Adopting Zero Trust

Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall


Listen Later

Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research.

Catch this episode on YouTubeAppleSpotifyAmazon, or GoogleYou can read the show notes here.

Cybersecurity challenges come in many different flavors regardless of how old your company is or how many employees it houses. Larger companies have to deal with layers upon layers of technology, processes, and the people who support it. Smaller organizations are resource-constrained, often lack the experience or expertise to build a proper program, and typically rely on external support systems.

While larger companies may not be nimble, typically, they employ and understand the value of threat intelligence to hone in on risks that could impact the business. They also have larger targets on their back because they are seen as more valuable targets for data, financial drain, and other nefarious purposes. In the same, smaller organizations may not be as valuable as a direct target, but they can be seen as a doorway into these larger companies. It’s for these reasons that supply chain attacks, even older ones, are among the top threats targeting small businesses and startups.

This week on AZT, we examine the top five threats targeting startups and small businesses and chat with SonicWall’s Executive Director of Threat Research about the WHY behind them. As a researcher and educator through SANS, Doug McKee shares his perspective on why smaller shops need to consider threat intelligence as part of their cybersecurity program and how MSPs can help fulfill that capability.

Top 5 threats to SMBs (According to SonicWall)

Log4j (2021) more than 43% of organizations were under attack

  • Fortinet SSL VPN CVE-2018-13379 - 35% of orgs were under attack

  • Heartbleed (2012) - 35% of organizations

  • Atlassian CVE-2021- 26085 - 32 %

  • Vmware CVE-2021 - 21975 - 28% of orgs

    The Guest: Douglas McKee

    Doug is an experienced information security professional who possesses extensive technical expertise acquired through involvement in application and system security testing, hardware and software vulnerability research, malware analysis, forensics, penetration testing, red team exercises, protocol analysis, application development, and risk mitigation activities. These technical proficiencies are complemented by adept leadership and communication skills, honed through the leadership of teams and projects, collaboration within both large and small teams, and the composition of technical reports for clients.

    Doug is recognized for discovering numerous CVEs and regularly speaks at prominent security conferences such as Blackhat, DEFCON, RSA, Hardware.io, and Ekoparty. Additionally, Douglas's research is frequently featured in publications with a wide readership, including Wired, Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.

    Key Takeaways

    None of these vulnerabilities in SonicWall’s research were found or disclosed between 2022-2024, and yet we’re still dealing with them

  • Old vulnerabilities remain a significant threat

  • The most widespread attacks for SMBs include Heartbleed and Log4j vulnerabilities

  • Many widespread vulnerabilities are supply chain vulnerabilities

  • These vulnerabilities are embedded in multiple products and systems

  • Patching vulnerabilities can be complex and costly

  • Compliance and regulatory standards can complicate the process

  • Attackers are becoming increasingly nuanced in their approaches

    ...more
    View all episodesView all episodes
    Download on the App Store

    Adopting Zero TrustBy Adopting Zero Trust

    • 5
    • 5
    • 5
    • 5
    • 5

    5

    4 ratings


    More shows like Adopting Zero Trust

    View all
    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,006 Listeners

    Cybersecurity Today by Jim Love

    Cybersecurity Today

    166 Listeners

    CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

    CISO Series Podcast

    189 Listeners

    Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

    Defense in Depth

    74 Listeners

    "No Trust" by Zero Trust Forum by "No Trust" by Zero Trust Forum

    "No Trust" by Zero Trust Forum

    5 Listeners

    Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

    Threat Vector by Palo Alto Networks

    34 Listeners