On a Tuesday morning in January 2022, 2,000 Erie County government employees showed up to work and found their computers locked. A message on every screen demanded $300,000 in Bitcoin. Their files were encrypted. Their systems were frozen. And their IT team had no idea it was coming.
Erie County refused to pay the ransom. That decision, while principled, came with a price tag that dwarfs the original demand: when all was said and done — recovery costs, emergency contractor fees, overtime for staff working nights and weekends, legal counsel, compliance remediation, and productivity loss across thousands of workers — the county had spent an estimated $10 million.
Here's the part that keeps us up at night: Erie County is a large government entity with a real IT department, dedicated staff, and actual security policies in place. They still got hit. They still paid $10 million. And they still had to explain it to the public.
If it can happen to them, it can absolutely happen to your business. The question isn't whether you're a target — it's whether you're prepared.
The hard truth: Small and mid-sized businesses are now the primary target of ransomware attacks. Cybercriminals know that large enterprises have mature security programs. SMBs often don't — which makes them easier, faster, and more profitable to hit.
How Ransomware Actually Gets In
Ransomware doesn't materialize out of thin air. It gets into your network through specific, well-understood entry points — the same ones that haven't changed much in a decade, because they keep working.
Phishing emails are still the number-one delivery method. Your accounting manager gets an email that looks like it's from a vendor. She clicks the link. She enters credentials into what appears to be a legitimate login page. Within 48 hours, an attacker is quietly crawling your network looking for the best files to encrypt. The 2024 Verizon Data Breach Investigations Report found that 68% of breaches involved a human element — meaning a click, a credential, a mistake.
Unpatched vulnerabilities are the second most common vector. Every piece of software you run — your operating system, your VPN, your firewall firmware, your remote access tools — has known vulnerabilities that get discovered and documented in a public database called the CVE (Common Vulnerabilities and Exposures) list. Attackers subscribe to that list. If you haven't patched a critical vulnerability within 30 days of its disclosure, someone is scanning for it in the wild. Your window is shorter than most IT teams realize.
Exposed Remote Desktop Protocol (RDP) is something we see constantly when we take on new clients. RDP — the Windows feature that lets someone remotely log into a computer — is incredibly useful for remote work and IT support. It's also one of the most abused entry points in modern cybercrime. If your RDP is exposed directly to the internet without VPN or multi-factor authentication, attackers are running brute-force tools against it right now. Not hypothetically. Right now.
What Happens After the Encryption
Here's what most people don't realize: paying the ransom is the beginning of your problems, not the end.
Modern ransomware gangs — and they are organized criminal enterprises with project managers, help desks, and affiliate programs — don't just encrypt your files. They first exfiltrate them. That means before your files get locked, they've already been copied to servers the attacker controls.
This creates what's called double extortion: they demand payment to unlock your files, and they demand additional payment to not publish those files on the dark web or sell them to your competitors. If you're in healthcare, legal, or financial services, that threat takes on an entirely different dimension. We're talking HIPAA violations, client confidentiality breaches, regulatory penalties layered on top of the original ransom.
After a successful attack, your company's name, email domain, and stolen credentials typically end up on dark web marketplaces within days. Other criminal groups buy that data and use it to launch secondary attacks — phishing campaigns targeting your clients, credential-stuffing attacks against your banking accounts, fake supplier scams using your business identity.
The encryption is the visible part of the iceberg. Everything under the surface is worse.
Why Paying Doesn't Help
Let's talk about what happens when businesses pay the ransom. The FBI recommends against it. Most cybersecurity professionals advise against it. And yet, under pressure of operational paralysis, many companies pay anyway. Here's what the data says about that decision:
Paying tells attackers two critical things: that you have money, and that you will pay. You have now made yourself the ideal repeat customer for a criminal enterprise. Your name goes on a list. Your profile — company size, industry, apparent willingness to pay — gets shared among ransomware affiliate networks.
There's also no guarantee that paying recovers your data. Decryption tools provided by ransomware groups are notoriously slow, buggy, and incomplete. In some documented cases, businesses paid, received a broken decryption tool, and still lost significant portions of their data. You paid for nothing.
And since 2021, the U.S. Treasury's Office of Foreign Assets Control (OFAC) has designated certain ransomware groups as sanctioned entities. If you pay a ransom to one of those groups — even unknowingly — your company could face federal penalties for violating sanctions law. The legal landscape around paying ransomware has become its own minefield.
The True Cost of a Ransomware Attack
Let's talk numbers, because this is where the conversation often ends prematurely. Business owners hear "ransomware" and think about the ransom demand. That's the smallest part of the bill.
The Ponemon Institute's 2024 Cost of a Data Breach Report puts the average total cost of a breach at $4.88 million — and that's an average across all company sizes. For small businesses without dedicated security teams or cyber insurance, the proportional impact is often higher because there's no cushion.
Here's where that money actually goes after a ransomware incident:
- Incident response and forensics: You need to hire an IR firm to figure out how they got in, what they took, and whether they still have access. This typically runs $25,000–$150,000 for an SMB, depending on scope and complexity.
- System restoration: Even with backups, rebuilding environments takes time and contractor labor. If you're restoring from scratch, figure 2–8 weeks of IT work.
- Downtime and lost productivity: At an average of $9,000 per minute of downtime for enterprise organizations (Gartner), and even a fraction of that for SMBs, a 3-day outage for a 20-person office can easily run $50,000–$100,000 in lost output.
- Legal and compliance costs: Breach notification laws in California (CCPA) and federal requirements for certain industries mandate formal notification to affected individuals. That's attorney fees, notification costs, credit monitoring services, and potential regulatory fines.
- Reputational damage: This one doesn't show up on an invoice, but it's real. Clients leave. Prospects don't sign. Vendors add risk clauses. The downstream effect of a publicized breach can last 2–3 years.
The ransom demand of $300,000 in the Erie County case was the smallest line item in a $10 million disaster. This is what the math actually looks like when you add it all up.
Your 5-Point Prevention Checklist
The good news — and there is genuine good news here — is that ransomware is largely preventable with the right controls in place. You don't need a federal cybersecurity budget. You need to execute on five specific things, consistently.
-
1Patch everything on a schedule. Not "when we get to it" — on a documented, enforced schedule. Critical patches within 14 days. Standard patches within 30. Use an RMM tool to deploy them automatically, or have your MSP handle it. Unpatched systems are the number-one opportunity ransomware exploits, and the fix costs nothing but discipline.
-
2Enforce MFA on every account. Multi-factor authentication means that even if an attacker steals your password, they can't log in without the second factor. This stops the majority of credential-based attacks cold. Enable it on Microsoft 365, Google Workspace, your VPN, your bank, your cloud platforms — everything. No exceptions for "convenience."
-
3Deploy EDR, not just antivirus. Endpoint Detection and Response (EDR) tools like CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint don't just look for known virus signatures — they analyze behavior in real time and stop attacks that have never been seen before. Traditional AV misses modern ransomware. EDR catches the behavioral patterns before encryption starts.
-
4Test your backups — actually restore something. Every business claims to have backups. Far fewer have actually restored from them. Run a quarterly restore test on a non-production system. Verify that the backup is complete, current, and actually recoverable. An untested backup is a false sense of security, and you will discover this at the worst possible moment.
-
5Train your employees quarterly, not annually. Your workforce is the most targeted attack surface you have. Simulated phishing campaigns — where you send fake phishing emails to your own employees and track who clicks — are one of the highest-ROI security investments available. The goal isn't to punish people who click; it's to create the muscle memory of skepticism before the real attack arrives.
None of these items require a security operations center or a team of analysts. They require a commitment to doing the basics well — which, frankly, is where most small businesses fall short.
What IT Center Cybersecurity Does About This
We built our IT Center Cybersecurity division specifically because we kept onboarding new clients who had been hit, were about to be hit, or had the kind of infrastructure that made a hit inevitable. We'd walk into an office and find RDP exposed to the internet, no MFA on Microsoft 365, antivirus that hadn't updated in six months, and backups that had been failing silently for weeks.
This is what a preventable disaster looks like before it happens.
IT Center Cybersecurity's approach is layered: we deploy EDR across every endpoint, enforce MFA at the identity layer, manage patching automatically, monitor your environment 24/7 from our SOC, and run penetration tests to find your weaknesses before attackers do. We also run dark web monitoring — watching for your domain, credentials, and business information showing up in criminal forums, often as an early warning sign that an attack is being planned.
One of our most valuable services is the initial security assessment. In a single conversation and review session, we can tell you exactly where your biggest exposures are, how an attacker would approach your network, and what the priority sequence for fixing them looks like. Most clients are surprised by what we find. Very few walk away thinking they were adequately protected before we looked.
Find Out How Exposed You Are — Before Someone Else Does
IT Center Cybersecurity runs penetration tests, deploys EDR, and monitors your environment 24/7. One call with our team can tell you exactly how exposed you are right now — no jargon, no pressure, just an honest assessment.
Schedule a Free Security Assessment