
Sign up to save your podcasts
Or


This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hacking, and social engineering tactics. The hosts discuss real-world defenses including USB port management, network segmentation, and employee training. They explore WPA2 encryption vulnerabilities and why upgrading to WPA3 matters for wireless security. The conversation covers practical cybersecurity situational awareness lessons, from recognizing physical security threats to monitoring network traffic patterns. Curtis shares war stories about malware-infected conference USB sticks, and both hosts examine how poor cybersecurity situational awareness enabled the fictional attacks. This episode provides actionable insights for IT professionals looking to strengthen their organization's security posture against USB-based threats, Bluetooth exploits, and social engineering campaigns.
By W. Curtis Preston (Mr. Backup)4.7
2525 ratings
This episode of The Backup Wrap-up examines cybersecurity situational awareness through the lens of Mr. Robot's prison break episode. Curtis and Prasanna analyze the technical accuracy of USB stick attacks, Bluetooth car hacking, and social engineering tactics. The hosts discuss real-world defenses including USB port management, network segmentation, and employee training. They explore WPA2 encryption vulnerabilities and why upgrading to WPA3 matters for wireless security. The conversation covers practical cybersecurity situational awareness lessons, from recognizing physical security threats to monitoring network traffic patterns. Curtis shares war stories about malware-infected conference USB sticks, and both hosts examine how poor cybersecurity situational awareness enabled the fictional attacks. This episode provides actionable insights for IT professionals looking to strengthen their organization's security posture against USB-based threats, Bluetooth exploits, and social engineering campaigns.

32,082 Listeners

291 Listeners

2,001 Listeners

625 Listeners

375 Listeners

637 Listeners

1,017 Listeners

112,489 Listeners

175 Listeners

314 Listeners

73 Listeners

134 Listeners

5,469 Listeners

16,091 Listeners

44 Listeners