Eero Nevaluoto
Senior Engineer, Intelligent iT
Eero is a certified cybersecurity professional (Azure Security Operations Analyst, CompTIA CySA+, Security+) who specializes in threat detection and compliance automation.
Ransomware is no longer just a problem for large enterprises. In 2026, mid-sized businesses are the primary target for ransomware gangs, precisely because many lack the security infrastructure of larger organizations while still having enough revenue to pay significant ransoms. The average ransom demand for companies with 100 to 500 employees exceeded $780,000 in 2025, and that figure continues to climb.
The good news is that ransomware is a preventable threat. No single tool will stop every attack, but a layered defense strategy dramatically reduces your risk and limits the damage if an attack does get through. Here are the seven essential steps every mid-sized business should implement.
1. Deploy Multi-Factor Authentication Everywhere
If there is one single action that provides the greatest return on security investment, it is multi-factor authentication. MFA blocks over 99% of credential-based attacks, which remain the most common entry point for ransomware operators.
MFA should be enforced on every system that supports it, not just email. That includes VPN connections, remote desktop access, cloud applications, administrative consoles, and any system that stores sensitive data. Pay special attention to privileged accounts. IT administrators and executives are high-value targets, and their accounts should require the strongest authentication methods available.
Avoid SMS-based MFA when possible. SIM-swapping attacks have made text message verification unreliable. Instead, use authenticator apps, hardware security keys, or biometric verification. Microsoft Authenticator and YubiKey are excellent options for mid-sized organizations.
2. Implement Endpoint Detection and Response
Traditional antivirus software relies on signature databases that can only detect known threats. Ransomware operators constantly modify their code to evade these signatures. Endpoint Detection and Response takes a fundamentally different approach by monitoring endpoint behavior in real time and flagging suspicious activity.
EDR platforms watch for behaviors that are characteristic of ransomware: rapid file encryption, attempts to disable backup services, communication with known command-and-control servers, and lateral movement across the network. When these behaviors are detected, EDR can automatically isolate the affected endpoint, preventing the ransomware from spreading.
For mid-sized businesses, managed EDR services provide the best balance of protection and practicality. Rather than requiring your internal team to monitor and respond to alerts 24/7, a managed service provides expert analysts who investigate alerts and take action on your behalf.
3. Maintain Immutable, Air-Gapped Backups
Backups are your last line of defense against ransomware, but modern ransomware operators know this. One of the first things sophisticated attackers do after gaining access is locate and destroy or encrypt your backups. If they succeed, you have no recovery option other than paying the ransom.
To protect against this, your backup strategy must include:
- Immutable backups: Backup copies that cannot be modified or deleted for a defined retention period, even by an administrator with full access
- Air-gapped storage: At least one copy of your backups should be stored in a location that is physically or logically disconnected from your production network
- The 3-2-1 rule: Three copies of your data, on two different types of media, with one copy stored offsite
- Regular recovery testing: Test your ability to restore from backup at least quarterly. Untested backups are not backups; they are assumptions
Cloud-based backup solutions from providers like Datto, Veeam, and Axcient offer immutability and air-gapping features specifically designed to resist ransomware attacks.
4. Lock Down Email Security
Email remains the number one delivery mechanism for ransomware. Phishing emails trick users into clicking malicious links or opening infected attachments, which download and execute the ransomware payload. AI-generated phishing emails have become alarmingly convincing, making this threat harder to defend against than ever.
A comprehensive email security strategy includes:
- Advanced email filtering: Deploy a solution that uses AI and machine learning to detect phishing attempts, not just known malicious signatures
- Link and attachment sandboxing: Automatically detonate links and attachments in a secure sandbox environment before they reach the user's inbox
- DMARC, DKIM, and SPF: Implement these email authentication protocols to prevent attackers from spoofing your domain
- Banner warnings: Add visual warnings to emails that originate from outside your organization
- Block risky file types: Prevent delivery of executable files, scripts, and other file types commonly used to deliver ransomware
5. Invest in Employee Security Awareness Training
Technology alone cannot stop ransomware. Your employees are both your greatest vulnerability and your strongest defense, depending on how well they are trained. Security awareness training transforms your workforce from a liability into an active security layer.
Effective training programs go beyond annual compliance presentations. They include:
- Monthly simulated phishing campaigns that test employees with realistic attack scenarios
- Short, engaging training modules delivered regularly rather than annual marathon sessions
- Role-specific training for high-risk positions like finance, HR, and executive assistants
- Positive reinforcement for employees who report suspicious emails rather than punitive measures for those who fail simulations
- Real-world examples and case studies that demonstrate the consequences of successful attacks
Organizations that implement ongoing security awareness training see phishing susceptibility rates drop from an industry average of 30% to under 5% within 12 months.
6. Segment Your Network and Enforce Least Privilege
If ransomware does get a foothold on one machine, network segmentation and least-privilege access limit how far it can spread. Without segmentation, an attacker who compromises a single workstation can potentially move laterally across your entire network, encrypting everything in their path.
Network segmentation divides your environment into isolated zones with controlled access points between them. At minimum, you should separate your guest Wi-Fi from your corporate network, isolate IoT devices, restrict server access to authorized administrators, and segment sensitive systems like financial applications and patient databases.
Least-privilege access means every user account has only the permissions needed for that person's specific role, nothing more. Regularly audit permissions and remove access that is no longer needed. Implement just-in-time administrative access so that even IT administrators only have elevated privileges when they are actively performing administrative tasks.
7. Build and Test an Incident Response Plan
Despite your best prevention efforts, you need a plan for what happens if ransomware does get through. An incident response plan defines exactly who does what, in what order, and how communication flows during a crisis. Without one, your team will waste precious time figuring out how to respond while the ransomware continues to spread.
Your incident response plan should include:
- Roles and responsibilities: Who leads the response, who communicates with stakeholders, who handles technical remediation
- Containment procedures: Step-by-step instructions for isolating affected systems to stop the spread
- Communication templates: Pre-drafted messages for employees, clients, regulators, and the public
- Recovery procedures: Detailed steps for restoring from backup and bringing systems back online in the right order
- Legal and insurance contacts: Pre-established relationships with cyber insurance carriers, legal counsel, and forensics firms
- Decision framework for ransom payment: A pre-discussed position on whether your organization would consider paying a ransom, including legal and ethical considerations
Most importantly, test your plan. Run tabletop exercises at least twice a year where your team walks through a simulated ransomware scenario. Identify gaps, update the plan, and test again. The organizations that recover fastest from ransomware attacks are invariably the ones that practiced their response before they needed it.
The Cost of Prevention vs. the Cost of an Attack
Implementing all seven of these steps requires investment, but that investment pales in comparison to the cost of a successful ransomware attack. Between ransom payments, downtime, recovery costs, legal fees, regulatory fines, and reputation damage, the average total cost of a ransomware incident for a mid-sized business exceeds $1.8 million.
Ransomware is not going away. The criminals behind it are well-funded, highly organized, and constantly evolving their tactics. The only responsible approach is to build defenses that are stronger than their attacks.
Is your business protected against ransomware?
Book a free security assessment to identify your vulnerabilities and build a comprehensive defense strategy.
Book a Free Consultation