5 Critical Steps To Recover From A Ransomware Attack

  • Home
  • 5 Critical Steps To Recover From A Ransomware Attack
5 Critical Steps To Recover From A Ransomware Attack

Is Your Business Safe from Ransomware?

How ransomware works, why SMEs get hammered, and how you protect your business before things go horribly wrong

Ransomware attacks are surging, affecting businesses of all sizes. Research suggests small and medium enterprises (SMEs) face risks just as often as larger ones, with many incidents going unreported to avoid reputational damage. It seems likely that underreporting hides the true scale, making prevention essential for everyone.

Key points:

  • Widespread Threat: Around 66% of organisations were hit by ransomware last year, including 13% of SMEs. Attacks grew 20% in 2025, driven by AI and easy-to-use tools like Ransomware-as-a-Service.
  • SME Vulnerability: Evidence leans toward SMEs being prime targets—82% of attacks hit firms with under 1,000 employees. 75% of small businesses say they couldn’t survive a hit, and 60% close within six months of a major attack.
  • Underreporting Issue: Many attacks stay hidden as businesses fear publicity, but stats show 69% of payers get hit again, highlighting ongoing risks.
  • Prevention Focus: Simple steps like backups and training can help, though no method is foolproof amid evolving threats.

What Makes Ransomware So Dangerous? Ransomware encrypts files or locks systems, demanding cryptocurrency payments. It often starts via phishing or weak software, with attackers stealing data for extra leverage. While big cases make headlines, smaller ones quietly devastate SMEs.

Why Should SMEs Worry? Small businesses aren’t immune—they’re often easier targets with fewer defenses. Underreporting means the problem appears smaller than it is, but real-world data shows frequent hits.

Quick Steps to Protect Your Business Start with basics: Train staff, update software, and back up data offline. More on this below.

Ransomware represents a major cyber threat where malware locks or encrypts data, demanding ransoms for access. Emerging prominently with variants like CryptoLocker in 2013, it has become a sophisticated operation. Attackers use phishing emails (up 1,265% with AI aid), exploit kits, or vulnerable software to infiltrate. Once inside, it spreads, encrypts files, and leaves ransom notes. Variants include encryptors (e.g., LockBit), screen lockers, and scareware. In 2025, Ransomware-as-a-Service (RaaS) allows even novices to launch attacks, democratising the threat.

Victims must choose: Pay (which funds crime and doesn’t guarantee recovery) or restore independently, often costing more in downtime. Globally, 59% of organisations faced attacks in 2024, hitting sectors like healthcare and education hardest due to sensitive data. But SMEs suffer too—82% of attacks target firms with under 1,000 employees, and 13% of small/medium businesses were hit last year. Many go unreported to avoid stigma, understating the issue.

How Has Ransomware Grown Over Time?

The threat escalated from 304 million global attempts in 2020 to 623 million in 2021, stabilising at 493 million in 2022 with better defenses. Daily attacks rose from 4,000 in 2023 to 4,400 in 2024, projected at 11,000 in 2025—a 3,500% frequency jump over five years. Attacks increased 20% in 2025 alone, with 264% growth over five years.

Costs ballooned: Average payments from £237,000 in 2020 to £2.08 million in 2024, projected at £2.44 million in 2025. Median payments rose from £59,000 to £1.52 million. Total damages: £69.3 billion in 2024 to £87.5 billion in 2025, or £1,827 per second in estimates. Payment rates dropped from 85% to 35%, as 97% recover without paying via backups. Recovery averages £1.41 million and 24 days downtime.

The World Economic Forum ranks it top cyber risk for 45% in 2025, with AI (66% expect impact) and supply chains driving growth. FBI reported 3,156 complaints in 2024 (up 11.7%), payments £619.27 million. By 2025, damages could hit £43.4 billion annually—or £119 million daily.

Sector trends: Education 180 attacks early 2025 (up 6%), healthcare 378 victims (from 282 in 2024). 72% note higher risks.

The table below summarises metrics (in GBP, 1 USD ≈ £0.7612 as of Nov 19, 2025):

YearGlobal Attack VolumeAverage Ransom PaymentMedian PaymentPayment RateTotal Damages
2020304 million attempts£237,000£59,00076%£15.2 billion
2021623 million attempts£434,000£107,00085%£43.4 billion
2022493 million attempts£618,000£152,00068%£32.0 billion
20234,000 daily attacks£1.41 million£304,00059%£57.1 billion
20244,400 daily attacks£2.08 million£1.52 million49%£69.3 billion
2025 (proj)11,000 daily attacks£2.44 million£1.90 million35%£87.5 billion

The chart illustrates cumulative victims, projecting 53% increase by 2025 end, underscoring the escalating problem.

Why Are Small Businesses Especially Vulnerable to Ransomware?

SMEs aren’t just collateral—they’re often primary targets. 82% of attacks hit companies under 1,000 employees, seen as having weaker defenses and quicker to pay. 75% of SMBs couldn’t operate post-ransomware, with only 17% insured. 60% close within six months of major attacks.

Underreporting amplifies this: Businesses hide incidents to protect reputation, but 69% of payers face repeat attacks. 87% involve data theft, 85% encryption. Phishing (42% of breaches) and AI-powered threats like RaaS make SMEs easy prey.

What Are the 5 Critical Steps to Recover from a Ransomware Attack?

Act swiftly to minimise damage:

  1. Isolate Systems: Disconnect infected devices from networks; power down if needed. Use endpoint tools for automation.
  2. Activate Continuity Plan: Follow predefined protocols; switch to backups for operations. Test regularly.
  3. Report Incident: Notify authorities (e.g., via IC3), stakeholders; comply with GDPR (72-hour disclosure).
  4. Restore Backups: Use clean, offline copies; prioritise essentials. 97% recover this way in 2025.
  5. Remediate and Monitor: Patch vulnerabilities, scan for backdoors; monitor ongoing.

Identify variants early (e.g., ID Ransomware) and assume data theft.

How Can SMEs Prevent Ransomware Attacks?

Prevention for SMEs emphasises affordable, layered defenses.

  • Employee Training: Educate on phishing (42% of attacks); simulate scenarios. Avoid unknown links/attachments.
  • Software Hygiene: Automate updates for OS, apps, firmware. Standardise devices; disable unused features.
  • Backups and Recovery: Use 3-2-1 rule (3 copies, 2 media, 1 offsite); store offline/immutably. Test quarterly.
  • Access Controls: Implement multi-factor authentication (MFA, ideally 3FA); adopt Zero Trust to verify access. Use strong passwords.
  • Security Tools: Install antivirus with auto-updates; enable firewalls, email authentication, intrusion prevention. Block malicious IPs; microsegment networks.
  • Plans and Insurance: Develop incident response/communications plans; exercise them. Get cyber insurance (only 17% of SMEs have it). Inventory assets; secure mobiles/supply chains.
  • Advanced Steps: Use threat intelligence; conduct red teaming if budget allows. Monitor anomalies; limit email file types.

Declining payment rates show these work, but stay vigilant.

Summary: How to Avoid Being Caught Out by Ransomware

Prioritise basics for SMEs: Train staff, update everything, backup offline. Layer with MFA, antivirus, and plans. Remember, 75% couldn’t survive without prep—act now to avoid hidden threats.

Dont get caught by the hackers. Take care of your systems before it happens.

SME Ransomware Case Studies

Ransomware attacks on small and medium enterprises (SMEs) represent a pervasive and escalating threat in the cybersecurity landscape. These are often overshadowed by high-profile incidents at large corporations.

While big businesses make headlines, data from 2025 reveals that SMEs are disproportionately affected. 82% of ransomware incidents target firms with fewer than 1,000 employees.

This vulnerability stems from limited resources and inadequate cybersecurity measures. There’s also the misconception that small size equates to low risk.

In reality, attackers exploit these gaps using sophisticated tools like AI-enhanced phishing and Ransomware-as-a-Service (RaaS). This has led to a 264% rise in incidents over five years.

Underreporting exacerbates the issue. Many SMEs avoid public disclosure to protect their reputation. But this silence allows threats to persist—69% of payers face repeat attacks.

Global trends in 2025 show ransomware evolving beyond encryption. It now includes data exfiltration in 87% of cases, adding extortion layers by threatening leaks.

For SMEs, the financial toll is severe. Average recovery costs reach £1.41 million per incident. Downtime averages 24 days, with total damages potentially hitting £87.5 billion globally.

Sectors such as healthcare, education, and professional services are particularly vulnerable. This is due to the value of their data.

For instance, 75% of SMBs report they couldn’t survive a major hit. Only 17% carry cyber insurance.

The Verizon 2025 Data Breach Investigations Report (DBIR) highlights that SMBs are targeted nearly four times more than large organisations. Ransomware features in a growing proportion of breaches.

Key Insights on Ransomware Attacks Targeting SMEs

Ransomware poses a significant threat to SMEs. Evidence suggests they are targeted as frequently as larger organisations, if not more so, due to perceived weaker defences.

Research indicates that 82% of ransomware attacks hit companies with fewer than 1,000 employees. Many incidents go unreported to avoid reputational harm.

In 2025, SMBs have been hit nearly four times more often than large firms. Ransomware is present in a rising number of breaches.

SMEs often face devastating impacts, including operational shutdowns, data loss, and financial strain. 60% close within six months of a major attack.

Underreporting is common, as businesses fear publicity. But this hides the true scale—69% of those who pay get hit again.

Why SMEs Are Vulnerable

Small businesses typically lack robust cybersecurity resources. This makes them attractive to attackers using tools like Ransomware-as-a-Service (RaaS).

Phishing, which surged 1,265% with AI assistance, accounts for 42% of breaches.

Many SMEs operate under the myth that they’re “too small to target”. This leads to inadequate training and backups.

Common Impacts and Costs

Attacks can encrypt files, steal data for extortion, and cause downtime averaging 24 days.

Recovery costs average £1.41 million, with only 17% of SMEs insured.

Sectors like healthcare, education, and professional services are hit hard due to sensitive data.

Notable Case Studies

Real-world examples illustrate the risks. Below is a table summarising key ransomware case studies involving SMEs or small businesses from recent years, including 2025.

These examples draw from documented incidents. They focus on impact, demands, outcomes, and lessons.

Note that many cases involve underreporting, so the full scope may be larger.

Case StudyYearCompany/SectorAttack DetailsImpactRansom DemandedOutcomeLessons Learned
DEphoto2024/2025UK Photography (SME)Data theft via ransomware, including credit cards and private photos.Affected 555,952 customers; risk of identity theft and photo leaks.£45,672 ($60,000)Data stolen for extortion; no payment confirmation.Secure customer data storage; avoid storing sensitive info without encryption; regular backups essential.
Peter Green ChilledMay 2025UK Logistics (SME)Scattered Spider ransomware disrupted operations.Halted refrigerated goods supply to supermarkets like Tesco, Aldi; supply chain ripple effects.Not specifiedOperations disrupted; no payment details.Strengthen supply chain security; segment networks to limit spread; monitor for anomalies.
SynnovisMay 2025UK Pathology Services (Potential SME)Qilin ransomware leaked health data.Exposed STI and cancer test results; patients uninformed for months.Not specifiedData leaked; no payment.Prioritise patient data protection; comply with notification laws; use immutable backups.
Dental Practices2019US Healthcare (Multiple SMEs)Ransomware via shared backup service encrypted files.Over 400 offices disrupted; patient care halted.Varied, but paid in many casesFaulty decryption keys; partial recovery.Vet third-party vendors; implement multi-layered backups; train on phishing.
K-12 Schools (e.g., Granite School District)2023US Education (SMEs)Ransomware locked systems and data.Disrupted classes; data theft threats.£1.14 million ($1.5M) for GraniteSome paid; ongoing recovery.Secure educational networks; regular patches; cyber insurance for schools.
Shenango Area School District2023US Education (SME)Similar encryption and extortion.Operational halt; student data at risk.£0.99 million ($1.3M)Recovery via backups where possible.Emphasise employee training; Zero Trust models.
Tri-City College Prep High School2023US Education (SME)Data encryption and leak threats.Educational disruptions.£76,120 ($100,000)Partial payment in some cases.Affordable cybersecurity tools for small institutions.
Law Firms (e.g., Grubman Shire Meiselas & Sacks)2020US Legal (SME)REvil ransomware stole client data.Threatened celebrity data leaks.£31.98 million ($42M) doubled from initialPaid to prevent leaks; lawsuits followed.Protect client confidentiality; MFA and encryption critical.

These cases demonstrate patterns. Entry via phishing or vulnerabilities, followed by encryption and extortion.

In healthcare, like the dental and Synnovis examples, sensitive data amplifies risks. This can lead to regulatory fines.

Education SMEs, as in school districts, face budget constraints. This makes recovery challenging.

Logistics like Peter Green show interconnected vulnerabilities. These affect larger chains.

Prevention Strategies for SMEs

Prevention involves layered defences like backups, training, and MFA. 97% recover without paying via clean backups.
Cyber insurance, held by only 17% of SMEs, can mitigate costs.
Recovery follows steps like isolation, reporting, and restoration.

1. What is ransomware, really?

Ransomware is malware that sneaks into your systems, encrypts your files and demands money to unlock them. Modern attacks usually lurk quietly first, mapping your network, finding your backups, stealing passwords and waiting for the perfect moment to hit. Once it triggers, everything locks at once and your business stops dead.

2. How common are ransomware attacks on small businesses?
Ridiculously common. Attackers use bots that scan the internet for weak systems, out-of-date software and terrible passwords. They don’t pick targets manually any more. If your business has a vulnerability, the bots find it and deploy the attack automatically.

3. Why do most SME ransomware attacks stay quiet?
Because businesses panic about reputational damage. They don’t want clients knowing they clicked a dodgy link or skipped updates. But when a business pays quietly, attackers share the details so other groups can target them again.

4. What are the real costs of a ransomware attack?
The ransom is the smallest part. The real costs include:
• downtime
• emergency IT work
• lost sales
• lost client trust
• data recovery
• legal fees
• possible ICO trouble
• long-term reputation damage

Recovery for a UK SME often ends up over £1 million once everything is counted.

5. Should I ever pay the ransom?
No. Paying doesn’t guarantee anything. Some attackers vanish, some ask for more, some send broken keys. Worst of all, paying makes you a repeat target.

6. How has AI made ransomware worse?
AI lets attackers:
• write convincing phishing emails
• clone voices
• build fake login pages
• automate malware writing
• scan networks faster
• customise attacks for specific industries

Even non-technical criminals can now run high-level attacks.

7. What is Ransomware-as-a-Service (RaaS)?
It’s the subscription model for criminals. They rent ransomware kits, dashboards, payment portals and instructions. Anyone with a laptop can run an attack. This is why attack volume has exploded.

8. Do backups actually protect you?
Yes, but only if they’re done properly. Backups must be:
• recent
• isolated
• clean
• tested regularly

Attackers often target backups first. If your backups are connected to your live network, they’re useless.

9. Is cyber insurance worth having?
Yes, but insurers expect you to have basic protections in place. This usually means MFA, updates, proper backups and a simple recovery plan. Cyber insurance can save your business financially after a major hit.

10. What should I do immediately if I’m hit by ransomware?
Do this right away:

  1. Disconnect affected devices.
  2. Shut down your network to stop the spread.
  3. Call your IT provider or a specialist.
  4. Report the incident to Action Fraud.
  5. Check backups, but don’t restore yet.
  6. Don’t communicate with the attackers.
  7. Document everything for insurance.

11. Can free security tools really prevent ransomware?
Yes. Most attacks succeed because of simple mistakes like outdated software or weak passwords. Free tools and built-in protections go a long way if you use them correctly.

12. How often should I test my backups?
At least quarterly. Preferably with a full mini recovery drill. A backup you’ve never tested is not a backup.

13. Is phishing still the main way attackers get in?
Yes. Phishing is behind nearly half of all ransomware infections. One click on a fake invoice or login screen is all it takes.

14. Are phones and tablets a security risk for SMEs?
Absolutely. Phones contain emails, MFA codes, passwords and cloud access. One compromised phone can expose your whole system.

15. How do I create a simple incident response plan?
You don’t need a huge document. Just a clear checklist covering:
• who isolates systems
• who contacts IT
• how to communicate if email is down
• who handles client communication
• where backups are stored
• the order of recovery steps
Run a practice drill once or twice a year.

16. What is double extortion ransomware?
Attackers steal your data first, then encrypt everything. They demand payment to stop them leaking your files. This is now the standard model.

17. What is triple extortion ransomware?
They steal your data, encrypt your systems and then contact your customers directly to pressure you. “Your provider won’t pay, your data is at risk.” Nasty stuff.

18. Are Macs and cloud systems safe from ransomware?
No. Macs get hit too. Cloud systems are safer than on-site servers, but if attackers get your login, they can encrypt or delete cloud files.

19. How do attackers choose their targets?
They don’t. Bots do the work. They scan the internet for:
• old software
• weak passwords
• open ports
• unprotected remote desktops

If your system looks weak, the bot deploys the attack instantly.

20. Which industries are targeted the most?
Attackers love businesses with sensitive data and tight deadlines.
Big targets include:
• dental practices
• accountants
• solicitors
• clinics
• schools
• trades businesses
• construction firms
• ecommerce shops

21. What are the different types of ransomware demands?
This is where it gets messy. Ransomware isn’t just “pay to unlock your files”. Criminals use a mix of threats.

Here are the main ones:

21.1 Encrypt and lock your files
The classic version of ransomware.

21.2 Lock your entire device
You can’t access anything. Just a ransom screen.

21.3 Steal your data and threaten to publish it
The modern standard.

21.4 Steal your data and contact your customers
They embarrass you into paying.

21.5 Threaten to destroy your servers
Countdown timers and panic tactics.

21.6 Threaten to leak internal emails
Great for scaring businesses that worry about reputation.

21.7 Leak staff records or payroll files
Including addresses, ID docs and salaries.

21.8 Sell your data on the dark web
The whole lot goes up for auction.

21.9 Threaten to report you to the ICO
Regulatory fear works very well on SMEs.

21.10 Leak supplier contracts or pricing
Hits your commercial relationships.

21.11 Wiper ransomware
Pretends to be ransomware but wipes everything for good.

21.12 Ransomware plus DDoS attack
Systems encrypted, website crashed at the same time.

21.13 Website takeover
Your entire site is replaced with a ransom page.

21.14 Cloud account encryption
Google Drive, OneDrive and Dropbox locked.

21.15 Backup server targeting
Attackers hit backups first so you can’t recover.

21.16 Credential theft plus encryption
They steal passwords before locking your systems.

21.17 Silent ransomware
Attackers hide for weeks before triggering the ransom.

Ransomware is not some distant problem for big corporations, it is hitting small businesses every single day. Most of the damage isn’t caused by the encryption itself, it is caused by downtime, panic, lost clients, legal headaches and the sheer chaos that follows when you realise your backups don’t actually work the way you thought they did.

The good news is that most ransomware attacks are completely preventable with a handful of simple steps like MFA, updates, isolated backups and basic staff training. Once you understand how attackers target SMEs and the tricks they use to pressure you into paying, you’re already halfway to being a much harder target.

If you’ve read this far, you’re ahead of most businesses already.


If you want to protect your business properly, get in touch and we’ll walk you through it.
Whether you want a quick consultation, a full review of your current setup or our practical Cyber Security Checklist that shows you exactly what to fix first, reach out and we’ll get you sorted.

No pressure, no jargon, just a clear plan that keeps your business safe and running.

You can message us any time to get started.