Latest episodes

Divining Requirements out of the Organization

This episode follows the previous one in a very interesting way. We have a guest, Eric Bursley, whose job is to divine business and technical requirements from a vendor perspective. He consults with customers and helps them get from “I want” to “I need.” This was a fascinating conversation that took a turn into (surprise) ransomware. Eric is a fan of the pod and knows his...

Getting approval for a new backup design (Backup to Basics Series)

We say it all the time: your backup requirements must be based on business/organizational needs. If you keep that in mind, not only will your organization be better off, it’ll be easier to get approval for the new backup system you want. This episode of our Backup to Basics series goes right to that core idea, and we get advice directly from one of our favorite guests: Jeff Rochlin. He is...

When to use public or private cloud AND how to protect it

If you have sometimes wondered if your apps should be in a public cloud, private cloud, or in your own datacenter, have we got the episode for you. And we’ll also talk about how to protect those apps regardless of where they reside. We looked hard for an unbiased cloud expert, and I think we hit gold. We found Sagi Brody, the CTO of Opti9, an MSP that supports both public and private...

Why do we even back up? (Backup to Basics)

We get right to the heart of the matter in this next episode of our Backup to Basics series. (See what we did there?). Why do we even back up? It is expensive, time consuming, and no one seems to want to be in charge of it, so we do we even do it anyway. This episode is based on Chapter 1 of W. Curtis Preston’s latest O’Reilly book, Modern Data Protection, which you can download for...

International lawyer discusses e-discovery in US & other countries

This week are we pleased to announce we have Joe Dehner, specialist in International Law, to discuss the legal side of e-discovery and all the things that go with it. For the first time on Restore it All, we have a lawyer discussing legal things! (Usually we just tell you we’re not lawyers!) My favorite part was listening to him tell stories from actual cases that make the various points we...

Your cyber insurance doesn’t want to pay for your hack

This is a trend that’s happening around the globe, and the news we got from Lloyd’s of London Insurance in August is just the latest example. They’re looking to exclude payments for “catastropic” and “state-sponsored” attacks. We talk about what that means. We also discuss how a plaintiff lost a recent lawsuit against their insurance company, getting...

Learning lessons from the Uber and LA USD cyberattacks

The Uber attack is huge. The initial penetration teaches about MFA, and how they were able to escalate their privileges from there is simply wrong, wrong, wrong. What can you learn from this? Well, we have a cybersecurity expert, and host of the Tech and Main podcast, on the pod this week to help us figure that out. We had planned to just talk about the Uber attack, but he also wanted to talk...

Top 5 security mistakes you’re making in the cloud

Cyber security attacks are everywhere, and they’re definitely going after what you have running in your favorite hyperscaler. Today we are joined by Paul Hadgy, CEO of Horangi Security, a cyber security company specializing in securing your cloud infrastructure. We talk about a number of things, but at one point, Mr. Backup asked him what the thought was the five biggest security mistakes...

How to back up Jira

Jira is yet another service that could be at the center of your organization, and losing the data stored in there could cost you a lot. Did you know it doesn’t even have an audit trail for many things? Not only can you lose data, you might not know what was deleted or who did it! We are joined this week from two representatives from Revyz, a new service to back up Jira. They talk about what...

What are RTO and RPO, and how do they drive backup design?

If you don’t meet your company’s Recovery time objective (RTO) and Recovery Point Objective with your backup design, nothing else matters. Seriously. No one cares if you can back up – only that you can restore in a timeframe they consider reasonable. The only way that’s going to happen is if you agree to these times UPFRONT. In this episode in our new back to basics series...

Subscribe and follow: