Artwork for podcast The Backup Wrap-Up
The Five Most Dangerous New Cyber Attack Techniques (A review of the RSA Keynote)
11th July 2022 • The Backup Wrap-Up • W. Curtis Preston (Mr. Backup)
00:00:00 00:40:54

Share Episode

Transcripts

Prasanna Malaiyandi:

Hi, and welcome to Backup central's restore it all podcast.

Prasanna Malaiyandi:

I'm your host WC Curtis w Curtis Preston.

W. Curtis Preston:

Wow.

W. Curtis Preston:

That's just, you will not assert my authority.

W. Curtis Preston:

So welcome folks.

W. Curtis Preston:

Welcome to the Backup Central's Restore it All podcast.

W. Curtis Preston:

I am your host, and I actually know how to say my name w Curtis Preston, AKA Mr.

W. Curtis Preston:

Backup, and I have with me, my voter abuse stress counselor, Malaiyandi.

Prasanna Malaiyandi:

Oh, my gosh, Curtis, how are you doing after?

Prasanna Malaiyandi:

So you volunteered at the elections and you were a site manager and

Prasanna Malaiyandi:

for the listeners, if you wanna understand how elections work

Prasanna Malaiyandi:

we did a podcast, uh, Last year.

Prasanna Malaiyandi:

Was it no.

Prasanna Malaiyandi:

Back in 2020 with Mark Thompson?

Prasanna Malaiyandi:

Yeah.

Prasanna Malaiyandi:

Election poll site manager explains us election systems.

Prasanna Malaiyandi:

Go take a listen to that, but yeah, you were in the primaries helping out

W. Curtis Preston:

Yep.

Prasanna Malaiyandi:

and you had an interesting time.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

It's um, I, you know, I'll say the same thing to anybody

W. Curtis Preston:

that anyone that's Curious.

W. Curtis Preston:

If, if you do not trust our election system, then I would suggest you

W. Curtis Preston:

go volunteer as a poll worker.

W. Curtis Preston:

It, it is an incredibly information filled experience and, um, and that, and

W. Curtis Preston:

that's what we talk a lot about, about.

W. Curtis Preston:

In that podcast.

W. Curtis Preston:

And then I wrote a blog, something like how hard it would be to actually hack the

W. Curtis Preston:

elections, the, how absolutely improbable.

W. Curtis Preston:

So many of the things that people are saying happened,

W. Curtis Preston:

how absolutely improbable that.

W. Curtis Preston:

I mean, there's no proof that it did happen and and how

W. Curtis Preston:

difficult it would be to do that.

W. Curtis Preston:

And, and, and the closer you get to the actual process, the more

W. Curtis Preston:

you understand what I'm saying.

W. Curtis Preston:

But I will tell you that the process of volunteering to be a poll worker,

W. Curtis Preston:

especially election day, which is I get there at 6:30 in the morning.

W. Curtis Preston:

And I'm there till about 10 o'clock at night.

W. Curtis Preston:

And.

Prasanna Malaiyandi:

It's a long day.

W. Curtis Preston:

It's a long day and you know, it's funny

W. Curtis Preston:

California or San Diego county.

W. Curtis Preston:

Anyway, we do four days of voting.

W. Curtis Preston:

In fact, there are some sites there's 203 sites.

W. Curtis Preston:

I think voting sites and about a dozen of them are open 11 days.

Prasanna Malaiyandi:

Oh my God.

Prasanna Malaiyandi:

Could you imagine doing that?

W. Curtis Preston:

yeah, I, I basically said a big fat no, when they said I

W. Curtis Preston:

was like, listen, I got a JOB, I can't be, I can't be leaving for 11 days,

W. Curtis Preston:

I mean, if I'm gonna leave for 11 days, what's that.

Prasanna Malaiyandi:

Doing the podcast is your JOB, right?

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Um, yeah.

W. Curtis Preston:

And so I was like, I was like, I.

W. Curtis Preston:

I have zero interest in 11 day site, but I was at a four day site.

W. Curtis Preston:

And for the first three days we got a whopping, like a grand total of

W. Curtis Preston:

about 32 people over three day period.

W. Curtis Preston:

And then on election day we got 266 people,

Prasanna Malaiyandi:

Oh my God.

W. Curtis Preston:

:

significantly more than 32.

Prasanna Malaiyandi:

Yeah,

Prasanna Malaiyandi:

just a little.

W. Curtis Preston:

And, everybody's like, oh, I didn't, I didn't know you were open.

W. Curtis Preston:

It's like, it's like, I guess you don't listen to the news

W. Curtis Preston:

or the radio or anything.

W. Curtis Preston:

That that's part of the problem is, you know, nobody watches the news or listens

W. Curtis Preston:

to the, like, what's a radio, right?

W. Curtis Preston:

The.

Prasanna Malaiyandi:

Or checks their mail because

Prasanna Malaiyandi:

you got they because they sent out flyers.

Prasanna Malaiyandi:

They're like, Hey, here are those sites that are opened ahead of time.

Prasanna Malaiyandi:

Go vote early.

W. Curtis Preston:

yeah.

W. Curtis Preston:

So, and of those 266 people, I'd say 10% of them were abusive

Prasanna Malaiyandi:

Hmm.

W. Curtis Preston:

to, to one degree or another,

W. Curtis Preston:

um, you know,

Prasanna Malaiyandi:

Do you just wanna curl up in the fetal position?

W. Curtis Preston:

Yeah.

W. Curtis Preston:

And, and as a site manager, I take the abuse.

W. Curtis Preston:

Right?

W. Curtis Preston:

I take the, I take the crazy questions.

W. Curtis Preston:

Um, you know, I had a, I had a Sharpie gate question, which I don't know if you,

W. Curtis Preston:

you remember Sharpie gate, but this, this thing of like, that people were being

W. Curtis Preston:

handled Sharpie handed Sharpies instead of the official ballot marking pens.

W. Curtis Preston:

And if you got a Sharpie, then your ballot wouldn't count, which was nonsense.

W. Curtis Preston:

But that, that was one of.

W. Curtis Preston:

And somebody actually asked me about that.

W. Curtis Preston:

I was like, well, first off, not relevant to the current election because we use

W. Curtis Preston:

a ballot marketing device, which is a screen that creates your printed ballot.

W. Curtis Preston:

You will be doing, you know, that's one of the questions.

W. Curtis Preston:

Are we gonna get paper ballots?

W. Curtis Preston:

Yes.

W. Curtis Preston:

You are going to use a paper ballot.

W. Curtis Preston:

You're going to create it on that device right over there.

W. Curtis Preston:

Which is a computer.

W. Curtis Preston:

Is that a Dominion machine?

W. Curtis Preston:

Yes.

W. Curtis Preston:

Yes.

W. Curtis Preston:

That is Dominion machine, but it, you will be able to see the, the thing

W. Curtis Preston:

that it produces, which is your vote.

W. Curtis Preston:

Um, so yeah, just all day long.

W. Curtis Preston:

I don't mind questions.

W. Curtis Preston:

I absolutely don't mind questions.

W. Curtis Preston:

It's I don't need the, I don't need the.

W. Curtis Preston:

Yeah, the attitude like I, like, I give everybody the same spiel

W. Curtis Preston:

when they come up to the BMD.

W. Curtis Preston:

That's the ballot marking device.

W. Curtis Preston:

That's you might call it a voting machine.

W. Curtis Preston:

We do not call it that.

W. Curtis Preston:

A voting machine is what we used to do, which is, or what some

W. Curtis Preston:

states used to do, which is it.

W. Curtis Preston:

Records your vote, right?

W. Curtis Preston:

This is not a voting machine.

W. Curtis Preston:

This is a ballot marketing device.

W. Curtis Preston:

It prints your ballot.

W. Curtis Preston:

And I give this spiel to everybody about how it doesn't store your vote,

W. Curtis Preston:

how it doesn't transmit your vote and how that you will be able to see your

W. Curtis Preston:

vote before you print it, you'll be able to see your vote after you print it.

W. Curtis Preston:

Cetera, cetera, cetera.

W. Curtis Preston:

And this guy who was, you know, an anti BMD person was like, I

W. Curtis Preston:

don't need, I'll figure it out.

W. Curtis Preston:

Like, okay.

W. Curtis Preston:

Okay.

W. Curtis Preston:

Like, I'm just trying to help you vote, man.

W. Curtis Preston:

You know, like I don't need you to snap at me.

Prasanna Malaiyandi:

so I know before we've talked about like everyone, at some

Prasanna Malaiyandi:

point in their life should work retail.

Prasanna Malaiyandi:

Do you think everyone, at some point in their life should work an election?

W. Curtis Preston:

I agree.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

I'm yeah, I think so.

W. Curtis Preston:

And first off it, it.

W. Curtis Preston:

So San Diego county, 200 polling sites, average of eight people.

W. Curtis Preston:

They wanted 10 people per site.

W. Curtis Preston:

That's 2000 employees that are temporary employees that need to be hired and

W. Curtis Preston:

vetted and trained prior to the election.

W. Curtis Preston:

It requires two days of training to be a poll worker, five

W. Curtis Preston:

days to be a site manager.

W. Curtis Preston:

And, you know, we, we only ended up having seven people.

W. Curtis Preston:

Let me just tell you.

W. Curtis Preston:

There's a big difference between seven and eight and eight, nine, you know, on

W. Curtis Preston:

election day, just try to get, there's no way to get the legally mandated numbers

W. Curtis Preston:

of lunches and breaks and whatnot, and still function as a, as a site.

Prasanna Malaiyandi:

because each person has their sort of

Prasanna Malaiyandi:

role responsibility, right.

Prasanna Malaiyandi:

Their task.

Prasanna Malaiyandi:

And it's not like everyone's just doing the same thing.

W. Curtis Preston:

Yeah, we cross train, right.

W. Curtis Preston:

We cross train across the whole site so that everybody can do every job,

W. Curtis Preston:

but still even with that, you have people that are better at certain jobs.

W. Curtis Preston:

And, um, so it was, I'm just saying, I, it was.

W. Curtis Preston:

It's a lot of work.

W. Curtis Preston:

And then, um, and then we had to tear down everything the next day.

W. Curtis Preston:

And, and now I'm today I'm, I'm sort of in, this is my first day where I get

W. Curtis Preston:

to sort of breathe after all of that.

W. Curtis Preston:

I don't have any election responsibilities, but yeah.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Uh, and I, you know, I was looking for, and I'll throw out our disclaimer Prasanna

W. Curtis Preston:

and I work for different companies.

W. Curtis Preston:

He works for Zoom.

W. Curtis Preston:

I work for Druva and this is not a podcast of either company.

W. Curtis Preston:

These are our opinions and not theirs.

W. Curtis Preston:

And, uh, be sure to rate us at ratethispodcast.com/restore.

W. Curtis Preston:

And also, if, you know, if you listen to this and you, you're interested in

W. Curtis Preston:

the things that we're interested in, then just reach out to me @wcpreston

W. Curtis Preston:

on Twitter, or wcurtispreston@Gmail.

W. Curtis Preston:

And we'll get you on, man.

W. Curtis Preston:

You know,

Prasanna Malaiyandi:

Come join us.

Prasanna Malaiyandi:

Come talk to us.

W. Curtis Preston:

come talk to us about.

W. Curtis Preston:

You know, tape, disc backups, archives security.

W. Curtis Preston:

We love talking security cuz it's so it's so adjacent to what we do.

W. Curtis Preston:

Right.

W. Curtis Preston:

It's funny.

W. Curtis Preston:

I, I, I grew up hating security.

W. Curtis Preston:

like when

Prasanna Malaiyandi:

They were the people who would like stop

Prasanna Malaiyandi:

you from doing things, right?

W. Curtis Preston:

yes, yes.

W. Curtis Preston:

Um, you you've been a Unix guy for a while.

W. Curtis Preston:

You, you was, RSH still a thing when you started.

Prasanna Malaiyandi:

Yeah.

Prasanna Malaiyandi:

Mm-hmm,

W. Curtis Preston:

Okay.

W. Curtis Preston:

So in order to get, we used dump and, and, and, and rdump back in the day, right back

W. Curtis Preston:

before I had a commercial backup utility.

W. Curtis Preston:

The only way that rdump would work is to be able to rsh as root

Prasanna Malaiyandi:

Oh,

W. Curtis Preston:

one server to another, without a password.

W. Curtis Preston:

Right.

W. Curtis Preston:

Put all those things together.

W. Curtis Preston:

And I just made a security person's head explode.

Prasanna Malaiyandi:

Back in the days before the internet.

W. Curtis Preston:

Well, we were, it was very, very, you

W. Curtis Preston:

know, like internet was just,

W. Curtis Preston:

I remember getting my AOL disc.

W. Curtis Preston:

I was an AOL customer.

W. Curtis Preston:

Jeezy, you've got mail.

W. Curtis Preston:

What I remember was just really hating the security folks because all

W. Curtis Preston:

they did, all they ever did was just get in the way of me doing my job.

W. Curtis Preston:

And I will say that if you are a backup person, then stop that, right.

W. Curtis Preston:

If that, if that's your way of looking at data security, cuz guess

W. Curtis Preston:

what we're gonna talk about today.

W. Curtis Preston:

We're gonna talk about information security.

W. Curtis Preston:

We're gonna talk about the RSA conference.

Prasanna Malaiyandi:

And for the people who are don't know who

Prasanna Malaiyandi:

their security people are, go talk to them, have a conversation.

Prasanna Malaiyandi:

Like I'm sure you both, like both teams are feeling the same sort of pressures and

Prasanna Malaiyandi:

issues and just sort of go chat with them and figure out what you could do together.

W. Curtis Preston:

Yes.

W. Curtis Preston:

You both have a common goal, right.

W. Curtis Preston:

Of keeping the company safe.

W. Curtis Preston:

It's just, you look at it from different sides, right?

W. Curtis Preston:

It's like the, that is that story about the elephant, like the people approaching

W. Curtis Preston:

elephant, like one grabs a tail, one grabs like blind people approach it.

W. Curtis Preston:

Do you know what I'm talking about?

Prasanna Malaiyandi:

Are you crazy?

W. Curtis Preston:

what do you know the story I'm talking about

Prasanna Malaiyandi:

no.

W. Curtis Preston:

It it's like three blind guys approaching an element.

W. Curtis Preston:

Like one, you know, gets the legs.

W. Curtis Preston:

One gets the trunk, one gets the tail and they describe the elephant

W. Curtis Preston:

in three different ways because it's what they're experiencing.

W. Curtis Preston:

You're experiencing the same thing is just you're approaching

W. Curtis Preston:

it from a different angle.

W. Curtis Preston:

And so just talk about it.

W. Curtis Preston:

It's like, listen, I know, I know you wanna do this.

W. Curtis Preston:

Here's how that makes my job difficult.

W. Curtis Preston:

And he's like, I know you wanna do this.

W. Curtis Preston:

Here's how that makes my job difficult.

Prasanna Malaiyandi:

Yeah, I need access to every single system

W. Curtis Preston:

Yeah.

W. Curtis Preston:

And those of you that have heard the podcast, if you've, if you've listened

W. Curtis Preston:

to the podcast, I, I, more than once, I'm sure I've told the story where

W. Curtis Preston:

I worked at at, uh, a company where I, where the, the security people

W. Curtis Preston:

shut me down in the middle of thing.

W. Curtis Preston:

It was a Y2K thing.

W. Curtis Preston:

It was, I just, I just lost it, but they were just, again, they

W. Curtis Preston:

were just trying to do their job.

Prasanna Malaiyandi:

Exactly.

Prasanna Malaiyandi:

Be kind.

W. Curtis Preston:

I mean, they, they did not, in my opinion, they did not do

W. Curtis Preston:

their job because they were specifically told not to do what they ended up doing.

W. Curtis Preston:

And that's why I went, you know, crazy.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Um, but the security people are your friends.

W. Curtis Preston:

And if you're a, if you're a security type person listening to this and you,

W. Curtis Preston:

you know, you hate the backup person.

W. Curtis Preston:

Please don't.

W. Curtis Preston:

So work together.

W. Curtis Preston:

This headline from, uh, RSA, I found this excellent article.

Prasanna Malaiyandi:

The RSA conference, just to be clear.

W. Curtis Preston:

Thank you.

W. Curtis Preston:

The RSA conference, which stands for,

Prasanna Malaiyandi:

Is it three dudes names?

W. Curtis Preston:

oh, I was gonna say really secure access.

Prasanna Malaiyandi:

Co-founders Ron ADI and Leonard, sorry, their last names.

W. Curtis Preston:

Okay, thank you.

W. Curtis Preston:

I was, I was very confused

Prasanna Malaiyandi:

Ron Reibes ADI Shamir and Leonard Adelman,

W. Curtis Preston:

Well, there you

Prasanna Malaiyandi:

R

W. Curtis Preston:

then what about the SANs Institute?

W. Curtis Preston:

Do you know what that stands for?

Prasanna Malaiyandi:

secure something.

Prasanna Malaiyandi:

Something,

W. Curtis Preston:

something something the security people listening to

W. Curtis Preston:

this podcast are like, oh man.

W. Curtis Preston:

Uh, but anyway, if you're a security person, you know

W. Curtis Preston:

what the SANs Institute is,

Prasanna Malaiyandi:

CIS admin

W. Curtis Preston:

well, there you go.

W. Curtis Preston:

This was a talk at the annual RSA conference

Prasanna Malaiyandi:

which I think they do every year is kind of like their keynote.

W. Curtis Preston:

The keynote was the top five dangerous cyber threats in 2022.

W. Curtis Preston:

So it's interesting because they are not, um, they're not very similar to

Prasanna Malaiyandi:

What we think about normally.

W. Curtis Preston:

no, what I'm saying is they're not the ones that they

W. Curtis Preston:

talked about just a year or two ago.

Prasanna Malaiyandi:

Hmm.

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

Year or two ago, they were focused on living off the

W. Curtis Preston:

land attacks, um, command and control.

W. Curtis Preston:

Deep persistence, mobile exploit, checkmate and check rain.

W. Curtis Preston:

I believe that's his and threats at the perimeter.

W. Curtis Preston:

This is a very different list.

W. Curtis Preston:

And I gotta say, looking at this list, I feel somewhat vindicated

W. Curtis Preston:

because we've been talking about some of these things for a while.

W. Curtis Preston:

Wouldn't you say?

Prasanna Malaiyandi:

Oh yeah, for sure.

Prasanna Malaiyandi:

It's it's interesting, like you were talking about earlier in our discussion

Prasanna Malaiyandi:

about like security and backup are there's a lot of overlap there, right?

Prasanna Malaiyandi:

Even in this list that they came up with, there's quite a lot of overlap

Prasanna Malaiyandi:

between like what we normally talk about and think about from like a backup data

Prasanna Malaiyandi:

protection perspective and what they're worried about from a security perspective.

W. Curtis Preston:

Right.

W. Curtis Preston:

So let's talk about the first one.

W. Curtis Preston:

And it's called living off the cloud, which may sound familiar for those of

W. Curtis Preston:

you that followed the SANs Institute.

W. Curtis Preston:

So they had this concept of living off the land, which is people that were

W. Curtis Preston:

using system management tools and systems to basically stay persistent and move

W. Curtis Preston:

around laterally within the organization.

W. Curtis Preston:

We talked about lateral movement and minimizing lateral movement in.

W. Curtis Preston:

What podcast, when we had, uh, snorkel.

W. Curtis Preston:

Do you have, do you have the titles up there?

Prasanna Malaiyandi:

We did two, one was called security expert rips

Prasanna Malaiyandi:

Okta for the response to hack, which probably isn't as respo, uh, isn't

Prasanna Malaiyandi:

as relevant, but the next one is snorkel 42 security expert from Reddit

Prasanna Malaiyandi:

explains his security cadence series.

Prasanna Malaiyandi:

It is, it was done back in may of this year of

W. Curtis Preston:

He talked about the idea of, one of the things that you

W. Curtis Preston:

want to do is minimize lateral movement.

W. Curtis Preston:

So in this, it's talking about living off the cloud, which basically

W. Curtis Preston:

just sounds like the, the cloud version of living off the land

Prasanna Malaiyandi:

It is a, it, it sounds reasonable.

Prasanna Malaiyandi:

I think the one thing they mentioned is.

Prasanna Malaiyandi:

With the cloud, right?

Prasanna Malaiyandi:

Living off the land, you have access to certain resources and everything else.

Prasanna Malaiyandi:

Cloud, you can just spin up things so quickly and use that as a staging

Prasanna Malaiyandi:

point for so many other attacks, right.

Prasanna Malaiyandi:

That it is.

Prasanna Malaiyandi:

Um, a lot more scary than something that's just within

Prasanna Malaiyandi:

the corporate network, right?

Prasanna Malaiyandi:

Because a cloud might not be like.

Prasanna Malaiyandi:

What's to prevent someone from spinning up an EC two instance, an AWS right.

Prasanna Malaiyandi:

Forgetting and accidentally leaving it open to the internet.

Prasanna Malaiyandi:

And now all of a sudden you have connectivity into

Prasanna Malaiyandi:

that cloud instance, right?

Prasanna Malaiyandi:

An attacker could.

Prasanna Malaiyandi:

And from there, depending on how the networks are configured, they could

Prasanna Malaiyandi:

easily get access to your internal data centers to other internal services,

Prasanna Malaiyandi:

just because you misconfigured something in your cloud environment,

W. Curtis Preston:

And then they also talked about.

W. Curtis Preston:

Enterprises tend to trust, uh, their, their own cloud provider.

W. Curtis Preston:

So if I want to attack you, and I know who your cloud provider is, I can

Prasanna Malaiyandi:

go through

W. Curtis Preston:

own environment inside that cloud provider and potentially

W. Curtis Preston:

allowing me not direct access, but, um, you know, just slightly easier because

W. Curtis Preston:

I'm coming from a place you trust.

W. Curtis Preston:

Um, which I would think is relatively easy to protect against,

Prasanna Malaiyandi:

Yep.

Prasanna Malaiyandi:

I don't know.

Prasanna Malaiyandi:

It

W. Curtis Preston:

again, not an information security because I, I'm

W. Curtis Preston:

not gonna trust you just because you came from AWS, I'm gonna trust you

W. Curtis Preston:

because you came from an IP address range or known IP addresses from AWS.

Prasanna Malaiyandi:

But, but even those known IP address ranges, just because

Prasanna Malaiyandi:

you're spinning up and down so quickly, if their private IP address is sure.

Prasanna Malaiyandi:

But if their public IP addresses, given how I can quickly spin up, spin down,

Prasanna Malaiyandi:

spot instances, everything else, like I don't actually know what IP range I

Prasanna Malaiyandi:

will necessarily get for those instances

W. Curtis Preston:

Well, again, I'm not running a corporate it

W. Curtis Preston:

network, but I would think that there's a way to deal with that.

Prasanna Malaiyandi:

:

there is, but it may be.

W. Curtis Preston:

I think that's the point of this, of this thing is

W. Curtis Preston:

to say, address that concern, right?

Prasanna Malaiyandi:

Cloud makes it easy to do all these dynamic things, but make

Prasanna Malaiyandi:

sure you're thinking about how to still secure, even though things could be

Prasanna Malaiyandi:

dynamic, don't just leave it all open.

W. Curtis Preston:

right.

W. Curtis Preston:

And then the next is attacks against multifactor authentication.

W. Curtis Preston:

And I've seen this.

W. Curtis Preston:

First off, there are many different types of multifactor authentication.

W. Curtis Preston:

There are different factors as they're called there is there's SMS.

W. Curtis Preston:

There's email.

W. Curtis Preston:

There are the little, um, the, to, you know, the little tokens,

Prasanna Malaiyandi:

Yep.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

uh, and then there are like apps like

W. Curtis Preston:

authy or Google authenticator.

W. Curtis Preston:

There's also just in my life.

W. Curtis Preston:

I know I also use the Symantec app, like one of my financial vendors,

W. Curtis Preston:

I have to download the Symantec MFA app as well as the, um, uh, oh.

W. Curtis Preston:

And my, my bank has its own authenticator app.

Prasanna Malaiyandi:

And since we're talking about RSA earlier, right.

Prasanna Malaiyandi:

Remember back in the day, all the key fobs that you would have, right.

Prasanna Malaiyandi:

Which would give you the six digit code, which you then use for MFA.

Prasanna Malaiyandi:

And now everyone's moving away from that to, like you said,

Prasanna Malaiyandi:

SMS or one of these apps.

Prasanna Malaiyandi:

And I think the challenge is some of these methods are not as secure as others.

Prasanna Malaiyandi:

And so someone can impersonate can spoof can acquire those MFA codes that are

Prasanna Malaiyandi:

being sent to supposedly you Curtis, but they're intercepting it if you will.

Prasanna Malaiyandi:

And using it to register their own devices.

Prasanna Malaiyandi:

And once their own device is registered, now they have full access to everything.

W. Curtis Preston:

Exactly.

W. Curtis Preston:

And then, and then there's also just a concern when it is a physical

W. Curtis Preston:

token or when it is an app on a phone or when it is an SMS to a phone.

W. Curtis Preston:

What process do you have in place for when someone loses their, their token?

Prasanna Malaiyandi:

No one ever loses their stuff, Curtis,

W. Curtis Preston:

Right.

Prasanna Malaiyandi:

or when they trade in their phone.

W. Curtis Preston:

I don't know what you're talking about.

W. Curtis Preston:

The, um, so, and, and do you have backup authentication mechanisms in

W. Curtis Preston:

place for when somebody loses their, their primary authentication mechanism?

W. Curtis Preston:

And do you have a way to disable the, you know, whatever, whatever I think

W. Curtis Preston:

you should have like, like a more secure method, like an app or the token?

W. Curtis Preston:

If you're attempting a direct attack on a person or on a company and

W. Curtis Preston:

you've targeted a person, you can very easily target the physical

W. Curtis Preston:

thing that they're using as a token.

W. Curtis Preston:

Right.

Prasanna Malaiyandi:

Your phone, right?

Prasanna Malaiyandi:

This is what happens often with a lot of the crypto heists that you're seeing

Prasanna Malaiyandi:

is people call into the cell phone provider, pretend to be the person,

Prasanna Malaiyandi:

port the number over to another carrier.

Prasanna Malaiyandi:

Do the MFA, get the code and then clear out their crypto wallet.

W. Curtis Preston:

I went to a talk with, uh, Kevin Mitnick once, and

W. Curtis Preston:

I know not, everybody's a huge fan of Kevin Mitnick, but I learned a

W. Curtis Preston:

lot in that talk about things like.

W. Curtis Preston:

How, how he gets, you know, how he hacks into physical, physical.

W. Curtis Preston:

He, he has a lot more social engineering and physical

W. Curtis Preston:

hacking than I would've thought.

W. Curtis Preston:

And like, and he, he does white hat hacking.

W. Curtis Preston:

Right.

W. Curtis Preston:

And he talked about getting into a bank by using a, um, what,

W. Curtis Preston:

what are, what are they called?

W. Curtis Preston:

The little badges.

W. Curtis Preston:

There's a name for that?

W. Curtis Preston:

The,

Prasanna Malaiyandi:

Oh,

Prasanna Malaiyandi:

the key card,

W. Curtis Preston:

that you,

W. Curtis Preston:

what.

Prasanna Malaiyandi:

the key card swipe

W. Curtis Preston:

Well, like it's key card.

W. Curtis Preston:

There's a, there's a name for that type of key card.

W. Curtis Preston:

But anyway, he, he has a scanner that he can scan that if he's he, he has two

W. Curtis Preston:

different ones, ones that he can scan from really close and the ones that he

W. Curtis Preston:

can scan from like several feet away.

W. Curtis Preston:

And he talked about going into a bathroom.

W. Curtis Preston:

the men's bathroom in a bank where he needed to go and just waited for

W. Curtis Preston:

a dude to come in, guys, you know, go into the bathroom and he's sitting

W. Curtis Preston:

there scanning the guy's card.

W. Curtis Preston:

Next thing you know, he's got a badge to get into the thing.

W. Curtis Preston:

Again.

W. Curtis Preston:

That's why we have MFA.

W. Curtis Preston:

Right.

W. Curtis Preston:

So, you know, you need something more than

Prasanna Malaiyandi:

Digest that.

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

plus a digit,

W. Curtis Preston:

right?

Prasanna Malaiyandi:

Or a picture.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Face

W. Curtis Preston:

thumbprint.

Prasanna Malaiyandi:

Something else?

W. Curtis Preston:

Hopefully, he's not cutting off anybody's

W. Curtis Preston:

thumbs, but all right.

Prasanna Malaiyandi:

So the fourth one is attacks involving

Prasanna Malaiyandi:

stalkerware against mobile devices.

Prasanna Malaiyandi:

Right?

Prasanna Malaiyandi:

So.

W. Curtis Preston:

Yeah.

Prasanna Malaiyandi:

Yeah.

Prasanna Malaiyandi:

Well, if you think about this, this is a lot around, like

Prasanna Malaiyandi:

there is the NSO group, right?

Prasanna Malaiyandi:

You're starting to see a lot of these sort of things being used, where people

Prasanna Malaiyandi:

are able to leverage zero day bugs and other things to install spyware.

Prasanna Malaiyandi:

If you will, on mobile devices.

Prasanna Malaiyandi:

And they can do it without requiring any interaction from the user.

Prasanna Malaiyandi:

They're now able to track where the user's going, what they're doing,

Prasanna Malaiyandi:

read your emails, read all your text messages, pull out your MFAs.

Prasanna Malaiyandi:

Right?

Prasanna Malaiyandi:

It's all scary stuff.

Prasanna Malaiyandi:

And before we used to think, oh, it's only in spy movies and it

Prasanna Malaiyandi:

won't happen to the common user.

Prasanna Malaiyandi:

Now there's, there's like groups and companies, which this is what they do.

Prasanna Malaiyandi:

And it's

W. Curtis Preston:

Yeah, that, that that freaks me out.

W. Curtis Preston:

Right?

W. Curtis Preston:

The idea of people just sort of randomly grabbing my,

W. Curtis Preston:

somehow these, these exploits.

W. Curtis Preston:

That's why I will say like in my personal life, when, whenever.

W. Curtis Preston:

Apple comes out with, and they're like, this is a security

W. Curtis Preston:

update and I'm like, boom, I'm

Prasanna Malaiyandi:

Uh,

W. Curtis Preston:

done.

W. Curtis Preston:

I've already like, I'm halfway through reading the article and

W. Curtis Preston:

I've already started installing it

Prasanna Malaiyandi:

Yeah.

Prasanna Malaiyandi:

I think apple is the, yeah, I think apple products are the

Prasanna Malaiyandi:

only one that I, oh, sorry.

Prasanna Malaiyandi:

iOS products are the only ones that I immediately install.

Prasanna Malaiyandi:

My laptop.

Prasanna Malaiyandi:

I'm a little out of date

W. Curtis Preston:

Yeah.

W. Curtis Preston:

of course I, I'm not, I'm not dragging my laptop around.

W. Curtis Preston:

Like I used to.

W. Curtis Preston:

Right.

W. Curtis Preston:

I'm look, I'm looking at my laptop right now, which for the record

W. Curtis Preston:

is never on top of my laptop.

W. Curtis Preston:

It just sits there.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um,

W. Curtis Preston:

yeah.

W. Curtis Preston:

So that's, that's kind of, so I, I guess the biggest thing there is again,

W. Curtis Preston:

secure your personal mobile device.

W. Curtis Preston:

Um,

Prasanna Malaiyandi:

be careful if you plug in, like, I've seen a lot of people,

Prasanna Malaiyandi:

they go and they just take the USB cable and they're like, oh, there's a USB port.

Prasanna Malaiyandi:

Let me plug it in.

Prasanna Malaiyandi:

Or they see a cable like plugged in or just standing there.

Prasanna Malaiyandi:

And they're like, oh, let me charge my phone quickly.

Prasanna Malaiyandi:

And they plug it in.

Prasanna Malaiyandi:

It's like, don't do those sort of things.

W. Curtis Preston:

we, we, we talked a couple episodes ago.

W. Curtis Preston:

I think we talked about this, about the, the dropping of the USB

W. Curtis Preston:

thumb drives and stuff like that.

W. Curtis Preston:

But again, that same talk that, uh, that I went to with Kevin Mitnick.

W. Curtis Preston:

He had a, he had a guy come up on stage and he handed him a, a USB cable, a

W. Curtis Preston:

USB charging cable for his iPhone.

W. Curtis Preston:

And he's like, I want you to examine this cable.

W. Curtis Preston:

He's.

W. Curtis Preston:

I'm examining it.

W. Curtis Preston:

And he's like, okay, you know, and he is like, does it look any different?

W. Curtis Preston:

And he's like, Nope.

W. Curtis Preston:

He goes, okay, we're gonna plug it in over here.

W. Curtis Preston:

And he plugged it and he plugged it into the wall.

W. Curtis Preston:

He plugged it into the wall and then he, and then he pulled up his laptop on

W. Curtis Preston:

the screen and we could see that he was reading the guy's data off his phone.

Prasanna Malaiyandi:

Yeah.

W. Curtis Preston:

I'm.

W. Curtis Preston:

Damn that's.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

So stay away from, you know, stay away from strange devices.

W. Curtis Preston:

This is also why you don't enable the USB, you know, the USB, uh,

W. Curtis Preston:

the data access on the USB ports.

W. Curtis Preston:

When you put in a strange device, this is why you don't just randomly

W. Curtis Preston:

use random chargers out there.

W. Curtis Preston:

Bring your own charger.

W. Curtis Preston:

Um, Know thy cable.

W. Curtis Preston:

Um, so the, the next one is another one.

W. Curtis Preston:

That's that's kind of, and again, this is one of these, like, um, this is sort

W. Curtis Preston:

of like the cloud, the cloud is not bad, but the cloud is being used in bad ways.

W. Curtis Preston:

Bitcoin is not bad, but being Bitcoin is being used in bad ways.

W. Curtis Preston:

And there's a couple different articles that I saw in this, this.

W. Curtis Preston:

The the, the CRN article doesn't specifically mention Starlink, but

W. Curtis Preston:

the other article did, and they were saying that that Starlink

W. Curtis Preston:

enables a lot of really cool stuff.

W. Curtis Preston:

And they were talking about how they were able to re enable

W. Curtis Preston:

access in Ukraine, for example.

Prasanna Malaiyandi:

When the modems got wiped and they lost access and

W. Curtis Preston:

right.

W. Curtis Preston:

J just similar to.

W. Curtis Preston:

To that DR story that we had with, uh, the island that, uh, they, they had to

W. Curtis Preston:

use wireless internet, or they had to use satellite internet, which I'm guessing

W. Curtis Preston:

was not as good back then as it is now.

W. Curtis Preston:

But what he was saying was be concerned about nation state hacking and With

W. Curtis Preston:

the advent of things like Starlink, you could be dealing with a nation state

W. Curtis Preston:

that doesn't look like a nation state.

Prasanna Malaiyandi:

yep.

Prasanna Malaiyandi:

The lines get blurred right between.

W. Curtis Preston:

So it's

W. Curtis Preston:

not E it's not as easy as like, well, I'm just gonna, like, I don't do

W. Curtis Preston:

any business with anybody in Russia.

W. Curtis Preston:

I'm just gonna block off all access from Russia.

W. Curtis Preston:

Right.

W. Curtis Preston:

Um, you know, I dunno if I ever told you, but I, the backup central got hacked once.

Prasanna Malaiyandi:

Oh

W. Curtis Preston:

Did I tell you that it was a just years ago, but

W. Curtis Preston:

it was a SQL injection attack.

W. Curtis Preston:

And for, for a relatively short period of time, I was flying some country's flag

W. Curtis Preston:

on the, on the front page of my website.

W. Curtis Preston:

And also, uh, I was, there was some stuff in my metadata that was.

W. Curtis Preston:

Bad stuff.

W. Curtis Preston:

I don't remember what it was, but it, they had inserted stuff in my

W. Curtis Preston:

metadata, which didn't need to be there.

W. Curtis Preston:

Um, and that was the, that was the biggest evidence that, that that's actually how

W. Curtis Preston:

I, something, something clued me in.

W. Curtis Preston:

But, um, yeah, it was SQL injection attack recovered via backups.

W. Curtis Preston:

Of course.

Prasanna Malaiyandi:

Nice.

W. Curtis Preston:

Um, good news is backup central.

W. Curtis Preston:

Doesn't have like A huge.

W. Curtis Preston:

Change rate

Prasanna Malaiyandi:

yeah.

W. Curtis Preston:

it's like once a week I put in a new episode.

W. Curtis Preston:

So,

W. Curtis Preston:

um,

Prasanna Malaiyandi:

And since you were talking about backups, since

Prasanna Malaiyandi:

we're talking about Ukraine, I can't remember where I was reading this

Prasanna Malaiyandi:

article, but they were mentioning, they were talking about Ukraine and

Prasanna Malaiyandi:

how they got hit with these attacks.

Prasanna Malaiyandi:

Like, and they were talking about how because they've been so like the it

Prasanna Malaiyandi:

industry there has gotten so used to dealing with disruptive operations,

Prasanna Malaiyandi:

they're actually really, really good at restoring their environments.

Prasanna Malaiyandi:

Because they're kind of doing it all the time.

Prasanna Malaiyandi:

Like when not Petya hit.

Prasanna Malaiyandi:

Right.

Prasanna Malaiyandi:

And other things like that, they're able to like quickly get up and running

Prasanna Malaiyandi:

in like hours rather than like weeks that most other companies take, because

Prasanna Malaiyandi:

they're like, oh yeah, we just drill.

Prasanna Malaiyandi:

We practice, we practice, we practice.

Prasanna Malaiyandi:

and so they have it down.

W. Curtis Preston:

and I think the same is true of me.

W. Curtis Preston:

It's like the reason why I got so good at backup is because it, you

W. Curtis Preston:

know, partly because I had a job and that was all I did was backups.

W. Curtis Preston:

But then I left that job to become a quote, real sysadmin.

W. Curtis Preston:

And they put me at the headquarters of Amoco and they had the,

W. Curtis Preston:

the, the actual headquarters part, which is where I was at.

W. Curtis Preston:

They.

W. Curtis Preston:

They had an it department that was kind of had been ignored.

W. Curtis Preston:

And so I was, I was in there doing the, the person that was running

W. Curtis Preston:

the it department, uh, just, wasn't a very strong CIS admin.

W. Curtis Preston:

And, uh, and so they brought us in to, to assist and, and so we started

W. Curtis Preston:

doing things like crazy things, like loading the most recent, uh,

W. Curtis Preston:

patches and rebooting the servers once in a while and things like that.

W. Curtis Preston:

But.

W. Curtis Preston:

But they were dying left and right.

W. Curtis Preston:

and so, so I just got really good at not only like just doing backups and restores,

W. Curtis Preston:

but doing bare metal backups and restores,

Prasanna Malaiyandi:

and doing quickly and pain free.

W. Curtis Preston:

yeah,

W. Curtis Preston:

exactly.

W. Curtis Preston:

And, uh, you can hear all about that in the episode.

W. Curtis Preston:

Uh, how I, what is something about how I got the nickname crash?

W. Curtis Preston:

I think

Prasanna Malaiyandi:

Uh, sure.

W. Curtis Preston:

there's a, we have an episode we talked.

W. Curtis Preston:

How I used to be called crash,

W. Curtis Preston:

Well, anyway, it's up there somewhere.

W. Curtis Preston:

One of those episodes, we'll find it, see if I can figure it out.

W. Curtis Preston:

But, um, yeah, that's how I got the nickname crash, cuz I was

W. Curtis Preston:

like, I was rebooting servers and they weren't coming back up and

W. Curtis Preston:

then, so I got really good at it.

W. Curtis Preston:

So that's interesting.

W. Curtis Preston:

So

Prasanna Malaiyandi:

the last one, your favorite

W. Curtis Preston:

and the last one we need, we need a drum roll sound.

W. Curtis Preston:

You boo.

W. Curtis Preston:

The fifth one is attacks against system backup

Prasanna Malaiyandi:

:

No one ever does that.

W. Curtis Preston:

Right.

W. Curtis Preston:

And you know, this has become huge, you know, and they're saying here that backups

W. Curtis Preston:

were the last line of defense, but they're also becoming the first line of attack.

W. Curtis Preston:

And, you know, they're saying that the back the software used to create

W. Curtis Preston:

the backups have flaws and the backup software vendors have had

W. Curtis Preston:

to address these vulnerabilities.

W. Curtis Preston:

And, and I would say it's, it's.

W. Curtis Preston:

It it's less of a flaw generally in the backup software itself, but more

W. Curtis Preston:

in the overall infrastructure, right?

W. Curtis Preston:

Yes.

W. Curtis Preston:

There's also, I'd say that historically backup software was not written

W. Curtis Preston:

with information security in mind.

W. Curtis Preston:

Back in the day, you had to be root to run your backups.

W. Curtis Preston:

You had to be root everywhere.

W. Curtis Preston:

So I used to joke a lot about the back.

W. Curtis Preston:

You know, backup admin is like trust your backup admin because they can delete

W. Curtis Preston:

everything, including your backups.

W. Curtis Preston:

So that's no longer the case.

W. Curtis Preston:

And, and I will say this, if you're I say it all the time, if your backup

W. Curtis Preston:

software still requires you to have root on servers that you're backing

W. Curtis Preston:

up and or root on the backup server.

W. Curtis Preston:

In order to just run the backups, then you need to run.

W. Curtis Preston:

Don't walk from that backup software product.

W. Curtis Preston:

The, you should be able to put a junior person in charge of the backups,

W. Curtis Preston:

which you shouldn't do, but I'm just saying you should be able to do that.

W. Curtis Preston:

Put someone who does not have sysadmin privileges in charge of the backups and,

W. Curtis Preston:

and they should be able to do everything that they need to do without needing

Prasanna Malaiyandi:

Operate root.

Prasanna Malaiyandi:

Yep.

Prasanna Malaiyandi:

I'm just trying

W. Curtis Preston:

Because you wanna limit the blast radius, right.

W. Curtis Preston:

And the backup user itself is powerful enough, but the, you know, just limit

W. Curtis Preston:

the blast radius wherever you can.

W. Curtis Preston:

But the, but the biggest thing I think, um, is, as I said earlier,

W. Curtis Preston:

is we talk about it a lot is . How people are storing their backups.

Prasanna Malaiyandi:

So because all this data, right?

Prasanna Malaiyandi:

There's a lot of data.

Prasanna Malaiyandi:

There are a lot of systems you're backing up, right?

Prasanna Malaiyandi:

Typically you end up writing to something, some other storage

Prasanna Malaiyandi:

device for your backups.

Prasanna Malaiyandi:

And a lot of people just dump it out over a standard protocol,

Prasanna Malaiyandi:

like NFS or SMB . Right.

Prasanna Malaiyandi:

great because now I can just bring in any storage array.

Prasanna Malaiyandi:

I just plug it in.

Prasanna Malaiyandi:

I now start backing up to it.

Prasanna Malaiyandi:

Easy peasy.

Prasanna Malaiyandi:

The downside is it's an open protocol, right?

Prasanna Malaiyandi:

It's an open endpoint that anyone else can also access.

Prasanna Malaiyandi:

So

W. Curtis Preston:

Emphasis on open

Prasanna Malaiyandi:

yeah, it is open.

Prasanna Malaiyandi:

Um, and so anyone can access it, which means if ransom, if a attacker.

Prasanna Malaiyandi:

exploits, it's not even your backup server, but even any other server in

Prasanna Malaiyandi:

the environment, they could potentially gain access to that Mount and start

Prasanna Malaiyandi:

accessing, deleting, exfiltrating, which is probably even a bigger issue, right.

Prasanna Malaiyandi:

Your data.

Prasanna Malaiyandi:

And you could be in trouble.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

And I would say, I would add to that just like the default installation

W. Curtis Preston:

of a lot of disk space backup products is, is not an NFS target.

W. Curtis Preston:

It's just a regular disc target race, just a, you know, SQL back slash backups.

W. Curtis Preston:

Um, that's not good either, especially if it's a windows box, you know?

W. Curtis Preston:

Yes.

W. Curtis Preston:

I prefer Unix and Linux and yes, I think they're more secure.

W. Curtis Preston:

They're not perfect, but it is a stating a fact saying that windows is

W. Curtis Preston:

the number one target for ransomware.

W. Curtis Preston:

It's not the only one, but it's definitely the number one.

W. Curtis Preston:

And so for your backups to be sitting on a Windows server, And, and then

W. Curtis Preston:

the backups are inside that server

W. Curtis Preston:

you know, so

Prasanna Malaiyandi:

:

That's probably not a good

W. Curtis Preston:

attacked, you can, you can do that.

W. Curtis Preston:

There are ways to address all of these concerns

Prasanna Malaiyandi:

Yep.

Prasanna Malaiyandi:

Which we talked about in numerous.

W. Curtis Preston:

yeah,

W. Curtis Preston:

we have.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

So, but, but I just do, I do find it interesting cuz we talk about

W. Curtis Preston:

it a lot and sometimes I, I feel like I live in the, you know,

Prasanna Malaiyandi:

Can I bubble

W. Curtis Preston:

of, of a backup company and I'm like, yes, but it's nice to see.

W. Curtis Preston:

vindication of the RSA conference saying that one of the top

W. Curtis Preston:

five data risks right now

W. Curtis Preston:

Is the, you know, the loss of your

Prasanna Malaiyandi:

:

attacks on your backups

W. Curtis Preston:

you're doing them.

W. Curtis Preston:

And, you know, and, and the, and I've said it before, but I'll say it again.

W. Curtis Preston:

The reason this is the case, I'd say two things.

W. Curtis Preston:

One is.

W. Curtis Preston:

Hacking, you know, and, and, and all, and, and ransomware and

W. Curtis Preston:

all that's creating an industry.

W. Curtis Preston:

So there's resources and stuff that, that, that the bad folks

W. Curtis Preston:

just didn't have back in the day.

W. Curtis Preston:

But the other is the, in the backup industry's move from tape to disc as

W. Curtis Preston:

their primary protection mechanism.

W. Curtis Preston:

And so it makes it really easy to get access to it.

W. Curtis Preston:

If you haven't done the right things, um, go.

Prasanna Malaiyandi:

One of the articles on the SANs list of

Prasanna Malaiyandi:

bad backups is from tech target.

Prasanna Malaiyandi:

And there was a quote from the, one of the presenters, right?

Prasanna Malaiyandi:

Backups are boring.

Prasanna Malaiyandi:

Boring is good.

Prasanna Malaiyandi:

Keep it boring.

W. Curtis Preston:

Yeah, yeah.

W. Curtis Preston:

Backups are boring.

W. Curtis Preston:

That's why nobody wants to be the backup person, but you know, it is what it is.

W. Curtis Preston:

And, you know, you know, I saw that quote and I was like, I

W. Curtis Preston:

don't know how I feel about that.

W. Curtis Preston:

And I don't mean that like, Like I'm being insulted

Prasanna Malaiyandi:

Yeah, I think, I think instead of boring,

Prasanna Malaiyandi:

I think it's what is it simple or

W. Curtis Preston:

Yeah,

Prasanna Malaiyandi:

easy or something like that,

W. Curtis Preston:

Yeah.

W. Curtis Preston:

The problem is the, and again,

W. Curtis Preston:

to a hammer, everything looks like a nail, but, and I work for a.

W. Curtis Preston:

Cloud backup vendor.

W. Curtis Preston:

But to me, the only way to do backups today, easy is to use the

W. Curtis Preston:

SaaS product that does backups.

W. Curtis Preston:

Everything else is hard, right?

W. Curtis Preston:

Buy a box, secure that box, buy some backup software, secure that backup

W. Curtis Preston:

software, buy a backup target, secure that and all that stuff.

W. Curtis Preston:

You know, just all of that.

W. Curtis Preston:

That is not simple.

W. Curtis Preston:

It used to be simple.

W. Curtis Preston:

It is not simple anymore.

W. Curtis Preston:

And you can't just hand the keys to the backup kingdom, to the, to the new person

W. Curtis Preston:

and expect them to figure all that out.

W. Curtis Preston:

Right.

W. Curtis Preston:

They're

Prasanna Malaiyandi:

Here you go.

Prasanna Malaiyandi:

Good luck.

W. Curtis Preston:

Good luck, please, please keep the keys to

W. Curtis Preston:

our kingdom secure from all the bad, you know, hackers out there.

W. Curtis Preston:

Uh, the only way to do that in my opinion is to use SaaS service and,

W. Curtis Preston:

and, and, by the way, it, it, you know, let me rephrase what I'm saying

W. Curtis Preston:

is the only way to do it simply.

Prasanna Malaiyandi:

Yep.

W. Curtis Preston:

We've had the guys from Veeam on here.

W. Curtis Preston:

Right.

W. Curtis Preston:

I'm not anti Veeam and they've got answers to these concerns.

W. Curtis Preston:

It's simple if you know what you're doing, but to me, um, and

W. Curtis Preston:

I'm not saying it's, I don't know.

W. Curtis Preston:

I, I'm not attacking these folks.

W. Curtis Preston:

I'm just saying there's nothing simpler than just put in an agent and point.

W. Curtis Preston:

Right.

W. Curtis Preston:

You don't have any of the backend security

Prasanna Malaiyandi:

Issue story

W. Curtis Preston:

stuff to worry about, right?

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Anyway.

W. Curtis Preston:

All right, well, um, you know, I'm gonna go maybe have a beer and, uh, think

W. Curtis Preston:

about my, all those people yelling at me over the over the, over the election.

Prasanna Malaiyandi:

not just gonna start.

Prasanna Malaiyandi:

Oh, about the election.

Prasanna Malaiyandi:

Okay.

Prasanna Malaiyandi:

Yeah, no, I thought you were going to be like, yeah, I'm gonna go call all those

Prasanna Malaiyandi:

people who told me I was wrong in the past and you just have like a book somewhere

Prasanna Malaiyandi:

and you're just going through it.

Prasanna Malaiyandi:

Crossing out line by line,

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Um,

Prasanna Malaiyandi:

awkward silence.

Prasanna Malaiyandi:

He didn't deny it.

Prasanna Malaiyandi:

He might actually have a book.

W. Curtis Preston:

I don't know.

W. Curtis Preston:

Maybe I might have a book.

W. Curtis Preston:

I'm just saying maybe I got it all up in here.

W. Curtis Preston:

You know, maybe

Prasanna Malaiyandi:

good with names.

Prasanna Malaiyandi:

You're not good with names.

Prasanna Malaiyandi:

I

W. Curtis Preston:

Okay, dang it.

W. Curtis Preston:

Dang it.

W. Curtis Preston:

I am busted.

W. Curtis Preston:

I suck at names like literally.

W. Curtis Preston:

I mean people that I know and talk to all the time, it, it hasn't

W. Curtis Preston:

happened to me with you yet, but I've had people that I've known for

W. Curtis Preston:

years and then I'll be talking to 'em and I'll be in the middle of a

W. Curtis Preston:

conversation with him and I'll realize, I can't remember this person's name.

Prasanna Malaiyandi:

This happened to me the other day, I was on a video

Prasanna Malaiyandi:

call and I was talking to the person.

Prasanna Malaiyandi:

And for some reason, my mind just went blank.

Prasanna Malaiyandi:

And luckily though they had the name of the person at the bottom of the screen.

Prasanna Malaiyandi:

I was like, oh, thank God.

Prasanna Malaiyandi:

It's like someone I interacted with so much.

Prasanna Malaiyandi:

Like I was like, I should know this.

W. Curtis Preston:

Yeah.

W. Curtis Preston:

And I met a, I met a new person, one of the folks that worked with me at the

W. Curtis Preston:

election and, uh, his name is, is Allen.

W. Curtis Preston:

I had to think about it for a minute.

W. Curtis Preston:

And the reason I had to think about it was because somebody else started

W. Curtis Preston:

calling him, Larry, his name's not Larry.

W. Curtis Preston:

They, they reminded him of Larry.

W. Curtis Preston:

And so they started calling him Larry, and then halfway through the election.

W. Curtis Preston:

He just turns his badge over and he puts his, puts his name as

W. Curtis Preston:

Larry I'm like, okay, for a guy like me, that is not helpful.

W. Curtis Preston:

Like, I

Prasanna Malaiyandi:

You're like it's already hard enough keeping track

W. Curtis Preston:

it's already hard enough.

W. Curtis Preston:

And then he added another he's like, well, my dad always called

W. Curtis Preston:

me Bob or something like that.

W. Curtis Preston:

I was like, grrrr, like stop.

Prasanna Malaiyandi:

That's why like,

W. Curtis Preston:

Yeah.

W. Curtis Preston:

Anyway.

W. Curtis Preston:

All right.

W. Curtis Preston:

Well, thanks

W. Curtis Preston:

for discussing the, the RSA conference with me

Prasanna Malaiyandi:

how's it going?

Prasanna Malaiyandi:

Anytime, Curtis, and go enjoy your beer.

W. Curtis Preston:

I will definitely do that.

W. Curtis Preston:

And remember folks out there.

W. Curtis Preston:

Thanks for listening.

W. Curtis Preston:

And remember to subscribe so that you can restore it all.

Links

Chapters

Video

More from YouTube