If you run an SMB or a managed service provider, the ransomware story has changed again — and the new chapter isn't kind. The 2025 Verizon Data Breach Investigations Report found that 88% of small-business breaches now involve ransomware, compared to 39% at large organizations. Translation: attackers aren't bothering with surgical intrusions at the top of the market anymore. They're industrializing the middle.
The math is brutal. Verizon documented 3,049 small-business incidents in the reporting period, and the median ransom payment dropped to roughly $115,000 — down from $150,000 a year earlier. That isn't a win. Attackers lowered the price because they realized a smaller, faster ransom is easier to collect from a 50-person firm than a million-dollar demand a CFO will fight for eight weeks.
What actually changed in 2026
Three shifts matter more than the raw numbers. First, time-to-encryption has collapsed. Industry telemetry now shows ransomware deployed within seven days of initial access in a majority of intrusions — and a meaningful share inside 24 hours. If your detection and response playbook is measured in days, you're already late.
Second, backups are the target, not the lifeline. VikingCloud reported that 96% of ransomware attacks now attempt to reach backup systems. Attackers dwell long enough to map your storage, find your Veeam or Datto console, and delete or encrypt recovery points before they detonate the primary environment. An "air gap" that lives on the same Windows domain is not an air gap.
Third, the operators have become brokers. Initial access brokers sell VPN credentials and MFA-fatigue victims wholesale. Affiliates deploy the encryptor. Negotiation is outsourced. Every stage is specialized, which means the barrier to running a ransomware business is lower than it has ever been.
Why SMBs are the preferred target
The numbers from industry research are sobering — roughly 43% of cyberattacks target small businesses, and three-quarters of SMBs say they could not continue operating if hit with a successful ransomware attack. Attackers know this. They know you're less likely to have a 24x7 SOC, less likely to have tested recovery, and more likely to wire a five-figure payment quickly to avoid existential risk.
They also know that professional services firms, healthcare practices, and manufacturing shops hold data that's disproportionately valuable to their customers — meaning secondary pressure through client notification is a viable extortion lever. The "we'll leak your files" threat is now the primary threat, with encryption as the accelerant.
What a credible defense looks like now
Forget the marketing language about "next-gen AI." The defenses that actually reduce ransomware blast radius in 2026 are unglamorous and architectural:
- Immutable, offline-verified backups. Not snapshots on the same hypervisor. Immutable object storage with retention locks, restored and validated on a schedule — not the day you need them.
- Phishing-resistant MFA everywhere. SMS and push-based MFA are being bypassed daily. FIDO2 keys, passkeys, or certificate-based authentication for anything that touches identity, email, or remote access.
- EDR with 24x7 human eyes. An endpoint agent that alerts into a shared inbox nobody reads on Saturday night is theater. You need a SOC that triages and responds inside the time window attackers operate in.
- Network segmentation that actually segments. If your finance VLAN can reach your backup server, your backup server can be deleted.
- Tested incident response. A runbook you've never executed is a wish. Tabletop annually, restore a real system quarterly, rehearse the legal and communications tracks.
The quiet number that matters
Cobalt projects ransomware volume will rise roughly 40% by the end of 2026 over 2024 levels. That's not a forecast — it's a trajectory already baked in by the economics. The question is not whether your organization will be probed. It's whether you'll be the one with rehearsed recovery or the one that pays.
If you can't confidently answer "how long would it take us to recover if every Windows endpoint and every backup console were wiped tonight," you don't have a ransomware program. You have hope.
Torchsec's 24x7 SOC monitors, triages, and contains ransomware precursors before encryption. If you'd like a frank walkthrough of where your environment stands, let's talk.
Ready to talk?
If any of this sounds familiar, we'd be happy to walk your team through it. Book a no-obligation consultation or request a free risk assessment.

