There's a persistent myth among small and mid-sized business owners that goes something like this: "Why would hackers bother with us? We're not a big target."
It's an understandable assumption. When major breaches make headlines, it's always the Fortune 500 companies, the government agencies, the hospital networks. Surely a 50-person accounting firm or a regional manufacturing company isn't worth the effort.
Except it is. And the data proves it.
Key insight: Small businesses aren't targeted despite their size, they're targeted because of it. Smaller organizations typically have weaker defenses, less security awareness, and fewer resources for incident response, making them highly profitable targets for cybercriminals.
Data point: 43% of cyberattacks target small businesses, yet only 14% of SMBs consider their cybersecurity posture highly effective. -Verizon Data Breach Investigations Report
To build a defense that works, you first need to understand what you're defending against. Here's what hackers actually want from your business, and why.
The Economics of Cybercrime
Cybercrime is a business. Like any business, it's driven by return on investment. Attackers allocate their time and resources where the payoff is highest relative to the effort required.
Here's why small businesses offer an attractive ROI for criminals:
- Low defenses: Many SMBs lack basic controls like MFA, EDR, or security awareness training
- High success rate: Phishing emails succeed far more often at companies without training programs
- Quick payoff: Ransomware attacks on small businesses can generate five- and six-figure ransoms with minimal effort
- Low risk of prosecution: Law enforcement resources are stretched thin, and most SMB attacks go unreported
The bottom line: attackers don't care about your company's name. They care about what's behind your firewall and how easy it is to get there.
Think of it this way: a sophisticated attacker might spend months trying to breach a well-defended enterprise for a $10 million payout. Or they can deploy an automated phishing campaign against 1,000 small businesses, compromise 50 of them, and collect $50,000 to $200,000 from each. The second approach is faster, lower risk, and often more profitable in aggregate.
What Attackers Are Really After
Not every attack is the same, and not every attacker wants the same thing. Understanding the specific assets that make your business a target helps you prioritize your defenses.
1Financial Data
- Bank account credentials
- Credit card information
- ACH and wire transfer details
- Accounting system access
2Credentials and Access
- Employee email passwords
- VPN and remote access logins
- Cloud service credentials
- Admin-level system access
3Customer PII
- Names, addresses, phone numbers
- Social Security numbers
- Health records (for healthcare-adjacent firms)
- Customer financial information
4Supply Chain Access
- Connections to larger clients' networks
- Vendor portal credentials
- Shared file systems and APIs
- Trust relationships with enterprise partners
Let's dig into each of these in more detail.
Financial Data: The Direct Cash Grab
The most straightforward motive. Attackers compromise your email to intercept wire transfer instructions, redirect invoice payments, or drain accounts directly. Business email compromise (BEC) attacks, where an attacker impersonates a CEO, CFO, or vendor to authorize fraudulent transfers, cost businesses billions annually.
Data point: Business email compromise resulted in $2.9 billion in reported losses in a single year, making it the costliest category of cybercrime. -FBI Internet Crime Complaint Center (IC3)
Small businesses are especially vulnerable because they often lack dual-authorization requirements for financial transactions. A single compromised email account can lead to six-figure losses before anyone notices.
Credentials: The Keys to Every Door
Stolen credentials are the currency of the dark web. A single set of valid employee credentials can sell for $10 to $500, depending on the access level. But the real value isn't in selling individual passwords, it's in what those credentials unlock.
With valid credentials, an attacker can:
- Access your cloud email and impersonate executives
- Move laterally through your network to find higher-value targets
- Install ransomware across multiple systems simultaneously
- Exfiltrate data quietly over weeks or months
The problem is compounded when employees reuse passwords across personal and professional accounts. One breach at a social media platform or retail site can expose the same password your controller uses for your financial systems.
Customer PII: A Long-Term Revenue Stream
Personal identifiable information has lasting value on the black market. Unlike a stolen credit card that gets canceled within days, a Social Security number, date of birth, or medical record can be used for identity theft for years.
Here's what stolen PII is worth:
- Social Security numbers: $1 to $10 each
- Complete identity profiles (fullz): $30 to $100 each
- Medical records: $250 to $1,000 each
- Corporate email credentials: $100 to $500 each
If your business holds records on 10,000 customers, even low-value PII creates a dataset worth tens of thousands of dollars. For healthcare-adjacent businesses, law firms, or financial services firms, the per-record value is significantly higher.
Supply Chain Access: You're the Side Door
This is the threat vector most SMB leaders overlook entirely. If your business has network connections, VPN access, or trusted vendor relationships with larger organizations, you're not just a target, you're a stepping stone.
Some of the most devastating breaches in recent years started with a small vendor. Attackers know that enterprise companies spend millions on their own security, but their vendors often don't. Compromising a 20-person IT services firm or a regional accounting practice can provide direct access to enterprise networks that would otherwise be impenetrable.
The Supply Chain Risk You're Not Seeing
If you provide services to larger companies and can't demonstrate strong security practices, you face a double risk: you become both a target for attackers seeking access to your clients, and you risk losing those client relationships when they raise their vendor security requirements.
Ransomware: The Blunt Instrument
Ransomware deserves its own section because it has fundamentally changed the economics of attacking small businesses. Modern ransomware operations run like franchises, developers create the malware and lease it to affiliates who carry out attacks, splitting the profits.
This "ransomware as a service" model means that even low-skilled attackers can deploy devastating ransomware campaigns. And the playbook is brutally effective:
- Gain initial access through phishing or exploiting a known vulnerability
- Move laterally through the network, escalating privileges
- Identify and encrypt critical data, including backups if possible
- Exfiltrate sensitive data before encrypting it (double extortion)
- Demand ransom in cryptocurrency, threatening to publish stolen data if payment isn't made
Data point: The average ransomware payment for small businesses is approximately $150,000, but total recovery costs, including downtime, data restoration, and lost business, typically reach $1.27 million. -Sophos State of Ransomware Report
The critical detail most CEOs miss: even if you pay the ransom, there's no guarantee you'll get your data back. And even if you do, the average recovery time is measured in weeks, not days.
Why "We're Too Small" Is the Most Dangerous Assumption
Let's be direct: the belief that your business is too small to target is itself a security vulnerability. It leads to:
- Underinvestment in basic security controls
- Complacency among employees who don't take security training seriously
- Delayed response when incidents do occur because no one expected them
- Lack of planning for business continuity and incident response
The reality is that most attacks on small businesses aren't targeted at all. They're automated. Attackers scan the internet for known vulnerabilities, send mass phishing campaigns, and exploit whatever they find. Your business doesn't need to be specifically targeted to be compromised, it just needs to be exposed.
What You Can Do About It
Understanding attacker motivations is the first step. The next step is building defenses that address the specific threats your business faces. Here's where to start:
Protect Financial Transactions
- Require dual authorization for all wire transfers and ACH payments
- Implement out-of-band verification for any changes to payment instructions
- Train your finance team to recognize BEC attacks
Secure Credentials
- Deploy multi-factor authentication on all accounts, especially email and remote access
- Use a business password manager to eliminate password reuse
- Monitor for compromised credentials on the dark web
Safeguard Customer Data
- Minimize what you collect and how long you keep it
- Encrypt sensitive data at rest and in transit
- Implement access controls so employees only see data they need
Harden Your Supply Chain Position
- Understand what access you have to client networks and systems
- Document and secure all vendor connections
- Be prepared to demonstrate your security posture to partners and clients
Prepare for Ransomware
- Maintain offline or immutable backups tested regularly
- Develop and practice an incident response plan
- Ensure your cyber insurance covers ransomware scenarios
Key Takeaways
- Cybercrime is a business, Attackers target SMBs because the ROI is high and the risk of prosecution is low
- You have what they want, Financial data, credentials, customer PII, and supply chain access are all valuable
- Most attacks are automated, You don't need to be specifically targeted to be compromised
- Ransomware has changed the game, Double extortion tactics make every business a potential victim
- Understanding the threat informs the defense, Knowing what attackers want helps you prioritize where to invest
The best defense starts with dropping the assumption that you're too small to matter. You're not. For more on building a defense strategy that matches real-world threats, see Cybersecurity for CEOs.