to track users.  Then finally we discuss Prasanna's experience with using CCPA to find out how a company got his cell phone number.  Spoiler alert: it's a sad ending.  We then round out the podcast by discussing whether or not we need a more Federal response to privacy in the US.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/is-apple-violating-iphone-users-privacy-restore-it-all-podcast-118/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1108586002</guid><itunes:image href="https://artwork.captivate.fm/7bd35178-fe8f-4411-83b3-2506e80502b0/65Baw1VOoPvUDFJTiwpM79dz.png"/><pubDate>Mon, 23 Aug 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b0cdbbc9-3ed0-414d-922d-7153104b1015/1108586002-restoreitall-is-apple-violating-iphone-users-privacy.mp3" length="54782994" type="audio/mpeg"/><itunes:duration>50:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this privacy-themed podcast, we start with Apple&apos;s bombshell of a new feature, where they are scanning your pictures to see if you have any child porn on your Apple devices.  While stopping child porn is a laudable goal, we discuss the privacy ramifications of this feature. We also discuss how Apple&apos;s iCloud backups aren&apos;t encrypted!  The next topic is Luxembourg&apos;s huge $900M GDPR fine levied against Amazon for failure to get permission to track users.  Then finally we discuss Prasanna&apos;s experience with using CCPA to find out how a company got his cell phone number.  Spoiler alert: it&apos;s a sad ending.  We then round out the podcast by discussing whether or not we need a more Federal response to privacy in the US.</itunes:summary></item><item><title>CockroachDB: the SQL database as resilient as its namesake</title><itunes:title>CockroachDB: the SQL database as resilient as its namesake</itunes:title><description><![CDATA[<p>Dave Lukens from Cockroach Labs joins us to discuss CochroachDB,  a highly resilient SQL ACID-compliant database.  We discuss the CAP theorum, which says you can choose any two from Consistency, Availability, and Partition Tolerance –&nbsp;but you can't have all three.  We talk about which two they chose, and why they believe they're the most resilient SQL database.  We also, of course, discuss how you back this monster up!  (We also discuss why it's named CockroachDB, and it's exactly what we thought!)</p>]]></description><content:encoded><![CDATA[<p>Dave Lukens from Cockroach Labs joins us to discuss CochroachDB,  a highly resilient SQL ACID-compliant database.  We discuss the CAP theorum, which says you can choose any two from Consistency, Availability, and Partition Tolerance –&nbsp;but you can't have all three.  We talk about which two they chose, and why they believe they're the most resilient SQL database.  We also, of course, discuss how you back this monster up!  (We also discuss why it's named CockroachDB, and it's exactly what we thought!)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/cockroachdb-the-sql-database-as-resilient-as-its-namesake-restore-it-all-podcast-117/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1104370015</guid><itunes:image href="https://artwork.captivate.fm/c2e12f4c-6fa4-41fd-9fa0-c94b6d16e90f/BgsqKVsb6b0VPn35fgGCW9o6.png"/><pubDate>Mon, 16 Aug 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/faf3d2bf-6c0c-4229-99e8-bd26b5fd12d5/1104370015-restoreitall-cockroachdb-the-sql-database-as-resilie.mp3" length="61761718" type="audio/mpeg"/><itunes:duration>01:00:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Dave Lukens from Cockroach Labs joins us to discuss CochroachDB,  a highly resilient SQL ACID-compliant database.  We discuss the CAP theorum, which says you can choose any two from Consistency, Availability, and Partition Tolerance – but you can&apos;t have all three.  We talk about which two they chose, and why they believe they&apos;re the most resilient SQL database.  We also, of course, discuss how you back this monster up!  (We also discuss why it&apos;s named CockroachDB, and it&apos;s exactly what we thought!)</itunes:summary></item><item><title>No backups - just beef &amp; bbq</title><itunes:title>No backups - just beef &amp; bbq</itunes:title><description><![CDATA[<p>In this bonus episode of Restore it All, Mr. Backup talks BBQ!  A few months ago, Curtis did a 15-stop BBQ tour of Texas, and made a series of youtube videos (https://www.youtube.com/wcpreston) about it.  This is a bonus episode where Prasanna interviews him about his experience.  If you have no interest in BBQ or beef, you can skip this one.  Our regular episode will go live next Monday.</p>]]></description><content:encoded><![CDATA[<p>In this bonus episode of Restore it All, Mr. Backup talks BBQ!  A few months ago, Curtis did a 15-stop BBQ tour of Texas, and made a series of youtube videos (https://www.youtube.com/wcpreston) about it.  This is a bonus episode where Prasanna interviews him about his experience.  If you have no interest in BBQ or beef, you can skip this one.  Our regular episode will go live next Monday.</p>]]></content:encoded><link><![CDATA[https://soundcloud.com/restoreitall/no-backups-just-beef-bbq]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1103732566</guid><itunes:image href="https://artwork.captivate.fm/83c1a912-9f2e-4cff-8d97-269bdbe87c37/2L0BhLBMyHVk_xtWo09xx5oj.jpg"/><pubDate>Tue, 10 Aug 2021 21:22:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/54b144b2-087c-4640-a6f5-7f341089f736/1103732566-restoreitall-no-backups-just-beef-bbq.mp3" length="53143181" type="audio/mpeg"/><itunes:duration>48:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this bonus episode of Restore it All, Mr. Backup talks BBQ!  A few months ago, Curtis did a 15-stop BBQ tour of Texas, and made a series of youtube videos (https://www.youtube.com/wcpreston) about it.  This is a bonus episode where Prasanna interviews him about his experience.  If you have no interest in BBQ or beef, you can skip this one.  Our regular episode will go live next Monday.</itunes:summary></item><item><title>HYCU VP explains their service to Mr. Backup</title><itunes:title>HYCU VP explains their service to Mr. Backup</itunes:title><description><![CDATA[<p>Subbiah Sundaram, VP of Products at HYCU, joins Mr. Backup and Prasanna Malaiyandi on the podcast to explain the evolution of the HYCU product line. They have expanded well beyond their original product that was aimed at Nutanix AHV.  In addition to VMware, they've added support for Google Cloud Platform, Azure, Kubernetes, and Microsoft 365.  They are also clearly focused on delivering their offerings as a service.  We then have a very interesting discussion about the use of the multi-region object storage that Google Cloud offers.</p>]]></description><content:encoded><![CDATA[<p>Subbiah Sundaram, VP of Products at HYCU, joins Mr. Backup and Prasanna Malaiyandi on the podcast to explain the evolution of the HYCU product line. They have expanded well beyond their original product that was aimed at Nutanix AHV.  In addition to VMware, they've added support for Google Cloud Platform, Azure, Kubernetes, and Microsoft 365.  They are also clearly focused on delivering their offerings as a service.  We then have a very interesting discussion about the use of the multi-region object storage that Google Cloud offers.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/hycu-vp-explains-their-service-to-mr-backup-2/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1102720480</guid><itunes:image href="https://artwork.captivate.fm/074b33f5-7fa4-4147-9479-e6a91f0ba0d4/r3G1j65bfDJ533vr-PgPQLAE.jpeg"/><pubDate>Mon, 09 Aug 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ac7830c7-57e1-48da-aaff-f66c994cbcf0/1102720480-restoreitall-hycu-vp-explains-their-service-to-mr-ba.mp3" length="59328577" type="audio/mpeg"/><itunes:duration>58:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Subbiah Sundaram, VP of Products at HYCU, joins Mr. Backup and Prasanna Malaiyandi on the podcast to explain the evolution of the HYCU product line. They have expanded well beyond their original product that was aimed at Nutanix AHV.  In addition to VMware, they&apos;ve added support for Google Cloud Platform, Azure, Kubernetes, and Microsoft 365.  They are also clearly focused on delivering their offerings as a service.  We then have a very interesting discussion about the use of the multi-region object storage that Google Cloud offers.</itunes:summary></item><item><title>Mr. Backup Grills StorOne on Their Data Protection Story</title><itunes:title>Mr. Backup Grills StorOne on Their Data Protection Story</itunes:title><description><![CDATA[<p>Mr. Backup and Prasanna grill George Crump, CMO of StorOne, a software-defined storage company, about their product.  We start with an overview, alon with George's claims about not needing backup... .then we challenge him on that topic.  George used to be Curtis' boss, so this one's a fun one.</p>]]></description><content:encoded><![CDATA[<p>Mr. Backup and Prasanna grill George Crump, CMO of StorOne, a software-defined storage company, about their product.  We start with an overview, alon with George's claims about not needing backup... .then we challenge him on that topic.  George used to be Curtis' boss, so this one's a fun one.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/mr-backup-grills-storone-on-their-data-protection-story-restore-it-all-podcast-115/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1098448042</guid><itunes:image href="https://artwork.captivate.fm/62a7a069-30ba-4e9e-a282-dfe35ff686e5/XczYg3TBa02KyeNIblqIInI4.jpeg"/><pubDate>Mon, 02 Aug 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/4236d731-3d16-4065-8b90-f92b3f4c09a8/1098448042-restoreitall-mr-backup-grills-storone-on-their-data.mp3" length="60129911" type="audio/mpeg"/><itunes:duration>01:01:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Mr. Backup and Prasanna grill George Crump, CMO of StorOne, a software-defined storage company, about their product.  We start with an overview, alon with George&apos;s claims about not needing backup... .then we challenge him on that topic.  George used to be Curtis&apos; boss, so this one&apos;s a fun one.</itunes:summary></item><item><title>Emmy Winning Sound Mixer Explains Movie Archiving</title><itunes:title>Emmy Winning Sound Mixer Explains Movie Archiving</itunes:title><description><![CDATA[<p>We are super excited to have the Emmy Winning sound mixer Larry Blake on the podcast to talk about his upcoming book "Solving The Digital Dilemma." It is a response to "The Digital Dilemma," which is a paper released in 2007 by the Academy's Sci-Tech Council that discusses long term archiving of a movie. (It describes a very NON-digital solution.) He has edited the sound on over 60 motion pictures, over 30 of which with Oscar-winning director Steven Soderbergh. This is both a very entertaining and very informative podcast about the about the art and science of archiving motion pictures.</p>]]></description><content:encoded><![CDATA[<p>We are super excited to have the Emmy Winning sound mixer Larry Blake on the podcast to talk about his upcoming book "Solving The Digital Dilemma." It is a response to "The Digital Dilemma," which is a paper released in 2007 by the Academy's Sci-Tech Council that discusses long term archiving of a movie. (It describes a very NON-digital solution.) He has edited the sound on over 60 motion pictures, over 30 of which with Oscar-winning director Steven Soderbergh. This is both a very entertaining and very informative podcast about the about the art and science of archiving motion pictures.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/emmy-winning-sound-mixer-explains-movie-archiving/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1091883814</guid><itunes:image href="https://artwork.captivate.fm/602e61b6-a42c-465e-aba5-1db88beaf09f/ypi0AOTKiMxg7gbPfGY1L7tJ.jpg"/><pubDate>Mon, 26 Jul 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/2edc69c1-54e4-4a6e-a04f-6ef598b5ee87/1091883814-restoreitall-emmy-award-winning-sound-tech-explains.mp3" length="57637508" type="audio/mpeg"/><itunes:duration>55:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We are super excited to have the Emmy Winning sound mixer Larry Blake on the podcast to talk about his upcoming book &quot;Solving The Digital Dilemma.&quot; It is a response to &quot;The Digital Dilemma,&quot; which is a paper released in 2007 by the Academy&apos;s Sci-Tech Council that discusses long term archiving of a movie. (It describes a very NON-digital solution.) He has edited the sound on over 60 motion pictures, over 30 of which with Oscar-winning director Steven Soderbergh. This is both a very entertaining and very informative podcast about the about the art and science of archiving motion pictures.</itunes:summary></item><item><title>Information Security Expert Says it Must Evolve</title><itunes:title>Information Security Expert Says it Must Evolve</itunes:title><description><![CDATA[<p>Wolfgang Goerlich, Advisory CISO, explains the current state of information security, and why he thinks many environments are focusing on the wrong things.  We speak about ransomware, extortionware, and phishing, even giving examples where we know we have personally been phished!  He explains how this illustrates his point that we need more emphasis in different areas of information security.</p>]]></description><content:encoded><![CDATA[<p>Wolfgang Goerlich, Advisory CISO, explains the current state of information security, and why he thinks many environments are focusing on the wrong things.  We speak about ransomware, extortionware, and phishing, even giving examples where we know we have personally been phished!  He explains how this illustrates his point that we need more emphasis in different areas of information security.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/information-security-expert-says-infosec-must-evolve/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1088849734</guid><itunes:image href="https://artwork.captivate.fm/debf04a3-5dc6-465d-9754-dc5bd5c43852/7e46OkP6_hSahSfJyO_UWLmd.jpg"/><pubDate>Mon, 19 Jul 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d7817ff0-4b12-4bea-8417-a46e58ba5bb1/1088849734-restoreitall-information-security-expert-says-it-mus.mp3" length="46033299" type="audio/mpeg"/><itunes:duration>41:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Wolfgang Goerlich, Advisory CISO, explains the current state of information security, and why he thinks many environments are focusing on the wrong things.  We speak about ransomware, extortionware, and phishing, even giving examples where we know we have personally been phished!  He explains how this illustrates his point that we need more emphasis in different areas of information security.</itunes:summary></item><item><title>Are You Vulnerable to an Attack like the one on Kaseya?</title><itunes:title>Are You Vulnerable to an Attack like the one on Kaseya?</itunes:title><description><![CDATA[<p>Mr. Backup and Prasanna discuss the Kaseya attack that happened over the July 4th weekend of 2021. First, we talk about how bad actors use long weekends for attacks, then discuss various things you can/should do to ensure that your environment would not be vulnerable to such an attack.   We talk about the kinds of questions that even an unskilled person can ask to help mitigate this risk, including (especially) the all-important questions about backups.  We also talk about the need for establishing a "bat-phone" type connection between your environment and any providers you may be using.  We have a short talk about the impact that all these attacks are having on ransomware costs, and how you can use your DR site to test patches.</p>]]></description><content:encoded><![CDATA[<p>Mr. Backup and Prasanna discuss the Kaseya attack that happened over the July 4th weekend of 2021. First, we talk about how bad actors use long weekends for attacks, then discuss various things you can/should do to ensure that your environment would not be vulnerable to such an attack.   We talk about the kinds of questions that even an unskilled person can ask to help mitigate this risk, including (especially) the all-important questions about backups.  We also talk about the need for establishing a "bat-phone" type connection between your environment and any providers you may be using.  We have a short talk about the impact that all these attacks are having on ransomware costs, and how you can use your DR site to test patches.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/are-you-vulnerable-to-an-attack-like-kaseya-one-on-kaseya-restore-it-all-podcast-112/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1085799013</guid><itunes:image href="https://artwork.captivate.fm/8c802338-9699-43a0-a9e5-4f0be1a2a1b6/YtBn7XIcQz2wnN5ruKG0ISqi.jpg"/><pubDate>Mon, 12 Jul 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/99b102e5-d539-4f2e-a5bb-23c49fceec85/1085799013-restoreitall-are-you-vulnerable-to-an-attack-like-th.mp3" length="42315184" type="audio/mpeg"/><itunes:duration>38:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Mr. Backup and Prasanna discuss the Kaseya attack that happened over the July 4th weekend of 2021. First, we talk about how bad actors use long weekends for attacks, then discuss various things you can/should do to ensure that your environment would not be vulnerable to such an attack.   We talk about the kinds of questions that even an unskilled person can ask to help mitigate this risk, including (especially) the all-important questions about backups.  We also talk about the need for establishing a &quot;bat-phone&quot; type connection between your environment and any providers you may be using.  We have a short talk about the impact that all these attacks are having on ransomware costs, and how you can use your DR site to test patches.</itunes:summary></item><item><title>Tape Drive Designer Schools Mr. Backup on Tape</title><itunes:title>Tape Drive Designer Schools Mr. Backup on Tape</itunes:title><description><![CDATA[<p>Joe Jurneke has been designing the innards of magnetic devices since 1973, and now he's here to answer our questions.  He started with disk, and moved over to tape over thirty years ago, and is now retired – but  consults with the tape industry from time to time.  We talk in detail about how tape drives work they way they do, their reliability and more.  We take down a couple of myths from the guy that was there, even correcting a misunderstanding Mr. Backup has had for many years.  If the phrase "magneto crystalline anisotropy" has been used on any other podcast, we'd be surprised.  This is a good one you won't want to miss.</p>]]></description><content:encoded><![CDATA[<p>Joe Jurneke has been designing the innards of magnetic devices since 1973, and now he's here to answer our questions.  He started with disk, and moved over to tape over thirty years ago, and is now retired – but  consults with the tape industry from time to time.  We talk in detail about how tape drives work they way they do, their reliability and more.  We take down a couple of myths from the guy that was there, even correcting a misunderstanding Mr. Backup has had for many years.  If the phrase "magneto crystalline anisotropy" has been used on any other podcast, we'd be surprised.  This is a good one you won't want to miss.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/tape-drive-designer-schools-mr-backup-on-tape-restore-it-all-podcast-111/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1080344437</guid><itunes:image href="https://artwork.captivate.fm/7d95bd09-fbb7-46a4-8f06-1781e72b365c/F_xs55I7t-LaNoK7J5fFnmMU.jpg"/><pubDate>Mon, 05 Jul 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/50b60816-b07c-42ad-ab7e-2fa183f6a1ff/1080344437-restoreitall-tape-drive-designer-schools-mr-backup-o.mp3" length="65864610" type="audio/mpeg"/><itunes:duration>01:03:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Joe Jurneke has been designing the innards of magnetic devices since 1973, and now he&apos;s here to answer our questions.  He started with disk, and moved over to tape over thirty years ago, and is now retired – but  consults with the tape industry from time to time.  We talk in detail about how tape drives work they way they do, their reliability and more.  We take down a couple of myths from the guy that was there, even correcting a misunderstanding Mr. Backup has had for many years.  If the phrase &quot;magneto crystalline anisotropy&quot; has been used on any other podcast, we&apos;d be surprised.  This is a good one you won&apos;t want to miss.</itunes:summary></item><item><title>Why you need a copy of Modern Data Protection</title><itunes:title>Why you need a copy of Modern Data Protection</itunes:title><description><![CDATA[<p>We cover my latest book, Modern Data Protection, by O'Reilly &amp; Associates on this podcast. I give an overview of the book, which covers the "Why, What, Where, and How" of backup, archive, and disaster recovery. After giving an overview of the book, I talk about why I wrote, and what it's like to write a book for O'Reilly.  Prasanna acted as a tech editor on the book, so he offered his unique perspective as well.</p>]]></description><content:encoded><![CDATA[<p>We cover my latest book, Modern Data Protection, by O'Reilly &amp; Associates on this podcast. I give an overview of the book, which covers the "Why, What, Where, and How" of backup, archive, and disaster recovery. After giving an overview of the book, I talk about why I wrote, and what it's like to write a book for O'Reilly.  Prasanna acted as a tech editor on the book, so he offered his unique perspective as well.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/why-you-need-a-copy-of-modern-data-protection-restore-it-all-podcast-110/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1077605824</guid><itunes:image href="https://artwork.captivate.fm/2e2d49ac-3d5c-457f-addf-da06a8999579/KkME46BC87okmqUFY8vHleUR.jpg"/><pubDate>Mon, 28 Jun 2021 18:34:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b8ed7e0e-0a04-48f3-a2b7-238e047ead89/1077605824-restoreitall-why-you-need-a-copy-of-modern-data-prot.mp3" length="68462302" type="audio/mpeg"/><itunes:duration>01:03:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We cover my latest book, Modern Data Protection, by O&apos;Reilly &amp; Associates on this podcast. I give an overview of the book, which covers the &quot;Why, What, Where, and How&quot; of backup, archive, and disaster recovery. After giving an overview of the book, I talk about why I wrote, and what it&apos;s like to write a book for O&apos;Reilly.  Prasanna acted as a tech editor on the book, so he offered his unique perspective as well.</itunes:summary></item><item><title>Can OVH properly redesign their backup infrastructure?</title><itunes:title>Can OVH properly redesign their backup infrastructure?</itunes:title><description><![CDATA[<p>Prasanna and Curtis discuss whether or not can (or will) OVH properly redesign their backup infrastructure to prevent another incident like what happened in March, where many customers lost their sites forever. As we discussed in our previous podcast, OVH had a backup service already that people paid for, and it was not up to the task.  OVH"s CEO made an 8-minute video where he discussed some of the things they were going to do to make things better, and we discuss what he said. We talk about their idea of a centralized region just for backups, and whether or not that's a good idea. We also talk about how big of a job they have in front of them.  We applaud what we see, but have many concerns that the brief video do not address.  We also talk about how this plan is supposed to take five years, and what do OVH customers do in the meantime?</p>]]></description><content:encoded><![CDATA[<p>Prasanna and Curtis discuss whether or not can (or will) OVH properly redesign their backup infrastructure to prevent another incident like what happened in March, where many customers lost their sites forever. As we discussed in our previous podcast, OVH had a backup service already that people paid for, and it was not up to the task.  OVH"s CEO made an 8-minute video where he discussed some of the things they were going to do to make things better, and we discuss what he said. We talk about their idea of a centralized region just for backups, and whether or not that's a good idea. We also talk about how big of a job they have in front of them.  We applaud what we see, but have many concerns that the brief video do not address.  We also talk about how this plan is supposed to take five years, and what do OVH customers do in the meantime?</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/can-ovh-properly-redesign-their-backup-infrastructure-restore-it-all-podcast-109/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1072675969</guid><itunes:image href="https://artwork.captivate.fm/e0334807-c03c-42ac-aedf-6310367086a8/JYcFUE0XhL7vfBYp7S2Lv70K.jpg"/><pubDate>Mon, 21 Jun 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/7b918312-7404-4838-98d0-8522524eb079/1072675969-restoreitall-can-ovh-properly-redesign-their-backup.mp3" length="46922144" type="audio/mpeg"/><itunes:duration>44:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Prasanna and Curtis discuss whether or not can (or will) OVH properly redesign their backup infrastructure to prevent another incident like what happened in March, where many customers lost their sites forever. As we discussed in our previous podcast, OVH had a backup service already that people paid for, and it was not up to the task.  OVH&quot;s CEO made an 8-minute video where he discussed some of the things they were going to do to make things better, and we discuss what he said. We talk about their idea of a centralized region just for backups, and whether or not that&apos;s a good idea. We also talk about how big of a job they have in front of them.  We applaud what we see, but have many concerns that the brief video do not address.  We also talk about how this plan is supposed to take five years, and what do OVH customers do in the meantime?</itunes:summary></item><item><title>ComplyTrust: Remembering those you need to forget</title><itunes:title>ComplyTrust: Remembering those you need to forget</itunes:title><description><![CDATA[<p>We talk to Mike Johnson of ComplyTrust, who says they "remember those you are supposed to forget." We talk about the data management challenges created by data subject access requests (DSARs), right-of-erasure (ROE, AKA right to be forgotten, or RTBF) requests, and the fact that we have many parts of the datacenter that are much better at remembering than forgetting.  Backups are a particular challenge, but Mike brings up other challenges, such as mergers and acquisitions, and salespeople importing old data. ComplyTrust SaaS offering has a unique solution to this problem by remembering (on your behalf) those you are supposed to forget, and continually checking to see that they stay forgotten.</p>]]></description><content:encoded><![CDATA[<p>We talk to Mike Johnson of ComplyTrust, who says they "remember those you are supposed to forget." We talk about the data management challenges created by data subject access requests (DSARs), right-of-erasure (ROE, AKA right to be forgotten, or RTBF) requests, and the fact that we have many parts of the datacenter that are much better at remembering than forgetting.  Backups are a particular challenge, but Mike brings up other challenges, such as mergers and acquisitions, and salespeople importing old data. ComplyTrust SaaS offering has a unique solution to this problem by remembering (on your behalf) those you are supposed to forget, and continually checking to see that they stay forgotten.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/complytrust-remembering-those-you-need-to-forget-restore-it-all-podcast-108/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1068627049</guid><itunes:image href="https://artwork.captivate.fm/1ffd9402-f8c2-4f34-a71a-37795a36a484/ePwLUSQbB4RC3zpIoK0ZhlIK.jpg"/><pubDate>Tue, 15 Jun 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6d609db5-1774-4989-954b-3fb27c26932c/1068627049-restoreitall-complytrust-remembering-those-you-need.mp3" length="56183224" type="audio/mpeg"/><itunes:duration>57:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We talk to Mike Johnson of ComplyTrust, who says they &quot;remember those you are supposed to forget.&quot; We talk about the data management challenges created by data subject access requests (DSARs), right-of-erasure (ROE, AKA right to be forgotten, or RTBF) requests, and the fact that we have many parts of the datacenter that are much better at remembering than forgetting.  Backups are a particular challenge, but Mike brings up other challenges, such as mergers and acquisitions, and salespeople importing old data. ComplyTrust SaaS offering has a unique solution to this problem by remembering (on your behalf) those you are supposed to forget, and continually checking to see that they stay forgotten.</itunes:summary></item><item><title>OVH&apos;s Backup Service Didn&apos;t Work</title><itunes:title>OVH&apos;s Backup Service Didn&apos;t Work</itunes:title><description><![CDATA[<p>This week we discuss further lessons from the OVH fire, which starts with an admission by the CEO that some customers who paid for the backup service lost their backups in the fire.  It then morphs into a discussion about designing resilient systems, starting with the concept of designing for failure. You have to protect against both physical and logical damage to your apps and data.  We talk about using both cloud-native apps that have resiliency built in, vs having to add resiliency to your own app. Most importantly, know how your app/data is protected, and don't tolerate wishy-washy terminology in your service agreements.  Above all, test, test, test!</p>]]></description><content:encoded><![CDATA[<p>This week we discuss further lessons from the OVH fire, which starts with an admission by the CEO that some customers who paid for the backup service lost their backups in the fire.  It then morphs into a discussion about designing resilient systems, starting with the concept of designing for failure. You have to protect against both physical and logical damage to your apps and data.  We talk about using both cloud-native apps that have resiliency built in, vs having to add resiliency to your own app. Most importantly, know how your app/data is protected, and don't tolerate wishy-washy terminology in your service agreements.  Above all, test, test, test!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/ovhs-backup-service-didnt-work-restore-it-all-podcast-107/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1060944673</guid><itunes:image href="https://artwork.captivate.fm/50cac7b0-da64-4796-b6f3-02c41e81dc89/q1KHYNE5G6S23UZUaEy0_MAz.jpg"/><pubDate>Mon, 07 Jun 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/106761bb-bb8f-4e3f-b535-31395f8af155/1060944673-restoreitall-ovh-backup-service-didnt-work.mp3" length="43947266" type="audio/mpeg"/><itunes:duration>43:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week we discuss further lessons from the OVH fire, which starts with an admission by the CEO that some customers who paid for the backup service lost their backups in the fire.  It then morphs into a discussion about designing resilient systems, starting with the concept of designing for failure. You have to protect against both physical and logical damage to your apps and data.  We talk about using both cloud-native apps that have resiliency built in, vs having to add resiliency to your own app. Most importantly, know how your app/data is protected, and don&apos;t tolerate wishy-washy terminology in your service agreements.  Above all, test, test, test!</itunes:summary></item><item><title>How do You Prove Your Backup Service is Real?</title><itunes:title>How do You Prove Your Backup Service is Real?</itunes:title><description><![CDATA[<p>This week we discuss a topic brought up by the OVH fire.  It appears some people actually had a contractual backup service that wasn't doing it's job.  How do you verify that a service you're paying for is real, and is doing what it claims to be doing?  Especially how do you make sure they are storing data offsite?  We've got some ideas.</p>]]></description><content:encoded><![CDATA[<p>This week we discuss a topic brought up by the OVH fire.  It appears some people actually had a contractual backup service that wasn't doing it's job.  How do you verify that a service you're paying for is real, and is doing what it claims to be doing?  Especially how do you make sure they are storing data offsite?  We've got some ideas.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-do-you-prove-your-backup-service-is-real-restore-it-all-podcast-106/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1059535261</guid><itunes:image href="https://artwork.captivate.fm/d1a26862-fa3b-440d-9b7d-7f645e9df507/Ty8YLIEj6pTXsTu6AehDDmI6.jpg"/><pubDate>Tue, 01 Jun 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0c5c388c-6f48-48a6-bc4a-4152942f0d80/1059535261-restoreitall-how-do-you-prove-your-backup-service-is.mp3" length="48082655" type="audio/mpeg"/><itunes:duration>47:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week we discuss a topic brought up by the OVH fire.  It appears some people actually had a contractual backup service that wasn&apos;t doing it&apos;s job.  How do you verify that a service you&apos;re paying for is real, and is doing what it claims to be doing?  Especially how do you make sure they are storing data offsite?  We&apos;ve got some ideas.</itunes:summary></item><item><title>Datacenter manager Dan Frith discusses the OVH Fire</title><itunes:title>Datacenter manager Dan Frith discusses the OVH Fire</itunes:title><description><![CDATA[<p>Datacenter manager Dan Frith (@penguinpunk) joins us on the podcast for our first discussion of the #OVHFire. A massive fire destroyed a datacenter of a large cloud provider in Europe, and millions of websites disappeared. We talk about the lessons we can learn from this event.</p><p>Dan talks about how outsourcing the servers doesn't outsource the responsibility for data protection.  I make the point that this fire shows what happens when you completely rely on a single entity for both production and data protection. We end up talking about the 3-2-1 rule and how it applies in this scenario.  </p><p><br></p><p>I also give a discount code during the podcast for my new O'Reilly book Modern Data Protection, which is now available for purchase.  If you use the URL below and the code I give on the podcast, you can get 35% of the retail price. </p><p><br></p><p>https://shop.aer.io/oreilly/p/Modern_Data_Protection_Ensuring_Recoverability_of_/9781492094050-9149</p>]]></description><content:encoded><![CDATA[<p>Datacenter manager Dan Frith (@penguinpunk) joins us on the podcast for our first discussion of the #OVHFire. A massive fire destroyed a datacenter of a large cloud provider in Europe, and millions of websites disappeared. We talk about the lessons we can learn from this event.</p><p>Dan talks about how outsourcing the servers doesn't outsource the responsibility for data protection.  I make the point that this fire shows what happens when you completely rely on a single entity for both production and data protection. We end up talking about the 3-2-1 rule and how it applies in this scenario.  </p><p><br></p><p>I also give a discount code during the podcast for my new O'Reilly book Modern Data Protection, which is now available for purchase.  If you use the URL below and the code I give on the podcast, you can get 35% of the retail price. </p><p><br></p><p>https://shop.aer.io/oreilly/p/Modern_Data_Protection_Ensuring_Recoverability_of_/9781492094050-9149</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/datacenter-manager-dan-frith-discusses-the-ovh-fire-restore-it-all-podcast-105/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1054348330</guid><itunes:image href="https://artwork.captivate.fm/4670d4e3-81d6-4770-aeca-fe0331f5ce9e/IO00Uwof5u-hiUJElhkbBmKT.jpg"/><pubDate>Mon, 24 May 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/97fa4bfa-6fa7-45aa-94a1-696083b0ac6e/1054348330-restoreitall-datacenter-manager-dan-frith-discusses.mp3" length="54898379" type="audio/mpeg"/><itunes:duration>52:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Datacenter manager Dan Frith (@penguinpunk) joins us on the podcast for our first discussion of the #OVHFire. A massive fire destroyed a datacenter of a large cloud provider in Europe, and millions of websites disappeared. We talk about the lessons we can learn from this event.

Dan talks about how outsourcing the servers doesn&apos;t outsource the responsibility for data protection.  I make the point that this fire shows what happens when you completely rely on a single entity for both production and data protection. We end up talking about the 3-2-1 rule and how it applies in this scenario.  

I also give a discount code during the podcast for my new O&apos;Reilly book Modern Data Protection, which is now available for purchase.  If you use the URL below and the code I give on the podcast, you can get 35% of the retail price. 

https://shop.aer.io/oreilly/p/Modern_Data_Protection_Ensuring_Recoverability_of_/9781492094050-9149</itunes:summary></item><item><title>Dave Russell answers our questions about Veeam</title><itunes:title>Dave Russell answers our questions about Veeam</itunes:title><description><![CDATA[<p>It only took us 100 episodes, but we finally got Dave Russell, VP of Enterprise Strategy at Veeam, as our guest on the podcast.  Dave and Curtis go way back, and this was a great discussion.  We cover the proper use of tape, and what it was like for Dave when he went to Veeam.  Another big discussion point was Dave clearing up misconceptions (some of which may have come from this podcast) about what Insight Partners acquiring Veeam really meant.  We then get into a great discussion about how Veeam works, ending that discussion with Dave explaining what Veeam is doing to address concerns about Windows and ransomware.</p>]]></description><content:encoded><![CDATA[<p>It only took us 100 episodes, but we finally got Dave Russell, VP of Enterprise Strategy at Veeam, as our guest on the podcast.  Dave and Curtis go way back, and this was a great discussion.  We cover the proper use of tape, and what it was like for Dave when he went to Veeam.  Another big discussion point was Dave clearing up misconceptions (some of which may have come from this podcast) about what Insight Partners acquiring Veeam really meant.  We then get into a great discussion about how Veeam works, ending that discussion with Dave explaining what Veeam is doing to address concerns about Windows and ransomware.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/dave-russell-answers-our-questions-about-veeam-restore-it-all-podcast-104/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1050107458</guid><itunes:image href="https://artwork.captivate.fm/f7be9b8d-b8a5-4bdd-9506-9431e335cd73/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 17 May 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5bb1180a-7ed5-4b9e-9faf-9271e6e28385/1050107458-restoreitall-dave-russell-answers-our-questions-abou.mp3" length="74502829" type="audio/mpeg"/><itunes:duration>01:10:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>It only took us 100 episodes, but we finally got Dave Russell, VP of Enterprise Strategy at Veeam, as our guest on the podcast.  Dave and Curtis go way back, and this was a great discussion.  We cover the proper use of tape, and what it was like for Dave when he went to Veeam.  Another big discussion point was Dave clearing up misconceptions (some of which may have come from this podcast) about what Insight Partners acquiring Veeam really meant.  We then get into a great discussion about how Veeam works, ending that discussion with Dave explaining what Veeam is doing to address concerns about Windows and ransomware.</itunes:summary></item><item><title>Fortune 100 company considers changing backup product</title><itunes:title>Fortune 100 company considers changing backup product</itunes:title><description><![CDATA[<p>Our anonymous guest this week is from a Fortune 100 company who is considering swapping out their backup product.  Our guest has been at the company for over 20 years, and remembers swapping out NetWorker for NetBackup many years ago.  Now he is considering swapping out NetBackup to address his challenges with that product.  We discuss a number of topics, including the age-old argument of who should be in charge of database backups, as well as the challenges of moving to a modern backup product when you are still using operating systems not usually supporting by such products. Our guest's final thoughts center on the importance of a good relationship with the vendor in question.</p>]]></description><content:encoded><![CDATA[<p>Our anonymous guest this week is from a Fortune 100 company who is considering swapping out their backup product.  Our guest has been at the company for over 20 years, and remembers swapping out NetWorker for NetBackup many years ago.  Now he is considering swapping out NetBackup to address his challenges with that product.  We discuss a number of topics, including the age-old argument of who should be in charge of database backups, as well as the challenges of moving to a modern backup product when you are still using operating systems not usually supporting by such products. Our guest's final thoughts center on the importance of a good relationship with the vendor in question.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/fortune-100-company-considers-changing-backup-product-restore-it-all-podcast-103/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1045981918</guid><itunes:image href="https://artwork.captivate.fm/d13de35a-27b9-40a5-b235-a20821477917/4P0agP8_1fJILBdU-77kQTsQ.jpg"/><pubDate>Mon, 10 May 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/be68af91-1b10-4723-bb24-758065fb0fd6/1045981918-restoreitall-fortune-100-company-considers-changing.mp3" length="46154303" type="audio/mpeg"/><itunes:duration>45:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Our anonymous guest this week is from a Fortune 100 company who is considering swapping out their backup product.  Our guest has been at the company for over 20 years, and remembers swapping out NetWorker for NetBackup many years ago.  Now he is considering swapping out NetBackup to address his challenges with that product.  We discuss a number of topics, including the age-old argument of who should be in charge of database backups, as well as the challenges of moving to a modern backup product when you are still using operating systems not usually supporting by such products. Our guest&apos;s final thoughts center on the importance of a good relationship with the vendor in question.</itunes:summary></item><item><title>Veeam User Warns About Item-Level Retention in Microsoft 365 Backup</title><itunes:title>Veeam User Warns About Item-Level Retention in Microsoft 365 Backup</itunes:title><description><![CDATA[<p>A Veeam user warns of what he felt is a confusing option in Veeam Backup for Microsoft 365.  He says he likes the product, but that the first retention setting mentioned in the documentation (item-level retention) might not do what you think it does. He thinks everyone should use snapshot-level retention, which behaves more traditionally.  We also discuss IBM Spectrum Protect (AKA TSM) a little bit, as they also use that product.  Our guest is speaking on conditions of anonymity, so we gave him a fake name (Puddleglum) and altered his voice in the recording.   (Want to talk about your environment, but don't want to use your name?  We'd love to have you on and we'll keep you anonymous too!)</p>]]></description><content:encoded><![CDATA[<p>A Veeam user warns of what he felt is a confusing option in Veeam Backup for Microsoft 365.  He says he likes the product, but that the first retention setting mentioned in the documentation (item-level retention) might not do what you think it does. He thinks everyone should use snapshot-level retention, which behaves more traditionally.  We also discuss IBM Spectrum Protect (AKA TSM) a little bit, as they also use that product.  Our guest is speaking on conditions of anonymity, so we gave him a fake name (Puddleglum) and altered his voice in the recording.   (Want to talk about your environment, but don't want to use your name?  We'd love to have you on and we'll keep you anonymous too!)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/veeam-user-warns-about-item-level-retention-in-microsoft-365-backup-restore-it-all-podcast-102/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1041330187</guid><itunes:image href="https://artwork.captivate.fm/34166bec-9ada-4e53-9704-e20baf1dfcf8/dCgTTEwCZeFCFg290ARpICR9.jpg"/><pubDate>Mon, 03 May 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cc7f498a-823b-4921-899b-174fb0ddfc85/1041330187-restoreitall-veeam-user-warns-about-item-level-reten.mp3" length="54384045" type="audio/mpeg"/><itunes:duration>55:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>A Veeam user warns of what he felt is a confusing option in Veeam Backup for Microsoft 365.  He says he likes the product, but that the first retention setting mentioned in the documentation (item-level retention) might not do what you think it does. He thinks everyone should use snapshot-level retention, which behaves more traditionally.  We also discuss IBM Spectrum Protect (AKA TSM) a little bit, as they also use that product.  Our guest is speaking on conditions of anonymity, so we gave him a fake name (Puddleglum) and altered his voice in the recording.   (Want to talk about your environment, but don&apos;t want to use your name?  We&apos;d love to have you on and we&apos;ll keep you anonymous too!)</itunes:summary></item><item><title>Securing &amp; speeding up network traffic w/o VPN or SD-WAN</title><itunes:title>Securing &amp; speeding up network traffic w/o VPN or SD-WAN</itunes:title><description><![CDATA[<p>Adi Ruppin, founder of Ananda Networks, joins us on the podcast to discuss how they secure – and increase the performance of –  network traffic without deploying a VPN or SD-WAN.  He talks about how the technologies we use for networking are actually very old designs that come with a lot of downsides. Ananda Networks aims to address those downsides while giving you everything a VPN and SD-WAN do – and more.  Faster and more secure internet connections  without the technologies we usually use for such things.</p>]]></description><content:encoded><![CDATA[<p>Adi Ruppin, founder of Ananda Networks, joins us on the podcast to discuss how they secure – and increase the performance of –  network traffic without deploying a VPN or SD-WAN.  He talks about how the technologies we use for networking are actually very old designs that come with a lot of downsides. Ananda Networks aims to address those downsides while giving you everything a VPN and SD-WAN do – and more.  Faster and more secure internet connections  without the technologies we usually use for such things.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/securing-speeding-up-network-traffic/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1036641256</guid><itunes:image href="https://artwork.captivate.fm/049bb9eb-76bd-4a78-88f6-2e02296d0c33/QopY4zDJDNfY1rQvfKnBfgZi.jpg"/><pubDate>Mon, 26 Apr 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/9873e318-bc80-41da-b49d-2edeec57bce3/1036641256-restoreitall-securing-network-traffic-wo-a-vpn.mp3" length="53051351" type="audio/mpeg"/><itunes:duration>50:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Adi Ruppin, founder of Ananda Networks, joins us on the podcast to discuss how they secure – and increase the performance of –  network traffic without deploying a VPN or SD-WAN.  He talks about how the technologies we use for networking are actually very old designs that come with a lot of downsides. Ananda Networks aims to address those downsides while giving you everything a VPN and SD-WAN do – and more.  Faster and more secure internet connections  without the technologies we usually use for such things.</itunes:summary></item><item><title>What we learned in 100 episodes of Backup Central&apos;s Restore it All</title><itunes:title>What we learned in 100 episodes of Backup Central&apos;s Restore it All</itunes:title><description><![CDATA[<p>It's hard to believe, but this is our 100th episode!  Prasanna and Curtis discuss the favorite topics we've had over 100 episodes, as well as the many things we've learned along the way.  We talk about containers and K8s, tape, COVID-19, election security, and how recoveries are impacted by other factors.  We also talked extensively about ransomware, and talked to someone who had actually been through a recovery from an attack.  We talked about DDI, cloud backups, the importance of segregating your Windows backup server, and many things about the 120+ database products that have to be backed up. </p><p>Thank you so much to our listeners!  We look forward to 100 more episodes!</p>]]></description><content:encoded><![CDATA[<p>It's hard to believe, but this is our 100th episode!  Prasanna and Curtis discuss the favorite topics we've had over 100 episodes, as well as the many things we've learned along the way.  We talk about containers and K8s, tape, COVID-19, election security, and how recoveries are impacted by other factors.  We also talked extensively about ransomware, and talked to someone who had actually been through a recovery from an attack.  We talked about DDI, cloud backups, the importance of segregating your Windows backup server, and many things about the 120+ database products that have to be backed up. </p><p>Thank you so much to our listeners!  We look forward to 100 more episodes!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-we-learned-in-100-episodes-of-backup-centrals-restore-it-all-restore-it-all-podcast-100/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1032123751</guid><itunes:image href="https://artwork.captivate.fm/e1ab56b3-6ef2-410f-96a6-c6757c6da5c0/yTVhMmK0E9etjZgTjs5X0rvA.jpg"/><pubDate>Mon, 19 Apr 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a9eb43e5-62f3-44f8-9552-f16416d27da7/1032123751-restoreitall-what-we-learned-in-100-episodes-of-back.mp3" length="61849737" type="audio/mpeg"/><itunes:duration>59:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>It&apos;s hard to believe, but this is our 100th episode!  Prasanna and Curtis discuss the favorite topics we&apos;ve had over 100 episodes, as well as the many things we&apos;ve learned along the way.  We talk about containers and K8s, tape, COVID-19, election security, and how recoveries are impacted by other factors.  We also talked extensively about ransomware, and talked to someone who had actually been through a recovery from an attack.  We talked about DDI, cloud backups, the importance of segregating your Windows backup server, and many things about the 120+ database products that have to be backed up. 

Thank you so much to our listeners!  We look forward to 100 more episodes!</itunes:summary></item><item><title>Kubernetes Expert Explains K8s, the CSI, and backups</title><itunes:title>Kubernetes Expert Explains K8s, the CSI, and backups</itunes:title><description><![CDATA[<p>Russ Cantwell (@rcantw3ll), CTO of SHI Corp, joins us to talk about Kubernetes, the Container Storage Interface (CSI), and backups.  Before we get to that, however, we talk about how he, his pregnant wife, and two-year old child all got COVID-19.  We discuss how that went and continues to go, and then we talk about Kubernetes.  (If you're not interested in our banter, and just want to hear about K8s, just fast-forward to 11:50.)</p>]]></description><content:encoded><![CDATA[<p>Russ Cantwell (@rcantw3ll), CTO of SHI Corp, joins us to talk about Kubernetes, the Container Storage Interface (CSI), and backups.  Before we get to that, however, we talk about how he, his pregnant wife, and two-year old child all got COVID-19.  We discuss how that went and continues to go, and then we talk about Kubernetes.  (If you're not interested in our banter, and just want to hear about K8s, just fast-forward to 11:50.)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/kubernetes-expert-explains-k8s-the-csi-and-backups-restore-it-all-podcast-99/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1027438855</guid><itunes:image href="https://artwork.captivate.fm/6e008ec7-1b22-4f5b-9c25-8b238bcedecc/qAbHwAsbobNtkaM0ZmHrGD6A.jpg"/><pubDate>Mon, 12 Apr 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/608ce48f-a99b-4123-b134-955ce50ec9cc/1027438855-restoreitall-kubernetes-expert-explains-k8s-the-csi.mp3" length="57253604" type="audio/mpeg"/><itunes:duration>55:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Russ Cantwell (@rcantw3ll), CTO of SHI Corp, joins us to talk about Kubernetes, the Container Storage Interface (CSI), and backups.  Before we get to that, however, we talk about how he, his pregnant wife, and two-year old child all got COVID-19.  We discuss how that went and continues to go, and then we talk about Kubernetes.  (If you&apos;re not interested in our banter, and just want to hear about K8s, just fast-forward to 11:50.)</itunes:summary></item><item><title>Porteguese University Using Open-Source Backup Tools</title><itunes:title>Porteguese University Using Open-Source Backup Tools</itunes:title><description><![CDATA[<p>Another industry veteran, Jose Calhariz. joins us this week to explain how he uses the community versions of two open-source backup tools to meet his university's backup needs, while saving money.  We have a very interesting discussion that includes coverage of dump, tar, and  Amanda.  Jose also tells a great story of a huge recovery he had to do, that took several days.</p>]]></description><content:encoded><![CDATA[<p>Another industry veteran, Jose Calhariz. joins us this week to explain how he uses the community versions of two open-source backup tools to meet his university's backup needs, while saving money.  We have a very interesting discussion that includes coverage of dump, tar, and  Amanda.  Jose also tells a great story of a huge recovery he had to do, that took several days.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/porteguese-university-using-open-source-backup-tools-restore-it-all-podcast-98/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1022401900</guid><itunes:image href="https://artwork.captivate.fm/0ba31e49-142e-44c8-90b3-138bdec2fc64/cuXiAvpmHUyUFr_Yv7a7t1Mw.jpg"/><pubDate>Mon, 05 Apr 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0bd1a56a-ec35-42c5-b739-03d3b4dd0174/1022401900-restoreitall-porteguese-university-using-open-source.mp3" length="51713948" type="audio/mpeg"/><itunes:duration>52:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Another industry veteran, Jose Calhariz. joins us this week to explain how he uses the community versions of two open-source backup tools to meet his university&apos;s backup needs, while saving money.  We have a very interesting discussion that includes coverage of dump, tar, and  Amanda.  Jose also tells a great story of a huge recovery he had to do, that took several days.</itunes:summary></item><item><title>Create a physical air-gap without using tape using portable disk</title><itunes:title>Create a physical air-gap without using tape using portable disk</itunes:title><description><![CDATA[<p>Darren McBride, CEO of Highly Reliable Systems (http://high-rely.com/ ) joins us on this podcast to talk about their product, which he says is designed for SMBs to get reliable offsite backup without using tape or an Internet connection.  They have purpose-built appliances that support mirroring, but with removable disks. This product has been on the market for almost twenty years, but is having a surge in demand due to the desire by many companies to have an air-gapped backup for ransomware protection purposes.</p>]]></description><content:encoded><![CDATA[<p>Darren McBride, CEO of Highly Reliable Systems (http://high-rely.com/ ) joins us on this podcast to talk about their product, which he says is designed for SMBs to get reliable offsite backup without using tape or an Internet connection.  They have purpose-built appliances that support mirroring, but with removable disks. This product has been on the market for almost twenty years, but is having a surge in demand due to the desire by many companies to have an air-gapped backup for ransomware protection purposes.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/create-a-physical-air-gap-without-using-tape-using-portable-disk-restore-it-all-podcast-97/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1018173403</guid><itunes:image href="https://artwork.captivate.fm/9052af55-2ae3-4c61-8fe9-f004b3c6d9c5/7tizf0hCA0-b3PJkSq8C1WHA.jpg"/><pubDate>Mon, 29 Mar 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/26948c07-990f-4d6c-9f4b-3b8abd71264f/1018173403-restoreitall-create-a-physical-air-gap-without-using.mp3" length="50253299" type="audio/mpeg"/><itunes:duration>51:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Darren McBride, CEO of Highly Reliable Systems (http://high-rely.com/ ) joins us on this podcast to talk about their product, which he says is designed for SMBs to get reliable offsite backup without using tape or an Internet connection.  They have purpose-built appliances that support mirroring, but with removable disks. This product has been on the market for almost twenty years, but is having a surge in demand due to the desire by many companies to have an air-gapped backup for ransomware protection purposes.</itunes:summary></item><item><title>Ransomware Victim Tells HIs Story</title><itunes:title>Ransomware Victim Tells HIs Story</itunes:title><description><![CDATA[<p>In May of 2020, Tony Mendoza of Spectra Logic found out his company had been attacked by ransomware.  Hear his harrowing tale of how long it took just to get the data center ready for a restore, and then the various tools they used to bring things back online.  He did not want to pay that ransom!  Spectra Logic is actually a tape vendor, so Tony has a unique viewpoint.  We thank him so much for being so candid about his experience. You will learn a lot.</p>]]></description><content:encoded><![CDATA[<p>In May of 2020, Tony Mendoza of Spectra Logic found out his company had been attacked by ransomware.  Hear his harrowing tale of how long it took just to get the data center ready for a restore, and then the various tools they used to bring things back online.  He did not want to pay that ransom!  Spectra Logic is actually a tape vendor, so Tony has a unique viewpoint.  We thank him so much for being so candid about his experience. You will learn a lot.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/ransomware-victim-tells-his-story-restore-it-all-podcast-96/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1012781962</guid><itunes:image href="https://artwork.captivate.fm/444dea48-6e98-48a7-ae48-eee21210452e/IlFAuqAQwgTaDvd9K5hr91V2.jpg"/><pubDate>Mon, 22 Mar 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cdd42cf9-1c49-4b3a-a043-b9d3b0e5db75/1012781962-restoreitall-ransomware-victim-tells-his-story.mp3" length="56790120" type="audio/mpeg"/><itunes:duration>01:02:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In May of 2020, Tony Mendoza of Spectra Logic found out his company had been attacked by ransomware.  Hear his harrowing tale of how long it took just to get the data center ready for a restore, and then the various tools they used to bring things back online.  He did not want to pay that ransom!  Spectra Logic is actually a tape vendor, so Tony has a unique viewpoint.  We thank him so much for being so candid about his experience. You will learn a lot.</itunes:summary></item><item><title>Bacula: Sucking the Vital Essence from your computers</title><itunes:title>Bacula: Sucking the Vital Essence from your computers</itunes:title><description><![CDATA[<p>Rob Morrison joins us from Bacula Systems, the commercial arm of the open-source backup product, Bacula.  It's tagline is that it roams the datacenter at night and sucks the vital essence from your computers.  Bacula Systems has come a long way since I first saw them years ago. Check out what they're been up to.</p>]]></description><content:encoded><![CDATA[<p>Rob Morrison joins us from Bacula Systems, the commercial arm of the open-source backup product, Bacula.  It's tagline is that it roams the datacenter at night and sucks the vital essence from your computers.  Bacula Systems has come a long way since I first saw them years ago. Check out what they're been up to.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/bacula-sucking-the-vital-essence-from-your-computers-restore-it-all-podcast-95/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1006167523</guid><itunes:image href="https://artwork.captivate.fm/67e9668b-b6c4-4538-86e9-ed6b5af16b1e/H1PEj1G7-sKQO6jYcjgv3NKJ.png"/><pubDate>Mon, 15 Mar 2021 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/2d598e41-4cb2-451b-b872-06c42da5ef69/1006167523-restoreitall-bacula-sucking-the-vital-essence-from-y.mp3" length="53436505" type="audio/mpeg"/><itunes:duration>53:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Rob Morrison joins us from Bacula Systems, the commercial arm of the open-source backup product, Bacula.  It&apos;s tagline is that it roams the datacenter at night and sucks the vital essence from your computers.  Bacula Systems has come a long way since I first saw them years ago. Check out what they&apos;re been up to.</itunes:summary></item><item><title>Back in my day, backups were really hard</title><itunes:title>Back in my day, backups were really hard</itunes:title><description><![CDATA[<p>This week’s episode is dedicated to my friend Jim Bougor, who passed on this week.  Jim, this week’s guest (Darryl Baker), and I all worked at Collective Technologies back in the day.  Darryl comes with over 30 years of backup and IT experience, and he and I walk down memory lane about the way things used to be with backups.  Apropos for women’s history month, we also talk about Grace Hopper and Ada Lovelace a little bit.  The Grace Hopper speech Darryl references can be seen here: https://www.youtube.com/watch?v=9eyFDBPk4Yw&amp;ab_channel=funbury  We talk about all sorts of tape drives from the old days including: 9-track, VHS, QIC-180, 8mm, AIT, 4mm, TK-70s, DLTs, and LTOs. We discuss the concept of coercivity and how that relates to magnetic media. We also discuss the difference between helical scan and linear tape drives, and Darryl’s theory as to why helical scan disappeared.</p>]]></description><content:encoded><![CDATA[<p>This week’s episode is dedicated to my friend Jim Bougor, who passed on this week.  Jim, this week’s guest (Darryl Baker), and I all worked at Collective Technologies back in the day.  Darryl comes with over 30 years of backup and IT experience, and he and I walk down memory lane about the way things used to be with backups.  Apropos for women’s history month, we also talk about Grace Hopper and Ada Lovelace a little bit.  The Grace Hopper speech Darryl references can be seen here: https://www.youtube.com/watch?v=9eyFDBPk4Yw&amp;ab_channel=funbury  We talk about all sorts of tape drives from the old days including: 9-track, VHS, QIC-180, 8mm, AIT, 4mm, TK-70s, DLTs, and LTOs. We discuss the concept of coercivity and how that relates to magnetic media. We also discuss the difference between helical scan and linear tape drives, and Darryl’s theory as to why helical scan disappeared.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/back-in-my-day-backups-were-really-hard-restore-it-all-podcast-94/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/1000758100</guid><itunes:image href="https://artwork.captivate.fm/5d35cc62-3ecb-4943-8e23-f32cdbfe4dfa/V3ehEBF7Htn_dJKemw1e314k.jpg"/><pubDate>Mon, 08 Mar 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/88e80d9b-a6a5-4533-aaf9-f6196729fd88/1000758100-restoreitall-back-in-my-day-backups-were-really-hard.mp3" length="51591031" type="audio/mpeg"/><itunes:duration>56:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This week’s episode is dedicated to my friend Jim Bougor, who passed on this week.  Jim, this week’s guest (Darryl Baker), and I all worked at Collective Technologies back in the day.  Darryl comes with over 30 years of backup and IT experience, and he and I walk down memory lane about the way things used to be with backups.  Apropos for women’s history month, we also talk about Grace Hopper and Ada Lovelace a little bit.  The Grace Hopper speech Darryl references can be seen here: https://www.youtube.com/watch?v=9eyFDBPk4Yw&amp;ab_channel=funbury  We talk about all sorts of tape drives from the old days including: 9-track, VHS, QIC-180, 8mm, AIT, 4mm, TK-70s, DLTs, and LTOs. We discuss the concept of coercivity and how that relates to magnetic media. We also discuss the difference between helical scan and linear tape drives, and Darryl’s theory as to why helical scan disappeared.</itunes:summary></item><item><title>Distributed Ledger (e.g. BlockChain) expert explains how to use it for security</title><itunes:title>Distributed Ledger (e.g. BlockChain) expert explains how to use it for security</itunes:title><description><![CDATA[<p>Chainkit Founder &amp; CEO Val Bercovici returns to the podcast to build on what we learned last week.  This week we talk about how distributed ledger technology (such as the one in BlockChain, but there are others), can be used to increase security. We talk about the SolarWinds hack and how that could have been prevented using such technology.</p>]]></description><content:encoded><![CDATA[<p>Chainkit Founder &amp; CEO Val Bercovici returns to the podcast to build on what we learned last week.  This week we talk about how distributed ledger technology (such as the one in BlockChain, but there are others), can be used to increase security. We talk about the SolarWinds hack and how that could have been prevented using such technology.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/distributed-ledger-e-g-blockchain-expert-explains-how-to-use-it-for-security-restore-it-all-podcast-93/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/994792768</guid><itunes:image href="https://artwork.captivate.fm/7af36bbf-0bc9-497a-9b49-c915c8f050af/oDhnYMxx7T6cHSZH5qQ87HPv.jpg"/><pubDate>Mon, 01 Mar 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee31d1d3-c23d-4604-8a37-27a31abf628f/994792768-restoreitall-distributed-ledger-eg-blockchain-expert.mp3" length="56192981" type="audio/mpeg"/><itunes:duration>01:00:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Chainkit Founder &amp; CEO Val Bercovici returns to the podcast to build on what we learned last week.  This week we talk about how distributed ledger technology (such as the one in BlockChain, but there are others), can be used to increase security. We talk about the SolarWinds hack and how that could have been prevented using such technology.</itunes:summary></item><item><title>Blockchain expert explains blockchain &amp; distributed ledgers</title><itunes:title>Blockchain expert explains blockchain &amp; distributed ledgers</itunes:title><description><![CDATA[<p>We invite blockchain expert Val Bercovici, Founder &amp; CEO of ChainKit, on the podcast to explain the basics of distributed ledgers, as well as the biggest distributed ledger – BlockChain.  He explains what a distributed ledger is and why you might want one.  We then talk about why someone would contribute to such a ledger, meaning why you would volunteer your resources to be part one – a process known as "mining."  Then, as a precursor to our next episode, we talk a little bit about the security possibilities of a distributed ledger.</p>]]></description><content:encoded><![CDATA[<p>We invite blockchain expert Val Bercovici, Founder &amp; CEO of ChainKit, on the podcast to explain the basics of distributed ledgers, as well as the biggest distributed ledger – BlockChain.  He explains what a distributed ledger is and why you might want one.  We then talk about why someone would contribute to such a ledger, meaning why you would volunteer your resources to be part one – a process known as "mining."  Then, as a precursor to our next episode, we talk a little bit about the security possibilities of a distributed ledger.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/blockchain-expert-explains-blockchain-distributed-ledgers-restore-it-all-podcast-92/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/989256229</guid><itunes:image href="https://artwork.captivate.fm/fd32c104-b3d8-4fff-8498-ba36c63cabc0/sCLG7UVHA5R0mtT4RcnGSy8_.jpg"/><pubDate>Mon, 22 Feb 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d4132d89-da99-474f-9d88-f3c87201252b/989256229-restoreitall-blockchain-expert-explains-blockchain-di.mp3" length="50191799" type="audio/mpeg"/><itunes:duration>55:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We invite blockchain expert Val Bercovici, Founder &amp; CEO of ChainKit, on the podcast to explain the basics of distributed ledgers, as well as the biggest distributed ledger – BlockChain.  He explains what a distributed ledger is and why you might want one.  We then talk about why someone would contribute to such a ledger, meaning why you would volunteer your resources to be part one – a process known as &quot;mining.&quot;  Then, as a precursor to our next episode, we talk a little bit about the security possibilities of a distributed ledger.</itunes:summary></item><item><title>Using backup to refresh your server, laptop, and phone</title><itunes:title>Using backup to refresh your server, laptop, and phone</itunes:title><description><![CDATA[<p>Prasanna and Curtis discuss the importance of occasionally refreshing your hardware (or virtual hardware) and how important backup in in that scenario.  There are many modern tools that can help you migrate from one thing to another (e.g. iPhone migration), but you'd better also have a decent backup.  We also discuss the pros and cons of TimeMachine.  It's nice, but not perfect.  (Still better than anything in WIndows, though.)</p>]]></description><content:encoded><![CDATA[<p>Prasanna and Curtis discuss the importance of occasionally refreshing your hardware (or virtual hardware) and how important backup in in that scenario.  There are many modern tools that can help you migrate from one thing to another (e.g. iPhone migration), but you'd better also have a decent backup.  We also discuss the pros and cons of TimeMachine.  It's nice, but not perfect.  (Still better than anything in WIndows, though.)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/using-backup-to-refresh-your-server-laptop-and-phone-restore-it-all-podcast-92/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/985808110</guid><itunes:image href="https://artwork.captivate.fm/6acc9d04-752f-452f-9b5b-eaee613588b8/q5ctGQogZJmcip1cdhnLYIUS.jpg"/><pubDate>Mon, 15 Feb 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/55f59984-ee49-42ab-8060-2ce2307525a9/985808110-restoreitall-using-backup-to-refresh-your-server-lapt.mp3" length="43356491" type="audio/mpeg"/><itunes:duration>42:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Prasanna and Curtis discuss the importance of occasionally refreshing your hardware (or virtual hardware) and how important backup in in that scenario.  There are many modern tools that can help you migrate from one thing to another (e.g. iPhone migration), but you&apos;d better also have a decent backup.  We also discuss the pros and cons of TimeMachine.  It&apos;s nice, but not perfect.  (Still better than anything in WIndows, though.)</itunes:summary></item><item><title>Netbackup &amp; Rubrik User Tells Their STory</title><itunes:title>Netbackup &amp; Rubrik User Tells Their STory</itunes:title><description><![CDATA[<p>Julie Ulrich, Systems Engineer at Farm Bureau Insurance of Michigan, joins us on this episode to talk about her experiences with NetBackup and Rubrik in her world.  She’s been working in backups for over 25 years, so has seen a number of iterations of both products.  We talk about many of the challenges she had with NetBackup that led her to considering Rubrik, as well as the pros and cons of using Rubrik. We also talk a little about her concerns about Microsoft 365.</p>]]></description><content:encoded><![CDATA[<p>Julie Ulrich, Systems Engineer at Farm Bureau Insurance of Michigan, joins us on this episode to talk about her experiences with NetBackup and Rubrik in her world.  She’s been working in backups for over 25 years, so has seen a number of iterations of both products.  We talk about many of the challenges she had with NetBackup that led her to considering Rubrik, as well as the pros and cons of using Rubrik. We also talk a little about her concerns about Microsoft 365.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/netbackup-rubrik-user-tells-their-story-restore-it-all-podcast-90/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/981489454</guid><itunes:image href="https://artwork.captivate.fm/8de011c4-cc1a-4f1a-a6ab-975ed839d916/pXW2RSusGLFjgCJitL0Fmlck.jpg"/><pubDate>Mon, 08 Feb 2021 16:43:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/76e80a97-f6ce-4122-bf44-03b5e7d4a45b/981489454-restoreitall-netbackup-rubrik-user-tells-their-story.mp3" length="54685969" type="audio/mpeg"/><itunes:duration>56:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Julie Ulrich, Systems Engineer at Farm Bureau Insurance of Michigan, joins us on this episode to talk about her experiences with NetBackup and Rubrik in her world.  She’s been working in backups for over 25 years, so has seen a number of iterations of both products.  We talk about many of the challenges she had with NetBackup that led her to considering Rubrik, as well as the pros and cons of using Rubrik. We also talk a little about her concerns about Microsoft 365.</itunes:summary></item><item><title>Scary data loss stories</title><itunes:title>Scary data loss stories</itunes:title><description><![CDATA[<p>These are the kinds of stories that keep you up at night.  UK police deleted hundreds of thousands of records. Sysadmin accidentally deleting thousands of users.  A new backup "feature" that made the backups worthless.  The infamous story of Toy Story getting deleted with no backups!  All this and more!</p>]]></description><content:encoded><![CDATA[<p>These are the kinds of stories that keep you up at night.  UK police deleted hundreds of thousands of records. Sysadmin accidentally deleting thousands of users.  A new backup "feature" that made the backups worthless.  The infamous story of Toy Story getting deleted with no backups!  All this and more!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/scary-data-loss-stories-restore-it-all-podcast-89/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/976691914</guid><itunes:image href="https://artwork.captivate.fm/c6a1885e-e2d9-4ee5-89b7-438ce3636493/pIjr_gsLsX8EF8OpiRrqiWOr.jpg"/><pubDate>Mon, 01 Feb 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/12dc8517-a7ea-4644-a85b-d61b85840235/976691914-restoreitall-scary-data-loss-stories.mp3" length="45633984" type="audio/mpeg"/><itunes:duration>44:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>These are the kinds of stories that keep you up at night.  UK police deleted hundreds of thousands of records. Sysadmin accidentally deleting thousands of users.  A new backup &quot;feature&quot; that made the backups worthless.  The infamous story of Toy Story getting deleted with no backups!  All this and more!</itunes:summary></item><item><title>The Very Tape-Centric Backup Views in Finland</title><itunes:title>The Very Tape-Centric Backup Views in Finland</itunes:title><description><![CDATA[<p>In another fascinating look into a very different world (backup-wise), we are delighted to have Timo Piiparinen from Multicom in Finland.  He’s been in the IT industry for over 40 years at the same company! TImo gave us a fascinating look into a very different backup world. He makes a case for tape in the backup system (something I gave up on a while ago) because he’s using a backup software vendor that didn’t give up on the medium and actually innovated for it.  Using a unique multiplexing setup that used flash disk as a big cache for the tape, very large block sizes, and what he called read-optimized writes, they run these tape drives at over 650 MB/s during backups and can guarantee restore speeds!  He and I spar a bit over the value of disk during DR, and his position was that this was only necessary for the most critical systems.  He’s a fan of tape, which is hard to find these days.  TImo will be back.</p>]]></description><content:encoded><![CDATA[<p>In another fascinating look into a very different world (backup-wise), we are delighted to have Timo Piiparinen from Multicom in Finland.  He’s been in the IT industry for over 40 years at the same company! TImo gave us a fascinating look into a very different backup world. He makes a case for tape in the backup system (something I gave up on a while ago) because he’s using a backup software vendor that didn’t give up on the medium and actually innovated for it.  Using a unique multiplexing setup that used flash disk as a big cache for the tape, very large block sizes, and what he called read-optimized writes, they run these tape drives at over 650 MB/s during backups and can guarantee restore speeds!  He and I spar a bit over the value of disk during DR, and his position was that this was only necessary for the most critical systems.  He’s a fan of tape, which is hard to find these days.  TImo will be back.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/the-very-tape-centric-backup-views-in-finland-restore-it-all-podcast-88/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/972124915</guid><itunes:image href="https://artwork.captivate.fm/9071237c-a786-4082-a9d3-1678e9722cb0/e2ZNiCYog4QWa1N6MNQIs2x2.jpg"/><pubDate>Mon, 25 Jan 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/09b12229-d979-4fac-b79c-9f31b7eeda21/972124915-restoreitall-the-very-tape-centric-backup-views-in-fi.mp3" length="55926229" type="audio/mpeg"/><itunes:duration>56:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In another fascinating look into a very different world (backup-wise), we are delighted to have Timo Piiparinen from Multicom in Finland.  He’s been in the IT industry for over 40 years at the same company! TImo gave us a fascinating look into a very different backup world. He makes a case for tape in the backup system (something I gave up on a while ago) because he’s using a backup software vendor that didn’t give up on the medium and actually innovated for it.  Using a unique multiplexing setup that used flash disk as a big cache for the tape, very large block sizes, and what he called read-optimized writes, they run these tape drives at over 650 MB/s during backups and can guarantee restore speeds!  He and I spar a bit over the value of disk during DR, and his position was that this was only necessary for the most critical systems.  He’s a fan of tape, which is hard to find these days.  TImo will be back.</itunes:summary></item><item><title>Stop ransomware in its tracks with DNS, DHCP, IPAM!</title><itunes:title>Stop ransomware in its tracks with DNS, DHCP, IPAM!</itunes:title><description><![CDATA[<p>We welcome Andrew Wertkin, Chief Strategy Officer of BlueCat, a DNS, DHCP, &amp; IPAM (DDI) security company.  Like backup, properly securing these parts of your infrastructure are both extremely important –&nbsp;and everyone thinks it's boring.  I knew nothing about DDI before this recording and I learned a ton about the ways that bad actors use these technologies to either attack or exploit your company.  Using technologies like Bluecat can actually stop ransomware in its tracks!  Andrew explains exactly how ransomware attackers use DNS for Command and Control, and how products like Bluecat can be used to stop them in ther tracks.  This is a great episode with a lot of really good information.</p>]]></description><content:encoded><![CDATA[<p>We welcome Andrew Wertkin, Chief Strategy Officer of BlueCat, a DNS, DHCP, &amp; IPAM (DDI) security company.  Like backup, properly securing these parts of your infrastructure are both extremely important –&nbsp;and everyone thinks it's boring.  I knew nothing about DDI before this recording and I learned a ton about the ways that bad actors use these technologies to either attack or exploit your company.  Using technologies like Bluecat can actually stop ransomware in its tracks!  Andrew explains exactly how ransomware attackers use DNS for Command and Control, and how products like Bluecat can be used to stop them in ther tracks.  This is a great episode with a lot of really good information.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/stop-ransomware-in-its-tracks-with-dns-dhcp-ipam-restore-it-all-podcast-87/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/966398596</guid><itunes:image href="https://artwork.captivate.fm/599a6514-4881-42e6-a482-f63ba302b6b8/AQorSSyTyLeA6yXiCaGTSdAA.jpg"/><pubDate>Mon, 18 Jan 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/628ecd7c-672f-4181-a8ae-5e004e5926bb/966398596-restoreitall-stop-ransomware-in-its-tracks-with-ddi.mp3" length="51258267" type="audio/mpeg"/><itunes:duration>58:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We welcome Andrew Wertkin, Chief Strategy Officer of BlueCat, a DNS, DHCP, &amp; IPAM (DDI) security company.  Like backup, properly securing these parts of your infrastructure are both extremely important – and everyone thinks it&apos;s boring.  I knew nothing about DDI before this recording and I learned a ton about the ways that bad actors use these technologies to either attack or exploit your company.  Using technologies like Bluecat can actually stop ransomware in its tracks!  Andrew explains exactly how ransomware attackers use DNS for Command and Control, and how products like Bluecat can be used to stop them in ther tracks.  This is a great episode with a lot of really good information.</itunes:summary></item><item><title>Microsoft 365 expert explains why you need to back it up</title><itunes:title>Microsoft 365 expert explains why you need to back it up</itunes:title><description><![CDATA[<p>Vanessa Toves joins us again to explain exactly why you need to backup Microsoft 365 and similar services. We talk about how Microsoft is only responsible for that platform; you are responsible for the data.  Particular attention is given to the idea that somehow Retention Policies are a substitute for backup. She explains exactly why that is not the case.  In fact, her experience with such policies has her struggling to wrap her head around why someone would want to do that.</p>]]></description><content:encoded><![CDATA[<p>Vanessa Toves joins us again to explain exactly why you need to backup Microsoft 365 and similar services. We talk about how Microsoft is only responsible for that platform; you are responsible for the data.  Particular attention is given to the idea that somehow Retention Policies are a substitute for backup. She explains exactly why that is not the case.  In fact, her experience with such policies has her struggling to wrap her head around why someone would want to do that.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/microsoft-365-expert-explains-why-you-need-to-back-it-up-restore-it-all-podcast-86/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/963241312</guid><itunes:image href="https://artwork.captivate.fm/6c037e04-53ef-4973-a591-f7923e9559af/FhajfWmbcTxaD2X9sp5bqjzs.jpg"/><pubDate>Mon, 11 Jan 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b3d29260-7524-4e25-a7a2-21168781fcf3/963241312-restoreitall-microsoft-365-expert-explains-why-you-ne.mp3" length="67483947" type="audio/mpeg"/><itunes:duration>01:10:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Vanessa Toves joins us again to explain exactly why you need to backup Microsoft 365 and similar services. We talk about how Microsoft is only responsible for that platform; you are responsible for the data.  Particular attention is given to the idea that somehow Retention Policies are a substitute for backup. She explains exactly why that is not the case.  In fact, her experience with such policies has her struggling to wrap her head around why someone would want to do that.</itunes:summary></item><item><title>Microsoft 365 architecture that needs to be backed up</title><itunes:title>Microsoft 365 architecture that needs to be backed up</itunes:title><description><![CDATA[<p>Vanessa Toves, a Microsoft 365 expert, joins us on Restore it All to explain the unique architecture of Microsoft 365 (formerly known as Office365).  We talk about Teams and Groups, and how many people misuse both.  We cover Sharepoint's role in this as well, and how Exchange Online figures into the picture.   This was originally going to just be an overview, but our architecture questions just kept coming, and Vanessa kept answering them.  This episode lays a good foundation of what we will cover in the next episode, which will be dedicate to backing up Microsoft 365.</p>]]></description><content:encoded><![CDATA[<p>Vanessa Toves, a Microsoft 365 expert, joins us on Restore it All to explain the unique architecture of Microsoft 365 (formerly known as Office365).  We talk about Teams and Groups, and how many people misuse both.  We cover Sharepoint's role in this as well, and how Exchange Online figures into the picture.   This was originally going to just be an overview, but our architecture questions just kept coming, and Vanessa kept answering them.  This episode lays a good foundation of what we will cover in the next episode, which will be dedicate to backing up Microsoft 365.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/microsoft-365-architecture-that-needs-to-be-backed-up-restore-it-all-podcast-85/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/958305790</guid><itunes:image href="https://artwork.captivate.fm/6bc2eb26-e451-40b1-9281-8fd92143c3e2/5Cs_-YXcW6QTuEpWAmdY47kD.jpg"/><pubDate>Mon, 04 Jan 2021 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/9c581e3c-6612-4584-b66d-acaa4819f868/958305790-restoreitall-microsoft-365-architecture-that-needs-to.mp3" length="41365304" type="audio/mpeg"/><itunes:duration>45:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Vanessa Toves, a Microsoft 365 expert, joins us on Restore it All to explain the unique architecture of Microsoft 365 (formerly known as Office365).  We talk about Teams and Groups, and how many people misuse both.  We cover Sharepoint&apos;s role in this as well, and how Exchange Online figures into the picture.   This was originally going to just be an overview, but our architecture questions just kept coming, and Vanessa kept answering them.  This episode lays a good foundation of what we will cover in the next episode, which will be dedicate to backing up Microsoft 365.</itunes:summary></item><item><title>2021 Storage and Data Protection Predictions</title><itunes:title>2021 Storage and Data Protection Predictions</itunes:title><description><![CDATA[<p>Prasanna and Curtis wax philisophical at the end of 2020, and try to predict what they think will happen next year. We look forward to the end of 2020 (don't we all?) and look with a positive outlook to 2021. We talk about the vaccine, and what it's going to be like getting back to work, and whether or not there will be a new normal there that's not like what it was.  We talk about SaaS products and their prevalence, as well as the emergence of a number of backup products based on Kubernetes.  2020 has been quite the year; let's hope 2021 is better.</p><p>Here is the FTC page I referenced in one of the editor's notes: https://www.ftc.gov/tips-advice/competition-guidance/guide-antitrust-laws/single-firm-conduct/predatory-or-below-cost</p>]]></description><content:encoded><![CDATA[<p>Prasanna and Curtis wax philisophical at the end of 2020, and try to predict what they think will happen next year. We look forward to the end of 2020 (don't we all?) and look with a positive outlook to 2021. We talk about the vaccine, and what it's going to be like getting back to work, and whether or not there will be a new normal there that's not like what it was.  We talk about SaaS products and their prevalence, as well as the emergence of a number of backup products based on Kubernetes.  2020 has been quite the year; let's hope 2021 is better.</p><p>Here is the FTC page I referenced in one of the editor's notes: https://www.ftc.gov/tips-advice/competition-guidance/guide-antitrust-laws/single-firm-conduct/predatory-or-below-cost</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/2021-storage-and-data-protection-predictions-restore-it-all-podcast-84/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/955096969</guid><itunes:image href="https://artwork.captivate.fm/71f66939-edb9-4019-933f-cd9a9f24ce4f/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 28 Dec 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/2522778d-2a58-4943-9858-05a8dab330aa/955096969-restoreitall-2021-storage-and-data-protection-predict.mp3" length="38161704" type="audio/mpeg"/><itunes:duration>35:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Prasanna and Curtis wax philisophical at the end of 2020, and try to predict what they think will happen next year. We look forward to the end of 2020 (don&apos;t we all?) and look with a positive outlook to 2021. We talk about the vaccine, and what it&apos;s going to be like getting back to work, and whether or not there will be a new normal there that&apos;s not like what it was.  We talk about SaaS products and their prevalence, as well as the emergence of a number of backup products based on Kubernetes.  2020 has been quite the year; let&apos;s hope 2021 is better.

Here is the FTC page I referenced in one of the editor&apos;s notes: https://www.ftc.gov/tips-advice/competition-guidance/guide-antitrust-laws/single-firm-conduct/predatory-or-below-cost</itunes:summary></item><item><title>Inside look at the DDOS attack on Fathom Analytics</title><itunes:title>Inside look at the DDOS attack on Fathom Analytics</itunes:title><description><![CDATA[<p>Fathom Analytics (https://www.usefathom.com) is a privacy-first analytics engine, and they were attacked in November 2020 via a very big DDOS attack that threatened their core business.  Jack Ellis, co-founder of Fathom Analytics, is a developer and first used the developer mindset to address this threat.  He quickly realized he was out of his depth and decided to call for help. The AWS Shield Advanced team came to the rescue and helped them shut down the attack, and helped to stop additional attacks that were still on the horizon. </p><p>Jack wrote about his experiences in the blog post "Someone attacked our company," and its URL is below. Now he shares his experience with us.  What's it like to be attacke by an unknown assailant bent on doing your company harm – and to not be sure how to stop it?  Join us on this episode to find out!</p><p><br></p><p>Someone Attacked Our Company: https://usefathom.com/blog/ddos-attack</p>]]></description><content:encoded><![CDATA[<p>Fathom Analytics (https://www.usefathom.com) is a privacy-first analytics engine, and they were attacked in November 2020 via a very big DDOS attack that threatened their core business.  Jack Ellis, co-founder of Fathom Analytics, is a developer and first used the developer mindset to address this threat.  He quickly realized he was out of his depth and decided to call for help. The AWS Shield Advanced team came to the rescue and helped them shut down the attack, and helped to stop additional attacks that were still on the horizon. </p><p>Jack wrote about his experiences in the blog post "Someone attacked our company," and its URL is below. Now he shares his experience with us.  What's it like to be attacke by an unknown assailant bent on doing your company harm – and to not be sure how to stop it?  Join us on this episode to find out!</p><p><br></p><p>Someone Attacked Our Company: https://usefathom.com/blog/ddos-attack</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/inside-look-at-the-ddos-attack-on-fathom-analytics-restore-it-all-podcast-83/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/949725979</guid><itunes:image href="https://artwork.captivate.fm/7d8b765d-3e0f-41ea-8f11-8e7890b7a896/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 21 Dec 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dc0433e9-2b15-4274-8a98-0a80be8d4ad0/949725979-restoreitall-inside-look-at-the-ddos-attack-on-fathom.mp3" length="47108546" type="audio/mpeg"/><itunes:duration>46:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Fathom Analytics (https://www.usefathom.com) is a privacy-first analytics engine, and they were attacked in November 2020 via a very big DDOS attack that threatened their core business.  Jack Ellis, co-founder of Fathom Analytics, is a developer and first used the developer mindset to address this threat.  He quickly realized he was out of his depth and decided to call for help. The AWS Shield Advanced team came to the rescue and helped them shut down the attack, and helped to stop additional attacks that were still on the horizon. 

Jack wrote about his experiences in the blog post &quot;Someone attacked our company,&quot; and its URL is below. Now he shares his experience with us.  What&apos;s it like to be attacke by an unknown assailant bent on doing your company harm – and to not be sure how to stop it?  Join us on this episode to find out!

Someone Attacked Our Company: https://usefathom.com/blog/ddos-attack</itunes:summary></item><item><title>Disaster Recovery after a hurricane - a First Hand Account</title><itunes:title>Disaster Recovery after a hurricane - a First Hand Account</itunes:title><description><![CDATA[<p>We get a closer look at the eye of the storm.   A few episodes ago, we had an anonymous guest we called Harry Potter, who told us what it was like to manage a DR remotely.  This week we hear from the man on the ground, recovering two datacenters after a hurricane wiped out the island where they resided.  We learn all sorts of lessons, especially about how so much of a disaster recovery has very little to do with what backup people think of when they think about a "recovery."  In fact, we spend almost this entire episode NOT talking about backup!  We talk about network connections, places to sleep, how to eat, and how to recover your datacenter when the neighborhood power won't even stay on.  This guest is also remaining anonymous, and since he is Harry Potter's friend, we called him Ron Weasley.  (My apologies to the Potterheads out there.)</p>]]></description><content:encoded><![CDATA[<p>We get a closer look at the eye of the storm.   A few episodes ago, we had an anonymous guest we called Harry Potter, who told us what it was like to manage a DR remotely.  This week we hear from the man on the ground, recovering two datacenters after a hurricane wiped out the island where they resided.  We learn all sorts of lessons, especially about how so much of a disaster recovery has very little to do with what backup people think of when they think about a "recovery."  In fact, we spend almost this entire episode NOT talking about backup!  We talk about network connections, places to sleep, how to eat, and how to recover your datacenter when the neighborhood power won't even stay on.  This guest is also remaining anonymous, and since he is Harry Potter's friend, we called him Ron Weasley.  (My apologies to the Potterheads out there.)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/disaster-recovery-after-a-hurricane-a-first-hand-account-restore-it-all-podcast-82/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/947050822</guid><itunes:image href="https://artwork.captivate.fm/89be0c3b-314a-4743-8b87-c1e73e3f6241/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 14 Dec 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cc16aece-a886-4108-aa46-278c0e88624a/947050822-restoreitall-disaster-recovery-after-hurricane-first.mp3" length="58598200" type="audio/mpeg"/><itunes:duration>55:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We get a closer look at the eye of the storm.   A few episodes ago, we had an anonymous guest we called Harry Potter, who told us what it was like to manage a DR remotely.  This week we hear from the man on the ground, recovering two datacenters after a hurricane wiped out the island where they resided.  We learn all sorts of lessons, especially about how so much of a disaster recovery has very little to do with what backup people think of when they think about a &quot;recovery.&quot;  In fact, we spend almost this entire episode NOT talking about backup!  We talk about network connections, places to sleep, how to eat, and how to recover your datacenter when the neighborhood power won&apos;t even stay on.  This guest is also remaining anonymous, and since he is Harry Potter&apos;s friend, we called him Ron Weasley.  (My apologies to the Potterheads out there.)</itunes:summary></item><item><title>Author of Cloud-Native Patterns explains importance of cloud-native design</title><itunes:title>Author of Cloud-Native Patterns explains importance of cloud-native design</itunes:title><description><![CDATA[<p>Cornelia Davis, 30-year industry veteran and CTO of Weaveworks, explains what cloud-native design is and why it matters.  She explains that you do not have to go fully cloud-native on day one if you are moving an app to the cloud, but everything you do "refactor" to a cloud-native architecture will be more resilient, scalable, and cost you less to operate. We talk about Kubernetes and how that figures into everything, but how it is not the only way to be cloud-native.</p><p>Listeners to the podcast can get a 40% discount on Cornelia's book by using our code "podrestore20" </p><p><br></p><p>https://www.manning.com/books/cloud-native-patterns?query=Cloud%20Native%20Patterns</p>]]></description><content:encoded><![CDATA[<p>Cornelia Davis, 30-year industry veteran and CTO of Weaveworks, explains what cloud-native design is and why it matters.  She explains that you do not have to go fully cloud-native on day one if you are moving an app to the cloud, but everything you do "refactor" to a cloud-native architecture will be more resilient, scalable, and cost you less to operate. We talk about Kubernetes and how that figures into everything, but how it is not the only way to be cloud-native.</p><p>Listeners to the podcast can get a 40% discount on Cornelia's book by using our code "podrestore20" </p><p><br></p><p>https://www.manning.com/books/cloud-native-patterns?query=Cloud%20Native%20Patterns</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/author-of-cloud-native-patterns-explains-importance-of-cloud-native-design-restore-it-all-podcast-81/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/928259893</guid><itunes:image href="https://artwork.captivate.fm/ca94c01b-6990-4b0a-8a5b-7ce664d24925/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 07 Dec 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/17c0aaff-c155-471c-bf7d-293f2f933940/928259893-restoreitall-author-of-cloud-native-patterns-explains.mp3" length="47108551" type="audio/mpeg"/><itunes:duration>46:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cornelia Davis, 30-year industry veteran and CTO of Weaveworks, explains what cloud-native design is and why it matters.  She explains that you do not have to go fully cloud-native on day one if you are moving an app to the cloud, but everything you do &quot;refactor&quot; to a cloud-native architecture will be more resilient, scalable, and cost you less to operate. We talk about Kubernetes and how that figures into everything, but how it is not the only way to be cloud-native.

Listeners to the podcast can get a 40% discount on Cornelia&apos;s book by using our code &quot;podrestore20&quot; 

https://www.manning.com/books/cloud-native-patterns?query=Cloud%20Native%20Patterns</itunes:summary></item><item><title>Public Health Expert Explains COVID-19 Vaccine News</title><itunes:title>Public Health Expert Explains COVID-19 Vaccine News</itunes:title><description><![CDATA[<p>Lindsey Schulz MD/MPH joins once more on the podcast to discuss the great news we have had in the last few weeks around the Coronavirus (COVID-19).  There are THREE vaccines that have been announced that all exceed the goals the medical community set, and will all be applying for emergency use authorization from the FDA.  She explains the pros and cons of each of the three vaccinees we know about at this point, as well as giving a little info about another vaccine that is expected to announce soon.  This is great news!</p>]]></description><content:encoded><![CDATA[<p>Lindsey Schulz MD/MPH joins once more on the podcast to discuss the great news we have had in the last few weeks around the Coronavirus (COVID-19).  There are THREE vaccines that have been announced that all exceed the goals the medical community set, and will all be applying for emergency use authorization from the FDA.  She explains the pros and cons of each of the three vaccinees we know about at this point, as well as giving a little info about another vaccine that is expected to announce soon.  This is great news!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/public-health-expert-explains-covid-19-vaccine-news-restore-it-all-podcast-80/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/934796443</guid><itunes:image href="https://artwork.captivate.fm/2094a75b-af1c-4b73-8f1a-a8266d9ebc57/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 30 Nov 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/449ed80b-ee09-4b31-84b2-c916c7d39327/934796443-restoreitall-public-health-expert-explains-covid-19-v.mp3" length="34489818" type="audio/mpeg"/><itunes:duration>38:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lindsey Schulz MD/MPH joins once more on the podcast to discuss the great news we have had in the last few weeks around the Coronavirus (COVID-19).  There are THREE vaccines that have been announced that all exceed the goals the medical community set, and will all be applying for emergency use authorization from the FDA.  She explains the pros and cons of each of the three vaccinees we know about at this point, as well as giving a little info about another vaccine that is expected to announce soon.  This is great news!</itunes:summary></item><item><title>Doctor &amp; Public Health expert explains current state of the pandemic</title><itunes:title>Doctor &amp; Public Health expert explains current state of the pandemic</itunes:title><description><![CDATA[Lindsey Schulz MD/MPH visits us again to give us an update on the current state of COVID-19.  There is good and bad news, here,  as we are in the midst of a third wave of cases and deaths. But the good news is that health care professionals have learned a lot about the virus in the last several months that have helped to reduce the death rate somewhat, and improve quality of life for those suffering from the illness.  Next week's episode will focus on the vaccines that we now know about, but this week we will just talk about the current state of the disease itself.]]></description><content:encoded><![CDATA[Lindsey Schulz MD/MPH visits us again to give us an update on the current state of COVID-19.  There is good and bad news, here,  as we are in the midst of a third wave of cases and deaths. But the good news is that health care professionals have learned a lot about the virus in the last several months that have helped to reduce the death rate somewhat, and improve quality of life for those suffering from the illness.  Next week's episode will focus on the vaccines that we now know about, but this week we will just talk about the current state of the disease itself.]]></content:encoded><link><![CDATA[https://soundcloud.com/restoreitall/doctor-public-health-expert-explains-current-state-of-the-pandemic]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/934365094</guid><itunes:image href="https://artwork.captivate.fm/66346442-1b19-403f-ba45-4203a1d0cd17/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 23 Nov 2020 12:00:42 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b13f90a1-8fea-4a0c-ac7d-ff68b09ee71e/934365094-restoreitall-doctor-public-health-expert-explains-cur.mp3" length="38673304" type="audio/mpeg"/><itunes:duration>43:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lindsey Schulz MD/MPH visits us again to give us an update on the current state of COVID-19.  There is good and bad news, here,  as we are in the midst of a third wave of cases and deaths. But the good news is that health care professionals have learned a lot about the virus in the last several months that have helped to reduce the death rate somewhat, and improve quality of life for those suffering from the illness.  Next week&apos;s episode will focus on the vaccines that we now know about, but this week we will just talk about the current state of the disease itself.</itunes:summary></item><item><title>Election poll site manager explains US election systems</title><itunes:title>Election poll site manager explains US election systems</itunes:title><description><![CDATA[<p>In a departure from our normal coverage, I decided to bring on Mark Thompson, who was the Site Manager for the election polling site I volunteered at last week.  He gives us insight into how elections are managed in the US, and what we do to prevent fraud and ensure the overall integrity of the system.  We talk about the technology used on the front end of the polling process, which in San Diego county including Electronic Poll Books (EPBs) and Ballot Marking Devices (BMDs). We then also talk briefly about the checks and balances in the actual counting process.  Although this is a departure from our normal fare, I think a lot of people will benefit from the info we discuss.</p><p>Also, I also posted a blog post about this topic here: http://www.backupcentral.com/why-its-really-hard-to-rig-a-national-election/</p>]]></description><content:encoded><![CDATA[<p>In a departure from our normal coverage, I decided to bring on Mark Thompson, who was the Site Manager for the election polling site I volunteered at last week.  He gives us insight into how elections are managed in the US, and what we do to prevent fraud and ensure the overall integrity of the system.  We talk about the technology used on the front end of the polling process, which in San Diego county including Electronic Poll Books (EPBs) and Ballot Marking Devices (BMDs). We then also talk briefly about the checks and balances in the actual counting process.  Although this is a departure from our normal fare, I think a lot of people will benefit from the info we discuss.</p><p>Also, I also posted a blog post about this topic here: http://www.backupcentral.com/why-its-really-hard-to-rig-a-national-election/</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/doctor-public-health-expert-explains-current-state-of-the-pandemic/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/928916626</guid><itunes:image href="https://artwork.captivate.fm/4b66746f-0a39-4396-967f-44169f23fa7f/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 16 Nov 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f1660535-6c3c-4aeb-ab30-0cfbdc215215/928916626-restoreitall-election-poll-site-manager-explains-us-e.mp3" length="63330872" type="audio/mpeg"/><itunes:duration>01:00:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In a departure from our normal coverage, I decided to bring on Mark Thompson, who was the Site Manager for the election polling site I volunteered at last week.  He gives us insight into how elections are managed in the US, and what we do to prevent fraud and ensure the overall integrity of the system.  We talk about the technology used on the front end of the polling process, which in San Diego county including Electronic Poll Books (EPBs) and Ballot Marking Devices (BMDs). We then also talk briefly about the checks and balances in the actual counting process.  Although this is a departure from our normal fare, I think a lot of people will benefit from the info we discuss.

Also, I also posted a blog post about this topic here: http://www.backupcentral.com/why-its-really-hard-to-rig-a-national-election/</itunes:summary></item><item><title>Dissecting two ransomware attacks on hospitals</title><itunes:title>Dissecting two ransomware attacks on hospitals</itunes:title><description><![CDATA[<p>Prasanna and Curtis talk about two recent ransomware attacks on hospitals and what we can learn from them.  They also discuss things you can do to protect yourself from such attacks, and how to prepare to respond if you get one.  We especially talk about the 3-2-1 rule and the remote desktop protocol (RDP) and how these figure into protecting yourself from such things.</p>]]></description><content:encoded><![CDATA[<p>Prasanna and Curtis talk about two recent ransomware attacks on hospitals and what we can learn from them.  They also discuss things you can do to protect yourself from such attacks, and how to prepare to respond if you get one.  We especially talk about the 3-2-1 rule and the remote desktop protocol (RDP) and how these figure into protecting yourself from such things.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/dissecting-two-ransomware-attacks-on-hospitals-restore-it-all-podcast-77/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/925685668</guid><itunes:image href="https://artwork.captivate.fm/7e9ad4a9-2ffa-42aa-b09e-d01d94e1d11e/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 09 Nov 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0cd0e775-194a-46b8-a76d-e537e9e1e601/925685668-restoreitall-dissecting-two-ransomware-attacks-on-hos.mp3" length="43218164" type="audio/mpeg"/><itunes:duration>41:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Prasanna and Curtis talk about two recent ransomware attacks on hospitals and what we can learn from them.  They also discuss things you can do to protect yourself from such attacks, and how to prepare to respond if you get one.  We especially talk about the 3-2-1 rule and the remote desktop protocol (RDP) and how these figure into protecting yourself from such things.</itunes:summary></item><item><title>Tape may be cheap, but disk is better for backups</title><itunes:title>Tape may be cheap, but disk is better for backups</itunes:title><description><![CDATA[<p>This isn't a rebuttal to last week's podcast, but it might seem that way.  Last week we talked about the advantages of tape for very long term retention (e.g. 10 years), one of which is a significant cost advantage.  This week we will discuss how backup, recovery, and disaster recovery are very different use cases, and why disk and cloud is a much more appropriate place for that use case. Joining us to discuss this topic is Druva's CTO, Stephen Manley, who has spent many years at companies that use disk for this purpose.</p>]]></description><content:encoded><![CDATA[<p>This isn't a rebuttal to last week's podcast, but it might seem that way.  Last week we talked about the advantages of tape for very long term retention (e.g. 10 years), one of which is a significant cost advantage.  This week we will discuss how backup, recovery, and disaster recovery are very different use cases, and why disk and cloud is a much more appropriate place for that use case. Joining us to discuss this topic is Druva's CTO, Stephen Manley, who has spent many years at companies that use disk for this purpose.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/tape-may-be-cheap-but-disk-is-better-for-backups-restore-it-all-podcast-76/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/920017849</guid><itunes:image href="https://artwork.captivate.fm/ec615ecc-218a-4546-b9d8-65ae85bedb82/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 02 Nov 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/66b98436-28ce-438a-8397-2442f0e2e77a/920017849-restoreitall-tape-may-be-cheap-but-disk-is-better-for.mp3" length="41577014" type="audio/mpeg"/><itunes:duration>40:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This isn&apos;t a rebuttal to last week&apos;s podcast, but it might seem that way.  Last week we talked about the advantages of tape for very long term retention (e.g. 10 years), one of which is a significant cost advantage.  This week we will discuss how backup, recovery, and disaster recovery are very different use cases, and why disk and cloud is a much more appropriate place for that use case. Joining us to discuss this topic is Druva&apos;s CTO, Stephen Manley, who has spent many years at companies that use disk for this purpose.</itunes:summary></item><item><title>Why Tape is Cheaper than Glacier for Long Term Storage</title><itunes:title>Why Tape is Cheaper than Glacier for Long Term Storage</itunes:title><description><![CDATA[<p>Matt Starr, CTO of Spectra, comes on the podcast to discuss the advantages of tape for long term storage. We talk about how tape is actually better at holding data long term than disk is – 10,000 times better if you compare it to SATA disk. We also talk about the advancements in tape in the last 10-20 years that have made libraries like Spectra's even more reliable than they used to be.  Finally, we talk about the Spectra T-Finity library that can now hold an Exabyte of data in a single unit! What started this whole idea of bringing Matt on was Spectra's eBook that said that the T-Finity tape library was significantly cheaper than Glacier Deep Archive if you store your data for a long period of time (e.g. 10 years or more).   Here's the eBook that got the conversation started:  https://bit.ly/37BtTkK</p>]]></description><content:encoded><![CDATA[<p>Matt Starr, CTO of Spectra, comes on the podcast to discuss the advantages of tape for long term storage. We talk about how tape is actually better at holding data long term than disk is – 10,000 times better if you compare it to SATA disk. We also talk about the advancements in tape in the last 10-20 years that have made libraries like Spectra's even more reliable than they used to be.  Finally, we talk about the Spectra T-Finity library that can now hold an Exabyte of data in a single unit! What started this whole idea of bringing Matt on was Spectra's eBook that said that the T-Finity tape library was significantly cheaper than Glacier Deep Archive if you store your data for a long period of time (e.g. 10 years or more).   Here's the eBook that got the conversation started:  https://bit.ly/37BtTkK</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/why-is-it-so-hard-to-backup-consumer-saas-products-restore-it-all-podcast-74/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/917648951</guid><itunes:image href="https://artwork.captivate.fm/9cb3bb73-fd2e-430e-b6e8-96216cd1b1f0/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 26 Oct 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/206cc6ea-7419-42fd-adaa-a182a1470430/917648951-restoreitall-why-tape-is-cheaper-than-glacier-for-lon.mp3" length="60892009" type="audio/mpeg"/><itunes:duration>01:01:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Matt Starr, CTO of Spectra, comes on the podcast to discuss the advantages of tape for long term storage. We talk about how tape is actually better at holding data long term than disk is – 10,000 times better if you compare it to SATA disk. We also talk about the advancements in tape in the last 10-20 years that have made libraries like Spectra&apos;s even more reliable than they used to be.  Finally, we talk about the Spectra T-Finity library that can now hold an Exabyte of data in a single unit! What started this whole idea of bringing Matt on was Spectra&apos;s eBook that said that the T-Finity tape library was significantly cheaper than Glacier Deep Archive if you store your data for a long period of time (e.g. 10 years or more).   Here&apos;s the eBook that got the conversation started:  https://bit.ly/37BtTkK</itunes:summary></item><item><title>Why is it so hard to backup consumer SaaS products?</title><itunes:title>Why is it so hard to backup consumer SaaS products?</itunes:title><description><![CDATA[<p>Daniel Rosehill, a self-described "backup anorak," joins us to discuss how difficult it can be to backup consumer SaaS services, such as Evernote.  Daniel used to use EverNote on Linux, and sent a message to their support system on how to backup its data.  They had no answer unless you were using it on Windows.   We talk about Google Drive, Dropbox, and other consumer-grade cloud services, and how the challenges of backing them up should be a concern for any users of these platforms –&nbsp;not just backup anoraks.  (An anorak is a slightly prejorative term that refers to someone who is interested in a not-so-leading idea –&nbsp;like backups.)</p>]]></description><content:encoded><![CDATA[<p>Daniel Rosehill, a self-described "backup anorak," joins us to discuss how difficult it can be to backup consumer SaaS services, such as Evernote.  Daniel used to use EverNote on Linux, and sent a message to their support system on how to backup its data.  They had no answer unless you were using it on Windows.   We talk about Google Drive, Dropbox, and other consumer-grade cloud services, and how the challenges of backing them up should be a concern for any users of these platforms –&nbsp;not just backup anoraks.  (An anorak is a slightly prejorative term that refers to someone who is interested in a not-so-leading idea –&nbsp;like backups.)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/why-is-it-so-hard-to-backup-consumer-saas-products-restore-it-all-podcast-74/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/913051000</guid><itunes:image href="https://artwork.captivate.fm/25078fe2-43b0-489f-9e55-8b82abde5c22/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 19 Oct 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f7f5463f-4749-43e0-babe-1e545d15eb2d/913051000-restoreitall-why-is-it-so-hard-to-backup-consumer-saa.mp3" length="53216883" type="audio/mpeg"/><itunes:duration>49:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Daniel Rosehill, a self-described &quot;backup anorak,&quot; joins us to discuss how difficult it can be to backup consumer SaaS services, such as Evernote.  Daniel used to use EverNote on Linux, and sent a message to their support system on how to backup its data.  They had no answer unless you were using it on Windows.   We talk about Google Drive, Dropbox, and other consumer-grade cloud services, and how the challenges of backing them up should be a concern for any users of these platforms – not just backup anoraks.  (An anorak is a slightly prejorative term that refers to someone who is interested in a not-so-leading idea – like backups.)</itunes:summary></item><item><title>The Dangers of Improperly Secured Cloud Accounts</title><itunes:title>The Dangers of Improperly Secured Cloud Accounts</itunes:title><description><![CDATA[<p>The Palo Alto Networks’ Unit 42 threat hunting team found that a big customer of theirs had misconfigured two critical Amazon Web Services (AWS) services.  If these misconfigurations were exploited by hackers, it could have created a data breach that could have cost the customers tens of millions of dollars.  Prasanna Malaiyandi and W. Curtis Preston (Mr. Backup) discuss this misconfiguration, and what you can learn from it to protect backups you store in the cloud.</p>]]></description><content:encoded><![CDATA[<p>The Palo Alto Networks’ Unit 42 threat hunting team found that a big customer of theirs had misconfigured two critical Amazon Web Services (AWS) services.  If these misconfigurations were exploited by hackers, it could have created a data breach that could have cost the customers tens of millions of dollars.  Prasanna Malaiyandi and W. Curtis Preston (Mr. Backup) discuss this misconfiguration, and what you can learn from it to protect backups you store in the cloud.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/the-dangers-of-improperly-secured-cloud-accounts-restore-it-all-podcast-73/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/908933158</guid><itunes:image href="https://artwork.captivate.fm/421c2f6c-2ee2-4358-ad5a-9aeab79ecf7b/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 12 Oct 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/80b8e505-a559-4380-b4ad-a5dc0dfdcfae/908933158-restoreitall-the-dangers-of-improperly-secured-cloud.mp3" length="43422977" type="audio/mpeg"/><itunes:duration>41:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>The Palo Alto Networks’ Unit 42 threat hunting team found that a big customer of theirs had misconfigured two critical Amazon Web Services (AWS) services.  If these misconfigurations were exploited by hackers, it could have created a data breach that could have cost the customers tens of millions of dollars.  Prasanna Malaiyandi and W. Curtis Preston (Mr. Backup) discuss this misconfiguration, and what you can learn from it to protect backups you store in the cloud.</itunes:summary></item><item><title>Real Life Hurricane Disaster Recover Story</title><itunes:title>Real Life Hurricane Disaster Recover Story</itunes:title><description><![CDATA[<p>A mystery guest from a multinational corporation that experienced a disaster during a recent hurricane describes their mostly-disk NetBackup environment and how they used it to recover from a hurricane that ravaged an island.  (Company and location names are changed or not mentioned so "Harry Potter," our mystery guest, can speak freely.)</p>]]></description><content:encoded><![CDATA[<p>A mystery guest from a multinational corporation that experienced a disaster during a recent hurricane describes their mostly-disk NetBackup environment and how they used it to recover from a hurricane that ravaged an island.  (Company and location names are changed or not mentioned so "Harry Potter," our mystery guest, can speak freely.)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/real-life-hurricane-disaster-recover-story/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/900787459</guid><itunes:image href="https://artwork.captivate.fm/10074ef4-79c4-4488-b6af-753c9b63c3a2/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 05 Oct 2020 07:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/4504d8fc-71b6-4cd9-bd2f-aa8a10880f4c/900787459-restoreitall-real-life-huricanne-disaster-recover-sto.mp3" length="44170127" type="audio/mpeg"/><itunes:duration>46:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>A mystery guest from a multinational corporation that experienced a disaster during a recent hurricane describes their mostly-disk NetBackup environment and how they used it to recover from a hurricane that ravaged an island.  (Company and location names are changed or not mentioned so &quot;Harry Potter,&quot; our mystery guest, can speak freely.)</itunes:summary></item><item><title>Backing up MongoDB &amp; Cassandra, a deep dive</title><itunes:title>Backing up MongoDB &amp; Cassandra, a deep dive</itunes:title><description><![CDATA[<p>Shalabh Goyal(@goyalshalabh) joins us on this podcast to discuss sharded databases – and MongoDB and Cassandra in particular – and how one might go about backing them up.  Suffice it to say that it is complicated.  We learned a lot from recording this podcast and you will learn a lot listening to it!</p>]]></description><content:encoded><![CDATA[<p>Shalabh Goyal(@goyalshalabh) joins us on this podcast to discuss sharded databases – and MongoDB and Cassandra in particular – and how one might go about backing them up.  Suffice it to say that it is complicated.  We learned a lot from recording this podcast and you will learn a lot listening to it!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backing-up-mongodb-cassandra-a-deep-dive-restore-it-all-podcast-71/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/894067846</guid><itunes:image href="https://artwork.captivate.fm/83dba905-464f-42eb-9335-fb1a11148ca2/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 28 Sep 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6d335ae2-5053-491b-a727-74656be6ea70/894067846-restoreitall-backing-up-mongodb-cassandra-a-deep-dive.mp3" length="52303662" type="audio/mpeg"/><itunes:duration>51:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Shalabh Goyal(@goyalshalabh) joins us on this podcast to discuss sharded databases – and MongoDB and Cassandra in particular – and how one might go about backing them up.  Suffice it to say that it is complicated.  We learned a lot from recording this podcast and you will learn a lot listening to it!</itunes:summary></item><item><title>Backing up Sharded NoSQL Databases</title><itunes:title>Backing up Sharded NoSQL Databases</itunes:title><description><![CDATA[<p>Tony McGarry, Senior Principal Engineer at Druva, joins W. Curtis Preston and Prasanna Malaiyandi to talk about backing up large, multi-node, sharded NoSQL databases like DynamoDB, Cassandra, and MongoDB.</p>]]></description><content:encoded><![CDATA[<p>Tony McGarry, Senior Principal Engineer at Druva, joins W. Curtis Preston and Prasanna Malaiyandi to talk about backing up large, multi-node, sharded NoSQL databases like DynamoDB, Cassandra, and MongoDB.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backing-up-sharded-nosql-databases-restore-it-all-podcast-70/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/886478131</guid><itunes:image href="https://artwork.captivate.fm/315b7941-7d79-4d49-96c5-a544d3cc19cb/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 21 Sep 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/fa78cbff-fc16-4761-80ef-847c6ee9f406/886478131-restoreitall-backing-up-sharded-nosql-databases.mp3" length="46794459" type="audio/mpeg"/><itunes:duration>46:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Tony McGarry, Senior Principal Engineer at Druva, joins W. Curtis Preston and Prasanna Malaiyandi to talk about backing up large, multi-node, sharded NoSQL databases like DynamoDB, Cassandra, and MongoDB.</itunes:summary></item><item><title>What is it like to actually use VMware Cloud on AWS? (AKA VMC)</title><itunes:title>What is it like to actually use VMware Cloud on AWS? (AKA VMC)</itunes:title><description><![CDATA[<p>Adam Fisher (@BonzoVT), Cloud &amp; DevOps Engineer at RoundTower Technologies, visits the podcast to talk about VMware Cloud on AWS (AKA VMC), and what it's like to actually use and administer it in a production environment.  We also talk about how people backup VMC.</p>]]></description><content:encoded><![CDATA[<p>Adam Fisher (@BonzoVT), Cloud &amp; DevOps Engineer at RoundTower Technologies, visits the podcast to talk about VMware Cloud on AWS (AKA VMC), and what it's like to actually use and administer it in a production environment.  We also talk about how people backup VMC.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-is-it-like-to-actually-use-vmware-cloud-on-aws-aka-vmc-restore-it-all-podcast-69/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/883279048</guid><itunes:image href="https://artwork.captivate.fm/99d489d5-10d0-43ca-9b11-9ec4843e2ae8/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 14 Sep 2020 16:05:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/39270857-cac1-4c95-be9c-b24a883296cb/883279048-restoreitall-what-is-it-like-to-actually-use-vmware-c.mp3" length="56813134" type="audio/mpeg"/><itunes:duration>52:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Adam Fisher (@BonzoVT), Cloud &amp; DevOps Engineer at RoundTower Technologies, visits the podcast to talk about VMware Cloud on AWS (AKA VMC), and what it&apos;s like to actually use and administer it in a production environment.  We also talk about how people backup VMC.</itunes:summary></item><item><title>What makes Rust a good, safe programming language?</title><itunes:title>What makes Rust a good, safe programming language?</itunes:title><description><![CDATA[<p>Carol Nichols and Jake Goulding, the authors of the Rust in Motion video series, join us to talk about Rust and why it makes such a "safe" programming language.  We discuss what it means to be a safe programming language and how Rust accomplishes that.</p><p>We also discuss the upcoming free Live@Manning Rust Conference.</p><p><br></p><p>Finding Rustaceans weird but intriguing? Secretly wanting to become one? Tune-in, Sep 15, to the live@Manning #Rust conference to find your #Rustlang pincers! http://mng.bz/qNoA</p><p><br></p><p>Somewhere in the podcast we also give out a 40% discount code for anything at Manning.com.</p>]]></description><content:encoded><![CDATA[<p>Carol Nichols and Jake Goulding, the authors of the Rust in Motion video series, join us to talk about Rust and why it makes such a "safe" programming language.  We discuss what it means to be a safe programming language and how Rust accomplishes that.</p><p>We also discuss the upcoming free Live@Manning Rust Conference.</p><p><br></p><p>Finding Rustaceans weird but intriguing? Secretly wanting to become one? Tune-in, Sep 15, to the live@Manning #Rust conference to find your #Rustlang pincers! http://mng.bz/qNoA</p><p><br></p><p>Somewhere in the podcast we also give out a 40% discount code for anything at Manning.com.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-makes-rust-a-good-safe-programming-language-restore-it-all-podcast-68/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/888036562</guid><itunes:image href="https://artwork.captivate.fm/b4f963c6-abd6-4bd0-91bd-4d4a34fef1af/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Tue, 08 Sep 2020 10:59:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1a208f0d-81ab-4a8a-b83b-49d5dcb218cf/888036562-restoreitall-what-makes-rust-a-good-safe-programming.mp3" length="43482395" type="audio/mpeg"/><itunes:duration>44:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Carol Nichols and Jake Goulding, the authors of the Rust in Motion video series, join us to talk about Rust and why it makes such a &quot;safe&quot; programming language.  We discuss what it means to be a safe programming language and how Rust accomplishes that.

We also discuss the upcoming free Live@Manning Rust Conference.

Finding Rustaceans weird but intriguing? Secretly wanting to become one? Tune-in, Sep 15, to the live@Manning #Rust conference to find your #Rustlang pincers! http://mng.bz/qNoA

Somewhere in the podcast we also give out a 40% discount code for anything at Manning.com.</itunes:summary></item><item><title>Proliferation of the edge, containers, &amp; how to protect them</title><itunes:title>Proliferation of the edge, containers, &amp; how to protect them</itunes:title><description><![CDATA[<p>Gina Rosenthal (@gminks) joins us on this week's podcast to talk about the edge, Kubernetes, and how to protect it all. Good conversation that also includes som Texas Brisket talk!</p><p>We also mention the Women in Tech conference that will go live on October 13.  Here's what they have to say about themselves:</p><p><br></p><p>When the girls get coding!. Join us on your screens, Oct 13, for the live@Manning “Women in Tech” conference to celebrate the rising movement of women in technology. http://mng.bz/7GZm</p><p><br></p><p>We still have a long way to go to achieve diversity, inclusion and equality in technology. Our contribution is the live@Manning “Women in Tech” online conference, Oct 13, starring the women rocking the tech boat! http://mng.bz/7GZm</p><p><br></p><p>Cloud navigators and serverless gurus; algorithm sorceresses and community advocates; we proudly bring you the women creating the tech world we live in. Oct 13, live@manning “Women in Tech” Twitch conference! </p><p><br></p><p>#womenintech #womenwhocode</p>]]></description><content:encoded><![CDATA[<p>Gina Rosenthal (@gminks) joins us on this week's podcast to talk about the edge, Kubernetes, and how to protect it all. Good conversation that also includes som Texas Brisket talk!</p><p>We also mention the Women in Tech conference that will go live on October 13.  Here's what they have to say about themselves:</p><p><br></p><p>When the girls get coding!. Join us on your screens, Oct 13, for the live@Manning “Women in Tech” conference to celebrate the rising movement of women in technology. http://mng.bz/7GZm</p><p><br></p><p>We still have a long way to go to achieve diversity, inclusion and equality in technology. Our contribution is the live@Manning “Women in Tech” online conference, Oct 13, starring the women rocking the tech boat! http://mng.bz/7GZm</p><p><br></p><p>Cloud navigators and serverless gurus; algorithm sorceresses and community advocates; we proudly bring you the women creating the tech world we live in. Oct 13, live@manning “Women in Tech” Twitch conference! </p><p><br></p><p>#womenintech #womenwhocode</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/proliferation-of-the-edge-containers-how-to-protect-them-restore-it-all-podcast-67/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/879818251</guid><itunes:image href="https://artwork.captivate.fm/111150d5-f8a5-4ae9-b469-b0939458d92d/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Tue, 01 Sep 2020 04:48:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/79fa6a27-2752-4279-a9ac-0b4a58d621e8/879818251-restoreitall-proliferation-of-the-edge-containers-how.mp3" length="42944242" type="audio/mpeg"/><itunes:duration>42:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Gina Rosenthal (@gminks) joins us on this week&apos;s podcast to talk about the edge, Kubernetes, and how to protect it all. Good conversation that also includes som Texas Brisket talk!

We also mention the Women in Tech conference that will go live on October 13.  Here&apos;s what they have to say about themselves:

When the girls get coding!. Join us on your screens, Oct 13, for the live@Manning “Women in Tech” conference to celebrate the rising movement of women in technology. http://mng.bz/7GZm

We still have a long way to go to achieve diversity, inclusion and equality in technology. Our contribution is the live@Manning “Women in Tech” online conference, Oct 13, starring the women rocking the tech boat! http://mng.bz/7GZm

Cloud navigators and serverless gurus; algorithm sorceresses and community advocates; we proudly bring you the women creating the tech world we live in. Oct 13, live@manning “Women in Tech” Twitch conference! 

#womenintech #womenwhocode</itunes:summary></item><item><title>9 Tips for Disaster Recovery</title><itunes:title>9 Tips for Disaster Recovery</itunes:title><description><![CDATA[<p>Prasanna and Curtis discuss their opinion of an ITPro article called Nine Tips to Improve your Disaster Recovery Strategy.  In case you're curious, they are:</p><p>1. Have full documentation</p><p>2. Assess the risks</p><p>3. Drill for disaster</p><p>4. Prepare for disasters of different levels</p><p>5. Consider the cloud</p><p>6. Prioritize resilience</p><p>7. Evaluate security practices</p><p>8. Revise and Revisit</p><p>9. Build a critical response team</p>]]></description><content:encoded><![CDATA[<p>Prasanna and Curtis discuss their opinion of an ITPro article called Nine Tips to Improve your Disaster Recovery Strategy.  In case you're curious, they are:</p><p>1. Have full documentation</p><p>2. Assess the risks</p><p>3. Drill for disaster</p><p>4. Prepare for disasters of different levels</p><p>5. Consider the cloud</p><p>6. Prioritize resilience</p><p>7. Evaluate security practices</p><p>8. Revise and Revisit</p><p>9. Build a critical response team</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/9-tips-for-disaster-recovery-restore-it-all-podcast-66/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/876070996</guid><itunes:image href="https://artwork.captivate.fm/5c45a3a5-20d1-4ca6-8150-7969dc713f06/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 24 Aug 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/96cb2b14-4192-44f5-9007-35fbbf802638/876070996-restoreitall-9-tips-for-disaster-recovery.mp3" length="29355684" type="audio/mpeg"/><itunes:duration>27:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Prasanna and Curtis discuss their opinion of an ITPro article called Nine Tips to Improve your Disaster Recovery Strategy.  In case you&apos;re curious, they are:
1. Have full documentation
2. Assess the risks
3. Drill for disaster
4. Prepare for disasters of different levels
5. Consider the cloud
6. Prioritize resilience
7. Evaluate security practices
8. Revise and Revisit
9. Build a critical response team</itunes:summary></item><item><title>What can we learn from the twitter hack</title><itunes:title>What can we learn from the twitter hack</itunes:title><description><![CDATA[<p>Scott Lowe (@otherscottlowe) joins us on the podcast to discuss the recent major hack of Twitter, where hundreds of accounts were compromised using backdoor access gained via a Twitter employee.</p>]]></description><content:encoded><![CDATA[<p>Scott Lowe (@otherscottlowe) joins us on the podcast to discuss the recent major hack of Twitter, where hundreds of accounts were compromised using backdoor access gained via a Twitter employee.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-can-we-learn-from-the-twitter-hack-restore-it-all-podcast-65/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/875561071</guid><itunes:image href="https://artwork.captivate.fm/5fe2d7c0-6511-48ad-81a6-d38e544817c5/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 17 Aug 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/8f7dadd2-b836-409f-af62-0977afb6c8d8/875561071-restoreitall-what-can-we-learn-from-the-twitter-hack.mp3" length="37132362" type="audio/mpeg"/><itunes:duration>37:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Scott Lowe (@otherscottlowe) joins us on the podcast to discuss the recent major hack of Twitter, where hundreds of accounts were compromised using backdoor access gained via a Twitter employee.</itunes:summary></item><item><title>How to backup a NAS filer?</title><itunes:title>How to backup a NAS filer?</itunes:title><description><![CDATA[<p>W. Curtis Preston and Prasanna Malaiyandi discuss the pros and cons of the various ways to backup a NAS filer.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston and Prasanna Malaiyandi discuss the pros and cons of the various ways to backup a NAS filer.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-backup-a-nas-filer-restore-it-all-podcast-64/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/872606209</guid><itunes:image href="https://artwork.captivate.fm/0bcaac73-e6b7-46f4-bebe-84e51f013b8e/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 10 Aug 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/3d037dff-4d73-42cd-bae7-bcfed0ac5300/872606209-restoreitall-how-to-backup-a-nas-filer.mp3" length="28017330" type="audio/mpeg"/><itunes:duration>26:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston and Prasanna Malaiyandi discuss the pros and cons of the various ways to backup a NAS filer.</itunes:summary></item><item><title>One big problem with the Right to be Forgotten and Backups</title><itunes:title>One big problem with the Right to be Forgotten and Backups</itunes:title><description><![CDATA[<p>Curtis and Prasanna discuss the very difficult problem of "forgetting" someone using a backup system that is fundamentally designed to remember.  This is a direct conflict between GDPR/CCPA and backup.</p>]]></description><content:encoded><![CDATA[<p>Curtis and Prasanna discuss the very difficult problem of "forgetting" someone using a backup system that is fundamentally designed to remember.  This is a direct conflict between GDPR/CCPA and backup.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/one-big-problem-with-the-right-to-be-forgotten-and-backups-restore-it-all-podcast-63/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/869491429</guid><itunes:image href="https://artwork.captivate.fm/464a6747-a570-49ab-953f-c93fe2a25485/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 03 Aug 2020 17:14:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/35672f67-5241-4789-bc7f-585b4a5b92ca/869491429-restoreitall-one-big-problem-with-the-right-to-be-for.mp3" length="32472678" type="audio/mpeg"/><itunes:duration>31:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Curtis and Prasanna discuss the very difficult problem of &quot;forgetting&quot; someone using a backup system that is fundamentally designed to remember.  This is a direct conflict between GDPR/CCPA and backup.</itunes:summary></item><item><title>Salesfore Expert explains why backing up SFDC is so important</title><itunes:title>Salesfore Expert explains why backing up SFDC is so important</itunes:title><description><![CDATA[<p>Antone Kom, 7X Certified Salesforce expert, explains to W. Curtis Preston and Prasanna Malaiyandi all the things that can go wrong when you don't backup your Salesforce database.</p>]]></description><content:encoded><![CDATA[<p>Antone Kom, 7X Certified Salesforce expert, explains to W. Curtis Preston and Prasanna Malaiyandi all the things that can go wrong when you don't backup your Salesforce database.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/salesfore-expert-explains-why-backing-up-sfdc-is-so-important-restore-it-all-podcast-62/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/865182214</guid><itunes:image href="https://artwork.captivate.fm/bf0c628d-e5bb-4c60-8cf8-cc84206127ed/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 27 Jul 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/00299438-f8e1-43ed-8586-297e1c1e1290/865182214-restoreitall-salesfore-expert-explains-why-backing-up.mp3" length="57971869" type="audio/mpeg"/><itunes:duration>46:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Antone Kom, 7X Certified Salesforce expert, explains to W. Curtis Preston and Prasanna Malaiyandi all the things that can go wrong when you don&apos;t backup your Salesforce database.</itunes:summary></item><item><title>Are cloud &quot;snapshots&quot; the way to protect cloud resources?</title><itunes:title>Are cloud &quot;snapshots&quot; the way to protect cloud resources?</itunes:title><description><![CDATA[<p>Chris Evans (@chrismevans) discusses with us the idea of cloud "snapshots" (which are actually image copies &amp; very different than array snapshots) and the pros and cons of using them for backup &amp; recovery – as well as other purposes.</p>]]></description><content:encoded><![CDATA[<p>Chris Evans (@chrismevans) discusses with us the idea of cloud "snapshots" (which are actually image copies &amp; very different than array snapshots) and the pros and cons of using them for backup &amp; recovery – as well as other purposes.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/are-cloud-snapshots-the-way-to-protect-cloud-resources-restore-it-all-podcast-61/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/860421634</guid><itunes:image href="https://artwork.captivate.fm/e4b2a016-9974-490b-af53-fb0c3e65d51f/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 20 Jul 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0f631764-c392-4581-abbf-978db2d835eb/860421634-restoreitall-are-cloud-snapshots-the-way-to-protect-c.mp3" length="46070208" type="audio/mpeg"/><itunes:duration>44:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Chris Evans (@chrismevans) discusses with us the idea of cloud &quot;snapshots&quot; (which are actually image copies &amp; very different than array snapshots) and the pros and cons of using them for backup &amp; recovery – as well as other purposes.</itunes:summary></item><item><title>Thoughts on the Cloud from an AWS Customer turned employee</title><itunes:title>Thoughts on the Cloud from an AWS Customer turned employee</itunes:title><description><![CDATA[<p>We are joined by Jake Burns, who is an industry veteran and an AWS and Druva customer before he became an AWS employee.  He is now Enterprise Strategist at AWS and shares with us how LIveNation moved their entire corporate infrastructure to the cloud in one year, and how he now supports AWS customers in their cloud journey.</p>]]></description><content:encoded><![CDATA[<p>We are joined by Jake Burns, who is an industry veteran and an AWS and Druva customer before he became an AWS employee.  He is now Enterprise Strategist at AWS and shares with us how LIveNation moved their entire corporate infrastructure to the cloud in one year, and how he now supports AWS customers in their cloud journey.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/thoughts-on-the-cloud-from-an-aws-customer-turned-employee-restore-it-all-podcast-60/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/855194434</guid><itunes:image href="https://artwork.captivate.fm/a6ac3a51-ad47-498c-8f8a-908032eee4c4/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 13 Jul 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/86ebc469-8a0b-43eb-8a10-ad2abd8a1314/855194434-restoreitall-thoughts-on-cloud-from-an-aws-customer-t.mp3" length="45003908" type="audio/mpeg"/><itunes:duration>44:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We are joined by Jake Burns, who is an industry veteran and an AWS and Druva customer before he became an AWS employee.  He is now Enterprise Strategist at AWS and shares with us how LIveNation moved their entire corporate infrastructure to the cloud in one year, and how he now supports AWS customers in their cloud journey.</itunes:summary></item><item><title>Those that do not remember backup history are condemned to repeat it</title><itunes:title>Those that do not remember backup history are condemned to repeat it</itunes:title><description><![CDATA[<p>On this special US Independence Day edition, we talk a little bit about history in general, and how we all owe those who came before us. Then we morph that discussion into one about backups, and how we must also remember the backup lessons of the past. W. Curtis Preston (@wcpreston) then tells old backup stories.</p>]]></description><content:encoded><![CDATA[<p>On this special US Independence Day edition, we talk a little bit about history in general, and how we all owe those who came before us. Then we morph that discussion into one about backups, and how we must also remember the backup lessons of the past. W. Curtis Preston (@wcpreston) then tells old backup stories.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/those-that-do-not-remember-backup-history-are-condemned-to-repeat-it-restore-it-all-podcast-59/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/853174168</guid><itunes:image href="https://artwork.captivate.fm/c7809435-6e11-41b4-a6d6-1293c605212f/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 06 Jul 2020 17:41:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/489dc408-0eeb-44f5-96ec-7fedff161319/853174168-restoreitall-those-that-do-not-remember-backup-history.mp3" length="47390583" type="audio/mpeg"/><itunes:duration>45:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this special US Independence Day edition, we talk a little bit about history in general, and how we all owe those who came before us. Then we morph that discussion into one about backups, and how we must also remember the backup lessons of the past. W. Curtis Preston (@wcpreston) then tells old backup stories.</itunes:summary></item><item><title>Learning from the Honda Ransomware Attack</title><itunes:title>Learning from the Honda Ransomware Attack</itunes:title><description><![CDATA[<p>Zoë Rose, a cyber investigator from the UK, joins us to talk about the lessons we can learn from the ransomware attack on Honda.  We discuss a number of "common sense" things a company can do to protect their data.</p>]]></description><content:encoded><![CDATA[<p>Zoë Rose, a cyber investigator from the UK, joins us to talk about the lessons we can learn from the ransomware attack on Honda.  We discuss a number of "common sense" things a company can do to protect their data.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/learning-from-the-honda-ransomware-attack-restore-it-all-podcast-58/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/846230455</guid><itunes:image href="https://artwork.captivate.fm/4ee55454-928f-4d57-be54-b21c1911bd16/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 29 Jun 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dec6ea48-b0b6-472d-8f8f-891f29c4c1ed/846230455-restoreitall-learning-from-the-honda-ransomware-attack.mp3" length="57939589" type="audio/mpeg"/><itunes:duration>55:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Zoë Rose, a cyber investigator from the UK, joins us to talk about the lessons we can learn from the ransomware attack on Honda.  We discuss a number of &quot;common sense&quot; things a company can do to protect their data.</itunes:summary></item><item><title>GigaOm Analyst explains their latest report on data management</title><itunes:title>GigaOm Analyst explains their latest report on data management</itunes:title><description><![CDATA[<p>GigagOm analyst Enrico Signoretti (@esignoretti) is our guest this week, and he helps us understand their latest radar report, which evaluates data management vendors.</p>]]></description><content:encoded><![CDATA[<p>GigagOm analyst Enrico Signoretti (@esignoretti) is our guest this week, and he helps us understand their latest radar report, which evaluates data management vendors.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/gigaom-analyst-explains-their-latest-report-on-data-management-restore-it-all-podcast-57/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/843219511</guid><itunes:image href="https://artwork.captivate.fm/5fa9a558-9cfe-4071-adcf-a82d4b126019/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Tue, 23 Jun 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/3b9431b4-33ef-4055-a3e6-37c6ab7f46f8/843219511-restoreitall-gigaom-analyst-explains-their-latest-rep.mp3" length="37690700" type="audio/mpeg"/><itunes:duration>37:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>GigagOm analyst Enrico Signoretti (@esignoretti) is our guest this week, and he helps us understand their latest radar report, which evaluates data management vendors.</itunes:summary></item><item><title>One year anniversary special! With the voice behind our theme song!</title><itunes:title>One year anniversary special! With the voice behind our theme song!</itunes:title><description><![CDATA[<p>On this first anniversary special, we are joined by my daughter, the voice behind our podcast's theme song.  Fun times talking to her, and talking about our dreams for next year's broadcast.</p>]]></description><content:encoded><![CDATA[<p>On this first anniversary special, we are joined by my daughter, the voice behind our podcast's theme song.  Fun times talking to her, and talking about our dreams for next year's broadcast.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/one-year-anniversary-special-restore-it-all-podcast-56/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/840382243</guid><itunes:image href="https://artwork.captivate.fm/7db3f3a4-8630-4060-a21d-2a289bba9cec/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 15 Jun 2020 11:01:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cc397090-3795-4649-a34f-54fa5577209e/840382243-restoreitall-one-year-anniversary-special-with-the-vo.mp3" length="45782807" type="audio/mpeg"/><itunes:duration>45:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>On this first anniversary special, we are joined by Nina Hebert, the voice behind our podcast&apos;s theme song.  Fun times talking to her, and talking about our dreams for next year&apos;s broadcast.</itunes:summary></item><item><title>How Hollywood Picks Backup Products, Part 2</title><itunes:title>How Hollywood Picks Backup Products, Part 2</itunes:title><description><![CDATA[<p>We continue our series of how Hollywood Picks backup products, discussing vendor selection and proofs of concepts.  Jeff Rochlin returns as a guest, hosted by W. Curtis Preston and Prasanna Malaiyandi.</p>]]></description><content:encoded><![CDATA[<p>We continue our series of how Hollywood Picks backup products, discussing vendor selection and proofs of concepts.  Jeff Rochlin returns as a guest, hosted by W. Curtis Preston and Prasanna Malaiyandi.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-hollywood-picks-backup-products-part-2-restore-it-all-podcast-55/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/836141311</guid><itunes:image href="https://artwork.captivate.fm/6ed82731-277e-4a85-a9a4-981d89052803/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 08 Jun 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ed524820-ec93-49fe-9724-0add4aa201f0/836141311-restoreitall-how-hollywood-picks-backup-products-part.mp3" length="47615662" type="audio/mpeg"/><itunes:duration>46:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We continue our series of how Hollywood Picks backup products, discussing vendor selection and proofs of concepts.  Jeff Rochlin returns as a guest, hosted by W. Curtis Preston and Prasanna Malaiyandi.</itunes:summary></item><item><title>How Hollywood Picks Backup Products (Part 1)</title><itunes:title>How Hollywood Picks Backup Products (Part 1)</itunes:title><description><![CDATA[<p>We talk to Jeff Rochlin, a veteran of many Hollywood studios and related businesses, about how he would go about picking a backup product in that environment.  W. Curtis Preston and Prasanna Malaiyandi hosting.</p>]]></description><content:encoded><![CDATA[<p>We talk to Jeff Rochlin, a veteran of many Hollywood studios and related businesses, about how he would go about picking a backup product in that environment.  W. Curtis Preston and Prasanna Malaiyandi hosting.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-hollywood-picks-backup-products-part-1-restore-it-all-podcast-54/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/833613559</guid><itunes:image href="https://artwork.captivate.fm/1bc3e83d-d26e-40d7-87fd-bfd076ff300c/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Wed, 03 Jun 2020 21:52:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/054e50f1-4c7d-4951-b831-8fc686b0a837/833613559-restoreitall-how-hollywood-picks-backup-products-part.mp3" length="41705410" type="audio/mpeg"/><itunes:duration>40:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We talk to Jeff Rochlin, a veteran of many Hollywood studios and related businesses, about how he would go about picking a backup product in that environment.  W. Curtis Preston and Prasanna Malaiyandi hosting.</itunes:summary></item><item><title>Is backup worthless for DR?</title><itunes:title>Is backup worthless for DR?</itunes:title><description><![CDATA[<p>Prasanna Malaiyandi and W. Curtis Preston discuss an article that says that backups are worthless for DR.  Are they?  Some are, some aren't.  Have a listen and see if you agree!</p>]]></description><content:encoded><![CDATA[<p>Prasanna Malaiyandi and W. Curtis Preston discuss an article that says that backups are worthless for DR.  Are they?  Some are, some aren't.  Have a listen and see if you agree!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/is-backup-worthless-for-dr-restore-it-all-podcast-53/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/825418120</guid><itunes:image href="https://artwork.captivate.fm/2b268365-04dd-40bc-89ad-37a07fb4378f/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 25 May 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6d2b83cc-d392-4919-bfea-7e63ec9c2e33/825418120-restoreitall-is-backup-worthless-for-dr.mp3" length="33471299" type="audio/mpeg"/><itunes:duration>31:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Prasanna Malaiyandi and W. Curtis Preston discuss an article that says that backups are worthless for DR.  Are they?  Some are, some aren&apos;t.  Have a listen and see if you agree!</itunes:summary></item><item><title>Are Drive Recovery Services a Good Option?</title><itunes:title>Are Drive Recovery Services a Good Option?</itunes:title><description><![CDATA[<p>If you've ever wondered about whether or not drive recovery services are a good option, then this is the podcast for you.  W. Curtis Preston and Prasanna Malaiyandi discuss whether or not they're a viable alternative to backup.</p>]]></description><content:encoded><![CDATA[<p>If you've ever wondered about whether or not drive recovery services are a good option, then this is the podcast for you.  W. Curtis Preston and Prasanna Malaiyandi discuss whether or not they're a viable alternative to backup.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/are-drive-recovery-services-a-good-option-restore-it-all-52/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/822750280</guid><itunes:image href="https://artwork.captivate.fm/95ab9a72-ddde-4931-8a3c-b429336c6d63/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 18 May 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/09c8d518-47d4-4353-8b95-b26fa7a37ead/822750280-restoreitall-are-drive-recovery-services-a-good-option.mp3" length="26952717" type="audio/mpeg"/><itunes:duration>25:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>If you&apos;ve ever wondered about whether or not drive recovery services are a good option, then this is the podcast for you.  W. Curtis Preston and Prasanna Malaiyandi discuss whether or not they&apos;re a viable alternative to backup.</itunes:summary></item><item><title>What workloads are appropriate to backup to the cloud?</title><itunes:title>What workloads are appropriate to backup to the cloud?</itunes:title><description><![CDATA[<p>Is it appropriate to backup your data to the cloud?  Which workloads work well to be backed up to the cloud?  Even more importantly, which workloads don't backup to the cloud well?  These are the questions we answer in this episode of Restore it All, with W. Curtis Preston and Prasanna Malaiyandi.</p>]]></description><content:encoded><![CDATA[<p>Is it appropriate to backup your data to the cloud?  Which workloads work well to be backed up to the cloud?  Even more importantly, which workloads don't backup to the cloud well?  These are the questions we answer in this episode of Restore it All, with W. Curtis Preston and Prasanna Malaiyandi.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-workloads-are-appropriate-to-backup-to-the-cloud-restore-it-all-podcast-51/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/815141236</guid><itunes:image href="https://artwork.captivate.fm/973eea1f-d667-440f-b29f-e51b7f11fc5f/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 11 May 2020 11:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cba4c643-d2f0-4b31-a43c-354e67a58485/815141236-restoreitall-what-workloads-are-appropriate-to-backup.mp3" length="45002280" type="audio/mpeg"/><itunes:duration>42:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Is it appropriate to backup your data to the cloud?  Which workloads work well to be backed up to the cloud?  Even more importantly, which workloads don&apos;t backup to the cloud well?  These are the questions we answer in this episode of Restore it All, with W. Curtis Preston and Prasanna Malaiyandi.</itunes:summary></item><item><title>Why Egress Charges are a fact of life in the cloud</title><itunes:title>Why Egress Charges are a fact of life in the cloud</itunes:title><description><![CDATA[<p>W. Curtis Preston &amp; Prasanna Malaiyandi discuss the reality of egress charges (AKA data transfer charges) in the cloud, and how they are the digital equivalent of the fees we all used to pay to Iron Mountain.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston &amp; Prasanna Malaiyandi discuss the reality of egress charges (AKA data transfer charges) in the cloud, and how they are the digital equivalent of the fees we all used to pay to Iron Mountain.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/why-egress-charges-are-a-fact-of-life-in-the-cloud-restore-it-all-podcast-50/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/802730206</guid><itunes:image href="https://artwork.captivate.fm/c8f51412-8986-4cfb-87ef-5cf8b0b0cb40/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 04 May 2020 14:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d8339651-0e0d-4c3b-a1e1-8c1800588e8e/802730206-restoreitall-why-egress-charges-are-a-fact-of-life-in.mp3" length="22261436" type="audio/mpeg"/><itunes:duration>21:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston &amp; Prasanna Malaiyandi discuss the reality of egress charges (AKA data transfer charges) in the cloud, and how they are the digital equivalent of the fees we all used to pay to Iron Mountain.</itunes:summary></item><item><title>Backup &amp; DR Lessons from The Tiger King &amp; Westworld</title><itunes:title>Backup &amp; DR Lessons from The Tiger King &amp; Westworld</itunes:title><description><![CDATA[<p>There are backup &amp; disaster recovery lessons to be learned from Netflix's The Tiger King, and HBO's Westworld. The 3-2-1 rule rules!</p>]]></description><content:encoded><![CDATA[<p>There are backup &amp; disaster recovery lessons to be learned from Netflix's The Tiger King, and HBO's Westworld. The 3-2-1 rule rules!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-dr-lessons-from-the-tiger-king-westworld/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/808524145</guid><itunes:image href="https://artwork.captivate.fm/e99b9b5c-94d2-4dd1-b345-c46cca136819/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 27 Apr 2020 21:32:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/66f0d05d-4753-485c-86db-aeb3678061a3/808524145-restoreitall-backup-dr-lessons-from-the-tiger-king-we.mp3" length="29858381" type="audio/mpeg"/><itunes:duration>29:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>There are backup &amp; disaster recovery lessons to be learned from Netflix&apos;s The Tiger King, and HBO&apos;s Westworld. The 3-2-1 rule rules!</itunes:summary></item><item><title>Free IT services offered during Coronavirus lockdown</title><itunes:title>Free IT services offered during Coronavirus lockdown</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss free services that vendors are offering during the Coronavirus lockdown, as well as an interesting discussion about how this might change how we work for the long haul.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss free services that vendors are offering during the Coronavirus lockdown, as well as an interesting discussion about how this might change how we work for the long haul.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/free-it-services-offered-during-coronavirus-lockdown-restore-it-all-podcast-episode-48/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/802728673</guid><itunes:image href="https://artwork.captivate.fm/e487e445-c5b7-49d4-98f6-ec9d1ef80f73/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 20 Apr 2020 15:06:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dfe413a6-9c8a-4597-97af-12ac2910b606/802728673-restoreitall-free-it-services-offered-during-coronovi.mp3" length="47732219" type="audio/mpeg"/><itunes:duration>32:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss free services that vendors are offering during the Coronavirus lockdown, as well as an interesting discussion about how this might change how we work for the long haul.</itunes:summary></item><item><title>Why everyone should be wearing masks right now!</title><itunes:title>Why everyone should be wearing masks right now!</itunes:title><description><![CDATA[<p>Special guest Christopher Kusek ( @cxi )talks about #masks4all, why he was always a fan of the idea, and the current logic behind it now.</p>]]></description><content:encoded><![CDATA[<p>Special guest Christopher Kusek ( @cxi )talks about #masks4all, why he was always a fan of the idea, and the current logic behind it now.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/why-everyone-should-be-wearing-masks-right-now-restore-it-all-podcast-episode-47/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/795644008</guid><itunes:image href="https://artwork.captivate.fm/36fe859c-663c-4114-9129-f62866ca7aea/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Tue, 14 Apr 2020 14:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c14bc25a-7f75-444a-a1fb-d65dac39f6fa/795644008-restoreitall-why-everyone-should-be-wearing-masks-rig.mp3" length="36714199" type="audio/mpeg"/><itunes:duration>36:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Special guest Christopher Kusek ( @cxi )talks about #masks4all, why he was always a fan of the idea, and the current logic behind it now.</itunes:summary></item><item><title>MD &amp; Masters in Public Health Gives Hope for the Future of the Coronavirus/COVID-19</title><itunes:title>MD &amp; Masters in Public Health Gives Hope for the Future of the Coronavirus/COVID-19</itunes:title><description><![CDATA[<p>Lindsey Shultz, MD/MPH (Masters in Public Health) gives us hope for the future in this part of our three-part interview with her.  If you haven't heard parts 1 and 2, please do so.  They focus on defining the problem: what is COVID-19 and why is it so scary.  This episode focuses primarily on hope for the future.</p>]]></description><content:encoded><![CDATA[<p>Lindsey Shultz, MD/MPH (Masters in Public Health) gives us hope for the future in this part of our three-part interview with her.  If you haven't heard parts 1 and 2, please do so.  They focus on defining the problem: what is COVID-19 and why is it so scary.  This episode focuses primarily on hope for the future.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/md-master-in-public-health-gives-hope-for-the-future-of-the-coronavirus-covid-19-restore-it-all-podcast-episode-46/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/792431485</guid><itunes:image href="https://artwork.captivate.fm/85bd6f33-117f-4369-9c69-23eac081bd3a/artworks-jy7o4mbyxxygnsgy-4zcrmw-t3000x3000.jpg"/><pubDate>Mon, 06 Apr 2020 19:47:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/9792d421-8f36-46c3-8459-c8a609becb0f/792431485-restoreitall-md-master-in-public-health-gives-hope-fo.mp3" length="38145855" type="audio/mpeg"/><itunes:duration>37:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lindsey Shultz, MD/MPH (Masters in Public Health) gives us hope for the future in this part of our three-part interview with her.  If you haven&apos;t heard parts 1 and 2, please do so.  They focus on defining the problem: what is COVID-19 and why is it so scary.  This episode focuses primarily on hope for the future.</itunes:summary></item><item><title>Are we over-reacting to Coronavirus/COVID-19? Lindsey Shultz M.D./M.P.H. answers that question!</title><itunes:title>Are we over-reacting to Coronavirus/COVID-19? Lindsey Shultz M.D./M.P.H. answers that question!</itunes:title><description><![CDATA[<p>We continue our three-part interview with Lindsey Shultz, MD/MPH about the Coronavirus.  In this second part, we focus on the reaction to COVID-19, and why it's so much more extreme than our reactions to other diseases of the past.</p>]]></description><content:encoded><![CDATA[<p>We continue our three-part interview with Lindsey Shultz, MD/MPH about the Coronavirus.  In this second part, we focus on the reaction to COVID-19, and why it's so much more extreme than our reactions to other diseases of the past.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/are-we-over-reacting-to-coronavirus-covid-19-lindsey-schultz-m-d-m-p-h-answers-that-question-restore-it-all-podcast-episode-45/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/788588338</guid><itunes:image href="https://artwork.captivate.fm/bad40298-a39f-4378-a653-50e0adb25437/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Wed, 01 Apr 2020 19:13:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/fd0c0631-10c4-4fed-b472-450b1fdee090/788588338-restoreitall-are-we-over-reacting-to-coronaviruscovid.mp3" length="30008245" type="audio/mpeg"/><itunes:duration>28:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We continue our three-part interview with Lindsey Shultz, MD/MPH about the Coronavirus.  In this second part, we focus on the reaction to COVID-19, and why it&apos;s so much more extreme than our reactions to other diseases of the past.</itunes:summary></item><item><title>Doctor &amp; Masters in Public Health answers our Coronavirus and COVID-19 questions</title><itunes:title>Doctor &amp; Masters in Public Health answers our Coronavirus and COVID-19 questions</itunes:title><description><![CDATA[<p>Lindsey Shultz MD/MPH (M.D. and Masters in Public Health) joins us to answer all our Coronavirus/COVID-19 questions.  This is the first in a three-part interview with her, as she was so helpful we talked to her for almost two hours.  You won't want to miss this one!</p>]]></description><content:encoded><![CDATA[<p>Lindsey Shultz MD/MPH (M.D. and Masters in Public Health) joins us to answer all our Coronavirus/COVID-19 questions.  This is the first in a three-part interview with her, as she was so helpful we talked to her for almost two hours.  You won't want to miss this one!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/doctor-masters-in-public-health-answers-our-coronavirus-and-covid-19-questions-restore-it-all-podcast-episode-44/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/786961321</guid><itunes:image href="https://artwork.captivate.fm/2c2ca971-6252-49a6-b6a2-83a3843c7bdf/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 30 Mar 2020 17:34:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/bbef2c13-01e4-482b-8124-5e68914bea97/786961321-restoreitall-doctor-masters-in-public-health-answers.mp3" length="39739431" type="audio/mpeg"/><itunes:duration>38:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lindsey Shultz MD/MPH (M.D. and Masters in Public Health) joins us to answer all our Coronavirus/COVID-19 questions.  This is the first in a three-part interview with her, as she was so helpful we talked to her for almost two hours.  You won&apos;t want to miss this one!</itunes:summary></item><item><title>A View from Italy &amp; its Coronavirus Quarantine</title><itunes:title>A View from Italy &amp; its Coronavirus Quarantine</itunes:title><description><![CDATA[<p>Enrico Signoretti (@esignoretti) joins us from Italy to discuss how the Coronavirus/Covid-19 quarantine is going.  We also get a first-hand report about what it's like for a company that didn't have anyone working remotely to suddenly have hundreds doing so.</p>]]></description><content:encoded><![CDATA[<p>Enrico Signoretti (@esignoretti) joins us from Italy to discuss how the Coronavirus/Covid-19 quarantine is going.  We also get a first-hand report about what it's like for a company that didn't have anyone working remotely to suddenly have hundreds doing so.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/a-view-from-italy-its-coronavirus-quarantine-restore-it-all-podcast-43/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/781817758</guid><itunes:image href="https://artwork.captivate.fm/cdabf452-459f-44f2-b9b4-42808bb64c49/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 23 Mar 2020 20:47:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/36aa9cc3-19c4-4f63-baa7-85da1eef6fe3/781817758-restoreitall-a-view-from-italy-its-coronavirus-quaran.mp3" length="48806103" type="audio/mpeg"/><itunes:duration>49:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Enrico Signoretti (@esignoretti) joins us from Italy to discuss how the Coronavirus/Covid-19 quarantine is going.  We also get a first-hand report about what it&apos;s like for a company that didn&apos;t have anyone working remotely to suddenly have hundreds doing so.</itunes:summary></item><item><title>Coronavirus concerns Part 2</title><itunes:title>Coronavirus concerns Part 2</itunes:title><description><![CDATA[<p>Prasanna Malaiyandi and W. Curtis Preston discuss week 2 of the Coronavirus scare.  We dispense some helpful advice, both technical and non-technical.</p>]]></description><content:encoded><![CDATA[<p>Prasanna Malaiyandi and W. Curtis Preston discuss week 2 of the Coronavirus scare.  We dispense some helpful advice, both technical and non-technical.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/coronavirus-concerns-part-2-restore-it-all-podcast-42/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/777119470</guid><itunes:image href="https://artwork.captivate.fm/925cb229-3cfc-4d8b-abf9-8842f00cef19/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 16 Mar 2020 17:11:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/86d4212f-d295-4c9b-ab69-52d979f63884/777119470-restoreitall-coronavirus-concerns-part-2.mp3" length="37007598" type="audio/mpeg"/><itunes:duration>35:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Prasanna Malaiyandi and W. Curtis Preston discuss week 2 of the Coronavirus scare.  We dispense some helpful advice, both technical and non-technical.</itunes:summary></item><item><title>Coronavirus and your data</title><itunes:title>Coronavirus and your data</itunes:title><description><![CDATA[<p>@wcpreston and @pmalaiyandi discuss Coronavirus and how it's going to affect the IT community, as well as your backup and recovery system.  We discuss remote employees, cloud data protection, and disaster recovery.</p>]]></description><content:encoded><![CDATA[<p>@wcpreston and @pmalaiyandi discuss Coronavirus and how it's going to affect the IT community, as well as your backup and recovery system.  We discuss remote employees, cloud data protection, and disaster recovery.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/coronavirus-and-your-data-restore-it-all-podcast-41/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/773063560</guid><itunes:image href="https://artwork.captivate.fm/629b8a6a-cbe8-498b-819d-7ed3a93bfbd0/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 09 Mar 2020 15:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/83abaeab-1dee-484f-ac37-143bc8da674c/773063560-restoreitall-coronavirus-and-your-data.mp3" length="39032125" type="audio/mpeg"/><itunes:duration>37:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>@wcpreston and @pmalaiyandi discuss Coronavirus and how it&apos;s going to affect the IT community, as well as your backup and recovery system.  We discuss remote employees, cloud data protection, and disaster recovery.</itunes:summary></item><item><title>Brian Biles from Datrium explains how they do HCI &amp; DR</title><itunes:title>Brian Biles from Datrium explains how they do HCI &amp; DR</itunes:title><description><![CDATA[<p>Brian Biles (@BrianBiles), Co-Founder and Chief Product Officer of Datrium, is our special guest. He explains their offerings, with a focus on how they use VMware Cloud on AWS to do DR.</p>]]></description><content:encoded><![CDATA[<p>Brian Biles (@BrianBiles), Co-Founder and Chief Product Officer of Datrium, is our special guest. He explains their offerings, with a focus on how they use VMware Cloud on AWS to do DR.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/brian-biles-from-datrium-explains-how-they-do-hci-dr-restore-it-all-podcast-40/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/767709343</guid><itunes:image href="https://artwork.captivate.fm/3b3a9de1-25cb-4dfe-8921-95b333c81c7a/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 02 Mar 2020 17:16:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1a21f871-a772-4c65-851a-d574c90b0540/767709343-restoreitall-brian-biles-from-datrium-explains-how-th.mp3" length="47785776" type="audio/mpeg"/><itunes:duration>43:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Brian Biles (@BrianBiles), Co-Founder and Chief Product Officer of Datrium, is our special guest. He explains their offerings, with a focus on how they use VMware Cloud on AWS to do DR.</itunes:summary></item><item><title>How to create a backup and DR plan</title><itunes:title>How to create a backup and DR plan</itunes:title><description><![CDATA[<p>W. Curtis Preston &amp; Prasanna Malaiyandi discuss how to create a backup plan, including discovering what can harm your data, gathering requirements, and looking at design options.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston &amp; Prasanna Malaiyandi discuss how to create a backup plan, including discovering what can harm your data, gathering requirements, and looking at design options.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/9how-to-create-a-backup-and-dr-plan-restore-it-all-podcast-39/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/765944149</guid><itunes:image href="https://artwork.captivate.fm/763d4bad-9663-498c-972e-53da124069b2/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 24 Feb 2020 20:04:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6524680e-cc15-4c2e-8cfa-68647b2d8e20/765944149-restoreitall-how-to-create-a-backup-and-dr-plan.mp3" length="31271604" type="audio/mpeg"/><itunes:duration>29:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston &amp; Prasanna Malaiyandi discuss how to create a backup plan, including discovering what can harm your data, gathering requirements, and looking at design options.</itunes:summary></item><item><title>Is there hope in the Kubernetes Backup Space?</title><itunes:title>Is there hope in the Kubernetes Backup Space?</itunes:title><description><![CDATA[<p>Special guest Chris Mellor (@chris_mellor) joins us on the podcast, and he asks some very good questions about the future of backup for Kubernetes, including a discussion about Portworx.</p>]]></description><content:encoded><![CDATA[<p>Special guest Chris Mellor (@chris_mellor) joins us on the podcast, and he asks some very good questions about the future of backup for Kubernetes, including a discussion about Portworx.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/is-there-hope-in-the-kubernetes-backup-space-restore-it-all-podcast-38/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/762314869</guid><itunes:image href="https://artwork.captivate.fm/e6312b21-bd41-4b39-9602-7751ef3434cd/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 17 Feb 2020 20:25:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6f632370-445c-44be-9936-7b2471490c29/762314869-restoreitall-is-their-hope-in-the-kubernetes-backup-s.mp3" length="43698275" type="audio/mpeg"/><itunes:duration>41:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Special guest Chris Mellor (@chris_mellor) joins us on the podcast, and he asks some very good questions about the future of backup for Kubernetes, including a discussion about Portworx.</itunes:summary></item><item><title>Applying Machine Learning to Data Protection</title><itunes:title>Applying Machine Learning to Data Protection</itunes:title><description><![CDATA[<p>Our special guest this week is Preethi Srinivasan, Technical Product Architect at Druva.  We talk about Machine Learning, analytics, and how they relate to Data Protection.</p>]]></description><content:encoded><![CDATA[<p>Our special guest this week is Preethi Srinivasan, Technical Product Architect at Druva.  We talk about Machine Learning, analytics, and how they relate to Data Protection.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/applying-machine-learning-to-data-protection-restore-it-all-podcast-37/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/756976081</guid><itunes:image href="https://artwork.captivate.fm/9f64c1cc-6d30-4e99-abbc-6b857e41e534/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 10 Feb 2020 13:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0c05cdaa-342a-4cc7-9415-b70a246135a6/756976081-restoreitall-applying-machine-learning-to-data-protec.mp3" length="33324012" type="audio/mpeg"/><itunes:duration>35:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Our special guest this week is Preethi Srinivasan, Technical Product Architect at Druva.  We talk about Machine Learning, analytics, and how they relate to Data Protection.</itunes:summary></item><item><title>Salesforce reverses its position on their recovery service</title><itunes:title>Salesforce reverses its position on their recovery service</itunes:title><description><![CDATA[<p>We discuss how Salesforce.com has reversed their position on their "recovery service" that costs $10,000 and takes 6-8 weeks.</p>]]></description><content:encoded><![CDATA[<p>We discuss how Salesforce.com has reversed their position on their "recovery service" that costs $10,000 and takes 6-8 weeks.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/salesforce-reverses-its-position-on-their-recovery-service-restore-it-all-podcast-36/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/754687600</guid><itunes:image href="https://artwork.captivate.fm/52cd71d4-47ba-4266-b9b6-e8432ef9038d/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Tue, 04 Feb 2020 01:56:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/31381f3b-eaad-4360-8b1f-a60a9e65d0a0/754687600-restoreitall-salesforce-reverses-its-position-on-thei.mp3" length="33907207" type="audio/mpeg"/><itunes:duration>32:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We discuss how Salesforce.com has reversed their position on their &quot;recovery service&quot; that costs $10,000 and takes 6-8 weeks.</itunes:summary></item><item><title>Knative Book Author Schools Mr. Backup in Kubernetes &amp; Container backup</title><itunes:title>Knative Book Author Schools Mr. Backup in Kubernetes &amp; Container backup</itunes:title><description><![CDATA[<p>We have a special guest this week!  None other than the author of "Knative in Action," Jacques Chester is joining Prasanna and Curtis to help us understand the interesting world of Kubernetes, Docker, Knative, and how it all relates to backup and storage.</p>]]></description><content:encoded><![CDATA[<p>We have a special guest this week!  None other than the author of "Knative in Action," Jacques Chester is joining Prasanna and Curtis to help us understand the interesting world of Kubernetes, Docker, Knative, and how it all relates to backup and storage.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/knative-book-author-schools-mr-backup-in-kubernetes-container-backup-restore-it-all-podcast-34/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/749528461</guid><itunes:image href="https://artwork.captivate.fm/5b64b42d-fb82-442e-9bb1-e831b948b6ff/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 27 Jan 2020 12:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b5e880d6-2383-4f35-9d38-892d9a16f684/749528461-restoreitall-knative-book-author-schools-mr-backup-in.mp3" length="53056454" type="audio/mpeg"/><itunes:duration>55:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>We have a special guest this week!  None other than the author of &quot;Knative in Action,&quot; Jacques Chester is joining Prasanna and Curtis to help us understand the interesting world of Kubernetes, Docker, Knative, and how it all relates to backup and storage.</itunes:summary></item><item><title>Veeam Acquisition – Part 2</title><itunes:title>Veeam Acquisition – Part 2</itunes:title><description><![CDATA[Due to the popularity of last week's podcast (An investor's perspective on Veem's Acquisiton), Prasanna and I decided to discuss this topic further.  We used the article "The 6 things a private equity firm will do after they buy your business" from inc.com as a reference: https://www.inc.com/jim-schleckser/the-6-things-a-private-equity-firm-will-do-after-they-buy-your-business.html]]></description><content:encoded><![CDATA[Due to the popularity of last week's podcast (An investor's perspective on Veem's Acquisiton), Prasanna and I decided to discuss this topic further.  We used the article "The 6 things a private equity firm will do after they buy your business" from inc.com as a reference: https://www.inc.com/jim-schleckser/the-6-things-a-private-equity-firm-will-do-after-they-buy-your-business.html]]></content:encoded><link><![CDATA[https://soundcloud.com/restoreitall/veeam-acquisition-part-2]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/746807029</guid><itunes:image href="https://artwork.captivate.fm/e16a94c2-729d-4107-8a68-3cdae1763bc1/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Tue, 21 Jan 2020 01:30:55 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a30a3add-94f3-4d6b-b783-1cd32634eb38/746807029-restoreitall-veeam-acquisition-part-2.mp3" length="37578900" type="audio/mpeg"/><itunes:duration>34:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Due to the popularity of last week&apos;s podcast (An investor&apos;s perspective on Veem&apos;s Acquisiton), Prasanna and I decided to discuss this topic further.  We used the article &quot;The 6 things a private equity firm will do after they buy your business&quot; from inc.com as a reference: https://www.inc.com/jim-schleckser/the-6-things-a-private-equity-firm-will-do-after-they-buy-your-business.html</itunes:summary></item><item><title>Veeam acquisition from an investor perspective</title><itunes:title>Veeam acquisition from an investor perspective</itunes:title><description><![CDATA[<p>One of the most successful investors in technology stocks is our special guest this first podcast of the new year!   Matt Feshbach has managed billions in tech stocks, and he lends his brain to answer questions such as:</p><p>- What does it mean that a private equity company just bought Veeam?</p><p>- Why would they do that?</p><p>- What's next?</p><p>It's a great podcast where I learned a lot.  Hope you like it!</p>]]></description><content:encoded><![CDATA[<p>One of the most successful investors in technology stocks is our special guest this first podcast of the new year!   Matt Feshbach has managed billions in tech stocks, and he lends his brain to answer questions such as:</p><p>- What does it mean that a private equity company just bought Veeam?</p><p>- Why would they do that?</p><p>- What's next?</p><p>It's a great podcast where I learned a lot.  Hope you like it!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/veeam-acquisition-from-an-investor-perspective-restore-it-all-podcast-33/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/743017825</guid><itunes:image href="https://artwork.captivate.fm/9f917725-20bd-4b0c-bc3a-65557a3f21fc/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 13 Jan 2020 22:34:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/38649686-c020-4a44-a7cf-30e1e207ba16/743017825-restoreitall-veeam-acquisition-from-an-investor-persp.mp3" length="41505385" type="audio/mpeg"/><itunes:duration>41:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>One of the most successful investors in technology stocks is our special guest this first podcast of the new year!   Matt Feshbach has managed billions in tech stocks, and he lends his brain to answer questions such as:

- What does it mean that a private equity company just bought Veeam?
- Why would they do that?
- What&apos;s next?

It&apos;s a great podcast where I learned a lot.  Hope you like it!</itunes:summary></item><item><title>How to back up IaaS, PaaS &amp; SaaS (i.e. cloud-native services)</title><itunes:title>How to back up IaaS, PaaS &amp; SaaS (i.e. cloud-native services)</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the various ways to back up IaaS, PaaS and SaaS data.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the various ways to back up IaaS, PaaS and SaaS data.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-back-up-iaas-paas-saas-restore-it-all-podcast-32/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/732668347</guid><itunes:image href="https://artwork.captivate.fm/e258dd73-51cd-416e-8fcb-3aed03b245f6/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 23 Dec 2019 14:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/480834f5-9278-4160-8c1c-e7a298be8a37/732668347-restoreitall-how-to-back-up-iaas-paas-saas-ie-cloud-n.mp3" length="21867780" type="audio/mpeg"/><itunes:duration>20:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the various ways to back up IaaS, PaaS and SaaS data.</itunes:summary></item><item><title>AWS Outposts &amp; Zombies</title><itunes:title>AWS Outposts &amp; Zombies</itunes:title><description><![CDATA[<p>W. Curtis Preston &amp; Prasanna Malaiyandi discuss the announcements of re:Invent 2019, and how Curtis fought zombies and lost.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston &amp; Prasanna Malaiyandi discuss the announcements of re:Invent 2019, and how Curtis fought zombies and lost.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/aws-outposts-zombies-restore-it-all-podcast-31/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/728915131</guid><itunes:image href="https://artwork.captivate.fm/acd3fec8-b44d-410a-862c-5f60d793b7a8/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 16 Dec 2019 23:25:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/14051bc6-8ce0-40df-963e-1bd539cdf905/728915131-restoreitall-aws-outposts-zombies.mp3" length="35865143" type="audio/mpeg"/><itunes:duration>33:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston &amp; Prasanna Malaiyandi discuss the announcements of re:Invent 2019, and how Curtis fought zombies and lost.</itunes:summary></item><item><title>How do you backup a container?</title><itunes:title>How do you backup a container?</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Jon Owings, Principal Solutions Architect for Cloud Solutions at Pure Storage (@jon_2vcps), discuss what container backup is, why it's so difficult, and what you need to do to back them up.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Jon Owings, Principal Solutions Architect for Cloud Solutions at Pure Storage (@jon_2vcps), discuss what container backup is, why it's so difficult, and what you need to do to back them up.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-do-you-backup-a-container-restore-it-all-podcast-30/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/723489619</guid><itunes:image href="https://artwork.captivate.fm/7f6d9fd0-6e0c-41e5-a133-f754d1f812f4/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 06 Dec 2019 04:36:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/56f63316-7f4b-4794-8321-f4dda91effc9/723489619-restoreitall-how-do-you-backup-a-container.mp3" length="24757357" type="audio/mpeg"/><itunes:duration>26:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Jon Owings, Principal Solutions Architect for Cloud Solutions at Pure Storage (@jon_2vcps), discuss what container backup is, why it&apos;s so difficult, and what you need to do to back them up.</itunes:summary></item><item><title>Thanksgiving Special</title><itunes:title>Thanksgiving Special</itunes:title><description><![CDATA[<p>In this special Thanksgiving Episode of Restore it All, Prasanna and Curtis talk about the things they're thankful for.  Important stuff, like smart phones, virtualization, and containers.  Yea... we're nerds.</p>]]></description><content:encoded><![CDATA[<p>In this special Thanksgiving Episode of Restore it All, Prasanna and Curtis talk about the things they're thankful for.  Important stuff, like smart phones, virtualization, and containers.  Yea... we're nerds.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/thanksgiving-special-restore-it-all-podcast-29/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/719568544</guid><itunes:image href="https://artwork.captivate.fm/495def62-a7c7-4cc6-94a1-341c23f67581/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Thu, 28 Nov 2019 03:09:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/46a42522-1990-4844-8a72-8c6fad701298/719568544-restoreitall-thanksgiving-special.mp3" length="31947337" type="audio/mpeg"/><itunes:duration>30:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this special Thanksgiving Episode of Restore it All, Prasanna and Curtis talk about the things they&apos;re thankful for.  Important stuff, like smart phones, virtualization, and containers.  Yea... we&apos;re nerds.</itunes:summary></item><item><title>Dispelling lies about AWS snapshots for backups</title><itunes:title>Dispelling lies about AWS snapshots for backups</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss some vendor FUD about using AWS snapshots (which are really image copies and not snapshots) for protecting native AWS resources like EC2, Redshift, S3, and EBS.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss some vendor FUD about using AWS snapshots (which are really image copies and not snapshots) for protecting native AWS resources like EC2, Redshift, S3, and EBS.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/dispelling-lies-about-aws-snapshots-for-backups-restore-it-all-podcast-28/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/716644705</guid><itunes:image href="https://artwork.captivate.fm/be2863ee-8f18-4d3f-9f54-afee7df31f85/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 22 Nov 2019 00:25:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ec8e3499-1f4d-431f-b6fd-62e7943b2af3/716644705-restoreitall-dispelling-lies-about-aws-snapshots-for.mp3" length="25287282" type="audio/mpeg"/><itunes:duration>26:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss some vendor FUD about using AWS snapshots (which are really image copies and not snapshots) for protecting native AWS resources like EC2, Redshift, S3, and EBS.</itunes:summary></item><item><title>Are backup admins obsolete?</title><itunes:title>Are backup admins obsolete?</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss whether or not backup admins are no longer needed.  They also discuss tapas and sangria. :)</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss whether or not backup admins are no longer needed.  They also discuss tapas and sangria. :)</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/are-backup-admins-obsolete-restore-it-all-podcast-27/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/713403040</guid><itunes:image href="https://artwork.captivate.fm/8f19720e-211a-4df4-be46-2e731f5127e0/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 15 Nov 2019 19:59:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/294d0d4d-9d9a-4ecf-8648-a569f6e6715f/713403040-restoreitall-are-backup-admins-obsolete.mp3" length="33979625" type="audio/mpeg"/><itunes:duration>33:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss whether or not backup admins are no longer needed.  They also discuss tapas and sangria. :)</itunes:summary></item><item><title>What to look for in a SaaS data protection solution</title><itunes:title>What to look for in a SaaS data protection solution</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss SaaS backup: what it is, what it isn't, things to look for in a SaaS data protection solution, and how to decide if SaaS data protection is for you.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss SaaS backup: what it is, what it isn't, things to look for in a SaaS data protection solution, and how to decide if SaaS data protection is for you.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-to-look-for-in-a-saas-data-protection-solution-restore-it-all-podcast-26/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/709085791</guid><itunes:image href="https://artwork.captivate.fm/e02d4946-5d0c-4b49-aa0c-e946f022c06b/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Thu, 07 Nov 2019 07:26:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c7dbd9e8-c397-4ad8-864e-90f99784bf77/709085791-restoreitall-what-to-look-for-in-a-saas-data-protecti.mp3" length="45453893" type="audio/mpeg"/><itunes:duration>41:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss SaaS backup: what it is, what it isn&apos;t, things to look for in a SaaS data protection solution, and how to decide if SaaS data protection is for you.</itunes:summary></item><item><title>How Hollywood Does Storage</title><itunes:title>How Hollywood Does Storage</itunes:title><description><![CDATA[<p>Jeff Rochlin, a former actor and Hollywood IT Industry veteran, makes his second appearance on Restore it All. W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi ask him to design a greenfield datacenter.  We also talk about GDPR &amp; CCPA.</p>]]></description><content:encoded><![CDATA[<p>Jeff Rochlin, a former actor and Hollywood IT Industry veteran, makes his second appearance on Restore it All. W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi ask him to design a greenfield datacenter.  We also talk about GDPR &amp; CCPA.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-hollywood-does-storage-restore-it-all-podcast-episode-25/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/706417105</guid><itunes:image href="https://artwork.captivate.fm/b4e7e5a3-2852-4e7b-b0bf-6140d934185c/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 01 Nov 2019 14:32:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/8cd78b4c-3521-477e-9331-22394353a887/706417105-restoreitall-how-hollywood-does-storage.mp3" length="41704615" type="audio/mpeg"/><itunes:duration>40:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Jeff Rochlin, a former actor and Hollywood IT Industry veteran, makes his second appearance on Restore it All. W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi ask him to design a greenfield datacenter.  We also talk about GDPR &amp; CCPA.</itunes:summary></item><item><title>Backing up relational databases</title><itunes:title>Backing up relational databases</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the various ways one can backup a relational database, like Oracle, SQL Server, DB2, MySQL, and PostgreSQL.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the various ways one can backup a relational database, like Oracle, SQL Server, DB2, MySQL, and PostgreSQL.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backing-up-relational-databases-restore-it-all-podcast-episode-24/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/701081653</guid><itunes:image href="https://artwork.captivate.fm/1afe52de-4471-4aa6-914d-01ca3f2f62ef/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Thu, 24 Oct 2019 15:21:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/4457e645-75a9-414a-8b4c-79e132f79cb8/701081653-restoreitall-backing-up-relational-databases.mp3" length="25904307" type="audio/mpeg"/><itunes:duration>24:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the various ways one can backup a relational database, like Oracle, SQL Server, DB2, MySQL, and PostgreSQL.</itunes:summary></item><item><title>Why are vendors offering Backup as a Service?</title><itunes:title>Why are vendors offering Backup as a Service?</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and a mystery guest discuss why it has become so popular for data protection companies to offer their product as a service.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and a mystery guest discuss why it has become so popular for data protection companies to offer their product as a service.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/why-are-vendors-offering-backup-as-a-service-restore-it-all-podcast-episode-23/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/698059273</guid><itunes:image href="https://artwork.captivate.fm/29220d0a-9c4e-4672-b9f0-79a8ad5382fd/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 18 Oct 2019 03:10:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/7ac47452-1afb-434a-931d-2cb317cee1ae/698059273-restoreitall-why-are-vendors-offering-backup-as-a-ser.mp3" length="34222206" type="audio/mpeg"/><itunes:duration>36:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and a mystery guest discuss why it has become so popular for data protection companies to offer their product as a service.</itunes:summary></item><item><title>What do people use instant boot for?</title><itunes:title>What do people use instant boot for?</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi talk about the concept of "Instant boot" what companies use it for, and when (and when) not it might be an appropriate tool.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi talk about the concept of "Instant boot" what companies use it for, and when (and when) not it might be an appropriate tool.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/what-do-people-use-instant-boot-for-restore-it-all-podcast-episode-23/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/694311160</guid><itunes:image href="https://artwork.captivate.fm/0e7c6d0e-94c4-458f-b2f0-7ef0f7490e20/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 11 Oct 2019 16:40:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/10e1b1a2-62ff-4ba4-a77f-7e39124e12ee/694311160-restoreitall-what-do-people-use-instant-boot-for.mp3" length="31540156" type="audio/mpeg"/><itunes:duration>32:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi talk about the concept of &quot;Instant boot&quot; what companies use it for, and when (and when) not it might be an appropriate tool.</itunes:summary></item><item><title>Thoughts on the latest Forrester Wave</title><itunes:title>Thoughts on the latest Forrester Wave</itunes:title><description><![CDATA[<p>Curtis &amp; Prasanna greet their special guests Chris Mellor (Editor, The Register) and Chris Evans (Storage Unpacked Podcast), and talk about The Forrester Wave: Data Resiliency Solutions, Q3 2019.  </p><p>If you want to download the report yourself, you can do so here: https://resources.druva.com/analyst-reports/the-forrester-wave-data-resiliency-solutions-q3-2019</p>]]></description><content:encoded><![CDATA[<p>Curtis &amp; Prasanna greet their special guests Chris Mellor (Editor, The Register) and Chris Evans (Storage Unpacked Podcast), and talk about The Forrester Wave: Data Resiliency Solutions, Q3 2019.  </p><p>If you want to download the report yourself, you can do so here: https://resources.druva.com/analyst-reports/the-forrester-wave-data-resiliency-solutions-q3-2019</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/forrester-wave-restore-it-all-podcast-episode-21/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/690804979</guid><itunes:image href="https://artwork.captivate.fm/3eacc258-aaa9-4a27-9238-c31a8409dfad/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 04 Oct 2019 04:14:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/3b067747-f730-421f-8b21-b4790bdb09e2/690804979-restoreitall-forrester-wave.mp3" length="32408684" type="audio/mpeg"/><itunes:duration>32:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Curtis &amp; Prasanna greet their special guests Chris Mellor (Editor, The Register) and Chris Evans (Storage Unpacked Podcast), and talk about The Forrester Wave: Data Resiliency Solutions, Q3 2019.  

If you want to download the report yourself, you can do so here: https://resources.druva.com/analyst-reports/the-forrester-wave-data-resiliency-solutions-q3-2019</itunes:summary></item><item><title>Did a GDPR court just cripple GDPR?</title><itunes:title>Did a GDPR court just cripple GDPR?</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) interviews Eugenia Buzogly, Senior Director of Legal and Data Protection Officer for Druva about a recent GDPR ruling that some have interpreted to mean they no longer have to comply!  (Here's the ruling: https://regmedia.co.uk/2019/09/24/cp190112en.pdf) Does the ruling actually mean that?</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) interviews Eugenia Buzogly, Senior Director of Legal and Data Protection Officer for Druva about a recent GDPR ruling that some have interpreted to mean they no longer have to comply!  (Here's the ruling: https://regmedia.co.uk/2019/09/24/cp190112en.pdf) Does the ruling actually mean that?</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/did-a-gdpr-court-just-cripple-gdpr-restore-it-all-podcast-episode-20/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/687462706</guid><itunes:image href="https://artwork.captivate.fm/0aa17e00-de8f-40a7-92cf-165b73e9fe11/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 27 Sep 2019 04:07:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b19f7b7f-a390-4991-ab8e-89763adc9a70/687462706-restoreitall-did-a-gdpr-court-just-cripple-gdpr.mp3" length="27593057" type="audio/mpeg"/><itunes:duration>27:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) interviews Eugenia Buzogly, Senior Director of Legal and Data Protection Officer for Druva about a recent GDPR ruling that some have interpreted to mean they no longer have to comply!  (Here&apos;s the ruling: https://regmedia.co.uk/2019/09/24/cp190112en.pdf) Does the ruling actually mean that?</itunes:summary></item><item><title>Backups - Done - Wrong</title><itunes:title>Backups - Done - Wrong</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Rob Worman discuss various backup configuration mistakes they've seen throughout their many years of backup.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Rob Worman discuss various backup configuration mistakes they've seen throughout their many years of backup.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-backups-done-wrong/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/682705226</guid><itunes:image href="https://artwork.captivate.fm/9970b0a4-a4f4-4a5f-ad2d-221fb650773b/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Thu, 19 Sep 2019 06:53:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cfd1af73-57a8-4780-929d-61b7d2a67948/682705226-restoreitall-backups-done-wrong.mp3" length="27826049" type="audio/mpeg"/><itunes:duration>28:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Rob Worman discuss various backup configuration mistakes they&apos;ve seen throughout their many years of backup.</itunes:summary></item><item><title>How To Win On Jeopardy (A &quot;bonus&quot; episode)</title><itunes:title>How To Win On Jeopardy (A &quot;bonus&quot; episode)</itunes:title><description><![CDATA[<p>In this "bonus" episode of Restore it All, I offer a complete departure from our normal podcast content as Rob Worman regales us with stories of what it's like to be a Jeopardy champion, as well as the path he took the get there. Some good advice for anyone thinking about being on the show.</p>]]></description><content:encoded><![CDATA[<p>In this "bonus" episode of Restore it All, I offer a complete departure from our normal podcast content as Rob Worman regales us with stories of what it's like to be a Jeopardy champion, as well as the path he took the get there. Some good advice for anyone thinking about being on the show.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-how-to-win-on-jeopardy/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/682702265</guid><itunes:image href="https://artwork.captivate.fm/5f1d6224-1f1b-4c86-aa42-7ac00dfc380e/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Wed, 18 Sep 2019 04:30:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f0ca6a64-df8b-45af-adac-30883cc78826/682702265-restoreitall-how-to-win-on-jeopardy.mp3" length="21542451" type="audio/mpeg"/><itunes:duration>22:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this &quot;bonus&quot; episode of Restore it All, I offer a complete departure from our normal podcast content as Rob Worman regales us with stories of what it&apos;s like to be a Jeopardy champion, as well as the path he took the get there. Some good advice for anyone thinking about being on the show.</itunes:summary></item><item><title>Make sure you&apos;re not the next ransomware victim!</title><itunes:title>Make sure you&apos;re not the next ransomware victim!</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss two recent huge ransomware attacks. One that affected dozens of cities in Texas, and hundreds of dentists in the US. We discuss things you can do to ensure you don't get attacked, as well as what to do in case you get attacked.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss two recent huge ransomware attacks. One that affected dozens of cities in Texas, and hundreds of dentists in the US. We discuss things you can do to ensure you don't get attacked, as well as what to do in case you get attacked.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-make-sure-youre-not-the-next-ransomware-victim/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/680702468</guid><itunes:image href="https://artwork.captivate.fm/e0e7b564-fcfe-4462-906e-a984fbc8852c/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 13 Sep 2019 19:36:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/066f0944-7ea2-46ea-9b29-3a2f2d7ea529/680702468-restoreitall-make-sure-youre-not-the-next-ransomware.mp3" length="33207862" type="audio/mpeg"/><itunes:duration>32:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss two recent huge ransomware attacks. One that affected dozens of cities in Texas, and hundreds of dentists in the US. We discuss things you can do to ensure you don&apos;t get attacked, as well as what to do in case you get attacked.</itunes:summary></item><item><title>Cloud customers lose data</title><itunes:title>Cloud customers lose data</itunes:title><description><![CDATA[<p>W. Curtis Preston and Prasanna Malaiyandi discuss the AWS outage that happened over Labor Day weekend, where some customers actually lost data.  We also discuss what they could/should have done to prevent that.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston and Prasanna Malaiyandi discuss the AWS outage that happened over Labor Day weekend, where some customers actually lost data.  We also discuss what they could/should have done to prevent that.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-cloud-customers-lose-data/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/676992150</guid><itunes:image href="https://artwork.captivate.fm/671d7bac-0430-4e55-be4d-f41243ea4548/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 06 Sep 2019 01:38:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6086b56c-2af1-4393-8624-aec691740a29/676992150-restoreitall-cloud-customers-lose-data.mp3" length="24614879" type="audio/mpeg"/><itunes:duration>23:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston and Prasanna Malaiyandi discuss the AWS outage that happened over Labor Day weekend, where some customers actually lost data.  We also discuss what they could/should have done to prevent that.</itunes:summary></item><item><title>VMworld and Funny Backup Stories</title><itunes:title>VMworld and Funny Backup Stories</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi talk with Steve Schaub at VMworld 2019 about VMware's announcements, and we also tell funny backup stories.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi talk with Steve Schaub at VMworld 2019 about VMware's announcements, and we also tell funny backup stories.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-vmworld-and-funny-backup-stories/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/672276614</guid><itunes:image href="https://artwork.captivate.fm/45e1a00e-26a2-4e11-9cb1-3bb6a0e68654/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Wed, 28 Aug 2019 17:11:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/73702d08-61dd-4c16-b031-5bfe74295bb4/672276614-restoreitall-vmworld-and-funny-backup-stories.mp3" length="19182194" type="audio/mpeg"/><itunes:duration>19:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi talk with Steve Schaub at VMworld 2019 about VMware&apos;s announcements, and we also tell funny backup stories.</itunes:summary></item><item><title>Challenges with Disaster Recovery</title><itunes:title>Challenges with Disaster Recovery</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various challenges with disaster recovery.  We also have a very special guest star!</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various challenges with disaster recovery.  We also have a very special guest star!</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-challenges-with-disaster-recovery/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/670151477</guid><itunes:image href="https://artwork.captivate.fm/126c0ab2-d74d-44b9-8940-a7a31af335ac/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 23 Aug 2019 21:58:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/7cc045b9-9ea0-4c92-abbb-e9d7c11fcdf8/670151477-restoreitall-challenges-with-disaster-recovery.mp3" length="33578535" type="audio/mpeg"/><itunes:duration>33:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various challenges with disaster recovery.  We also have a very special guest star!</itunes:summary></item><item><title>Beer and Backups and Banks</title><itunes:title>Beer and Backups and Banks</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Ben Patridge talk about the things they learned while working in IT and backups at a bank.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Ben Patridge talk about the things they learned while working in IT and backups at a bank.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/beer-and-backups-and-banks/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/666087233</guid><itunes:image href="https://artwork.captivate.fm/7ccb73c0-780d-4585-a14c-54acdcccb540/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Thu, 15 Aug 2019 10:22:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/85ac6dd8-8e0f-4802-8458-5ff3154f6959/666087233-restoreitall-beer-and-backups-and-banks.mp3" length="25461256" type="audio/mpeg"/><itunes:duration>27:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Ben Patridge talk about the things they learned while working in IT and backups at a bank.</itunes:summary></item><item><title>Beer and Backups, Part 1</title><itunes:title>Beer and Backups, Part 1</itunes:title><description><![CDATA[<p>Special guest on the podcast this week, Ben Patridge (Portland beer Ben), and W. Curtis Preston (Mr. Backup) discuss horror stories and other things gone wrong with backups, while drinking a couple of Trappist beers from Belgium.</p>]]></description><content:encoded><![CDATA[<p>Special guest on the podcast this week, Ben Patridge (Portland beer Ben), and W. Curtis Preston (Mr. Backup) discuss horror stories and other things gone wrong with backups, while drinking a couple of Trappist beers from Belgium.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-beer-and-backups-part-1/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/664540772</guid><itunes:image href="https://artwork.captivate.fm/d42d11e8-c794-41ef-b9f9-0ac3db02ee8e/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Mon, 12 Aug 2019 03:54:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e6a3eb10-a11d-45ba-8a2e-1bb928a66dbd/664540772-restoreitall-beer-and-backups-part-1.mp3" length="22866003" type="audio/mpeg"/><itunes:duration>24:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Special guest on the podcast this week, Ben Patridge (Portland beer Ben), and W. Curtis Preston (Mr. Backup) discuss horror stories and other things gone wrong with backups, while drinking a couple of Trappist beers from Belgium.</itunes:summary></item><item><title>Tape is not dead</title><itunes:title>Tape is not dead</itunes:title><description><![CDATA[<p>After covering in the last episode why tape isn't really good for backup anymore, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the continued uses for tape. It's not dead -- even growing.</p>]]></description><content:encoded><![CDATA[<p>After covering in the last episode why tape isn't really good for backup anymore, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the continued uses for tape. It's not dead -- even growing.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/restore-it-all-podcast-episode-tape-is-not-dead/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/659373317</guid><itunes:image href="https://artwork.captivate.fm/97f425cc-4023-4df7-a18b-dde4a0869897/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Thu, 01 Aug 2019 03:31:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/3f58b4b2-6426-4c6e-bb95-b9e29b957686/659373317-restoreitall-tape-is-not-dead.mp3" length="20403329" type="audio/mpeg"/><itunes:duration>18:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>After covering in the last episode why tape isn&apos;t really good for backup anymore, W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss the continued uses for tape. It&apos;s not dead -- even growing.</itunes:summary></item><item><title>Why tape and backup became enemies</title><itunes:title>Why tape and backup became enemies</itunes:title><description><![CDATA[<p>W. Curtis Preston (AKA Mr. Backup) explains to Prasanna Malaiyandi the early days of tape, and what happened to make backup and tape to become bad for each other.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (AKA Mr. Backup) explains to Prasanna Malaiyandi the early days of tape, and what happened to make backup and tape to become bad for each other.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/restore-it-all-podcast-episode-why-tape-and-backup-became-enemies/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/655924502</guid><itunes:image href="https://artwork.captivate.fm/c7446722-14b8-4a4b-a628-588995bd5ed9/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Wed, 24 Jul 2019 22:08:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/06b82d34-3d86-4669-8727-d699d5fa788b/655924502-restoreitall-why-tape-and-backup-became-enemies.mp3" length="29880095" type="audio/mpeg"/><itunes:duration>30:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (AKA Mr. Backup) explains to Prasanna Malaiyandi the early days of tape, and what happened to make backup and tape to become bad for each other.</itunes:summary></item><item><title>How Hollywood does backup</title><itunes:title>How Hollywood does backup</itunes:title><description><![CDATA[<p>Today we have a special guest on Restore it All, and it's none other than Jeff Rochlin, an industry veteran and long-time friend.  He's going to be giving us the inside scoop about how they do storage and backups in Hollywood, where he has worked for over 40 years.  He started out as an actor, and has run IT for the likes of Disney, Dreamworks, and is now head of IT at Fandango and Rotten Tomatoes.  This episode is a little longer than most, but it's full of good stuff.  I hope you enjoy it.</p>]]></description><content:encoded><![CDATA[<p>Today we have a special guest on Restore it All, and it's none other than Jeff Rochlin, an industry veteran and long-time friend.  He's going to be giving us the inside scoop about how they do storage and backups in Hollywood, where he has worked for over 40 years.  He started out as an actor, and has run IT for the likes of Disney, Dreamworks, and is now head of IT at Fandango and Rotten Tomatoes.  This episode is a little longer than most, but it's full of good stuff.  I hope you enjoy it.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-how-hollywood-does-backup/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/652790447</guid><itunes:image href="https://artwork.captivate.fm/08f4dc9f-9325-4152-95c7-422ccfe36140/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Thu, 18 Jul 2019 04:17:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/ea69b16b-f079-425f-b876-010c3e0bd266/652790447-restoreitall-how-hollywood-does-backup.mp3" length="32330478" type="audio/mpeg"/><itunes:duration>39:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Today we have a special guest on Restore it All, and it&apos;s none other than Jeff Rochlin, an industry veteran and long-time friend.  He&apos;s going to be giving us the inside scoop about how they do storage and backups in Hollywood, where he has worked for over 40 years.  He started out as an actor, and has run IT for the likes of Disney, Dreamworks, and is now head of IT at Fandango and Rotten Tomatoes.  This episode is a little longer than most, but it&apos;s full of good stuff.  I hope you enjoy it.</itunes:summary></item><item><title>Microsoft disabled the registry backup</title><itunes:title>Microsoft disabled the registry backup</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi are joined by a guest, Matt Leib, and they discuss how Microsoft disabled the registry backup in Windows 10 and told no one.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi are joined by a guest, Matt Leib, and they discuss how Microsoft disabled the registry backup in Windows 10 and told no one.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-microsoft-disabled-the-registry-backup/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/649457513</guid><itunes:image href="https://artwork.captivate.fm/3219f95d-4239-43ee-be6b-12138d8c75d2/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Thu, 11 Jul 2019 14:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/860153b3-bb66-4a8d-b6e4-508ccf1cff64/649457513-restoreitall-microsoft-disabled-the-registry-backup.mp3" length="25448582" type="audio/mpeg"/><itunes:duration>27:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi are joined by a guest, Matt Leib, and they discuss how Microsoft disabled the registry backup in Windows 10 and told no one.</itunes:summary></item><item><title>The Wifi is Down</title><itunes:title>The Wifi is Down</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malayaindi interview an IT director from a tech company in the bay area. (Company and full name withheld for privacy reasons.) . We discuss what it's like to be an IT and security manager in today's world.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malayaindi interview an IT director from a tech company in the bay area. (Company and full name withheld for privacy reasons.) . We discuss what it's like to be an IT and security manager in today's world.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/backup-centrals-restore-it-all-podcast-the-wifi-is-down/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/645456354</guid><itunes:image href="https://artwork.captivate.fm/bec87b01-129d-4415-8ce6-e637fa106725/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Fri, 05 Jul 2019 17:53:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/4c522e55-051a-4dce-882c-7285db720242/645456354-restoreitall-the-wifi-is-down.mp3" length="29210432" type="audio/mpeg"/><itunes:duration>27:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malayaindi interview an IT director from a tech company in the bay area. (Company and full name withheld for privacy reasons.) . We discuss what it&apos;s like to be an IT and security manager in today&apos;s world.</itunes:summary></item><item><title>How to use the cloud for backup</title><itunes:title>How to use the cloud for backup</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss different ways of using the cloud for backup</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss different ways of using the cloud for backup</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/how-to-use-the-cloud-for-backup/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/640398291</guid><itunes:image href="https://artwork.captivate.fm/bf3acea6-89ed-42f9-8a9b-2e08574e767e/artworks-000555925329-3vb7xk-t3000x3000.jpg"/><pubDate>Sat, 29 Jun 2019 05:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1d47064b-8517-42df-b2cc-ea5c592a285b/640398291-restoreitall-how-to-use-the-cloud-for-backup.mp3" length="25414555" type="audio/mpeg"/><itunes:duration>23:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss different ways of using the cloud for backup</itunes:summary></item><item><title>Why Backup SaaS Services</title><itunes:title>Why Backup SaaS Services</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss why it's important to backup SaaS services such as Office 365, G Suite, and Salesforce</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss why it's important to backup SaaS services such as Office 365, G Suite, and Salesforce</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/restore-it-all-podcast-why-backup-saas-services/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/640397808</guid><itunes:image href="https://artwork.captivate.fm/3ba868d9-5233-4eaa-b7bf-39e0ae3861f8/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Sat, 22 Jun 2019 05:10:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5695c266-794c-47d1-9331-e4c8a4deb857/640397808-restoreitall-why-backup-saas-services.mp3" length="23902021" type="audio/mpeg"/><itunes:duration>21:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss why it&apos;s important to backup SaaS services such as Office 365, G Suite, and Salesforce</itunes:summary></item><item><title>Disaster Recovery</title><itunes:title>Disaster Recovery</itunes:title><description><![CDATA[W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various ways people perform disaster recovery]]></description><content:encoded><![CDATA[W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various ways people perform disaster recovery]]></content:encoded><link><![CDATA[https://soundcloud.com/restoreitall/disaster-recovery]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/640397013</guid><itunes:image href="https://artwork.captivate.fm/fbdda9a5-5507-4ae3-86cc-6802537826b4/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Sat, 22 Jun 2019 05:07:18 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/79c8045b-9f69-4495-8b90-f5e2cc6fdada/640397013-restoreitall-disaster-recovery.mp3" length="20676146" type="audio/mpeg"/><itunes:duration>18:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various ways people perform disaster recovery</itunes:summary></item><item><title>Protecting from Ransomware</title><itunes:title>Protecting from Ransomware</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malayaindi discuss how to protect yourself from ransomware, and how to recover from if it happens.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malayaindi discuss how to protect yourself from ransomware, and how to recover from if it happens.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/restore-it-all-podcast-protecting-from-ransomware/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/640396563</guid><itunes:image href="https://artwork.captivate.fm/6341640c-142c-44f8-910b-c516c3b3aa9f/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Sat, 22 Jun 2019 05:05:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cac1db1f-d834-49ec-a48f-81da1628b682/640396563-restoreitall-protecting-from-ransomware.mp3" length="22539169" type="audio/mpeg"/><itunes:duration>20:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malayaindi discuss how to protect yourself from ransomware, and how to recover from if it happens.</itunes:summary></item><item><title>That&apos;s not Backup</title><itunes:title>That&apos;s not Backup</itunes:title><description><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various things people say are backup, which actually aren't backup.</p>]]></description><content:encoded><![CDATA[<p>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various things people say are backup, which actually aren't backup.</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/restore-it-all-podcast-thats-not-backup/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/640395507</guid><itunes:image href="https://artwork.captivate.fm/e7a3abd7-e7dc-4739-a1f7-a63ffcf2b596/avatars-78gfswjfvbosxkzw-hofjmg-original.jpg"/><pubDate>Sat, 22 Jun 2019 05:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a3f3dbf3-b9cb-40ed-8683-9db446f9980e/640395507-restoreitall-thats-not-backup.mp3" length="25877650" type="audio/mpeg"/><itunes:duration>23:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>W. Curtis Preston (Mr. Backup) and Prasanna Malaiyandi discuss various things people say are backup, which actually aren&apos;t backup.</itunes:summary></item><item><title>The Anniversary of GDPR</title><itunes:title>The Anniversary of GDPR</itunes:title><description><![CDATA[<p>In our premiere episode of Backup Central's Restore it All Podcast, W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss the one year anniversary of GDPR</p>]]></description><content:encoded><![CDATA[<p>In our premiere episode of Backup Central's Restore it All Podcast, W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss the one year anniversary of GDPR</p>]]></content:encoded><link><![CDATA[https://www.backupcentral.com/restore-it-all-podcast-the-anniversary-of-gdpr/]]></link><guid isPermaLink="false">tag:soundcloud,2010:tracks/640385073</guid><itunes:image href="https://artwork.captivate.fm/e219f54c-2e23-494e-a1f6-2831aa9582d2/artworks-000555917916-nofcao-t3000x3000.jpg"/><pubDate>Sat, 22 Jun 2019 04:15:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/439dc65c-e98f-4256-8f8b-177357bdcfa4/640385073-restoreitall-the-anniversary-of-gdpr.mp3" length="25247836" type="audio/mpeg"/><itunes:duration>26:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In our premiere episode of Backup Central&apos;s Restore it All Podcast, W. Curtis Preston (Mr. Backup) &amp; Prasanna Malaiyandi discuss the one year anniversary of GDPR</itunes:summary></item></channel></rss>