By the MenHerr Research Team · Salinas, California
Between January 2023 and June 2024, our incident response queue logged 412 ransomware-related cases from small businesses across Monterey, San Benito and Santa Cruz counties. We anonymized the data and pulled out the patterns that surprised us most.
72% of cases began with one of three things: a re-used password exposed in a previous breach, a phishing email opened on an unmanaged personal device, or an unpatched remote-desktop service exposed to the public internet. Sophisticated zero-days were a rounding error.
The attacker was already inside the network for a week and a half, on average, before encryption began. That window is exactly where good detection earns its keep.
Of the businesses with offline, tested backups, 94% recovered without paying a ransom. Of those without, 31% paid — and a quarter of those who paid never received a working decryptor.
If your business needs help putting any of this in place, our small-business team can walk you through it on the phone — call (831) 869-7424.