{"id":68153,"date":"2025-09-10T13:11:15","date_gmt":"2025-09-10T18:11:15","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68153"},"modified":"2025-09-10T17:06:45","modified_gmt":"2025-09-10T22:06:45","slug":"ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/","title":{"rendered":"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><em>The Hard Truth: Hackers Don\u2019t Skip the Little Guys<\/em><\/h4>\n\n\n\n<p>If you run a small shop, accounting firm, medical practice, or contracting business, you might think cybercriminals wouldn\u2019t bother with you. Unfortunately, that\u2019s no longer true.<\/p>\n\n\n\n<p>Recent numbers tell the story:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>82% of ransomware attacks in 2024 targeted organizations with fewer than 1,000 employees<\/strong> (<a href=\"https:\/\/www.flowspecialty.com\/blog-post\/emerging-cyber-risk-trends-for-smbs-in-2025-what-you-need-to-know\">Flow Specialty<\/a>).<\/li>\n\n\n\n<li>The <strong>average ransomware payout topped $26,000 in 2024<\/strong>, up from $13,000 just two years earlier (<a href=\"https:\/\/apnews.com\/article\/a542e2c9c7dd73fa4cca5be7c9a7a5b3\">AP News<\/a>).<\/li>\n\n\n\n<li>The hidden costs are even worse: downtime from an attack can reach <strong>$53,000 per hour<\/strong> in some industries (<a href=\"https:\/\/www.vikingcloud.com\/blog\/cybersecurity-statistics\">Viking Cloud<\/a>).<\/li>\n\n\n\n<li>And while big corporations make headlines, <strong>nearly half of small businesses reported a ransomware attack in the past year<\/strong> (<a href=\"https:\/\/www.connectwise.com\/blog\/smb-cybersecurity-statistics-and-trends\">ConnectWise<\/a>).<\/li>\n<\/ul>\n\n\n\n<p>For a micro business, a single attack can be devastating. Unlike Fortune 500 companies, most don\u2019t have the financial cushion to absorb days of downtime or pay expensive recovery costs.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why \u201cBe Careful Online\u201d Isn\u2019t Enough<\/h2>\n\n\n\n<p>It\u2019s common advice to tell employees to be cautious with email and not click suspicious links. Training is important\u2014but new research shows it doesn\u2019t always make the difference we hope.<\/p>\n\n\n\n<p>A <strong>2025 study of more than 12,000 employees at a U.S. financial services company<\/strong> found that phishing awareness training had <strong>little to no impact<\/strong> on whether people clicked dangerous links or reported them (<a href=\"https:\/\/arxiv.org\/abs\/2506.19899\">arXiv, June 2025<\/a>).<\/p>\n\n\n\n<p>That doesn\u2019t mean you should skip training\u2014it\u2019s still good practice. But it does mean you shouldn\u2019t rely on it alone. People are human, and mistakes will happen. That\u2019s why micro businesses need <strong>technical safeguards<\/strong>, like application allowlisting and automated patching, that don\u2019t depend on employees making perfect choices every time.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why Built-In Security Tools Aren\u2019t Enough<\/h2>\n\n\n\n<p>Every modern PC or laptop ships with some form of \u201cpre-installed\u201d protection like Windows Defender or Apple\u2019s XProtect. While these are a good starting point, they have limitations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reactive by design:<\/strong> Most built-in antivirus relies on signatures\u2014meaning the malware must already be known before it can be blocked. New ransomware variants often slip through.<\/li>\n\n\n\n<li><strong>Broad coverage, not specialized:<\/strong> These tools are built to protect billions of consumer devices, not tailored to the unique risks of small businesses.<\/li>\n\n\n\n<li><strong>Easily bypassed:<\/strong> Attackers routinely design malware to disable or work around default security.<\/li>\n\n\n\n<li><strong>Minimal visibility:<\/strong> Pre-installed tools rarely provide business owners with a clear view of what software is actually running in their environment\u2014leaving blind spots for rogue or unauthorized apps.<\/li>\n<\/ul>\n\n\n\n<p>For micro businesses, depending only on the free tools that came with your device is like locking the front door but leaving the windows wide open.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Practical, Affordable Steps for Micro Businesses<\/h2>\n\n\n\n<p>Here are concrete steps that don\u2019t require a big IT staff or enterprise budget:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.pcmatic.com\/blog\/7-affordable-cybersecurity-habits-every-micro-business-needs\/#back-up-data\">Back up your data\u2014and keep one copy offline.<\/a><\/strong> Cloud backups are great, but also keep a simple USB hard drive copy disconnected from your system.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.pcmatic.com\/blog\/7-affordable-cybersecurity-habits-every-micro-business-needs\/#automatic-updates\">Turn on automatic updates.<\/a><\/strong> Most ransomware takes advantage of outdated software. Let your computers update themselves overnight.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.pcmatic.com\/blog\/7-affordable-cybersecurity-habits-every-micro-business-needs\/#2FA\"><strong>Enable two-factor authentication (2FA).<\/strong> <\/a>Free with most email and banking platforms, it\u2019s one of the strongest defenses against account takeovers.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.pcmatic.com\/blog\/7-affordable-cybersecurity-habits-every-micro-business-needs\/#passwords\">Use strong, unique passwords.<\/a><\/strong> Password managers\u2014even free ones\u2014make this manageable.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.pcmatic.com\/blog\/7-affordable-cybersecurity-habits-every-micro-business-needs\/#application-allowlisting\">Adopt application allowlisting.<\/a><\/strong> Instead of trying to block every bad program, this method only lets pre-approved software run. If it\u2019s not on the list, it doesn\u2019t execute\u2014cutting ransomware off at the source.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.pcmatic.com\/blog\/7-affordable-cybersecurity-habits-every-micro-business-needs\/#restrict-rights\"><strong>Restrict admin rights.<\/strong> <\/a>Most employees don\u2019t need full system control. Limiting this reduces the damage if an account is compromised.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.pcmatic.com\/blog\/7-affordable-cybersecurity-habits-every-micro-business-needs\/#incident-response-plan\"><strong>Have a one-page response plan.<\/strong> <\/a>Write down who to call, how to disconnect an infected device, and where backups are stored. Even a short checklist can save precious time.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How PC Matic Pro Helps Micro Businesses Do This Economically<\/h2>\n\n\n\n<p>The challenge for micro businesses isn\u2019t knowing what needs to be done\u2014it\u2019s finding a way to do it affordably and without a full IT team. That\u2019s where <strong><a href=\"http:\/\/pcmatic.com\/pro\/smb\">PC Matic Pro<\/a><\/strong> comes in.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Application Allowlisting Built-In:<\/strong> PC Matic Pro enforces a \u201cdefault deny\u201d policy, only allowing known and trusted applications to run. This cuts off ransomware and other unauthorized software before it starts.<\/li>\n\n\n\n<li><strong>Automated Patching:<\/strong> The platform automatically updates common applications, closing the door on the unpatched vulnerabilities ransomware often exploits.<\/li>\n\n\n\n<li><strong>Visibility and Control:<\/strong> PC Matic\u2019s Fingerprint Dashboard shows business owners exactly what\u2019s running in their environment, making it easier to spot anomalies.<\/li>\n\n\n\n<li><strong>Low Cost, High Coverage:<\/strong> Unlike enterprise tools priced for big companies, PC Matic Pro is structured to fit the budgets of micro businesses\u2014delivering critical protections without requiring outside IT staff.<\/li>\n\n\n\n<li><strong>Made in the USA:<\/strong> With support and development based in the U.S., PC Matic Pro aligns with compliance and trust concerns many businesses now face.<\/li>\n<\/ul>\n\n\n\n<p>For micro businesses, it\u2019s a way to check multiple boxes\u2014allowlisting, patching, visibility, and control\u2014in one affordable solution.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Takeaway<\/h2>\n\n\n\n<p>Cybercriminals know that micro businesses are less protected than big companies. That makes you a target, not an exception. But with smart, simple safeguards\u2014like backups, updates, 2FA, and application allowlisting\u2014you can drastically lower your risk without draining your budget.<\/p>\n\n\n\n<p>Think of it the same way you think about your storefront: you wouldn\u2019t leave the doors unlocked overnight. Don\u2019t leave your business wide open online.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" style=\"margin-top:var(--wp--preset--spacing--80);margin-bottom:var(--wp--preset--spacing--80)\"\/>\n\n\n\n<h5 class=\"wp-block-heading\">References<\/h5>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.flowspecialty.com\/blog-post\/emerging-cyber-risk-trends-for-smbs-in-2025-what-you-need-to-know\">Flow Specialty \u2013 <em>Emerging Cyber Risk Trends for SMBs in 2025<\/em><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/apnews.com\/article\/a542e2c9c7dd73fa4cca5be7c9a7a5b3\">AP News \u2013 <em>Cyberattacks are on the rise, and that includes small businesses<\/em><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.vikingcloud.com\/blog\/cybersecurity-statistics\">Viking Cloud \u2013 <em>Cybersecurity Statistics 2025<\/em><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.connectwise.com\/blog\/smb-cybersecurity-statistics-and-trends\">ConnectWise \u2013 <em>SMB Cybersecurity Statistics and Trends<\/em><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/arxiv.org\/abs\/2506.19899\">arXiv \u2013 <em>Assessing the Effectiveness of Phishing Awareness Training: A Large-Scale Reproduction Study<\/em> (June 2025)<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>The Hard Truth: Hackers Don\u2019t Skip the Little Guys If you run a small shop, accounting firm, medical practice, or contracting business, you might think cybercriminals wouldn\u2019t bother with you. Unfortunately, that\u2019s no longer true. Recent numbers tell the story: For a micro business, a single attack can be devastating. Unlike Fortune 500 companies, most [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":68154,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-68153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs<\/title>\n<meta name=\"description\" content=\"The Hard Truth: Hackers Don\u2019t Skip the Little Guys If you run a small shop, accounting firm, medical practice, or contracting business, you might think\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs\" \/>\n<meta property=\"og:description\" content=\"The Hard Truth: Hackers Don\u2019t Skip the Little Guys If you run a small shop, accounting firm, medical practice, or contracting business, you might think\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-10T18:11:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-10T22:06:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-19.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cmunson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cmunson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/\"},\"author\":{\"name\":\"cmunson\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/113096bf28d4c3d6efb16e71b38e8c14\"},\"headline\":\"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs\",\"datePublished\":\"2025-09-10T18:11:15+00:00\",\"dateModified\":\"2025-09-10T22:06:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/\"},\"wordCount\":928,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-19.jpg\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/\",\"name\":\"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-19.jpg\",\"datePublished\":\"2025-09-10T18:11:15+00:00\",\"dateModified\":\"2025-09-10T22:06:45+00:00\",\"description\":\"The Hard Truth: Hackers Don\u2019t Skip the Little Guys If you run a small shop, accounting firm, medical practice, or contracting business, you might think\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-19.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-19.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/113096bf28d4c3d6efb16e71b38e8c14\",\"name\":\"cmunson\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/cmunson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs","description":"The Hard Truth: Hackers Don\u2019t Skip the Little Guys If you run a small shop, accounting firm, medical practice, or contracting business, you might think","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs","og_description":"The Hard Truth: Hackers Don\u2019t Skip the Little Guys If you run a small shop, accounting firm, medical practice, or contracting business, you might think","og_url":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-09-10T18:11:15+00:00","article_modified_time":"2025-09-10T22:06:45+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-19.jpg","type":"image\/jpeg"}],"author":"cmunson","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"cmunson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/"},"author":{"name":"cmunson","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/113096bf28d4c3d6efb16e71b38e8c14"},"headline":"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs","datePublished":"2025-09-10T18:11:15+00:00","dateModified":"2025-09-10T22:06:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/"},"wordCount":928,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-19.jpg","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/","url":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/","name":"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-19.jpg","datePublished":"2025-09-10T18:11:15+00:00","dateModified":"2025-09-10T22:06:45+00:00","description":"The Hard Truth: Hackers Don\u2019t Skip the Little Guys If you run a small shop, accounting firm, medical practice, or contracting business, you might think","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-19.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-19.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-and-the-micro-business-why-the-smallest-targets-are-now-in-the-crosshairs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware and the Micro Business: Why the Smallest Targets Are Now in the Crosshairs"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/113096bf28d4c3d6efb16e71b38e8c14","name":"cmunson","url":"https:\/\/www.pcmatic.com\/blog\/author\/cmunson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68153"}],"version-history":[{"count":10,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68153\/revisions"}],"predecessor-version":[{"id":68181,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68153\/revisions\/68181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68154"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}