Skip to main content

Ransomware and Small UK Businesses: What You Actually Need to Know

Ransomware attracts more cybersecurity coverage than almost any other threat — and most of that coverage is about large organisations. Hospital networks paralysed. Logistics companies brought to a standstill. Government departments locked out of their systems. The implication, sometimes explicit, is that ransomware is an enterprise problem.

It isn't. This guide explains what ransomware actually is, why small businesses are increasingly in the crosshairs, what the realistic cost of an attack looks like, and — most importantly — what genuinely reduces the risk.

What Ransomware Is

Ransomware is a category of malicious software that encrypts files on a victim's systems, making them inaccessible, and then demands payment — the ransom — in exchange for the decryption key. Modern ransomware typically also exfiltrates data before encrypting it, threatening to publish the stolen information on criminal leak sites if the ransom isn't paid. This is called double extortion, and it means that restoring from a backup no longer fully resolves the incident.

The encryption process itself can complete in under ten minutes on a file server. By the time most organisations notice something is wrong, the damage is done.

How Ransomware Gets In

Understanding the entry points is important because prevention is considerably cheaper than response. The three most common entry vectors for ransomware in small UK businesses are:

Phishing Emails

A staff member receives an email that appears to be from a trusted source — a supplier, a bank, a delivery company — and clicks a link or opens an attachment. The link delivers a downloader. The attachment executes a macro. Within minutes, malware has established a foothold on the endpoint.

Exposed Remote Desktop Protocol (RDP)

RDP is the technology that allows remote access to Windows computers. Thousands of UK businesses have RDP ports exposed to the internet — often because someone enabled remote access during the pandemic and never properly secured or disabled it. Criminal groups scan the entire internet for open RDP ports and use automated tools to test them with stolen credential lists. When they find a match, they're in.

Unpatched Software Vulnerabilities

Vendors release security patches to fix known vulnerabilities in their software. Ransomware gangs track vulnerability disclosures and develop automated exploits within days of a patch being published — targeting the organisations that haven't yet applied it. Small businesses, which often lack dedicated IT management, are disproportionately slow to patch.

What Ransomware Costs a Small Business

The ransom demand itself is often the smallest component of the total cost, and many organisations that pay find that it doesn't resolve the incident in any case. The full cost of a ransomware incident for a small UK business typically includes:

The UK Government's Cyber Security Breaches Survey puts the average cost of a cyber incident at £15,300 for small businesses. In practice, ransomware incidents typically exceed this significantly.

What Backups Do and Don't Protect Against

The standard advice — keep good backups — is correct but incomplete. Backups protect against data loss. They do not protect against:

Backups are a recovery tool. Preventing the attack from succeeding in the first place requires detection capability — the ability to identify the attacker's presence and activity before the encryption payload executes.

What Actually Stops Ransomware

Effective ransomware prevention operates across two time horizons: preventing entry, and detecting presence before the payload executes.

Preventing entry means patching software promptly, securing or disabling exposed remote access, training staff to recognise phishing, and implementing multi-factor authentication on all external-facing services. These are foundational controls that every organisation should have in place — and Cyber Essentials certification provides a framework for implementing them systematically.

Detecting presence is the role of continuous monitoring. Ransomware attacks don't happen instantaneously — there is typically a period of days to weeks between initial compromise and the execution of the encryption payload, during which the attacker is mapping the network, escalating privileges, disabling security tools, and staging the ransomware. A Security Operations Centre with behavioural detection capability can identify this activity and disrupt the attack before the encryption payload ever runs.

This is the gap that most small businesses have: good perimeter defences, no internal monitoring. The attacker gets in through a phishing email, and from that point onwards, nobody is watching.

Detect Ransomware Before It Executes

SOC in a Box provides continuous monitoring that detects the lateral movement, privilege escalation, and tool staging that precede ransomware deployment — giving your named analyst time to intervene before your files are encrypted. From order to live monitoring in five working days.

Book your scoping call

Related Articles