ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Disk Backup Security EXPOSED: The Vulnerability Nobody Discusses

Автор: The Backup Wrap-up

Загружено: 2026-01-26

Просмотров: 21

Описание: Disk backup security is the vulnerability ransomware attackers exploit first—here's what you need to know to protect your data.

When the industry moved from tape to disk-based backups, we gained some incredible capabilities. Deduplication made backup storage affordable. Replication meant we could have automated offsite copies without shipping tapes. Virtual synthetics made restores faster than ever. Backup verification became practical and routine.

But we also created a problem nobody anticipated: disk backup security was never part of the original design.

In this episode of The Backup Wrap-up, I sit down with Prasanna Malaiyandi to talk about how we got here and what you can do about it. Here's the reality: if your backups are sitting in a directory like E:\backups, a threat actor who gains access to your system can wipe them out with a single command. RM minus R. Del star-star. That's it. Years of backup data, gone in seconds.

This isn't theoretical. Backup systems are the number one target for ransomware attackers. They know that if they can take out your backups, you have no choice but to pay. Products like Veeam, which revolutionized backup with their "it just works" approach, had to acknowledge this threat and build countermeasures. Every backup vendor has had to respond to this reality.

So what can you do about disk backup security?

First, get your backups out of user space. If you can see your backups as a normal file path, that's a problem. Anyone who compromises an account with access to that path can delete everything.

Second, and this is the big one: immutability. If you can't delete the backups, they can't delete the backups. Truly immutable storage—where the data cannot be modified or removed regardless of who's asking—is no longer optional. It's the standard.

Third, consider obfuscation. Don't name your backup folder "backups." Rename processes and directories. It's not a complete solution, but it adds friction for attackers.

We also talk about the history of tape versus disk, why tape's air-gapped nature provided security we took for granted, and how technologies like LTO-10 are still relevant in 2026. Plus, I mention my upcoming book with Dr. Mike Sailor, "Learning Ransomware Response and Recovery," which covers these topics in depth.

If your backups aren't protected by immutable storage, you're leaving yourself exposed. The threat actors are coming for your backups. Make sure they can't get to them.
🔗 Learn more: https://www.backupwrapup.com/
📖 Book: "Learning Ransomware Response and Recovery" - Available on O'Reilly Learning Platform now, print edition March 2026

TIMESTAMPS:
0:00 - Episode intro
1:24 - Welcome & co-host Prasanna Malaiyandi
3:16 - "Grandpa's talking about tape again"
4:04 - Explaining tape for the modern audience
5:12 - How tape drives work (cassettes vs cartridges)
6:45 - Signal to noise ratio & why tape needs speed
9:07 - The bits got closer, the tape got faster
10:54 - The shoe-shining problem explained
11:30 - Everyone complained - enter disk staging
12:27 - 1999: Deduplication changes everything
13:08 - Avamar, Data Domain & dedupe storage
14:51 - SATA/nearline disks make it affordable
15:35 - The benefits of disk-based backup
15:47 - Backup verification with Veeam SureBackup
17:00 - Replication: No more "man in a van"
18:06 - Virtual synthetics explained
20:22 - "But it all sounds amazing..."
20:29 - THE PROBLEM: RM -r / DEL .
21:51 - Default setups: E:\backups vulnerability
22:27 - Veeam acknowledged the threat
23:43 - Backups are the #1 ransomware target
24:20 - Obfuscation & renaming strategies
25:08 - Get backups out of user space
26:26 - Immutability, immutability, immutability
27:00 - The bear analogy: outrun the other guy
27:32 - Book mention: Learning Ransomware Response & Recovery
28:11 - "Disk is awesome, except when it's not"
30:00 - Wrap-up and closing
#backup #ransomware #cybersecurity #dataprotection #immutablebackup #diskbackup #ITsecurityWhile

While you're here, Here's some other great episodes:
   • Cloud Computing DR: Lessons from Real-Worl...  
   • Backup Isn't Archive - Avoid Billion-Dolla...  
   • Air Gaps and Data Protection: Lessons from...  

This YouTube channel is also available as an audio podcast!
https://www.backupwrapup.com

We also have a blog that I've been running for over 20 years!
https://www.backupcentral.com

I've also written four O'Reilly books! My latest:
https://www.amazon.com/Modern-Data-Pr...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Disk Backup Security EXPOSED: The Vulnerability Nobody Discusses

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

The CryptoLocker Virus: Encryption, Botnets & the Rise of Modern Ransomware

The CryptoLocker Virus: Encryption, Botnets & the Rise of Modern Ransomware

Journey On!  February 16, 2026

Journey On! February 16, 2026

City Council Meeting 03-02-2026

City Council Meeting 03-02-2026

Lakeview National Ice Fishing Championship

Lakeview National Ice Fishing Championship

Overhead & Underground — Line Clearance and Dig Safety

Overhead & Underground — Line Clearance and Dig Safety

What Is an Initial Access Broker — and Why Should You Care?

What Is an Initial Access Broker — and Why Should You Care?

Facilities First episode 12!

Facilities First episode 12!

Myron Leffall - Risen From the Ashes

Myron Leffall - Risen From the Ashes

Marek Kozubel - Rosja kompletnie nie gotowa na to co ją czeka.

Marek Kozubel - Rosja kompletnie nie gotowa na to co ją czeka.

❄️ CHOWANY AUTAMI W ŚWIECIE MINECRAFT | BeamNG Drive |

❄️ CHOWANY AUTAMI W ŚWIECIE MINECRAFT | BeamNG Drive |

Ransomware as a Service Explained: No Skills Required

Ransomware as a Service Explained: No Skills Required

How Does the Transfiguration Change Our Everyday Courage? Matthew 17:1–9

How Does the Transfiguration Change Our Everyday Courage? Matthew 17:1–9

The Unseen Curriculum: What Prison Teaches About Life Beyond Bars

The Unseen Curriculum: What Prison Teaches About Life Beyond Bars

KACZYŃSKI w matni, NAWROCKI w pułapce | Dominika Wielowieyska 03.03.2026

KACZYŃSKI w matni, NAWROCKI w pułapce | Dominika Wielowieyska 03.03.2026

Episode 153: Federal Grants in 2026: What Nonprofits Need to Know Before Applying

Episode 153: Federal Grants in 2026: What Nonprofits Need to Know Before Applying

World Food Prize Podcast: Ambassador Michael Froman, President of the Council on Foreign Relations

World Food Prize Podcast: Ambassador Michael Froman, President of the Council on Foreign Relations

Burning Down Cybersecurity Myths: Insights from Joshua Copeland

Burning Down Cybersecurity Myths: Insights from Joshua Copeland

Journey On! February 24, 2026

Journey On! February 24, 2026

SZKOŁA *GTA w szkole 5 XD*

SZKOŁA *GTA w szkole 5 XD*

The Scarcity Myth: Debunking Limitation and Cultivating an Abundance Mentality

The Scarcity Myth: Debunking Limitation and Cultivating an Abundance Mentality

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]