Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall
Adopting Zero Trust13 Kesä 2024

Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall

Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.

Cybersecurity challenges come in many different flavors regardless of how old your company is or how many employees it houses. Larger companies have to deal with layers upon layers of technology, processes, and the people who support it. Smaller organizations are resource-constrained, often lack the experience or expertise to build a proper program, and typically rely on external support systems.

While larger companies may not be nimble, typically, they employ and understand the value of threat intelligence to hone in on risks that could impact the business. They also have larger targets on their back because they are seen as more valuable targets for data, financial drain, and other nefarious purposes. In the same, smaller organizations may not be as valuable as a direct target, but they can be seen as a doorway into these larger companies. It’s for these reasons that supply chain attacks, even older ones, are among the top threats targeting small businesses and startups.

This week on AZT, we examine the top five threats targeting startups and small businesses and chat with SonicWall’s Executive Director of Threat Research about the WHY behind them. As a researcher and educator through SANS, Doug McKee shares his perspective on why smaller shops need to consider threat intelligence as part of their cybersecurity program and how MSPs can help fulfill that capability.

Top 5 threats to SMBs (According to SonicWall)
  • Log4j (2021) more than 43% of organizations were under attack

  • Fortinet SSL VPN CVE-2018-13379 - 35% of orgs were under attack

  • Heartbleed (2012) - 35% of organizations

  • Atlassian CVE-2021- 26085 - 32 %

  • Vmware CVE-2021 - 21975 - 28% of orgs

The Guest: Douglas McKee

Doug is an experienced information security professional who possesses extensive technical expertise acquired through involvement in application and system security testing, hardware and software vulnerability research, malware analysis, forensics, penetration testing, red team exercises, protocol analysis, application development, and risk mitigation activities. These technical proficiencies are complemented by adept leadership and communication skills, honed through the leadership of teams and projects, collaboration within both large and small teams, and the composition of technical reports for clients.

Doug is recognized for discovering numerous CVEs and regularly speaks at prominent security conferences such as Blackhat, DEFCON, RSA, Hardware.io, and Ekoparty. Additionally, Douglas's research is frequently featured in publications with a wide readership, including Wired, Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.

Key Takeaways
  • None of these vulnerabilities in SonicWall’s research were found or disclosed between 2022-2024, and yet we’re still dealing with them

  • Old vulnerabilities remain a significant threat

  • The most widespread attacks for SMBs include Heartbleed and Log4j vulnerabilities

  • Many widespread vulnerabilities are supply chain vulnerabilities

  • These vulnerabilities are embedded in multiple products and systems

  • Patching vulnerabilities can be complex and costly

  • Compliance and regulatory standards can complicate the process

  • Attackers are becoming increasingly nuanced in their approaches

Hosted on Acast. See acast.com/privacy for more information.

Jaksot(58)

Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins

Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins

Season two, episode 13: Cybersecurity prevention on a global scale with Janey Heins, Global CISO for iHeartMedia. At the heart of Zero Trust is the idea of prevention. If you don’t trust anything or a...

27 Heinä 202344min

Adopting Zero Trust: Continuous Trust

Adopting Zero Trust: Continuous Trust

Over the past two years, we’ve explored the ins and outs of Zero Trust, ranging from the concept as a strategy down to the more technical components, such as how it impacts the physical world as found...

13 Heinä 202329min

Adopting Zero Trust: Nonfederated Apps

Adopting Zero Trust: Nonfederated Apps

Last episode, we brought to you a wild story of a victim who was SIM-swapped four times, and this week we’re back to basics with some fresh research and a closer look at a critical piece of Zero Trust...

29 Kesä 202354min

Adopting Zero Trust: SIM Swapped

Adopting Zero Trust: SIM Swapped

Taking a break from our usual format, this week we chat with a victim-turned-CEO who was hit by SIM-swapping attacks. However, not all harsh starts have to end that way, and Haseeb Awan made the best ...

15 Kesä 202359min

Adopting Zero Trust with Bloomberg: Implemented

Adopting Zero Trust with Bloomberg: Implemented

Season two, episode nine: Featuring Bloomberg’s Head of Information Security Architecture and the Information Security Program, Phil Vachon. Catch this episode on YouTube, Apple, Spotify, Amazon, or G...

25 Touko 202351min

Adopting Zero Trust with Bitwarden: The Mighty Password

Adopting Zero Trust with Bitwarden: The Mighty Password

There’s no avoiding it, the headlines have not been kind to the ways we access systems today. Users are still using 1234, password, and even their dog's name. Not just using these weak passwords but a...

11 Touko 202354min

Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy

Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy

For many, cybersecurity is seen as a cost center that reduces risk to the business. This can be oversimplified to something akin to how HR reduces people-related risks but comes with layer on top of l...

27 Huhti 202357min

Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto

Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto

For more than a decade, Zero Trust as a concept has moved from a philosophy and now into a practical architecture and strategy that organizations can adopt. While Zero Trust encapsulates much of what ...

13 Huhti 202339min