For a long time, ransomware felt like a big-company problem. Criminals would lock up a hospital system or a major retailer, demand a few million dollars, and it would make the news. Small businesses watched those stories and mostly felt like bystanders. That was a reasonable read of the situation five or six years ago. It stopped being accurate around 2022 and has gotten significantly worse since.
Last year, 88% of ransomware breaches hit organizations with fewer than 1,000 employees. The attackers did not suddenly develop a conscience about large enterprises. They changed their strategy because the numbers worked out better on the other end of the market.
CrowdStrike surveyed small business owners in 2025 and found that three out of four said a major cyberattack would likely or definitely put them out of business. For most small businesses, there is no budget to absorb six figures in recovery costs, legal fees, and lost revenue while the business is down.
Why small businesses became the preferred target
The honest answer is that it is easier. Not because small business owners are careless, but because they are running lean. There is no dedicated security team. Software updates get pushed back because there is always something more urgent. Backups exist in theory but have not been tested recently.
Attackers know this. Ransomware-as-a-Service kits sold on the dark web mean that technically unsophisticated criminals can run professional-grade attacks for a few hundred dollars. Lower ransom demands, higher success rates, less law enforcement attention than hitting a Fortune 500 company. The economics are brutal.
How these attacks actually unfold
Most ransomware attacks do not start with someone trying to break through a firewall. They start with an employee clicking something in an email. From that initial foothold, the attacker spends days or weeks inside the network before doing anything visible. They are mapping what is there, identifying the most valuable data, finding the backup systems.
In 2026, they almost always steal data before encrypting anything. This is the double extortion model: they have your data and are threatening to publish it publicly if you do not pay, even if you restore from backup. It removes the one obvious escape route that used to exist.
When they do trigger the encryption, it is fast. Cofense's 2026 threat analysis found that with AI-assisted tools, attackers can go from initial access to full organizational compromise in under an hour.
What ransomware protection for small business actually requires
Backups that survive the attack. If your backups are connected to your network, ransomware can encrypt them too. The standard that actually works is the 3-2-1 approach: three copies of your data, stored on two different types of media, with one copy completely offsite and disconnected from your network. And you need to test restoration regularly, because a backup you have never restored from is a backup you do not actually have.
EDR on every device. Endpoint Detection and Response software watches for the behavioral patterns that come before a ransomware attack. When a process starts rapidly accessing and modifying files across the system, EDR flags it and can isolate the device before the encryption spreads. Traditional antivirus does not catch this because it looks for known malicious files, not suspicious behavior patterns.
Multi-factor authentication, everywhere. A large percentage of ransomware attacks start with stolen credentials. MFA means that even when a password is compromised, the attacker cannot use it. Only 20% of small businesses have MFA deployed broadly. It costs almost nothing to implement and blocks a category of attack responsible for a significant share of breaches.
Patch management that actually happens. Ransomware groups maintain lists of known vulnerabilities and actively scan for unpatched systems. Automated patch management closes those windows before they get used.
A written incident response plan. Only 14% of small businesses have one. When an attack is in progress, the decisions made in the first hour determine how bad it gets. Who gets called? Which systems get taken offline? How do you communicate with customers? Having answers to those questions before the attack happens is the difference between a controlled response and a panicked one.
Ransomware protection for small business is not a single product you can buy. It is a set of overlapping controls where each one covers gaps the others leave. Businesses that get hit and recover quickly almost always had the basics in place before the attack. The ones that do not recover usually had none of them.