Ransomware attacks on small businesses increased 68% in 2025. The average demand has reached $247,000. And 43% of the SMBs that pay — or fail to recover — close within six months of an attack. This is the leading cause of business-ending IT incidents for companies under 200 employees.
The good news: a well-structured defense makes your business an unattractive target — and a survivable one if an attack gets through anyway. This guide covers the specific layers that matter, what to budget, and how to sequence the investment.
cybersecurity for small business
How Ransomware Actually Gets Into Small Businesses
Understanding the attack path tells you exactly where to invest in defense.
Most ransomware incidents follow a predictable sequence:
- Initial access — Usually via phishing email (60% of cases), credential reuse from a previous data breach (25%), or an unpatched vulnerability in internet-facing software (15%)
- Persistence — The attacker establishes a foothold, often sitting quietly for days or weeks to map the network and locate backup systems
- Lateral movement — Spreading from the initial infected device to file servers, backup systems, and other workstations
- Execution — Files get encrypted, the ransom note appears, and accessible backups get deleted before you realize what’s happening
Every defensive layer targets one of these stages. A business with strong defenses at each stage either stops the attack early or limits the damage enough to recover without paying.
The Five Layers of Effective Ransomware Protection
Layer 1: Block Initial Access
The entry point for most ransomware is the same as most other attacks: email and compromised credentials.
Email security with sandboxing catches malicious attachments and links before they reach your team. Basic spam filters catch known-bad content; sandboxing opens suspicious attachments in a controlled environment to catch zero-day malware that hasn’t been catalogued yet. Cost: $8–12/user/month.
MFA (multi-factor authentication) on every account eliminates credential reuse as an attack vector. Even if an employee’s password was exposed in an unrelated breach, an attacker can’t use it without the second factor. Cost: typically included in Microsoft 365 or Google Workspace business tiers.
Patch management closes the software vulnerability doors that attackers exploit. Out-of-date VPNs, firewalls, and remote access tools are disproportionately represented in ransomware entry points. A managed patching process keeps your attack surface current.
Layer 2: Detect and Stop the Encryption
EDR (Endpoint Detection and Response) is the most important single investment in ransomware defense. Unlike traditional antivirus — which identifies known malware signatures — EDR monitors device behavior in real time. When a process starts encrypting large numbers of files in rapid succession, a behavioral signature of ransomware, EDR can stop the process, isolate the device from the network, and alert your IT contact before the attack spreads.
Modern EDR platforms catch approximately 95% of ransomware attempts that reach the device layer. Cost: $8–15/device/month depending on platform and feature tier.
endpoint protection for small business
Layer 3: Limit the Blast Radius
Network segmentation divides your environment so that ransomware on one device can’t automatically reach every other device and your file server.
For most small businesses, practical segmentation means three things: separating guest WiFi from business systems, isolating file servers and backup systems from general user networks, and ensuring workstations can’t directly communicate with each other — only with servers. A ransomware infection that starts on one laptop should be containable to that device. Without segmentation, a single compromised workstation can encrypt every shared file on your network within hours.
Layer 4: Protect Your Backups
Ransomware operators know that backups are your recovery path. Modern ransomware is specifically designed to find and delete accessible backup systems before executing encryption.
Immutable backups solve this problem. An immutable backup can be written to but cannot be modified or deleted — even by someone with full administrator credentials. The backup provider enforces a retention policy that prevents deletion for a set period (typically 30–90 days).
The 3-2-1-1 rule is the target: three copies of your data, on two different media types, with one stored offsite, and one copy immutable. A business following this rule can recover from ransomware without paying — typically within 2–3 days rather than the 21-day average for businesses without tested recovery procedures.
Cloud backup with immutable object storage costs approximately $0.50–2.00/GB/month.
Layer 5: Incident Response Preparation
Recovery speed matters enormously. Businesses with a documented, tested incident response plan recover significantly faster than those making critical decisions under pressure while files are still being encrypted.
Your plan doesn’t need to be elaborate. At minimum, it should cover: a contact list for IT support, cyber insurance, and legal counsel; the steps to isolate an infected device without shutting down the entire network; the backup restoration procedure with a realistic tested timeline; an employee communication template; and your cyber insurance policy number and claims contact.
Cyber insurance for small businesses typically costs $1,500–4,000/year and covers ransom payments, recovery costs, and business interruption losses up to policy limits. It’s worth having before you need it — claims filed during an active incident are slower to process.
What Does a Complete Ransomware Defense Stack Cost?
For a 15-person business:
| Layer | Solution Type | Monthly Cost |
|---|---|---|
| Email security with sandboxing | Mid-tier email security platform | $120–180/month |
| MFA | Included in M365/Google Workspace | $0 (already in subscription) |
| EDR (15 devices) | Mid-tier EDR platform | $120–225/month |
| Immutable cloud backup (1TB) | Object-locked cloud storage | $15–30/month |
| Total | $255–435/month |
At $17–29/employee/month, a complete ransomware defense stack is one of the highest-ROI investments in the business — measured against an average recovery cost that starts at $1.3M if an attack succeeds.
managed security services for small business
—
The essentials
- Ransomware attacks on SMBs increased 68% in 2025; average demand is now $247,000 with total recovery cost averaging $1.3M
- Most attacks enter through phishing, credential reuse, or unpatched vulnerabilities — all preventable
- EDR is the single most important investment: behavioral detection stops ransomware before encryption completes
- Immutable backups are your recovery guarantee — attackers cannot delete what they cannot reach
- Network segmentation limits blast radius; an infected device shouldn’t become an infected network
- A 15-person business can run a complete defense stack for $255–435/month
- Test your backup restoration procedure before you need it — untested recoveries take 3–4x longer
Questions answered
What is the best ransomware protection for small businesses?
Effective ransomware protection requires multiple layers: EDR (Endpoint Detection and Response) for behavioral detection on devices, email security with sandboxing to block delivery, MFA to eliminate credential-based access, network segmentation to limit spread, and immutable cloud backups for recovery. No single tool provides complete protection — the defense value comes from covering each stage of the attack chain.
How much does ransomware protection cost for a small business?
A complete ransomware protection stack for a 15-person business typically runs $255–435/month, covering EDR, email security, and immutable backup storage. This compares favorably against the average SMB ransomware recovery cost of $1.3M including downtime, lost productivity, and incident response fees.
What is EDR and why do small businesses need it?
EDR (Endpoint Detection and Response) is a next-generation endpoint security tool that monitors device behavior in real time rather than scanning for known malware signatures. It detects anomalous behavior — like a process rapidly encrypting files, which is a ransomware indicator — and can automatically stop the process and isolate the device. For SMBs increasingly targeted with sophisticated attacks that bypass traditional antivirus, EDR is worth the incremental cost.
Should I pay a ransomware demand?
Generally, no. Paying doesn’t guarantee recovery of your files, funds criminal operations, and in some cases may create regulatory exposure. The better investment is building recovery capability — immutable backups and a tested incident response plan — that makes payment unnecessary. Businesses that pay and lack proper backups often discover their decryption tools don’t fully work and still face extended recovery time.
How long does ransomware recovery take?
Recovery time depends almost entirely on backup preparation. Businesses with tested immutable backups typically restore operations in 2–3 days. Businesses without prepared recovery capabilities average 21 days of downtime — at which point business disruption costs often exceed the original ransom demand.
What is an immutable backup?
An immutable backup is a data copy that cannot be modified or deleted once written, even by users with administrator credentials. The storage provider enforces a time-locked retention policy that prevents deletion for a set period. Immutable backups survive ransomware attacks because even attackers who gain full admin access to your systems cannot delete the offsite backup copies.
—
Not sure if your current security setup would stop a ransomware attack? Run a free security scan to check your gaps before attackers find them first.
Recommended Endpoint Security Vendors
DefendMyBusiness partners with a curated network of 400+ vetted providers. Four currently active in our ecosystem for endpoint security:
Spectrum
Spectrum is a national provider of fiber-and coaxial-based technology solutions, serving over 32 million customers in 41 states. The Spectrum Partner Program provides best-in-class telecommunication s
Comcast Business
Comcast Business offers leading global businesses the technology solutions and forward-thinking partnership they need. With a full suite of solutions including fast, reliable connectivity, secure netw
Lunavi
As a leading managed service provider and consulting firm, Lunavi helps customers advance their digital transformation goals by building modern technology solutions, operating efficient and dependable
vCom Solutions
vCom empowers channel partners to deliver comprehensive IT lifecycle management solutions that drive value for their customers. Our award-winning, AI-powered platform, vManager, and managed services s
Unsure which fits your business? We’ll match you with three in 24 hours, no obligation.
Keep going
Book a free 20-minute call
We will map out your options and pull three matched endpoint security providers from our 400+ vendor network. No obligation, no newsletter drip — one call, clear direction.