Artwork for podcast The Backup Wrap-Up
Detect Ransomware Before It Destroys Your Business
27th October 2025 • The Backup Wrap-Up • W. Curtis Preston (Mr. Backup)
00:00:00 00:33:55

Share Episode

Transcripts

Speaker:

You found the backup wrap up, your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

Got a little something different for you.

Speaker:

Uh, Mike and I have been, um, Mike Saylor and I have been working really hard on.

Speaker:

Finishing the book for you, the, the upcoming ransomware book.

Speaker:

And we did, um, that's the good news.

Speaker:

The bad news is we didn't have enough time to record another, an episode.

Speaker:

So I reached back into the archives and found, this is, uh, a recording from

Speaker:

Mike when he, uh, came on the podcast to talk about, uh, detecting ransomware.

Speaker:

And, uh, I'm, I'm trying something different here.

Speaker:

Let's see how it goes.

Speaker:

What I actually did was I tightened up the episode, uh, looked through and I

Speaker:

just grabbed really the, you know, the, the really relevant parts of this piece.

Speaker:

So it's a tighter episode than the original recording.

Speaker:

Should be around a half hour instead of the 45 minutes.

Speaker:

It's something I'm gonna try.

Speaker:

I really wanna know what you think about it.

Speaker:

So whether you're watching this on YouTube or on, uh, you know, the, uh, uh, backup

Speaker:

wrap up.com, I, I'd love to hear from you as to what you think of this tighter

Speaker:

format and specifically the one here where I took a longer show and, uh, tightened it

Speaker:

up to make it a little bit more, um, you know, I don't know, easier to listen to.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the show.

Speaker:

I am w Curtis Preston, AKA, Mr. Backup, and I have with me Prasanna Malaiyandi.

Speaker:

How's it going?

Speaker:

Prasanna.

Speaker:

I am good, Curtis.

Speaker:

It's time to bring on our, uh, our guest.

Speaker:

Once again, our resident cybersecurity expert, CEO of Black Swan Security.

Speaker:

Mike Saylor.

Speaker:

How's it going, Mike?

Speaker:

It is going well guys.

Speaker:

Thanks for having me.

Speaker:

We're talking about ransomware.

Speaker:

So this week I wanted to talk about.

Speaker:

The actual phase or you know, whatever the things that we need to

Speaker:

do in order to detect ransomware.

Speaker:

And I remember talking about this a little bit with you before, but can

Speaker:

you, um, aside from like a, a SEIM/SOAR tool, sort of going off and noticing

Speaker:

something, can you think of weird things that have happened in people's

Speaker:

environments where it ended up being.

Speaker:

The ultimate thing was they were actually under a ransomware attack.

Speaker:

You know what I'm saying?

Speaker:

Like, like for some reason the, you know, the company dishwasher stopped working

Speaker:

and uh, you have weird stories like that.

Speaker:

Uh, I, I do.

Speaker:

And so there, there are, there are, there's malware.

Speaker:

There's a category of malware called polymorphic.

Speaker:

So it, it, it changes.

Speaker:

Uh, some of that change depends on what the malware

Speaker:

has identified as, as its host.

Speaker:

And so there, there is a strain.

Speaker:

There are strains of malware that are specific to certain, you know, they're,

Speaker:

they're targeting specific, uh, devices.

Speaker:

Um, we saw this with stuck net.

Speaker:

Uh, we saw it with, uh, point of sale specific malware.

Speaker:

Uh, and now there's ransomware that is looking for specific.

Speaker:

Uh, specific hosts.

Speaker:

It doesn't want to trigger the ransomware on, on an invaluable host.

Speaker:

Like, I don't care if that's got ransomware, just throw it out the window.

Speaker:

Uh, but, and then tip, its, tip its cards to what it, you know,

Speaker:

the, the attackers are doing.

Speaker:

They don't want to trigger the alarms before the, the, the jewels are stolen.

Speaker:

So there, there are kind of your, your.

Speaker:

Your analogy to the dishwasher's not working anymore.

Speaker:

If it's a smart dishwasher, it could very well start to malfunction or perform

Speaker:

poorly if malware is interrogating it to determine if it's its target.

Speaker:

Uh, there's even malware, uh, the ransomware that,

Speaker:

that cleans up after itself.

Speaker:

So maybe it gets to the dishwasher and decides, well, this is a

Speaker:

dishwasher and it moves on.

Speaker:

Well, as it moves on, it deletes.

Speaker:

Its, you know, it cleans up after itself.

Speaker:

So when you go look at the, at the dishwasher, you, you're like, I

Speaker:

don't, I don't know what caused that.

Speaker:

But,

Speaker:

Seems to be working fine now.

Speaker:

more, more often than not, it's, it's user feedback about, you

Speaker:

know, complaining about their.

Speaker:

their computer running slowly, or, you know, I can't watch

Speaker:

Netflix at lunch anymore.

Speaker:

Um,

Speaker:

Dexter.

Speaker:

No Dexter at lunch.

Speaker:

right.

Speaker:

So it it's usually it's system, you know, performance degradation or, or.

Speaker:

Um, just weird stuff.

Speaker:

Symptoms, uh, weird symptomatic stuff that usually get, uh, you get

Speaker:

notifications on to determine, well, that's weird, but then you go look

Speaker:

at it and there's nothing there.

Speaker:

Well, it's, well forensically you can still see some stuff, but at

Speaker:

the, you know, kind of the, the surface level, you're like, I

Speaker:

don't, there's no malware here.

Speaker:

Um.

Speaker:

but in that case though, like I'm guessing that that user would call

Speaker:

their IT help desk and the IT TA person would probably take a look and

Speaker:

be like, oh yeah, nothing happened.

Speaker:

And then they'd probably just close it and move on.

Speaker:

Right.

Speaker:

Very like does, how often does it really get escalated?

Speaker:

Be like, Hey, that seems weird.

Speaker:

Let's figure out like, is there a security issue or something else?

Speaker:

It, it, the, the frequency or the, or I guess the likelihood that that

Speaker:

gets escalated is, is almost directly related to whether or not they've

Speaker:

had to deal with it in the past.

Speaker:

So if you've had ransomware, you're a little more diligent and

Speaker:

suspicious of weird stuff happening.

Speaker:

Like, all right, well we've had, we don't wanna go through that again.

Speaker:

Uh, I'm gonna, I'm gonna take every call about weird stuff happening as

Speaker:

if it might be ransomware or some other malware versus an environment

Speaker:

where maybe they haven't had the, put a fire out or go through that.

Speaker:

They're, they're, they're a little more skeptical about, you

Speaker:

know, that's just user error.

Speaker:

Or, you know, it's, it's Tuesday.

Speaker:

Uh.

Speaker:

do and do anybody, um, does anybody ever report actually seeing, like

Speaker:

someone taking over their desktop?

Speaker:

Like they're, they happen to see mouses moving around or

Speaker:

windows opening and closing?

Speaker:

Do they see that?

Speaker:

We have, we have worked a few, there's other cases, and

Speaker:

this is actually a a what.

Speaker:

In, in the, in a corporate environment, we don't see it as often.

Speaker:

Uh, but small businesses and individuals often get scammed into the hole.

Speaker:

You've got a virus call this phone number, we then remote access into your

Speaker:

machine and then, you know, their access persists or, or something else happened

Speaker:

to, to drive that, that weird behavior.

Speaker:

The other problem is managed service providers.

Speaker:

So you've got this one company that, that supports the, you

Speaker:

know, technology to some degree.

Speaker:

Whether it's everything, uh, servers and workstations and

Speaker:

help desk is all outsourced.

Speaker:

Or it's some something specific like a, like a core processing server

Speaker:

that does your financials if you're a credit union at, so you have

Speaker:

this one, one to many relationship.

Speaker:

You've got this one company that supports many clients and.

Speaker:

Uh, just human nature.

Speaker:

We wanna make sure that that's as easy as possible.

Speaker:

So what we found were what we call cons, uh, coincidental passwords.

Speaker:

So this one vendor uses the same credentials to log

Speaker:

into all of their clients.

Speaker:

And so what we've seen recently is, yeah, there's this remote control

Speaker:

stuff going on because that vendor was compromised and they didn't know it.

Speaker:

But now bad guys have access to the environments of all

Speaker:

the clients they support.

Speaker:

So, so what we've been talking about so far is sort of.

Speaker:

Users noticing something odd happening, calling in, right,

Speaker:

getting in, troubleshooting.

Speaker:

But I'm guessing though that users aren't always the best people to recognize

Speaker:

when things go wrong, and they're probably not always at their desk

Speaker:

when the bad actor is doing something.

Speaker:

So what happens for all those other scenarios?

Speaker:

So there's, there's other things that we do in a corporate environment that

Speaker:

we hopefully would notice weird things, our backups, our network bandwidth.

Speaker:

Um.

Speaker:

And there, there's tons of places that you can set up alerts and triggers,

Speaker:

uh, firewall, uh, weird IP addresses, different protocols, uh, unexpected

Speaker:

data going out, different ports.

Speaker:

Um.

Speaker:

There's a lot of things we could look at and, and, and it's, it's a pretty

Speaker:

lengthy list, but humanly possible.

Speaker:

Like, is there one person that's gonna go down this whole checklist every

Speaker:

day, you know, several times a day?

Speaker:

Uh, that's just not, that's not feasible.

Speaker:

Uh, and so you've really gotta roll that up into a tool that can automate it and

Speaker:

just give you a dashboard view of things.

Speaker:

Um.

Speaker:

The, the, the secret, the, the key is how many things, how

Speaker:

much visibility do we have?

Speaker:

Finding tools and the data sources and the use cases that all line up.

Speaker:

Like there's a, there's a ransomware use case.

Speaker:

All right?

Speaker:

So from ran, if, if we're, if, if our focus or objective

Speaker:

is to identify ransomware.

Speaker:

Then working backwards from that objective, we've gotta find the data

Speaker:

sources that would give us the indicators.

Speaker:

Uh, then we've gotta have the technology that can consume or

Speaker:

connect and consume that data source.

Speaker:

Uh, then we've gotta have some policy procedure around the source of that data.

Speaker:

Like, what is it?

Speaker:

Is it a server?

Speaker:

You know, uh, firewall, how's it configured?

Speaker:

How do we patch it?

Speaker:

How do we update it?

Speaker:

How do we back it up?

Speaker:

Uh, so that playbook is, is fairly extensive, but the, the detection

Speaker:

part of that is all about visibility.

Speaker:

Um, and, well, I guess fundamentally too, understanding how ransomware works.

Speaker:

Um, 'cause I mean, your, your smart dishwasher probably isn't gonna

Speaker:

get infected with, with ransomware.

Speaker:

Uh.

Speaker:

Hmm.

Speaker:

Not yet.

Speaker:

So when we start talking about this, we've got to start talking about some

Speaker:

sort of tools that are, and there's three tools that I'm aware of and, um, you

Speaker:

know, which would be XDR, sim and soar.

Speaker:

SOAR is more about the response, right?

Speaker:

But XDR and SIM tools are about the actual detection.

Speaker:

Did I, did I get that right?

Speaker:

So the, the XDR is, is the platform that you would, um, consolidate

Speaker:

all of your alerts and data sources from different other tools.

Speaker:

So it's kind of like the top, the top of your security stack.

Speaker:

Okay.

Speaker:

And then the, the sim is, is kind of below that.

Speaker:

So SIM is one of the.

Speaker:

One of the feeds into your XDR platform, EDR, you know, your anti malware endpoint

Speaker:

stuff, that's another data source.

Speaker:

Um, and, and so.

Speaker:

I just thought all the, all the EDR tools were calling themselves XDR tools.

Speaker:

That

Speaker:

that's

Speaker:

And, and they're really not.

Speaker:

Um,

Speaker:

the evolution of EDR into more of a managed service is still

Speaker:

missing the network layer.

Speaker:

So the, the eds like CrowdStrike that say that they, they do XDR, they're

Speaker:

still missing the, the east, west, you know, network traffic, net flow,

Speaker:

Okay.

Speaker:

EDR would be endpoint detection response, which typically what we're

Speaker:

talking about there is, is like desktops and laptops and things like that.

Speaker:

Not so much servers.

Speaker:

Would that be right?

Speaker:

Well servers too.

Speaker:

I mean, you can, you can put EDR on, on servers for sure.

Speaker:

But not necessarily networks, like network

Speaker:

it, it, uh, CrowdStrike doesn't do network analysis.

Speaker:

And so, you know, even before, you know, the, the first, the first kind

Speaker:

of acronym was NDR Network Layer stuff.

Speaker:

So that's like extra hop, uh, you know, net flow, uh, your, your router.

Speaker:

XDR, the extended detect is that we can plug anything into our console.

Speaker:

So that's our sim, that's an anti malware, uh, NetFlow, uh, and even

Speaker:

like some XDR platforms can do like physical security devices, like

Speaker:

badges and motion cameras, and, um.

Speaker:

I, OT things, uh, like, hey, my dishwasher's throwing errors a bunch.

Speaker:

Uh, you know, you can, I guess if there's a use case for that.

Speaker:

Um, so XD the idea with XDR, uh, and even, even broader than that, is an

Speaker:

open XDR uh, platform that just about anything you can imagine can be fed into

Speaker:

this thing, uh, to correlate events and, and if it's capable, develop behavioral

Speaker:

baselines and some other cool stuff.

Speaker:

So then, um, does Soar fit into that, all of that?

Speaker:

So SOAR is also not a new term.

Speaker:

Uh, so SOAR is security orchestration and automated response.

Speaker:

Uh, so the idea with SOAR is that we have this playbook, and historically

Speaker:

it's been a manual playbook, right?

Speaker:

We get out the book and we look through it and say, this is what we're gonna

Speaker:

do in response to whatever this.

Speaker:

Thing is, so it could be an incident, it could be a, a malware, it could

Speaker:

be a stolen laptop, whatever.

Speaker:

You've got this playbook and, and the idea with playbooks is you assess

Speaker:

yourself, like our company does these things and we have these assets, and

Speaker:

what is the most likely impact to us?

Speaker:

Ransomware's at the top should be at the top of everybody's list these

Speaker:

days, if you're connected to the internet and have users, uh, ransomware

Speaker:

is just statistically more likely than a lot of other things these

Speaker:

days, but it could be other stuff.

Speaker:

You should have a playbook on, uh, denial of service if your company

Speaker:

relies on internet connectivity, um, for revenue and communications.

Speaker:

You, if you have a, a large remote workforce and they have laptops that have.

Speaker:

Company data on it that you should have a playbook on stolen laptops.

Speaker:

Is this similar to the incident response plan stuff we talked about

Speaker:

a couple or many episodes ago?

Speaker:

it is, and, uh, however, uh, soar, uh, traditionally and, and I was kind of,

Speaker:

I was getting to that the, the Soar traditionally was more broadly defined.

Speaker:

So you could have something that might not be considered an incident yet.

Speaker:

Um, so, so, so back in the day also incorporated, well,

Speaker:

how do we analyze this event?

Speaker:

Hmm.

Speaker:

Uh, and then we, and then we started to developing more technical incident

Speaker:

response plans and programs that said, all right, that playbook is now part

Speaker:

of our plan, and here are the more technical, tactical things we need to do.

Speaker:

Well then the evolution of Soar, uh, from a platform or technology

Speaker:

perspective is, all right, how do we automate some of this stuff?

Speaker:

Yeah.

Speaker:

And so there are, there are third party tools that are, so our sim, our

Speaker:

XDR platform, identified this stuff.

Speaker:

Uh, let's integrate this automation tool or, or we have this tool now that's,

Speaker:

that we can then go and, and use to say, we need to handle this, this incident.

Speaker:

So as an example, could it be something like, I've detected some random

Speaker:

network traffic on this particular client that doesn't look right.

Speaker:

The SOAR detects it and maybe it shuts off the network port.

Speaker:

Yes.

Speaker:

And so in the Soar you would, you would again, define these playbooks

Speaker:

when this happens, do these things.

Speaker:

And so with ransomware as an example, if, uh, user account experiences, several

Speaker:

failed logins and then a successful login.

Speaker:

And then service, you know, anti malware is shut off on the endpoint and

Speaker:

there is internet traffic to geo, you know, whatever IP address, uh, around

Speaker:

the world do these things, right?

Speaker:

Disabled user revoke, MFA tokens, uh, uh, shun or, or quarantine

Speaker:

that, that endpoint, you know, take it off the, you know, um, uh.

Speaker:

Block its IP address, uh, notify whoever and do these things,

Speaker:

and you can automate that.

Speaker:

Um, and it can be as, as detailed as that.

Speaker:

It, it could be, uh, and any variation of that.

Speaker:

So yeah, those, those, that's a great example of how that, that

Speaker:

tool and it, and it would do it so quick, like milliseconds versus the,

Speaker:

the human version of that is, um.

Speaker:

You know, your sim tool pops up and says, you know, you've

Speaker:

got something to look into.

Speaker:

An analyst takes 15 to 20 minutes to verify it.

Speaker:

Uh, we have a valid thing.

Speaker:

Let me escalate it to level two.

Speaker:

Level two looks at it, you know, another 15, 20 minutes.

Speaker:

Now we're looking at other, other data sources like the firewall and some stuff.

Speaker:

We've now validated that then we, we escalate that to the client if it's

Speaker:

an MSP version, uh, or, or the, the business owner or the stakeholder

Speaker:

in a, in a corporate environment.

Speaker:

Uh.

Speaker:

And we're waiting for a response from them to determine what to do next.

Speaker:

And so now that that millisecond soar automated response has turned into at a

Speaker:

minimum hour and a half, two hours, and who knows what, you know, that malware

Speaker:

is, especially the ones that, that, uh, can run autonomously, is our, they've

Speaker:

already done reconnaissance to look at what else this thing has access to.

Speaker:

And I've already spread and done other stuff.

Speaker:

Time is of the essence.

Speaker:

yeah.

Speaker:

Yeah.

Speaker:

So all, all right.

Speaker:

So let, let's say, let's say I'm a company, I'm an organization that

Speaker:

has none of these tools, right?

Speaker:

Just, and I'm, I'm listening to this episode, I'm like, holy crap.

Speaker:

Like, how many things do I need to buy and where should I start?

Speaker:

Um, I, I think that's.

Speaker:

I think that's where the average person might be right now.

Speaker:

Um, and that's where I am.

Speaker:

Um, I'm like, wow, that's a, that's an awful lot of tools where, you know, and,

Speaker:

and, and each of them thinks they're, they're, you know, well, you gotta have

Speaker:

this, you gotta have MDR, you gotta have XDR, you gotta have sim, you gotta have,

Speaker:

so you gotta have all these things.

Speaker:

And I'm sure there's an acronyms that we haven't got to, um, where,

Speaker:

where does, you know, I'm worried that I'm gonna get ransomware where.

Speaker:

Do I start with all these tools?

Speaker:

There's a lot of different, uh, approaches to the problem and understanding.

Speaker:

The problem is, is fundamentally economics, right?

Speaker:

I can't afford.

Speaker:

The people or the, the software or the whatever it is to, to

Speaker:

truly, um, improve my, my odds.

Speaker:

And that's really what it is.

Speaker:

I mean, you can invest everything you have in protecting yourself and

Speaker:

you're still a statistic at some point.

Speaker:

'cause bad guys are gonna figure out how to get to you.

Speaker:

Um, but remember that ransomware is malware.

Speaker:

And all malware requires user, user interaction in order to infect your thing.

Speaker:

So your computer, um, if it's not connected to the internet and you're not

Speaker:

looking at email and going to websites, you're, you're, you're good, right?

Speaker:

Or you're, you know, 99% there.

Speaker:

Uh, you also have to disable all your USB ports and Bluetooth

Speaker:

and all that other stuff too.

Speaker:

Um, which means you really can't use your, your computer for anything.

Speaker:

Um.

Speaker:

So then, but, but if you start there, all right.

Speaker:

If my computer's not connected to anything, what can I do?

Speaker:

Well, I can't do much.

Speaker:

Well, I need to do this thing.

Speaker:

Well, what do I need to do that thing?

Speaker:

Well, I need internet to get to this website so I can log in to do my work.

Speaker:

Okay, well then can we exclude the majority of other things

Speaker:

that you don't need to do?

Speaker:

Yeah.

Speaker:

All right.

Speaker:

So let's, we can write policy about that.

Speaker:

That's okay.

Speaker:

Well, what else do you need?

Speaker:

Oh, I need email.

Speaker:

I need email to be able to send and receive files and talk to people.

Speaker:

Okay.

Speaker:

Well, are there ways of restricting email's ability to, to present me with

Speaker:

things that, that could be a risk?

Speaker:

Well, yeah, that's, you know, email filtering and spam

Speaker:

filtering and stuff of that stuff.

Speaker:

Some of those tools, some of the, some of that stuff that I've

Speaker:

mentioned is, are probably already a capability of what you've purchased.

Speaker:

Like Office 365 comes with some good stuff.

Speaker:

They just don't do a real good job at teaching you how to,

Speaker:

how to use it and configure it.

Speaker:

And us as consumers are really poor at, at reading the manual.

Speaker:

Um.

Speaker:

comes with some other stuff that, but they do charge quite a, quite a bit for it,

Speaker:

They do.

Speaker:

And so,

Speaker:

um, but you know, going back to how many tools do I need to

Speaker:

buy, that's another decision.

Speaker:

Do I, do I buy more licensing and, and capabilities from this one tool?

Speaker:

Or do I look at, you know, what other things can I bolt

Speaker:

on and, and add to, to this?

Speaker:

Maybe it's more cost effective, but now you've got a, now you've

Speaker:

got overhead and having to spend more time doing these other tools,

Speaker:

well then all.

Speaker:

So you've, you've been somewhat diligent.

Speaker:

You've, you're, you're using your computer responsibly and you, you've

Speaker:

figured out how to use what you paid for, uh, to do, you know, what,

Speaker:

what you can with what you have.

Speaker:

Mm-Hmm.

Speaker:

Then it all comes down to just be being aware and, and you know that that email

Speaker:

but, you know, kind of at the end of the day, and, and maybe getting

Speaker:

back to your, your original question with, well, how do, how does the

Speaker:

average person protect themself?

Speaker:

It starts with just being diligent.

Speaker:

Just take a minute and, and think through the, you know, rationale of whatever

Speaker:

it is that you're, you were gonna do.

Speaker:

Click on something, open something, download something, go to a website,

Speaker:

scan a QR code with your phone.

Speaker:

Um.

Speaker:

These are all things that you maybe just, just take a minute

Speaker:

and, and really think through.

Speaker:

Do I need to do that?

Speaker:

Was I expecting that?

Speaker:

Could there be something, you know, malicious or, or, uh,

Speaker:

wrong with whatever this is?

Speaker:

And it never hurts to phone a friend.

Speaker:

Um.

Speaker:

And, and, you know, making friends is important in this, in, in cyber.

Speaker:

'cause you know, as, as a individ, as an individual, you, you're

Speaker:

probably not gonna be exposed to or experience a lot of things.

Speaker:

Um, and then the more people you talk to about what you see and and your questions,

Speaker:

the more likely you're gonna get somebody that's probably already made that mistake

Speaker:

and can help you not make it yourself.

Speaker:

Yeah.

Speaker:

And Mike, just on that last point, I think it's a great thing, and I

Speaker:

know we did an entire discussion about like cyber insurance,

Speaker:

right?

Speaker:

And how they're like a trusted advisor.

Speaker:

You should talk to them because I'm sure they could give you good advice on sort

Speaker:

of how to shore up your defenses and be able to detect and protect yourself

Speaker:

against ransomware and other malware.

Speaker:

And there's a couple of, a couple of real quick, uh, like things to consider

Speaker:

if, if you think you've got ransomware or malware, just turn your computer off.

Speaker:

Power it off, take the battery out, unplug it.

Speaker:

'cause that, that stuff needs power to do its job.

Speaker:

And if, if you really think, you know, I've got my critical, my

Speaker:

whole life is on this computer and I think I have malware, shut it off.

Speaker:

Unplug it.

Speaker:

Take the battery out and find somebody that can help you get your data

Speaker:

off of it and make sure it's clean.

Speaker:

Um, and that way at least you've got a backup.

Speaker:

Backups are, are critical with ransomware.

Speaker:

Um, but yeah, don't.

Speaker:

Don't just sit there.

Speaker:

It's kind of like, you know, especially guys, and I'm, I'm definitely guilty.

Speaker:

I'm a little hardheaded when it comes to illness and health.

Speaker:

If you've got symptoms, call the doctor.

Speaker:

Right.

Speaker:

Don't, don't sit there and go, oh, I'll give it.

Speaker:

I'll give it another day.

Speaker:

Or maybe I just need a nap.

Speaker:

Yeah.

Speaker:

Yeah, I, um.

Speaker:

Which brings up, and, and this is a giant tee up, and, uh, but you know, it would

Speaker:

seem to me that this is too important for you to try to figure it out yourself.

Speaker:

Like if you, if you're not a cybersecurity specialist, if you, if you, if

Speaker:

you're not living your life, this thing, it's kinda like backup, right?

Speaker:

Where it's like, it's way more difficult than you think it is.

Speaker:

Right.

Speaker:

Um, and that, and that's why MSPs exist, right?

Speaker:

And so it would seem to me that I. Rather than try to figure out which of

Speaker:

10 different, you know, I mean, somebody showed me a, um, it was like the, it was

Speaker:

like the, one of those things where they have just company logos and it was like

Speaker:

the cybersecurity landscape and there were like just hundreds of these logos up there

Speaker:

of products and services that I could buy.

Speaker:

And, and it would seem to me that what I need, I need two things.

Speaker:

I need.

Speaker:

Tools that work, right, that, that, that do the things that I need.

Speaker:

And more importantly, I need somebody that knows how to use those tools.

Speaker:

'cause it doesn't do any good if I buy this great.

Speaker:

You know, uh, detection tool to find, you know, what's going on and, but I

Speaker:

don't know how to configure it so that it works and I don't know what to do.

Speaker:

And of course, one of the most common things is that I configured it such

Speaker:

a way that I get a whole bunch of false positives and then very quickly

Speaker:

it, it just ends up becoming ignored.

Speaker:

Right.

Speaker:

So I, I think that's where the, where the MSSP and obviously I'm, I'm, I'm

Speaker:

teeing it up for you, but I, I. I don't know what else, what else would

Speaker:

be right for, for a small organization or even a medium sized organization

Speaker:

that has never done this before.

Speaker:

No, I appreciate that.

Speaker:

Uh, and, and you're right.

Speaker:

Um, going back to kind of the initial comments of, uh, you know, just good

Speaker:

visibility if you wanna do it yourself, make sure you have the fundamentals.

Speaker:

Good anti vi, anti malware.

Speaker:

Um, that gives you consolidated, a consolidated view of all your assets.

Speaker:

You know, you don't have to go to every computer and see if there's an infection.

Speaker:

It needs to report up to a, a console that you can log into and, and get real

Speaker:

updates and know where the problems are.

Speaker:

Um, the, the other, the other gap, I mean, you, you managed, I mean, you

Speaker:

mentioned needing someone that knows the technology and you know, an expert.

Speaker:

To expand on that, it needs to be someone that's available 24 hours a day.

Speaker:

'cause bad guys aren't gonna go, oh, you know, they're probably still

Speaker:

at work working on the computer now is a good time to attack them.

Speaker:

No, it's, it's when you're asleep and you're in middle of the

Speaker:

night, uh, you know, Thur Thursday morning or Thursday after midnight

Speaker:

is when they're gonna hit you.

Speaker:

And, and because they also know that you're not gonna wanna,

Speaker:

uh, be at work over the weekend.

Speaker:

So they, for whatever reason, all right, they're, they're not gonna make it.

Speaker:

Uh, uh, easy for you.

Speaker:

Uh, and, and in a lot of cases, that's also because they're, they're

Speaker:

overseas in a different time zone anyway, so the fundamentals are good.

Speaker:

Endpoint protection, the, uh, good visibility across your environment.

Speaker:

Um, good firewall, uh, cloud, uh, office 365, Google AWS, whatever

Speaker:

you got, whatever's being used.

Speaker:

Um.

Speaker:

And then someone that, that you can call or someone that is looking

Speaker:

at your stuff 24 hours a day.

Speaker:

And there are some service providers where, you know, maybe you do have a

Speaker:

staff during the day, uh, and so you just need nights and weekends and holidays.

Speaker:

And so there are some providers like us that, that are flexible

Speaker:

in that, in that regard.

Speaker:

So that does help with, uh, cost and the economics.

Speaker:

Um.

Speaker:

But at the end of the day, absolutely, um, make friends with some experts,

Speaker:

uh, that you can call for nothing else.

Speaker:

Uh, if nothing else, just to ask questions.

Speaker:

But ideally, uh, someone that can help you identify the right

Speaker:

solutions, uh, to give you the right visibility and the right coverage.

Speaker:

Uh, and again, I it's gotta be 24 hours a day.

Speaker:

Yeah, so Mike, most of these organizations, right, they

Speaker:

don't have unlimited budget.

Speaker:

Right.

Speaker:

Cost is always a concern in terms of priority.

Speaker:

Right.

Speaker:

I know you talked about endpoint, you talked about XDR,

Speaker:

you talked about sim, right?

Speaker:

You talked about all these things.

Speaker:

If they're looking for sort of what is the first thing that they should

Speaker:

go after and try to protect or detect ransomware on or malware on, what

Speaker:

is, what is sort of like the most important thing in their environment

Speaker:

that they should be concerned with?

Speaker:

It depends.

Speaker:

So you've really got back to understanding yourself before you

Speaker:

can understand your, your enemy.

Speaker:

'cause your enemy's gonna probably know you better than you.

Speaker:

You do.

Speaker:

In order to be successful, uh, you've really gotta understand your business.

Speaker:

And so again, if your business is, uh, highly driven by your workforce and your

Speaker:

workforce is out, you know, on the, on the, you know, they're road warriors or

Speaker:

they're working from home, absolutely.

Speaker:

Endpoint protection is a priority because they're prob, they

Speaker:

probably have company data on that.

Speaker:

Device or they're using that device to log into, you know, VPN or, or your cloud.

Speaker:

And so if that device is compromised, then your, your

Speaker:

production network, your production environment may be compromised also.

Speaker:

But what if, what if you're, you're a data center and you don't have, all

Speaker:

your endpoints are servers, right?

Speaker:

Uh, and then so, but then there also.

Speaker:

Co, uh, co-managed, they're, they're not yours.

Speaker:

You, you own the hardware, but you don't own the, the, the, the virtual

Speaker:

machines or, or, or what have you.

Speaker:

So now your, your focus is your perimeter

Speaker:

and your connectivity.

Speaker:

Uh, so I think those are two extreme, you know, one, one end of the other.

Speaker:

Uh, but truly understand your environment first, uh, and where you're.

Speaker:

Your critical assets are, and your data and your use cases, uh, and what's

Speaker:

most likely impacting your business.

Speaker:

Uh, and then from that, uh, derive your priorities.

Speaker:

And,

Speaker:

Hmm

Speaker:

and there are some, there are some organizations that fit smack dab

Speaker:

in the middle, and you just have to have good hygiene across all of it.

Speaker:

There's a lot of organizations that aren't real familiar, uh, or

Speaker:

real accurate with all the things they need to protect anyway.

Speaker:

Similar to backups.

Speaker:

You know, I can, yeah, I can run back up.

Speaker:

But I can only back up what I know about, uh, and ideally even, even more

Speaker:

so to the next level, how important, how do I prioritize those backups?

Speaker:

Security is the same.

Speaker:

Uh, I can only secure what I know.

Speaker:

And if, if there's stuff on the network and there's stuff in the cloud and

Speaker:

there's people working from home that I don't know, then I can't protect that.

Speaker:

And if I am gonna protect it, how do I protect it?

Speaker:

You know that, that visibility part.

Speaker:

How do I get the data from those things, those tools?

Speaker:

To know if there's a problem and how to respond to it.

Speaker:

Is it automated?

Speaker:

Is it a person?

Speaker:

Um, and then all of that is going to kind of bubble up to what are my options and

Speaker:

what does it cost and what do I need?

Speaker:

Is that, is that something I can do on my own?

Speaker:

Is that, uh, opportunity to bring in a managed service provider?

Speaker:

Um, and I think real quick on, on, on the, the cost, I think

Speaker:

there's a big misconception that.

Speaker:

Yeah, I'm a small company.

Speaker:

I can't afford cybersecurity.

Speaker:

Uh, that is a huge misconception.

Speaker:

There are, there are a number of providers out there like us that, that

Speaker:

are flexible and scalable and I mean, our, our smallest we have, we have

Speaker:

clients that just have two employees and they work out of their garage.

Speaker:

But they are, they've determined, uh, from an analysis of themselves that

Speaker:

they, they are, they have a huge cyber risk and they need that protection.

Speaker:

And so, uh, it, it can be affordable, um, if we know what we're protecting and,

Speaker:

and what the, what the playbooks are.

Speaker:

Well, hey Mike, it's been great talking to you again.

Speaker:

And Prasanna, thanks for, thanks for, uh, being here as, as always.

Speaker:

This was fun.

Speaker:

And Mike, it's been great chatting.

Speaker:

It's been a while.

Speaker:

So glad to have you back on.

Speaker:

For sure I missed you.

Speaker:

Yeah.

Speaker:

And, uh, thanks to the, uh, our listeners, uh, we'd be nothing without you.

Speaker:

That is a wrap.

Speaker:

The backup wrap up is written, recorded and produced by me w Curtis Preston.

Speaker:

If you need backup or Dr. Consulting content generation or expert witness

Speaker:

work, check out backup central.com.

Speaker:

You can also find links from my O'Reilly Books on the same website.

Speaker:

Remember, this is an independent podcast and any opinions that you

Speaker:

hear are those of the speaker.

Speaker:

And not necessarily an employer.

Speaker:

Thanks for listening.

Links

Chapters

Video

More from YouTube