Download your IT & Cybersecurity Buying Guide just in time for Cybersecurity Awareness Month

The Real Cost of a Data Breach

Blog Home » Cyber Security » The Real Cost of a Data Breach

What happens if your computer systems are hacked with ransomware?

You are a small to mid-size business. You know everyone at the office by name. They aren’t going to do anything to jeopardize your business and you know that they are all careful. Besides, you are a small accounting firm and just deal with local businesses – nothing that a hacker wants…they are going after the big guys.



Let’s say that one of your employees is going through their email and receive a link to update their word processing software. You don’t have an onsite computer department, the group that does your network and computer support has a weekly stop in, but that’s not for a few days. Besides, she doesn’t want to incur any fees by calling them to find out if this is legit. It says Microsoft and so it must be ok. She needs to get a letter out today, so wanting to be efficient, she clicks on the link and will update the software so she can continue on with her work.

That email was a phishing email which distributed ransomware to her system. But she doesn’t realize this and keeps working. All the while, entering more passwords, giving more and more access to hackers. The malware is slowly spread out to each workstation at your office.

The next morning, you come in, everything is on lockdown and you’re being asked to pay a bitcoin ransom to access any files. What’s Bitcoin? You ring your managed service provider to have them in to fix it, but they can’t get in until tomorrow. They have an emergency crew which will come onsite but it’s going to be three times the normal hourly rate.

Unfortunately, the costs are just beginning to accrue. IMB Security reports that 67% of costs occur in the first year while longtail costs of a breach can stretch over two plus years.


Factor in the lost revenue from being unable to access your client records. You can’t ship, sell, or manage what you can’t see. Your customers need to run their own business, so they find another vendor. More lost revenue. This could go on for days. Those clients liked working with you, but they now have taken their business elsewhere and it’s working out fine, so they don’t return. When asked who they do business with, they tell this story. Is there a price to put on restoring a damaged reputation?

One week later, you’re still not back online. The ransom amount was unobtainable and even if you could pay it, there’s no guarantee that it won’t happen again next week. You now have to get all new systems, plus the time to input all of the lost data – if you can find it, and hopefully salvage all of the lost business. Should we mention the investigation, notification process to your clients about what happened (cringe) and the required credit monitoring you need to offer in order to restore your business and good name?

This scenario is unfortunate, but true.

  • SMBs account for 43% of data breaches

  • 83% lack the funds to recover from a breach

  • Healthcare is the most costly industry

  • The U.S. is the most expensive country

Protect your business from going out of business. Find out how much a data breach could cost you.


Check out related blog posts

Employees of the Future: How to Secure Your New Hybrid Workforce

Employees of the Future: How to Secure Your New Hybrid Workforce

Pivot! (Again). It doesn’t seem that COVID-19 is going away any time soon, and businesses are beginning to make working from home more than a...

You Clicked the Link. Now What?
How to Respond to a Cyber Attack

You Clicked the Link. Now What? How to Respond to a Cyber Attack

![You_Clicked_The_Link_Now_What_Image.png](/uploads/You_Clicked_The_Link_Now_What_Image.png) The COVID-19 situation has inspired a new normal: working from home. We’ve traded corner offices for a spot at the dining room table, business...

Work From Home: Security Best Practices

Work From Home: Security Best Practices

![Work-from-Home-Security-Best-Practices.png](/uploads/Work-from-Home-Security-Best-Practices.png) While working from home does come with its perks, there are many new cybersecurity risks created when employees make the transition from a trusted...

Ready to get started?
Engage with your new tech provider today
Find A Provider