Security8 min read

The Real Cost of a Data Breach (Hint: It's Not Just the Ransom)

By Inevat Team·December 22, 2025
The Real Cost of a Data Breach (Hint: It's Not Just the Ransom)

When we talk to business owners about cybersecurity, the mental model for "worst case scenario" is usually: hackers get in, demand ransom, company pays, problem goes away. It's a reasonable fear. It's also an incomplete one.

The ransom — when it's paid — is often one of the smaller costs of a breach. What actually shows up on the bill is significantly worse and significantly more complicated. IBM's annual Cost of a Data Breach Report put the global average total cost at $4.88 million in 2024, the highest figure recorded.[1] For small businesses that number is lower in absolute terms but can be proportionally devastating.

Here's what the full accounting actually looks like.

Downtime

The most immediately felt cost of a breach is that your business stops working. Systems are offline, staff can't access files, operations grind to a halt. For a ransomware incident, this period typically lasts days to weeks. The average downtime from a ransomware attack is around 21 days.[2]

For a business running $5M annually, 21 days of impaired operations is material. For a business that operates manufacturing, medical, or hospitality — where downtime means you literally cannot serve customers — the revenue loss during that window can be severe.

Incident Response and Investigation

Once you know there's been a breach, you need to understand what happened: how attackers got in, what they accessed, where they went, and whether they're still in your environment. This requires forensic investigation by security specialists.

Incident response retainers typically run $300–500/hour for qualified firms. The investigation phase alone commonly runs 40–100+ hours depending on the complexity of the environment. If you don't have a retainer pre-arranged, you're paying emergency rates for a firm that doesn't know your environment and you're waiting while they get up to speed.

Legal and Regulatory Exposure

If your breach involved customer data — which most do — you have mandatory notification requirements at the state and federal level. How many states? All 50 have breach notification laws, with varying thresholds and timelines. HIPAA has its own set of requirements. PCI-DSS has another.

Notification sounds simple. In practice, it requires legal counsel to navigate which laws apply, draft the notifications, and advise on your obligations. Legal fees for a breach response commonly run $50,000–$250,000 for small businesses, depending on the scope and the regulatory environment.

If regulators investigate — which they will if the breach is large enough or if there's evidence of negligent security practices — fines and settlement costs can dwarf everything else. HIPAA fines have run into the millions for organizations that didn't have adequate controls in place.

Notification Costs

Beyond legal fees, actually notifying affected individuals costs money. Postage, printing, setting up a call center for customer inquiries, credit monitoring services for affected individuals — these add up quickly. For a breach affecting 10,000 customers, notification costs alone can run $500,000 or more.

Reputational Damage and Customer Loss

This is the hardest one to quantify, and often the most lasting. Customers whose data is breached leave. Prospects who were evaluating you make a different decision. Partners get nervous. Reviews get written.

IBM's research found that lost business — including customer churn, acquisition costs to replace lost customers, and reputational losses — accounts for roughly 28% of total breach costs.[1] For businesses in industries where reputation is the product — professional services, healthcare, finance — the impact can persist for years.

Cyber Insurance Aftermath

If you have cyber insurance, it will cover some of this. It will not cover all of it. Coverage limits matter. Deductibles matter. Policy exclusions matter — and there are many. If you had a known vulnerability that you hadn't remediated, your insurer may dispute the claim.

After a claim, your premiums will go up. Significantly. Assuming you can get coverage renewed at all — some carriers will non-renew policies following claims, leaving you to find new coverage in a market that now knows you've had a breach.

The "We're Too Small to Be a Target" Fallacy

Most breaches affecting small businesses aren't targeted in the sense of "someone researched your company and decided to go after you specifically." They're opportunistic: automated tools scanning the internet for vulnerable systems, credential stuffing attacks testing known breached passwords against thousands of services simultaneously, phishing campaigns sent to millions of addresses.

Small businesses get hit not because attackers chose them, but because their defenses were lower and they appeared in the same scans as everyone else. Being small doesn't make you invisible. It often makes you easier.

What Actually Moves the Number

IBM's research consistently finds that organizations with strong security fundamentals — incident response plans, employee training, encryption, MFA, detection and response capabilities — have meaningfully lower breach costs than those without.[1] Not because breaches don't happen, but because the time to detect and contain is shorter, and the blast radius is smaller.

The controls that move the number are not exotic. They're the fundamentals: MFA, endpoint detection and response, email security, tested backups, and an incident response plan that someone has actually read.

If you want to understand your current exposure and what it would actually take to contain it, we're happy to talk through it. That conversation costs you an hour. A breach costs considerably more.

References

  1. IBM Security, Cost of a Data Breach Report 2024. Average total cost of a data breach reached $4.88M globally. ibm.com/reports/data-breach
  2. Coveware, Ransomware Quarterly Reports. Average business downtime from ransomware attacks, 2023–2024. coveware.com/ransomware-quarterly-reports

Need help with this? We can assist.

Inevat provides managed IT and cybersecurity for businesses nationwide. Schedule a free consultation to talk through your situation.

Schedule a Free Consultation

Related Articles

Security

Your Cyber Insurance Application Is Also a Security Audit

Cyber insurance applications have gotten specific. They ask about MFA, EDR, backup testing, and access controls. The questions aren't just bureaucratic — they're a map of what insurers know causes breaches. Here's how to read them.

Read Article: Your Cyber Insurance Application Is Also a Security Audit
Security

Why We Keep Seeing the Same 3 Entry Points in Every Breach

After responding to dozens of security incidents across businesses of all sizes, patterns emerge. Most breaches don't require sophisticated hacking. They use the same three doors — and all three are fixable.

Read Article: Why We Keep Seeing the Same 3 Entry Points in Every Breach
Security

Shadow IT: The Apps Your Employees Are Using That You Don't Know About

Someone on your team is storing files in their personal Dropbox right now. Someone else is running client data through a free AI tool. Nobody told IT. This is shadow IT — and it's more common (and riskier) than most business owners realize.

Read Article: Shadow IT: The Apps Your Employees Are Using That You Don't Know About