Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall
Adopting Zero Trust13 Kesä 2024

Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall

Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.

Cybersecurity challenges come in many different flavors regardless of how old your company is or how many employees it houses. Larger companies have to deal with layers upon layers of technology, processes, and the people who support it. Smaller organizations are resource-constrained, often lack the experience or expertise to build a proper program, and typically rely on external support systems.

While larger companies may not be nimble, typically, they employ and understand the value of threat intelligence to hone in on risks that could impact the business. They also have larger targets on their back because they are seen as more valuable targets for data, financial drain, and other nefarious purposes. In the same, smaller organizations may not be as valuable as a direct target, but they can be seen as a doorway into these larger companies. It’s for these reasons that supply chain attacks, even older ones, are among the top threats targeting small businesses and startups.

This week on AZT, we examine the top five threats targeting startups and small businesses and chat with SonicWall’s Executive Director of Threat Research about the WHY behind them. As a researcher and educator through SANS, Doug McKee shares his perspective on why smaller shops need to consider threat intelligence as part of their cybersecurity program and how MSPs can help fulfill that capability.

Top 5 threats to SMBs (According to SonicWall)
  • Log4j (2021) more than 43% of organizations were under attack

  • Fortinet SSL VPN CVE-2018-13379 - 35% of orgs were under attack

  • Heartbleed (2012) - 35% of organizations

  • Atlassian CVE-2021- 26085 - 32 %

  • Vmware CVE-2021 - 21975 - 28% of orgs

The Guest: Douglas McKee

Doug is an experienced information security professional who possesses extensive technical expertise acquired through involvement in application and system security testing, hardware and software vulnerability research, malware analysis, forensics, penetration testing, red team exercises, protocol analysis, application development, and risk mitigation activities. These technical proficiencies are complemented by adept leadership and communication skills, honed through the leadership of teams and projects, collaboration within both large and small teams, and the composition of technical reports for clients.

Doug is recognized for discovering numerous CVEs and regularly speaks at prominent security conferences such as Blackhat, DEFCON, RSA, Hardware.io, and Ekoparty. Additionally, Douglas's research is frequently featured in publications with a wide readership, including Wired, Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.

Key Takeaways
  • None of these vulnerabilities in SonicWall’s research were found or disclosed between 2022-2024, and yet we’re still dealing with them

  • Old vulnerabilities remain a significant threat

  • The most widespread attacks for SMBs include Heartbleed and Log4j vulnerabilities

  • Many widespread vulnerabilities are supply chain vulnerabilities

  • These vulnerabilities are embedded in multiple products and systems

  • Patching vulnerabilities can be complex and costly

  • Compliance and regulatory standards can complicate the process

  • Attackers are becoming increasingly nuanced in their approaches

Hosted on Acast. See acast.com/privacy for more information.

Jaksot(58)

The Security Debt We Pretend Isn’t There

The Security Debt We Pretend Isn’t There

As organizations push return-to-office (RTO) mandates and chase efficiency, many security teams are quietly accumulating debt they don’t know how to unwind.In this episode, we are joined by Lea Cure T...

29 Tammi 50min

Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics

Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics

In this episode, we break down Whisper Leak, a newly disclosed side-channel issue affecting encrypted LLM communications. JBO explains how attackers can infer conversation topics using packet size and...

11 Joulu 202531min

How Critical Infrastructure Leaders Are Rethinking Cybersecurity

How Critical Infrastructure Leaders Are Rethinking Cybersecurity

In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity a...

17 Huhti 202544min

Shadows Within Shadows: How AI is Challenging IT Teams

Shadows Within Shadows: How AI is Challenging IT Teams

In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already e...

20 Maalis 202548min

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights Dave Bittner, host of CyberWire D...

6 Maalis 202532min

Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals

Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals

New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction w...

5 Maalis 20253min

Predicting the year of cybersecurity ahead (minus regulations)

Predicting the year of cybersecurity ahead (minus regulations)

It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… ther...

18 Helmi 20251h 2min

Kicking Off Season 4 of Adoption Zero Trust (AZT)

Kicking Off Season 4 of Adoption Zero Trust (AZT)

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.Neal and I are excited to welcome you back to AZT as we kick off our fourth season. After four years of tryin...

11 Helmi 202522min