I came across a number recently that I haven’t been able to shake.
88%.
That’s the percentage of ransomware breaches last year that hit small and midsize businesses. Not the big guys. Not government. Businesses like the ones we work with every day.
For larger enterprises? That number is 39%.
When I first saw that, I thought there had to be something off with the data. But it checks out. And honestly, when you think about it, the math makes sense.
Why the Shift Happened
I’ve been in this industry for over two decades now, and I’ve watched the target move. The big companies got serious. They built out security teams, layered their defenses, made themselves expensive to go after. So the attackers adjusted.
It’s kind of like that story I heard early in the pandemic about toilet paper. Remember that? Someone explained to me that we didn’t actually have a shortage. The problem was proportion. It used to be 50/50 between commercial and home use. Then overnight it went to 95/5, and the manufacturers just weren’t set up for that shift.
Same thing happened here. Small and midsize businesses adopted cloud platforms, remote work tools, all these connected systems. That’s great for productivity. But most of them moved faster on the technology than they did on the security around it.
Attackers aren’t dumb. They follow the path of least resistance. Right now, that path runs straight through the mid-market.
The Assumption That Gets People in Trouble
I still hear it from business owners all the time: “We’re not big enough to be worth going after.”
I get why people think that. But here’s what that misses.
These attacks aren’t hand-crafted for each victim anymore. They’re automated. Attackers are running broad campaigns that scan thousands of organizations at once. They don’t care about your revenue. They care about whether your door is open.
And here’s the part that really concerns me: the window between “someone got in” and “everything is locked” has shrunk to about five days. Most businesses don’t even know they’ve been compromised in that timeframe.
Then there’s this: 69% of companies that paid a ransom got hit again. Once you’re marked as someone who pays, you become a repeat target. That’s really a thing now.
What We’re Seeing Work
Look, I’m not going to pretend we have all the answers. We’re far from perfect. But after watching this play out across dozens of organizations, you start to see patterns.
The ones that stay protected tend to share a few things:
They actually know what they have. You can’t protect systems you don’t know exist. Shadow IT, old cloud accounts nobody remembers, contractor access that never got turned off. These gaps are where attackers get in.
They’ve shifted their mindset. Instead of trying to prevent everything, they’re focused on detecting and responding quickly. Perfect prevention isn’t realistic. Fast containment is.
They treat security as ongoing operations, not a one-time project. The businesses that get hit are often the ones who did an audit two years ago and figured they were covered.
They have people watching. The tools are important, but the tools alone aren’t enough. You need people who can see context, who can catch the things that don’t fit a pattern. That’s really what we mean when we talk about People-First, AI-Amplified. The technology makes the people more effective. It doesn’t replace the judgment.
The Question Worth Asking
Here’s what I’d challenge you to think about: if someone started probing your systems tonight, how long would it take you to know?
Not how long until they got in. How long until you noticed someone was trying.
If the honest answer is “I have no idea,” that’s the gap worth closing.
The 88% number isn’t going down anytime soon. But whether your organization ends up part of that statistic is still something you can control.
Let’s Talk About Where You Stand
If you’re not sure what your security gaps look like, I’m happy to spend 30 minutes walking through it with you. No pitch, no pressure. Just an honest conversation about what’s working and what’s not.
Schedule a free 30-minute session

