MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

News
Cybersecurity threats in smbs plus recommendations devolutions blog

[DIVING INTO THE SURVEY] Cybersecurity Threats in SMBs + Recommendations

In this article, we focus on what SMBs can do to protect themselves against cybersecurity threats rather than take a wait-and-see approach, or assume that they are “too small to be attacked.”

Photo of Laurence Cadieux Laurence Cadieux

In the Devolutions’ State of IT Security in SMBs in 2022-23 survey [report now available!], we asked executives and decision-makers in SMBs worldwide to describe their overall perspective on IT security, covering subjects such as: what they have experienced in the last year, what concerns them the most today, and what they are doing to protect themselves.

Here is a summary of what we learned:

In the report, we provide commentary on the likely reasons for various tactics and trends — some of which are positive, while others are negative.

In the remainder of this article, we focus on what SMBs can do to protect themselves against cybersecurity threats rather than take a wait-and-see approach, or assume that they are “too small to be attacked.” This assumption may be comforting, but it is false. Hackers are increasingly targeting SMBs (read this article to discover the top reasons why).

Recommendations for SMBs

The first thing to acknowledge is that preventing all possible cyberattacks is ideal — but unrealistic. There are too many threat types (including an endless stream of variants). On top of this, the size of the attack surface is vast, and getting bigger all the time, especially with the rise of remote/hybrid work.

The good news, however, is that the impact of ransomware and other cyberthreats can be significantly reduced through effective preparation. Specifically, we advise SMBs to develop a defense strategy that achieves the following core objectives:

  1. Limits a bad actor’s ability to move freely within the environment.
  2. Enables visibility and response capabilities.
  3. Prevents unnecessary exposure.
  4. Implements a robust and efficient recovery of operations.

Limiting a bad actor’s ability to move freely within the environment.

Once initial access is obtained, hackers will try to seek (if they do not already have) high value credentials to gain administrative access in the environment. This attempt at vertical elevation typically requires moving from system to system. Strong account hygiene, along with suitable privileged access control and governance, makes it harder for hackers to remain undetected. Key action items that SMBs should adopt include:

Enabling visibility and response capabilities.

Endpoint detection and response (EDR) solutions are essential for detecting and preventing known and unknown malware. Other measures that SMBs should adopt include:

Preventing unnecessary exposure.

Reducing the size of the attack surface is critical for blocking initial access, elevation, and lateral movement (connecting on other systems) within the environment. Systems that are not required for business operations, or are not patched in a timely manner, may expose vulnerabilities. Systems that are unnecessary, or that are unavailable for patching, should be managed in such way that hackers will not have the opportunity to exploit them.

Implementing a robust and efficient recovery of operations.

A robust backup and recovery plan should be put in place to facilitate rapid recovery from highly disruptive ransomware. We recommend that SMBs adopt the following best practices:

In our next deep dive into the Devolutions State of IT Security in SMBs in 2022-23, we will highlight best practices to help SMBs implement five core principles and policies (some of which are mentioned above) that significantly reduce cybersecurity risks: the principle of least privilege, zero trust, segregation of duties, defense-in-depth, and the four-eyes principle.

More from News

Read more articles