8 min read
Small Business Cybersecurity Statistics & Trends (2026)
Published: May 13, 2026
Small businesses have become one of the most targeted groups in the modern threat landscape. It’s not that attackers view them as high-value prizes, but that they tend to be easier to breach. Limited IT resources, lean security budgets, and a persistent belief that “we're too small to matter” have made small and mid-sized businesses (SMBs) a reliable source of opportunity for cybercriminals.
According to Microsoft, one in three SMBs have experienced a cyber attack, and nine in ten say that they’re an increasing peril. What percentage of cyberattacks target small businesses? The 2025 Verizon Data Breach Investigations Report (DBIR) analyzed more than 22,000 real-world security incidents and confirmed 12,195 data breaches, a record high. SMBs accounted for 3,049 of those incidents, with 2,842 resulting in confirmed data disclosure. That means roughly 25% of cyber attacks target SMBs.
Exclusive research from Sagiss found that the threat is becoming harder to detect at precisely the moment employees are most likely to make a mistake. Attackers no longer need technical sophistication to craft a believable message. AI-powered crime service kits have made that part trivially easy, lowering the barrier to entry for phishing campaigns that would have required considerably more skill to execute even a few years ago.
The result is a threat environment where the volume of attacks is rising, the quality of those attacks is improving, and the window for a busy employee to catch a mistake before it becomes a breach is shrinking. The data below paints a picture of that landscape, including the scope of the threat, the financial consequences of a breach, and what emerging technology means for small businesses trying to stay ahead of it. It also outlines how the right IT support for small businesses can stave off attacks.
The State of Small Business Cybersecurity in 2026
- SMBs experience victimization at almost 4x the rate of large organizations. (Verizon DBIR)
- Verizon found ransomware in 88% of SMB breaches reviewed, compared to just 39% of breaches involving large organizations. (Verizon DBIR)
- 63% of workers clicked a work-related link in the past year and later felt they should have double-checked it first. (2026 Sagiss Phishing Survey)
- The average total cost of an attack is $254,445, but ran as high as $7 million in 2024. (Microsoft)
- 44% of SMB believe that they won’t be attacked because they’ve experienced one before. (Microsoft)
- Two-thirds of SMBs say budget constraints prevent them from upgrading security tools, and only 7% feel their current cybersecurity budget is fully adequate. (Crowdstrike)
- When choosing cybersecurity tools, only 57% of SMBs focus on protecting against advanced threats. (Crowdstrike)
- The median time between exposure and exploitation is only 24-48 hours, a sharp increase from 4.7 days. (Fortinet)
What the numbers reveal, taken together, is a gap between the scale of the threat and the resources most small businesses have committed to addressing it. Attackers are moving faster, and the shrinking window between exposure and exploitation leaves little room for a slow response. Meanwhile, many SMBs are still operating with tools and budgets that haven't kept pace.
Perhaps most revealing is the 44% of SMBs who believe a prior attack makes them less likely to be targeted again. That assumption runs directly counter to how attackers operate. A business that has been breached once has demonstrated that it can be breached, and without meaningful changes to its security posture, it remains an accessible target. The threat landscape in 2026 rewards preparation, not optimism.
Exclusive Research on Phishing Attacks on Small Businesses
What is the most common cyber threat for small businesses? Phishing is the #1 attack vector for small businesses. To understand how these attacks play out, Sagiss partnered with Pollfish to survey 500 U.S. desk-based workers in February 2026, including 100 employees in the Dallas-Fort Worth metro.
The results paint a detailed picture of how phishing risk has evolved in the workplace:
- 72% of workers say phishing attempts are more convincing than a year ago because of AI-written language.
- Nearly 65% of survey respondents said it is somewhat or very likely that an AI-generated message could successfully impersonate someone they work with.
- 57% said AI makes phishing harder to spot because it feels more professional.
- 42% said they have trusted a message at least once because it sounded like a coworker or someone they regularly interact with.
- About 33% said they have observed better grammar and writing in suspicious messages over the past year.
- 42% say they have clicked a work-related link multiple times in the past year and later felt they should have double-checked it first.
Employees have noticed specific changes in how suspicious messages are written, and those changes point in a consistent direction. Phishing has evolved beyond being primarily a problem of identifying clumsy, misspelled emails. Grammar has improved, tone has become more natural, and messages increasingly reference real workplace details. This is the kind of contextual accuracy that used to require insider knowledge but can now be generated at scale with the right tools.
The practical effect is that phishing messages are designed to pass the first test most employees apply: does this look like something a real person at my company would send? When the answer is yes often enough, the entire premise of awareness training to slow down and look for red flags becomes harder to act on in a busy workday. The threat has grown in volume and credibility, which has meaningful consequences for how small businesses need to think about their defenses.
What Makes SMBs Easier Phishing Targets
Small businesses face structural disadvantages that large organizations can more readily offset. The first is a shortage of security training that goes beyond annual checkbox exercises. Only 42% of SMBs provide employees with cybersecurity training. Employees who receive infrequent, generic phishing awareness training are ill-equipped to recognize attacks that have grown more convincing.
The second is the absence of dedicated IT or security staff. Without someone whose job is to monitor the environment, investigate suspicious activity, and respond quickly when something goes wrong, the burden of judgment falls entirely on individual employees who are often in the middle of a busy workday.
The third is BYOD exposure. When employees access work systems from personal phones and laptops outside any corporate security policy, attackers gain a foothold that even well-trained employees cannot always prevent.
Together, these gaps create an environment where even a modestly convincing phishing message can succeed.
The Real Cost: Financial Impact of a Cyberattack on Small Businesses
The financial impact of a breach on a small business is rarely limited to the immediate cost of the incident. Ransomware payments, forensic investigation, system restoration, legal notification, and business interruption losses compound quickly. For many SMBs, the total exposure is far larger than initial estimates.
The Verizon DBIR reported a median ransomware payment of $115,000 in 2024. For a business generating $5 million in annual revenue, that single payment represents more than 2% of top-line revenue. That’s before accounting for the downtime, lost productivity, and reputational fallout that typically accompany a ransomware event. The DBIR also noted that 64% of ransomware victims chose not to pay the ransom, a figure that has grown steadily as organizations improve their backup and recovery capabilities. For those without strong backups, however, the decision is rarely straightforward.
Business Email Compromise (BEC), a category of social engineering fraud closely tied to phishing, extracted more than $3 billion from victims in 2025, according to the FBI Internet Crime Complaint Center (IC3). In 2024, the median BEC loss settled around $50,000. These BEC scams are designed to exploit the trust-based communication patterns that are especially common in smaller organizations where employees rely heavily on email to authorize transactions, and approve vendors.
The most sobering data point for SMB owners is survivability. A significant portion of small businesses that experience a major breach do not remain operational. The combination of financial loss, reputational damage, and operational disruption is enough to close businesses that were otherwise healthy. For organizations with 20 to 100 employees, there is rarely a reserve large enough to absorb a significant incident without lasting consequences.
Industry Breakdown: Which Small Businesses Face the Highest Risk
Cybersecurity risk is not uniform across industries. Certain sectors face elevated exposure due to the value of the data they hold, their reliance on third-party vendors, and the complexity of their regulatory environments.
Healthcare
Healthcare holds some of the most sensitive personal data in existence, and are prime targets for attacks. IC3 found that, among industries considered critical infrastructure, healthcare and public health organizations reported the highest number of cyber attacks, with more than 600 incidents reported in 2025. Small medical practices and healthcare-adjacent businesses face the same threat actors targeting major hospital systems, without the security infrastructure to match.
Professional Services Firms
Professional services firms, including legal, accounting, insurance, and financial services, are frequent targets because they serve as custodians of confidential client data and often have access to client financial accounts. The Verizon DBIR noted that Denial of Service attacks disproportionately target professional services, which account for 17% of DoS victims. Financial services firms reported the second highest number of attacks to the IC3 in the critical infrastructure category in 2025. In non-critical sectors, legal services firms reported the highest number of ransomware attacks, accounting for 18% of complaints.
Construction and Engineering Firms
Construction and engineering firms can be attractive targets for both financial fraud and industrial espionage. They were the second and third most likely non-critical sectors to send ransomware complaints to the IC3. These firms often have lean IT teams and rely heavily on email and collaboration tools to coordinate across multiple project sites. This communication pattern creates natural openings for phishing and BEC attacks.
Manufacturing
Manufacturing faces a distinct risk profile that includes both operational technology (OT) exposure and traditional IT vulnerabilities. Critical manufacturing organizations reported more than 400 complaints to the IC3 in 2025. The DBIR found manufacturing among the top targets for Denial of Service attacks, which can be particularly damaging for businesses with time-sensitive production schedules. A ransomware event that disrupts production systems carries costs that extend well beyond data recovery.
The common thread across these industries is not the type of attack but the underlying vulnerability. Each of them manages valuable data and is responsible for processes that clients, employees, and sometimes the general public depend on every day. When an organization lacks the people, processes, or technology to detect and respond to an attack quickly, the consequences extend well beyond the business itself. That makes recovering from the attack, financially and reputationally, is rarely straightforward.
Ransomware, Supply Chain, and Emerging SMB Threats
Ransomware dominates the cybersecurity conversation for a reason, especially considering that ransomware is involved in nearly 50% more SMB breaches when compared to large organizations. Attackers have built scalable operations that specifically target SMBs because they’re profitable and often less protected.
The methods used in these attacks are also becoming more varied and aggressive. According to Sophos:
- 34% of organizations with 100–500 employees had their data encrypted.
- 22% experienced both data encryption and data theft.
- 13% of smaller organizations faced extortion-only attacks without encryption, compared to just 3% of organizations with 3,001–5,000 employees.
Together, these findings show that ransomware is no longer limited to locking down systems. Attackers are using multiple forms of pressure to maximize leverage against SMBs.
Third-party risk is also growing. Verizon found third-party involvement in breaches doubled from 15% to 30% in one year. Vendors, subcontractors, and software providers can expose SMBs through systems and data access.
AI Risks
AI is adding another layer of risk. AI-generated malicious emails have doubled in the past two years. Verizon also found that 15% of employees regularly accessed generative AI tools on corporate devices using personal accounts, creating data leakage risks many organizations still lack policies to address. Eighty-three percent of SMBs told Microsoft that they lack employee training on proper use of AI that may expose confidential data.
Turning These Stats Into Action: What SMBs Should Do Next
The statistics in this piece are only useful if they change behavior. Here’s what the data suggests small businesses should prioritize.
Treat phishing as an operational problem, not just a training problem.
The Sagiss survey found that the primary driver of risky behavior is the conditions under which decisions get made. High message volume, time pressure, and after-hours communication all increase error rates. Security programs that only focus on awareness training will underperform relative to programs that also address workflow, communication norms, and verification processes.
Audit your third-party exposure.
With third-party involvement in breaches doubling in a single year, every SMB should have a current inventory of vendors and partners who have access to their systems or data. They should also have a clear understanding of what security standards those partners maintain.
Address credential hygiene at the technical level.
Stolen credentials were the primary attack vector for SMB breaches in the DBIR. Multi-factor authentication, password manager deployment, and monitoring for compromised credentials in dark web data dumps are baseline controls that meaningfully reduce this exposure.
Build a ransomware recovery plan before you need one.
The Verizon DBIR found that 64% of ransomware victims declined to pay, and that figure rises with the quality of backup and recovery infrastructure. Organizations with tested, offsite backups have options that organizations without them don’t. A recovery plan isn’t a guarantee, but it’s the difference between a costly incident and a business-ending one.
Invest in 24/7 monitoring if you can’t do it in-house.
Most SMBs don’t have the staff to monitor their environment around the clock. Managed security services exist precisely to close that gap by providing continuous threat detection, incident response capability, and compliance support at a cost that is generally far lower than the equivalent in-house investment.
The threat landscape facing small businesses in 2026 is more sophisticated, more automated, and more targeted than it was even two years ago. To navigate it successfully, organizations need to treat security as an ongoing operational discipline rather than a one-time project.
Ready to assess where your business stands? Schedule a Security Assessment with Sagiss.
Sagiss, LLC