The word ‘sophisticated’ gets thrown around a lot after a cyberattack. According to Danny Jenkins, CEO and Co-founder of ThreatLocker, that framing usually says more about the victim’s desire to save face than it does about the attacker’s capabilities.
In this conversation with CX Today, Jenkins makes the case that the vast majority of breaches trace back to the same handful of preventable mistakes: unprotected VPNs, untrusted software running freely, no multi-factor authentication. AI hasn’t changed the fundamentals of how attacks work – it’s just lowered the barrier to entry.
He said:
“It’s just giving more people access to being a hacker. Whereas before you had to be relatively smart, a developer, now you can be anyone.”
That democratization effect is showing up in the numbers. For every high-profile breach that makes the news, Jenkins estimates around 1,000 smaller companies are hit quietly.
Cybercrime operations run like businesses, with staff, quotas, and targets. Small companies get caught in blanket email campaigns of 20,000-plus recipients – targeted not because their data is particularly valuable, but because they can pay a ransom.
The fix, Jenkins argues, is less complicated than most IT frameworks make it seem. Australian government data suggests that four controls – blocking untrusted software, disabling Office macros, enforcing dual-factor authentication, and restricting account access to trusted devices – prevent around 96% of attacks. The UK’s Cyber Essentials program takes a similar approach.
The bigger barrier is awareness. Many IT teams are still operating on assumptions built around older threat models, and the complexity of frameworks like ISO 27001 or NIST can put organizations off before they’ve even started .Jenkins’s view: a short list done properly beats a 200-item checklist that nobody finishes.
For more expert insights, follow CX Today on LinkedIn here!