![]() |
The Tech Savvy LawyerAuthor: Michael D.J. Eisenberg
The Tech Savvy Lawyer interviews Judges, Lawyers, and other professionals discussing utilizing technology in the practice of law. It may springboard an idea and help you in your own pursuit of the business we call "practicing law". Please join us for interesting conversations enjoyable at any tech skill level! Language: en Genres: News, Tech News, Technology Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
🎙️ Ep. 104: The Importance of Data Backup & Cybersecurity w "Mr. Backup", Curtis Preston!
Episode 104
Tuesday, 21 January, 2025
Our next guest is Curtis Preston, AKA "Mr. Backup". Curtis is a backup and cyber recovery expert, author, podcast host, and technical evangelist for S2Data.com, a firm specializing in helping companies leverage their legacy data. He has been working in the space since 1993 and has written four books on the subject: Modern Data Protection, Backup & Recovery, Using SANs and NAS, and Unix Backup & Recovery. He joined us today to talk about the importance of cybersecurity for lawyers. Join Curtis and me as we talk about the following three questions and more! What are the top three things lawyers are doing wrong with their own cyber security, and how can they correct it? What are the top three issues lawyers are missing or not understanding when it comes to E-discovery? What are the top three things lawyers should be doing when they're under a ransomware attack? In our conversation, we cover: [01.13] Tech Setup – Curtis’s current tech setup. [03.13] Challenges - Challenges of using Windows and Mac operating systems. [07.07] Tips & Tricks - Curtis shares his top three tips for balancing between Windows and Mac. [08.52] Multi-Factor Authentication - Importance of multi-factor authentication and password managers. [13.00] Data Backup - Curtis explains why not backing up your data is a mistake. [19.43] Recovery Services - The importance of having a third-party cloud backup. [20.14] E-Discovery - Curtis explains the E-Discovery challenges and best practices. [22.49] Documented Process – The importance of having a documented, well-tested process for e-discovery. [24.38] Ransomware Attack – Curtis explains the initial steps of handling a ransomware attack. [28.25] The importance of having an authentication and authorization system for a backup. [32.10] Air Gap Backup - Curtis explains how to make an Air Gap backup. [36.07] Relationships - Developing a relationship with cyber professionals. [38.38] Security Questionnaire - The top three things to look for in a security questionnaire from a provider. RESOURCES Connect with Curtis LinkedIn – linkedin.com/in/mrbackup/ Websites – backupcentral.com/ s2data.com/ Books by W. Curtis Preston goodreads.com/author/list/193436.W_Curtis_Preston Equipment Mentioned in the Podcast Apple iPhone 15 - apple.com/shop/buy-iphone/iphone-15 Apple MacBook Pro - apple.com/macbook-pro/ Audio-Technica Microphone - audio-technica.com/en-us/blog/a-look-into-audio-technicas-20-series-microphones Dell Latitude Laptop Computers - dell.com/en-us/shop/dell-laptops/scr/laptops/appref=latitude-product-line Logitech Brio Webcam - logitech.com/en-us/products/webcams/brio-4k-hdr-webcam.html Software & Services Mentioned in the Podcast Cohesity Data Security & Management - cohesity.com/ Dropbox - dropbox.com/ iCloud - icloud.com/ Rubrik Data Protection Solutions - rubrik.com/solutions/backup-recovery s2data - s2data.com/ Time Machine - solution-soft.com/products/time-machine