Ransomware is not a theoretical risk for small businesses. It is the most common and most damaging cyber threat you face. The average ransom demand for small and mid-size businesses is between $50,000 and $200,000. The average downtime after an attack is 21 days. And a significant percentage of businesses that pay the ransom never get their data back anyway.
The good news: ransomware prevention is not complicated or expensive. The attacks targeting small businesses are opportunistic — they exploit weak passwords, unpatched software, and missing backups. If you get the fundamentals right, you become a hard target, and attackers move on to someone easier.
Why Small Businesses Are the Primary Target
Attackers are not targeting you because your data is uniquely valuable. They are targeting you because you are statistically likely to have:
- Weak security. No dedicated IT staff, consumer-grade tools, minimal monitoring.
- No tested backups. Many small businesses have "backups" that have never been verified. When ransomware hits, they discover the backups are empty, corrupt, or months old.
- Willingness to pay. A 10-person law firm facing 21 days of downtime will consider paying $75,000 to get back online immediately. Attackers know this.
- No incident response plan. When the crisis hits, there is no playbook. Panic decisions lead to worse outcomes.
The Five-Layer Prevention Framework
Layer 1: Block the Delivery Method
Over 90% of ransomware arrives via email — a weaponized attachment or a link to a credential-harvesting page. The goal is not to catch every threat. It is to raise the bar high enough that opportunistic attacks bounce off.
- Block dangerous attachments at the gateway. Configure your email provider to reject .exe, .bat, .ps1, .vbs, and macro-enabled Office files. This single rule stops most commodity ransomware.
- Enable link scanning. Both Google Workspace and Microsoft 365 can check URLs in real time before users reach the destination.
- Simulate attacks on your own team. GoPhish is free and self-hosted. Run a simulated phishing campaign quarterly — not to punish clicks, but to measure and improve. (For a broader email security strategy, see our cybersecurity framework.)
Layer 2: Reduce the Attack Surface
Ransomware operators scan for known vulnerabilities the way burglars check for unlocked doors. If your software is current, most automated exploits fail silently.
- Automate patching. Enable OS auto-updates on every device. For servers, schedule a weekly maintenance window. The vulnerability that ransomware exploits almost always has a patch available — it just was not applied.
- Disable unnecessary services. RDP (Remote Desktop) exposed to the internet is the single biggest non-email entry point for ransomware. If you need remote access, use Tailscale or WireGuard instead.
- Kill Office macros by default. Macro-enabled documents are a classic payload delivery mechanism. Block them org-wide and whitelist only specific trusted files.
- Remove unused software. Every installed application is potential attack surface. If nobody uses it, uninstall it.
Layer 3: Network Segmentation
If ransomware gets into one system, segmentation limits how far it can spread. Without segmentation, a single compromised workstation can encrypt every file share on the network.
- Separate guest WiFi from your business network using VLANs
- Isolate sensitive systems (file servers, backup servers, financial systems) on their own network segment
- Use firewall rules to restrict which systems can talk to which — not everything needs to reach everything
- Deploy Fail2ban on internet-facing services to automatically block brute-force attempts
Layer 4: Immutable Backups
This is the layer that makes ransomware a bad day instead of a business-ending event. Immutable backups cannot be modified, encrypted, or deleted — not even by an attacker with admin credentials.
- Proxmox Backup Server supports immutable snapshots that ransomware cannot touch, even if the production servers are fully compromised
- Restic with append-only repositories ensures backup data can only be added, never modified or deleted
- Offsite replication with rclone to Backblaze B2 or similar means even physical destruction of your office does not destroy your backups
- Air-gapped backups — a USB drive or NAS that is physically disconnected from the network except during backup windows — provide the ultimate protection
I run this exact stack across three Proxmox nodes with daily automated backups, offsite replication, and n8n alerting if anything fails. It costs under $50/month in storage and has never missed a backup.
Layer 5: Access Controls
Least privilege access limits the blast radius of any compromise. If an attacker gets one person's credentials, they should only be able to access what that person needs — not everything.
- MFA on every account, without exception. Authenticator app, not SMS.
- No shared admin accounts. Every person gets their own credentials with only the permissions they need.
- Disable RDP (Remote Desktop Protocol) unless absolutely necessary. If you need remote access, use Tailscale or a proper VPN instead.
- Review access permissions quarterly. Remove access that is no longer needed.
Detection: What to Watch For
Early detection can mean the difference between one encrypted workstation and an entire network. Watch for:
- Mass file renames — ransomware typically renames files with a new extension (.encrypted, .locked, .crypted)
- Unusual CPU or disk activity — encryption is computationally expensive. A spike in CPU usage on a file server is a red flag.
- Unexpected network traffic — ransomware often communicates with command-and-control servers before encrypting
- Users reporting they cannot open files — often the first human signal that something is wrong
- Ransom notes appearing on desktops — by this point encryption is likely complete, but immediate isolation can prevent further spread
Monitoring tools like Grafana and Prometheus can alert on disk I/O and CPU anomalies automatically. Uptime Kuma can monitor file share availability.
If You Are Hit: Step-by-Step Response
- Isolate immediately. Disconnect affected systems from the network. Unplug Ethernet cables. Disable WiFi. Do not shut down the machines — forensic evidence may be needed.
- Do not pay the ransom. There is no guarantee you will get your data back. Payment funds the next attack. And in some cases, paying ransoms to sanctioned entities can create legal liability for your business.
- Assess the damage. Which systems are affected? Which data is encrypted? Are backups intact? Is the attacker still in the network?
- Restore from clean backups. This is where immutable backups pay for themselves. Wipe affected systems and restore from the last known clean backup.
- Report the incident. File a report with the FBI's Internet Crime Complaint Center (IC3) at ic3.gov. If client data was compromised, consult your legal obligations for notification.
- Post-incident review. How did the attacker get in? What control failed? What needs to change to prevent a recurrence? Document everything and implement the fixes.
The Math: Prevention vs. Recovery
Prevention costs for a 10-person business:
- Email filtering and phishing training: $0-50/month
- Endpoint protection and patching: $0 (built-in tools)
- Network segmentation: one-time setup cost
- Immutable backups with offsite storage: $30-50/month
- Access controls and MFA: $30/month (Bitwarden Teams)
- Monitoring: $0-299/month depending on scope
Total: $60-400/month.
Compare that to the cost of an attack: $50,000-200,000 ransom (which may not even work), 21 days average downtime, client notification costs, legal fees, reputational damage, and the very real possibility of losing the business entirely.
The best ransomware response plan is never needing it. Invest in prevention and immutable backups. Everything else is damage control.
Security Series
- Cybersecurity for Professional Services
- Ransomware Prevention & Response
- Backup & Disaster Recovery
How prepared is your business?
Take our free 25-item IT security checklist to score your current defenses. Then book a call to build a ransomware readiness plan specific to your environment.
Book a Ransomware Readiness Review