• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Too Small to be Targeted by Hackers? New Study Says No

No IT pro worth his or her salt takes digital security lightly. Despite that, it’s still tempting to grow at least a little comfortable with the notion that: “Hackers aren’t going to bother with my company.safe_data We’re too small. They’re only interested in things like big companies with a lot of name recognition, popular data warehouses and Major League Baseball teams.”

However, hackers tend to be pretty opportunistic when it comes to their targets. If they spot a weakness, they’ll exploit it, regardless of the size of the company. As a result, attacks on small business have been becoming more common. That’s the case according to the results of a recent study conducted by the National Small Business Association (NSBA), which included input from roughly 675 small-business owners, representing multiple industries across all 50 states.

The study asked participants if their business had been the victim of a cyberattack, including computer viruses, hacking, malware, etc. The responses were split right down the middle. Half of respondents said yes, the other half said no. The thing is, in the previous year’s version of this study, only 44% said yes while 56% answered in the negative. It may not be a catastrophic change, but a 6% swing in the wrong direction is still a trend worth keeping a close eye on.

This trend is especially worth monitoring considering the sharp spike in what these attacks are costing small businesses. In the previous year’s study, the total cost sat at $8,699.48. In this year’s study, that price tag skyrocketed up to $20,751.97.

Lastly, it’s taking longer for companies to resolve the attacks. Based on the data in this year’s study, attacks were sorted out in:

  • Less than a day – 30% (down 8% from previous year’s study)
  • Between 1-3 days – 34% (down 6%)
  • Between 3-7 days – 14% (up 3%)
  • More than a week – 9% (up 2%)
  • More than two weeks – 13% (up 8%)

Stay secure, regardless of size

It seems like new hacks and security issues are making headlines almost daily. In this type of climate, businesses of all shapes and sizes can’t afford to let their guard down. If they do, they risk becoming a target.

Part of keeping your mission critical systems and infrastructure hardened against an attack is having the right security solutions deployed in your environment. The other part is ensuring those solutions are maintained and up to date. Those are both areas in which Arraya Solutions can help.

A free security architecture consultation from Arraya can help keep your systems safe from cyber threats. It can turn up any of the potential weak points that cyber criminals love to cash in on. Then, our experts can work with you to find the best solution or tool to turn those weak points into strengths.

If you’d like to learn more about this offer or to schedule your free consultation, contact your Arraya Solutions Account Executive or simply click here.  If you’d like to learn more about Arraya and the other ways we can engage and elevate your IT team, please visit us at www.ArrayaSolutions.com.

Be sure to follow us on Twitter, @ArrayaSolutions, to stay on top of all the latest tech industry and company news.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}