How data breaches are hurting small businesses

Share this page

Small businesses are big targets for hackers, but they still aren’t prepared.

Data breaches that make the news usually involve massive corporations with vast datasets. But small businesses must also prevent cyberattacks and data breaches, and most don’t feel prepared.

“We lost $10,000 due to a cyberattack on our mainframe in which a hacker was able to access financial data.”

“An email was sent from a banking institution which was opened and a ransom note was given. Shut down all my computer systems and I lost all data.”

“I lost money to a cyberattack due to a corrupt employee who stole my information.”

These are just a few of the horror stories the Better Business Bureau compiled in a recent survey(new window) of small businesses. Hackers disproportionately target small businesses, perhaps because small businesses are less equipped to prevent cyberattacks and manage the fallout.

Three-fourths of small businesses don’t feel “well prepared” for cyber security threats, and 17% of data breaches(new window) occur because someone made a mistake (like clicking on a phishing email). Yet the consequences of an error could not be higher. Most small businesses say they could not remain profitable for a month if they lost their data, leaving them extremely vulnerable to ransomware attacks.

Infographic small businesses and data breaches

The infographic below is a warning shot for small and medium-sized businesses: The hackers are after you. Are you ready for them?

Sign up and get a free secure email account from Proton Mail.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan or donate. Thank you for your support.

Protect your privacy with Proton
Create a free account

Share this page

Ben Wolford

Ben Wolford is a writer and editor whose work has appeared in major newspapers and magazines around the world. Ben joined Proton in 2018 to help to explain technical concepts in privacy and make Proton products easy to use.

Related articles

A digital signature on a document is like a virtual fingerprint that verifies the identity of the person or entity that signed it. Unlike handwritten signatures, which you can easily forge, digital signatures are highly secure because they’re protec
Many people who use Apple products assume their data is private because of the company’s aggressive marketing on the topic. “Some things shouldn’t be shared. iPhone helps keep it that way,” goes one famous ad. “Privacy. That’s iPhone.” But if you u
Whether it’s personal documents such as your birth certificate or confidential business files like work contracts, we all have sensitive documents we need to store securely. With so many storage options available, it’s important to understand the dif
At Proton Mail, your security is our number one priority. Normally, this means protecting your inbox from unauthorized outside access. However, rather than trying to hack your software, phishing emails try to hack you. By spoofing emails from trusted
Learn all about email clients and why you might use one instead of webmail. If you’ve used an app like Gmail on your mobile phone or Outlook on your computer, you’ve used an email client. We explain how an email client works and the pros and cons of
No email service is completely anonymous. Learn how to send an email as anonymously as possible using private email, aliases, and a VPN or Tor. Do you need to send an email without revealing who you are? Unfortunately, you can’t just sign up for a f