Latest episodes

How do you authenticate with all new hardware?

Imagine you’re a small business or household that just lost everything in a fire, and your phones, ipads, and laptops went up in flames too. Where do you start? You’ve got a cloud-based password manager (e.g. Dashlane, OnePassword, KeyPass) and MFA system (e.g. Google Authenticator, Authy). How do you authenticate yourself with these systems if you have all new hardware? That’s...

You could lose access to iCloud account data forever!

There was a shocking article by Joanna Stern of the Wall Street Journal about how you are a simple bar trick away from losing access to all your photos (and some money) forever. All they need to do is steal your iPhone after seeing you type in your passcode, and they can lock you out of your account forever. 1. This is why we back up stuff and 2. There is a way to stop this. I’m not yet...

How to back up and recover a database (Backup to Basics series)

Have we got a packed episode for you.  This week we dive deep into the various options for backing up and recovering databases, along with the pros and cons of each.  Want to figure out the best way to back up your traditional or modern database? This is your episode.  As usual, Mr. Backup and Prasanna also manage to make it fun. This is a great episode and we think you’ll enjoy it.  ...

Flash expert schools Mr. Backup

A few weeks ago, Mr. Backup (W. Curtis Preston) said he didn’t understand why people used flash for backups. He said it was overkill. A few days later, Howard Marks of Vast (friend of the pod) took issue with that statement, and asked for the chance to defend Vast’s title, so to speak. Howard is a friend of the pod and we were happy to say yes. We also take the opportunity to get an...

What are SIEM, SOAR, EDR, XDR?

Are you doing all you can to stop ransomware attacks before they happen, or kill them the moment they show up? Have you looked into this and found yourself swimming in alphabet soup (SIEM, SOAR, EDR, XDR)? Have you looked at some of these tools and found them to be prohibitively expensive or too complex? This is the episode for you. We have Dez Rock, CEO of SIEMonster, a SIEM/SOAR/XDR as a...

What can you learn from the LastPass hack?

Last year LastPass suffered two hacks that left their customer’s data exposed.  What can you learn from this event, even if you’re not a LastPass customer?  We use this hack as an example of what your company should do (or not do) if it ever suffers such a hack.  We also talk about password managers, and what this hack means to those who use them.  You do use one, right?  This is a...

Backing up databases, Part 1 (Backup to basics)

It was a dark and stormy night in 1993 when paris (the database server) went down. It would be a night the new backup admin would never forget because he couldn’t restore the database from backup. The only bright side of that very sad story is that it launched a career. Yes, that’s the night W. Curtis Preston started his path toward Mr. Backup. Hear him tell the story in his own...

What computers should you back up? (Backup to Basics Series)

Are you backing up all the things you should be backing up? In this latest episode of our Backup to Basics series, Mr. Backup & Prasanna look at the list of the traditional things we think about backing up: servers, databases, laptops, mobile devices, file servers, virtualization servers, etc. The big question tackled in this episode is what of these things should you be backing up? Mr...

Can you apply least privilege to private data?

You know how we tell you to limit the amount of privilege each admin gets, in order to limit the blast radius if their account is compromised? What if you could apply that concept to applications that use private data to accomplish their task? We blindly give everything we have on each person to just about any app that needs anything. But if you had an app that only needs first name and email...

Six vulnerabilities your password manager might have

I was shocked to learn that my favorite password manager had a few known vulnerabilities, and you might be shocked too! We found this great research paper from the University of York, and invited one of the co-authors on to discuss it. Siamek Shahandasthi, an Associate Professor from the University of York, explained all the vulnerabilities discussed in the paper, and why each is important. I was...

Subscribe and follow: