Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
W Curtis Preston Mr Backup Podcasts

1
Deepfake Attacks: The Growing Threat to Enterprise Security
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24Deepfake attacks are exploding, and your company is probably not ready. In this episode of The Backup Wrap-up, we dive into how cybercriminals are using AI to clone voices and create fake videos to authorize fraudulent wire transfers and reset credentials. With nearly 50% of businesses already experiencing deepfake attacks, this isn't a future prob…
…
continue reading

1
Cyber Attack Notification - Final Lessons from Mr. Robot Season One
48:04
48:04
Play later
Play later
Lists
Like
Liked
48:04When cyber attack notification goes wrong, companies face a disaster worse than the original breach. This episode dives deep into the critical mistakes organizations make when communicating about security incidents - and why transparency beats secrecy every time. We examine real-world failures like LastPass and Rackspace, where poor communication s…
…
continue reading

1
Insider Threats and the Power of Least Privilege Access
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41Insider threats represent one of the most dangerous cybersecurity risks facing organizations today - and they're way more common than you think. In this episode of The Backup Wrap-up, we explore the three main types of insider threats: compromised employees who get extorted or have their credentials stolen, disgruntled workers who want revenge afte…
…
continue reading

1
Advanced Persistent Threats Explained Through Mr. Robot
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33Advanced persistent threats represent one of the most dangerous cyber security challenges facing organizations today. These long-term, stealthy attacks allow hackers to maintain undetected access to networks for extended periods. In this episode, we analyze multiple APT scenarios from Mr. Robot, including the Evil Corp hack, Ollie's compromised lap…
…
continue reading

1
Cybersecurity Situational Awareness Lessons from Mr. Robot
41:48
41:48
Play later
Play later
Lists
Like
Liked
41:48This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hacking, and social engineering tactics. The hosts discuss real-world defenses including USB port management, network segmentatio…
…
continue reading

1
Honeypot Server Best Practices - From Mr. Robot to Reality
40:34
40:34
Play later
Play later
Lists
Like
Liked
40:34Learn the ins and outs of honeypot server deployment and management in this episode of The Backup Wrap-up. We break down the cybersecurity concept using examples from Mr. Robot episodes 1.6 and 1.7, showing how these deceptive systems can catch both external attackers and insider threats. A honeypot server works by creating an enticing target that …
…
continue reading

1
Privilege Escalation Explained: Mr. Robot Cybersecurity Lessons
47:01
47:01
Play later
Play later
Lists
Like
Liked
47:01Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileges and compromise entire networks. Through examples from Mr. Robot, we explore both vertical privilege escalation (exploiting…
…
continue reading

1
Mr Robot Lessons: Cybersecurity in the Workplace
43:56
43:56
Play later
Play later
Lists
Like
Liked
43:56This episode examines cybersecurity in the workplace through the lens of Mr. Robot's "Exploits" episode, where social engineering takes center stage. Curtis Preston and Prasanna break down how Elliot infiltrates Steel Mountain data center using badge cloning, psychological manipulation, and fake identities. The hosts analyze real-world implications…
…
continue reading

1
Social Engineering Attacks: Lessons from Mr. Robot Episode 3
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social enginee…
…
continue reading

1
Reconnaissance in Cyber Security: Lessons from Mr. Robot ep 1.1
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23Reconnaissance in cyber security isn't just about scanning networks; it's about understanding your entire attack surface, including the human element. In this episode, Curtis and Prasanna analyze Mr. Robot season one, episode two, (AKA ep 1.1) to explore how sophisticated threat actors conduct reconnaissance before major attacks. Learn how F Societ…
…
continue reading

1
Social Engineering Lessons from Mr. Robot Episode 1
45:15
45:15
Play later
Play later
Lists
Like
Liked
45:15Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercriminals to manipulate victims into revealing sensitive information. This episode covers social engineering phone scams targetin…
…
continue reading

1
Insider Threat Prevention: Protecting Your Backups from Within
39:29
39:29
Play later
Play later
Lists
Like
Liked
39:29The insider threat represents one of the most dangerous and overlooked cybersecurity challenges facing organizations today. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna explore the three distinct types of insider threats that can devastate your organization from within. From malicious employees seeking revenge to careless w…
…
continue reading

1
Mission Impossible Movie Teaches Real Cyber Security Lessons
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45This episode explores surprising cyber security lessons hidden within Mission: Impossible's latest blockbuster. We analyze how Hollywood's depiction of AI threats, immutable backups, and air-gapped storage actually reflects real-world data protection challenges. Curtis and Prasanna dissect the movie's central premise: an AI entity altering digital …
…
continue reading

1
The EU Cloud Exit - Backup Strategies for Digital Sovereignty
37:22
37:22
Play later
Play later
Lists
Like
Liked
37:22The EU cloud exit movement is reshaping how European organizations think about data storage and sovereignty. Companies across Europe are moving away from US-based cloud providers like Microsoft 365, AWS, and Google Workspace due to concerns about the Cloud Act and data privacy regulations. In this episode, Curtis and Prasanna explore the backup imp…
…
continue reading

1
What Is an Air Gap Backup? Real Protection vs Marketing
33:32
33:32
Play later
Play later
Lists
Like
Liked
33:32Air gap has become one of the most overused and misunderstood terms in backup and recovery. In this episode, W. Curtis Preston and Prasanna explore what air gap really means, tracing its origins from the days when everyone used tape storage to modern virtual implementations. They discuss how true air gap required physical separation - tapes stored …
…
continue reading

1
Largest Data Breach in History: What You Need to Know
49:10
49:10
Play later
Play later
Lists
Like
Liked
49:10The largest data breach in recent memory has exposed 16 billion login credentials across multiple databases, and we're here to help you understand what it means for your security. This massive exposure involves data stolen primarily through infostealer malware rather than a single company breach. Join W. Curtis Preston, Dr. Mike Saylor, and Prasann…
…
continue reading
This episode breaks down snapshot backup fundamentals, covering the key differences between traditional storage snapshots and cloud-based approaches. Curtis and Prasanna explain copy-on-write versus redirect-on-write methods, performance implications, and why some snapshot systems can degrade performance by up to 50%. Learn about NetApp's redirect-…
…
continue reading
Human error has replaced hardware failures as the primary driver of data loss and restore operations in modern IT environments. This episode explores real-world examples of how both end users and administrators create the need for backup and recovery operations through accidental deletions, configuration mistakes, and poor processes. W. Curtis Pres…
…
continue reading
Learn how to extract measurable ROI from your backups beyond traditional disaster recovery. Curtis and Prasanna explore proven strategies for extracting business value from backup infrastructure through test and development environments, security monitoring, compliance checking, and AI-powered analytics. Discover why the shift from tape to disk sto…
…
continue reading

1
World Backup Day: Take the Pledge to Protect Your Data
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48World Backup Day falls on March 31st - the day before April Fool's Day because not backing up your data is no joke. In this episode, hosts W. Curtis Preston and Prasanna Malaiyandi discuss alarming statistics about data loss and why proper backup strategies are essential for business survival. The hosts break down the famous 3-2-1 backup rule and h…
…
continue reading

1
Ransomware Targets VMware ESXi: Melissa Palmer Explains the Threat
52:15
52:15
Play later
Play later
Lists
Like
Liked
52:15You've found The Backup Wrap-up, your go-to podcast for all things backup, recovery, and cyber-recovery. In this episode, we tackle one of the scariest threats out there - ransomware targeting VMware ESXi environments. I'm joined by Prasanna Malaiyandi and our special guest Melissa Palmer, also known as @vmiss, who's an independent technology analy…
…
continue reading

1
Breaking Down the VeeamOn Announcements for Backup Admins
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49In this episode of The Backup Wrap-up, W. Curtis Preston breaks down the key VeeamON announcements from the VeeamON 2025 conference in San Diego. He highlights Veeam's focus on security and ransomware defense, including their new CrowdStrike integration and data resilience maturity model developed with McKinsey and MIT. Curtis shares his excitement…
…
continue reading

1
DOGE and GSA Claim $1M Savings by Ditching Old Tape Tech
46:41
46:41
Play later
Play later
Lists
Like
Liked
46:41DOGE and GSA recently made headlines with a tweet claiming $1 million annual savings by converting 14,000 magnetic tapes to "permanent modern digital records." In this episode, W. Curtis Preston and Prasanna Malaiyandi analyze whether this claim is possible – although they cannot actually validate it due to lack of information. They discuss that DO…
…
continue reading

1
Why Tape Backup for Small Business Makes Sense Against Ransomware
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28Tape backup for small business might sound like old tech, but Mag Store's new Thunderbolt-compatible tape drive could change that perception. In this episode, we discuss how this new offering potentially opens tape technology to a wider market of SMBs and content creators looking for ransomware protection and cost-effective long-term storage. Curti…
…
continue reading

1
How Forever Incremental Backup Changed the World
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10In this episode of The Backup Wrap-Up, Curtis and Prasanna explore how forever incremental backup technology revolutionized the data protection industry. They discuss the evolution from traditional backup methods to modern approaches that eliminate the need for regular full backups, dramatically reducing network traffic, storage requirements, and b…
…
continue reading