Cybersecurity
Ransomware protection for small businesses: what actually works
A practical guide to ransomware protection for small businesses — how attacks enter, the prevention basics that work, the backup strategy that saves you, and what to do in the first hour if prevention fails.
By Greg Douglas Published 7 min read
Updated
Ransomware is common, but it isn’t mysterious. The attacks follow a predictable playbook, the defenses are well understood, and most small businesses can close the critical gaps without spending heavily. What separates the businesses that recover cleanly from the ones that don’t is almost always preparation — not budget, and not luck.
This guide is written for the owner or operations lead who wants to understand, in plain language, how ransomware actually affects small businesses, what the current defenses look like, and what you do if prevention fails. It’s based on current guidance from CISA, the FBI, and NIST, and on what we see in the field.
How ransomware actually reaches a small business
Small businesses aren’t targeted because they’re small. They’re caught up in the same broad, automated attack campaigns that hit larger organizations. The recent Sophos State of Ransomware reports consistently find that most organizations of every size have encountered ransomware at some point — and that the entry vectors are strikingly consistent year over year.
Three paths account for the overwhelming majority of initial access:
- Phishing and social engineering. An email that looks legitimate tricks someone into clicking a link or opening an attachment. Credentials get stolen, or malware gets quietly installed on the endpoint.
- Exploitation of exposed remote-access services. Remote Desktop Protocol (RDP), VPN appliances, and remote-management tools exposed to the internet without MFA or with unpatched vulnerabilities. CISA’s #StopRansomware guide calls this out repeatedly.
- Compromised third-party software. A vendor in your supply chain is breached, and the attacker rides that relationship into your environment. Less common, harder to defend against alone, but real.
The attack you should be defending against isn’t some movie-plot cyber-genius. It’s an automated scanner looking for exposed RDP, or a phishing email that makes it past the filter on a Tuesday morning.
The prevention basics that actually work
The controls that block ransomware are the same controls that block most small-business security incidents. Few are exotic; all of them work when applied consistently.
- Multi-factor authentication on every account that touches business data. Microsoft has repeatedly reported that MFA blocks more than 99% of automated account-compromise attacks. CISA specifically recommends phishing-resistant MFA (passkeys, FIDO2 hardware keys) for the accounts that matter most.
- Close off direct internet exposure of remote-access services. If you have RDP or admin portals reachable from the public internet without a VPN or zero-trust access layer in front of them, close that today. This is the single gap we most commonly find on first contact with a new client.
- Patch and update regularly. Operating systems, browsers, and the specific apps your business depends on. Attackers actively scan for known, unpatched vulnerabilities.
- Endpoint protection with real-time updates. Modern Windows (Microsoft Defender) and macOS (XProtect) ship with capable defenses — make sure they’re on, current, and centrally visible. For higher-risk environments, a managed EDR (Endpoint Detection and Response) tool adds meaningful signal.
- Email filtering and user training on phishing. Not compliance theater; specific, short training tied to real examples. The measure is how fast people report, not whether any individual test fools someone.
- Strong password management — unique passwords in a password manager, screened against breached-password databases. We wrote a practical deep-dive on password management for small businesses if that’s your biggest gap.
None of the items above are exotic. Their power comes from being in place consistently — across every laptop, every account, every new hire.
The backup strategy that actually saves you
When prevention fails, backups decide the outcome. The Sophos reports show that organizations that successfully recover from ransomware overwhelmingly do so from backups — not by paying the ransom. But only if the backups work. A “we have backups” program that has never been tested is a theoretical program.
The current best-practice framework, endorsed by CISA and most major backup vendors, is the 3-2-1-1-0 rule:
- 3 copies of your data
- On 2 different media types
- With 1 copy offsite
- 1 copy offline or immutable (meaning the backup can’t be altered or deleted by ransomware even with admin access)
- 0 errors on your last restore test
That last digit is the one most small businesses skip — and it’s the one that matters most. Ransomware variants routinely target backup systems first, specifically to neutralize recovery. An immutable or air-gapped copy — one that ransomware cannot reach even with stolen admin credentials — is what separates recoverable incidents from catastrophic ones.
A simple quarterly habit: pick a real file. Restore it from your backup. Open it. If you can, your program works. If you can’t, you’ve found a problem worth fixing before you need it.
What to do in the first hour
If something looks like a ransomware incident — encrypted files appearing, a ransom note on a screen, unexplained account lockouts — the first hour sets the tone for everything that follows. The goal is simple: contain the spread, preserve evidence, get the right people involved.
- Isolate the affected machine immediately. Disconnect the network cable or disable Wi-Fi. Do not power it off — that destroys forensic evidence that matters for both recovery and insurance claims.
- Lock the affected account(s). Force a password reset and revoke active sessions in your identity provider (Microsoft 365, Google Workspace).
- Preserve what you see. Screenshot the ransom note, the affected files, the timestamps. Note the time you first observed the issue.
- Call — don’t email — your Incident Commander and begin the contact tree. Email may be compromised; phone is more reliable.
- Engage your cyber insurance carrier early. Many policies require specific steps and approved response vendors; getting them involved immediately protects both the recovery and the coverage.
- Do not pay the ransom without expert advice. The FBI discourages ransom payments — they fund future attacks, don’t guarantee recovery, and can create legal exposure (OFAC sanctions rules apply if the attacker is on a sanctions list). Your insurer and a qualified incident-response firm should be in the decision, not you alone at 3 a.m.
Most small businesses don’t have this written down when they need it. That’s the single biggest reason we built the one-page incident response plan template — a free, print-ready page with Incident Commander fields, the first-30-minutes checklist, a contact tree, and the communications decisions pre-made. Fill it in once; keep it where the right people can reach it. It’s designed for exactly this moment.
After the incident: close the gap
Every ransomware incident is also a diagnostic. The post-incident review should answer one question honestly: how did the attacker get in? — and then close that specific path.
- If it was phishing: did MFA save you? If not, why not? Time to move to phishing-resistant MFA on critical accounts.
- If it was exposed RDP or VPN: what’s the new access model? Zero-trust, or at minimum MFA + geographic restrictions + VPN-only.
- If it was unpatched software: how did patching fall behind, and what’s the new cadence?
- If it came through a vendor: what access did they have, and was that access actually needed?
Once the specific gap is identified and closed, the same approach that recovered you is the approach that prevents the next one.
Where this fits in the bigger picture
Ransomware is a high-impact subset of the broader question of how small businesses approach cybersecurity at all. If you’re building from scratch, our cornerstone guide — where small businesses should actually start with cybersecurity — walks through the five controls that cover most of the risk, ransomware included.
And when something goes wrong, having the incident plan template filled in and posted beats having to improvise at the worst possible moment.
If any part of this reads like “that’s our biggest gap” — exposed remote access, untested backups, no written incident plan — that’s probably where to start. A free discovery call is the fastest way to work through the specifics for your business. If we’re not the right fit, we’ll tell you, and point you toward someone who is.
Ransomware is preventable for most small businesses. It’s not about being a hard target — it’s about not being an easy one.
Keep reading
-
Cybersecurity
Cybersecurity metrics that actually matter for a small business
Most cybersecurity metrics are vanity. Here are the handful that actually matter for a small business — simple to track, tied to real risk, useful in real decisions.
-
Cybersecurity
Seven password-management practices that actually work for small businesses
Practical password management for small businesses — what current NIST guidance actually says, which tools to use, and the practices that move the needle.
-
Cybersecurity
Where small businesses should actually start with cybersecurity
Where to start with cybersecurity for a small business — five essential controls, a people strategy that works, and a one-page incident plan owners can actually use.