{"id":10827,"date":"2026-01-22T08:00:46","date_gmt":"2026-01-22T08:00:46","guid":{"rendered":"https:\/\/www.binaryconfidence.com\/?p=10827"},"modified":"2026-01-21T16:47:14","modified_gmt":"2026-01-21T16:47:14","slug":"ransomware-aims-on-small-medium-enterprises","status":"publish","type":"post","link":"https:\/\/www.binaryconfidence.com\/en\/ransomware-cieli-na-male-a-stredne-podniky\/","title":{"rendered":"The world of ransomware attacks is changing, and small and medium-sized businesses should pay attention"},"content":{"rendered":"<p><em>You may also remember seeing an unremovable message from the \u201cPolice of the Slovak Republic\u201d on your computer screen back in 2013. It urged you to pay a fine for your repeated \u201cviolation of legislation.\u201d While a few years ago such types of ransomware spread like an avalanche, today they are rather rare. What is trending are surgically precise attacks, where attackers track their targets, study their infrastructure, use tools to steal credentials, and are far more dangerous for smaller business entities.<\/em><\/p>\n<p>Small and medium-sized enterprises in 2025 have undoubtedly found themselves on the front line of ransomware attacks. Estimates vary from one statistic to another, mainly because private companies are reluctant to disclose breaches, but even more conservative figures suggest that more than <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10940-025-09625-7#:~:text=Results,from%20the%20Dutch%20Cybersecurity%20Monitor.\">90 % of attacks<\/a> are directed at SMEs. For attackers, they are \u201clow-hanging fruit\u201d because they often lack sufficient security and respond more slowly than large corporations. Their investments in cybersecurity are significantly lower, which means that any unpatched system or inattentive employee can become an entry point.<\/p>\n<p>In many cases, an attack paralyzes the entire operation of a company. More than half of affected businesses experience downtime exceeding ten days, leading to both financial and reputational damage. When operations are finally restored, the damage is only beginning: from missed contracts to disappointed clients. Many companies still do not have a plan for handling such situations. Without a clear strategy and backups, every attack can turn into a fight for survival.<\/p>\n<p>&nbsp;<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-10828 size-large\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Fixed_Ransomware-Inforgraphic-01-1024x408.png\" alt=\"\" width=\"800\" height=\"319\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Fixed_Ransomware-Inforgraphic-01-1024x408.png 1024w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Fixed_Ransomware-Inforgraphic-01-300x120.png 300w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Fixed_Ransomware-Inforgraphic-01-768x306.png 768w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Fixed_Ransomware-Inforgraphic-01-1536x612.png 1536w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Fixed_Ransomware-Inforgraphic-01-18x7.png 18w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Fixed_Ransomware-Inforgraphic-01.png 1583w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>The ransomware landscape is changing, but the attacks remain<\/h3>\n<p>After the \u201cgolden era\u201d of ransomware during and after the COVID-19 pandemic, the growth of this favored cybercriminal practice has slowed, and in some categories, such as the volume of paid ransoms, <a href=\"https:\/\/deepstrike.io\/blog\/ransomware-payout-statistics-2025\">even declined year-on-year.<\/a> To a large extent, hackers themselves are to blame, as they escalated their activities so aggressively that they quickly drew the attention of government agencies worldwide.<\/p>\n<p>In 2024, coordinated international operations targeted some of the most well-known ransomware groups, disrupting their structures and reshaping the balance of power in the cybercriminal ecosystem. The ransomware landscape suddenly became more fragmented and less predictable. Instead of a few strong, centralized organizations, today\u2019s attacks are carried out by groups using multiple ransomware variants simultaneously to reduce risk.<\/p>\n<p>Government institutions were finally able to breathe a bit easier in 2024, with <a href=\"https:\/\/www.ibm.com\/think\/insights\/whats-behind-51-drop-in-ransomware-attacks\">recorded attacks dropping by 51%.<\/a> They are also increasingly less likely to pay ransoms, making them less attractive targets for attackers. According to some sources <a href=\"https:\/\/www.chainalysis.com\/blog\/crypto-crime-ransomware-victim-extortion-2025\/\">overall ransom payments<\/a> also declined by approximately 35% year-on-year in 2024 (from $1.25 billion to nearly $814 million), mainly due to the efforts of international agencies combating cybercrime.<\/p>\n<p>Despite this decline, however, the total number of ransomware incidents <a href=\"https:\/\/dig.watch\/updates\/ransomware-decline-masks-growing-threat\">increased by 46%<\/a>year-on-year by early 2025, indicating more frequent attacks but with evolving tactics. Less than half of ransomware attacks in 2025 involve data encryption, which is the traditional hallmark of ransomware. This may suggest that attackers already count on victims\u2019 fear of having stolen data publicly exposed. There are cases where an attacker demands a $2 million ransom, knowing that regulatory penalties for data breaches would be significantly higher.<\/p>\n<h3>Next-gen ransomware: silent, precise, and fast<\/h3>\n<p><a href=\"https:\/\/www.binaryconfidence.com\/en\/kde-koncia-miliony-z-ransomware-takto-si-ich-uzivaju-utocnici\/\">Today\u2019s attackers are sophisticated<\/a>, far better organized, and incredibly fast. <a href=\"https:\/\/www.commvault.com\/blogs\/ransomware-trends\">The average time<\/a> between initial network breach and full ransomware deployment has dropped to 48 minutes. In some cases, it takes an astonishing 51 seconds. Instead of brute-force intrusions, <a href=\"https:\/\/www.binaryconfidence.com\/en\/datovy-unik-v-x-bol-zrejme-sposobeny-z-vnutra\/\">attackers often simply use compromised employee accounts<\/a>, log in as legitimate users, and move quietly through the network. <a href=\"https:\/\/www.vikingcloud.com\/blog\/cybersecurity-statistics\">As many as 96% of ransomware attacks<\/a> also target backup systems to prevent data recovery. Even \u201cproperly\u201d configured backups may no longer guarantee safety if they are not isolated or kept offline.<\/p>\n<p>Over the past decade, ransomware has effectively become a business model. As we highlighted in <a href=\"https:\/\/www.binaryconfidence.com\/en\/kde-koncia-miliony-z-ransomware-takto-si-ich-uzivaju-utocnici\/\">our recent blog<\/a>about the now-defunct Conti group, attackers are not anonymous \u201choodie-wearing\u201d individuals. They are sophisticated and well-organized groups with clearly defined management structures and roles. They follow established procedures and commonly use Ransomware-as-a-Service (RaaS), where \u201cdevelopers\u201d provide attack tools to other criminals in exchange for a share of the ransom. <a href=\"https:\/\/www.rapid7.com\/blog\/post\/q2-2025-ransomware-trends-analysis-boom-and-bust\/\">Estimates from the first half of 2025<\/a> suggest there are 96 active ransomware groups\u2014almost 40% more than the previous year.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-10841\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/ransom_graph-1024x521.png\" alt=\"\" width=\"800\" height=\"407\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/ransom_graph-1024x521.png 1024w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/ransom_graph-300x153.png 300w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/ransom_graph-768x391.png 768w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/ransom_graph-1536x782.png 1536w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/ransom_graph-2048x1042.png 2048w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/ransom_graph-18x9.png 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3>Welcome to the era of AI-driven attacks<\/h3>\n<p>Only recently, hackers <a href=\"https:\/\/www.anthropic.com\/news\/detecting-countering-misuse-aug-2025\">used the AI tool Claude<\/a> at scale for a complex ransomware campaign. They managed to automate credential and data theft, write extortion emails, and even negotiate ransoms worth hundreds of thousands of dollars using AI. Nearly 20 organizations were reportedly affected, ranging from public entities to religious institutions. So far, this is only a small, but all the more alarming, glimpse of what lies ahead.<\/p>\n<p>Just as defenders use AI today, attackers are already leveraging it as well. AI can generate highly personalized phishing messages, mimic internal communication styles, or rapidly test which vulnerabilities are still exploitable. It is thus becoming a significant catalyst for both the volume and sophistication of ransomware threats.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-10830 size-large\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Ransomware-Inforgraphic-v3-03-629x1024.png\" alt=\"\" width=\"629\" height=\"1024\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Ransomware-Inforgraphic-v3-03-629x1024.png 629w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Ransomware-Inforgraphic-v3-03-184x300.png 184w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Ransomware-Inforgraphic-v3-03-768x1251.png 768w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Ransomware-Inforgraphic-v3-03-7x12.png 7w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Ransomware-Inforgraphic-v3-03.png 818w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>We monitor the hackers \u2013 so you don\u2019t have to<\/h3>\n<p>We closely monitor the inner workings of various hacker groups. We are connected to multiple sources, including intelligence databases and analytical networks, and we also track channels that help expose cybercriminals. We know which leaked credentials are \u201ccirculating\u201d online and can alert you if they involve access to your company\u2019s systems.<\/p>\n<p>Binary Confidence is the very first company in Slovakia to provide <a href=\"https:\/\/www.binaryconfidence.com\/en\/socaas\/\">Security Operations Center (SOC)<\/a> services, and we have spent years focusing on active protection. We offer a comprehensive portfolio of services that can significantly strengthen your organization\u2019s cyber resilience:<\/p>\n<p><a href=\"https:\/\/www.securea.io\/\">Securea<\/a> \u2013 An advanced tool for managing cyber risks and ensuring compliance with security regulations. It enables efficient management of security processes, risk assessment, and optimization of investments in the protection of sensitive data.<\/p>\n<p><a href=\"https:\/\/www.protegamus.com\/\">Protegamus<\/a> \u2013 A simulation platform for training in cyber incidents that allows IT teams and staff to practice responses to real-life cyberattacks. Interactive exercises help quickly and effectively improve the resilience of any organization that uses them.<\/p>\n<p>If you suspect that you have become a target of an attack, or if you want to proactively strengthen your cybersecurity posture \u2013 <a href=\"https:\/\/www.binaryconfidence.com\/en\/kontakt\/\">get in touch with us.<\/a> We know who we are dealing with. And we know how to defend against them.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10526\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-300x21.png\" alt=\"European Union and Digital Europe Programme funding logos displayed in partnership section.\" width=\"872\" height=\"61\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-300x21.png 300w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-1024x71.png 1024w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-768x53.png 768w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-1536x107.png 1536w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-2048x142.png 2048w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-18x1.png 18w\" sizes=\"(max-width: 872px) 100vw, 872px\" \/><\/p>\n<p>The project funded through grant agreement number 101145856 is supported by the European Cybersecurity Competence Centre.<\/p>","protected":false},"excerpt":{"rendered":"<p>Mo\u017eno ste aj vy v roku 2013 na obrazovke po\u010d\u00edta\u010da za\u017eili neodstr\u00e1nite\u013en\u00fa v\u00fdzvu od \u201ePol\u00edcie Slovenskej republiky\u201c. Nab\u00e1dala v\u00e1s zaplati\u0165 za va\u0161e opakovan\u00e9 \u201eporu\u0161enie legislat\u00edvy\u201c. K\u00fdm pred p\u00e1r rokmi sa podobn\u00e9 typy ransomv\u00e9ru \u0161\u00edril ako lav\u00edna, dnes je u\u017e sk\u00f4r zriedkavos\u0165ou. V kurze s\u00fa sk\u00f4r chirurgicky presn\u00e9 \u00fatoky, pri ktor\u00fdch \u00fato\u010dn\u00edci sleduj\u00fa svoje ciele, \u0161tuduj\u00fa [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10838,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-10827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spravy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Svet ransomv\u00e9rov\u00fdch \u00fatokov sa men\u00ed a mal\u00e9 a stredn\u00e9 firmy by mali d\u00e1va\u0165 pozor - Binary Confidence %<\/title>\n<meta name=\"description\" content=\"Mal\u00e9 a stredn\u00e9 podniky s\u00fa v prvej l\u00ednii ransomv\u00e9rov\u00fdch \u00fatokov. Aj triezvej\u0161ie odhady hovoria, \u017ee na SMEs ich smeruje viac ako 90 %.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.binaryconfidence.com\/en\/ransomware-aims-on-small-medium-enterprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Svet ransomv\u00e9rov\u00fdch \u00fatokov sa men\u00ed a mal\u00e9 a stredn\u00e9 firmy by mali d\u00e1va\u0165 pozor - Binary Confidence %\" \/>\n<meta property=\"og:description\" content=\"Mal\u00e9 a stredn\u00e9 podniky s\u00fa v prvej l\u00ednii ransomv\u00e9rov\u00fdch \u00fatokov. Aj triezvej\u0161ie odhady hovoria, \u017ee na SMEs ich smeruje viac ako 90 %.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.binaryconfidence.com\/en\/ransomware-aims-on-small-medium-enterprises\/\" \/>\n<meta property=\"og:site_name\" content=\"Binary Confidence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BinConf\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-22T08:00:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Untitled-design.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1854\" \/>\n\t<meta property=\"og:image:height\" content=\"595\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"root\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:site\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"root\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/\"},\"author\":{\"name\":\"root\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\"},\"headline\":\"Svet ransomv\u00e9rov\u00fdch \u00fatokov sa men\u00ed a mal\u00e9 a stredn\u00e9 firmy by mali d\u00e1va\u0165 pozor\",\"datePublished\":\"2026-01-22T08:00:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/\"},\"wordCount\":1327,\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Untitled-design.png\",\"articleSection\":[\"Spr\u00e1vy\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/\",\"name\":\"Svet ransomv\u00e9rov\u00fdch \u00fatokov sa men\u00ed a mal\u00e9 a stredn\u00e9 firmy by mali d\u00e1va\u0165 pozor - Binary Confidence %\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Untitled-design.png\",\"datePublished\":\"2026-01-22T08:00:46+00:00\",\"description\":\"Mal\u00e9 a stredn\u00e9 podniky s\u00fa v prvej l\u00ednii ransomv\u00e9rov\u00fdch \u00fatokov. Aj triezvej\u0161ie odhady hovoria, \u017ee na SMEs ich smeruje viac ako 90 %.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Untitled-design.png\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Untitled-design.png\",\"width\":1854,\"height\":595,\"caption\":\"Untitled design\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ransomware-cieli-na-male-a-stredne-podniky\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Svet ransomv\u00e9rov\u00fdch \u00fatokov sa men\u00ed a mal\u00e9 a stredn\u00e9 firmy by mali d\u00e1va\u0165 pozor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"name\":\"Binary Confidence\",\"description\":\"Binary Confidence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.binaryconfidence.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\",\"name\":\"Binary Confidence\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"caption\":\"Binary Confidence\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BinConf\",\"https:\\\/\\\/x.com\\\/binaryconf\",\"https:\\\/\\\/www.youtube.com\\\/@binaryconfidence\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/binary-confidence\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\",\"name\":\"root\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"caption\":\"root\"},\"sameAs\":[\"https:\\\/\\\/www.binaryconfidence.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The world of ransomware attacks is changing, and small and medium-sized businesses should pay attention - Binary Confidence","description":"Mal\u00e9 a stredn\u00e9 podniky s\u00fa v prvej l\u00ednii ransomv\u00e9rov\u00fdch \u00fatokov. Aj triezvej\u0161ie odhady hovoria, \u017ee na SMEs ich smeruje viac ako 90 %.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.binaryconfidence.com\/en\/ransomware-aims-on-small-medium-enterprises\/","og_locale":"en_GB","og_type":"article","og_title":"Svet ransomv\u00e9rov\u00fdch \u00fatokov sa men\u00ed a mal\u00e9 a stredn\u00e9 firmy by mali d\u00e1va\u0165 pozor - Binary Confidence %","og_description":"Mal\u00e9 a stredn\u00e9 podniky s\u00fa v prvej l\u00ednii ransomv\u00e9rov\u00fdch \u00fatokov. Aj triezvej\u0161ie odhady hovoria, \u017ee na SMEs ich smeruje viac ako 90 %.","og_url":"https:\/\/www.binaryconfidence.com\/en\/ransomware-aims-on-small-medium-enterprises\/","og_site_name":"Binary Confidence","article_publisher":"https:\/\/www.facebook.com\/BinConf","article_published_time":"2026-01-22T08:00:46+00:00","og_image":[{"width":1854,"height":595,"url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Untitled-design.png","type":"image\/png"}],"author":"root","twitter_card":"summary_large_image","twitter_creator":"@binaryconf","twitter_site":"@binaryconf","twitter_misc":{"Written by":"root","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/#article","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/"},"author":{"name":"root","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514"},"headline":"Svet ransomv\u00e9rov\u00fdch \u00fatokov sa men\u00ed a mal\u00e9 a stredn\u00e9 firmy by mali d\u00e1va\u0165 pozor","datePublished":"2026-01-22T08:00:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/"},"wordCount":1327,"publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Untitled-design.png","articleSection":["Spr\u00e1vy"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/","url":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/","name":"The world of ransomware attacks is changing, and small and medium-sized businesses should pay attention - Binary Confidence","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/#primaryimage"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Untitled-design.png","datePublished":"2026-01-22T08:00:46+00:00","description":"Mal\u00e9 a stredn\u00e9 podniky s\u00fa v prvej l\u00ednii ransomv\u00e9rov\u00fdch \u00fatokov. Aj triezvej\u0161ie odhady hovoria, \u017ee na SMEs ich smeruje viac ako 90 %.","breadcrumb":{"@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/#primaryimage","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Untitled-design.png","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/01\/Untitled-design.png","width":1854,"height":595,"caption":"Untitled design"},{"@type":"BreadcrumbList","@id":"https:\/\/www.binaryconfidence.com\/ransomware-cieli-na-male-a-stredne-podniky\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.binaryconfidence.com\/"},{"@type":"ListItem","position":2,"name":"Svet ransomv\u00e9rov\u00fdch \u00fatokov sa men\u00ed a mal\u00e9 a stredn\u00e9 firmy by mali d\u00e1va\u0165 pozor"}]},{"@type":"WebSite","@id":"https:\/\/www.binaryconfidence.com\/#website","url":"https:\/\/www.binaryconfidence.com\/","name":"Binary Confidence","description":"Binary Confidence","publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.binaryconfidence.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.binaryconfidence.com\/#organization","name":"Binary Confidence","url":"https:\/\/www.binaryconfidence.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","caption":"Binary Confidence"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BinConf","https:\/\/x.com\/binaryconf","https:\/\/www.youtube.com\/@binaryconfidence","https:\/\/www.linkedin.com\/company\/binary-confidence\/"]},{"@type":"Person","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514","name":"root","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","caption":"root"},"sameAs":["https:\/\/www.binaryconfidence.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/10827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/comments?post=10827"}],"version-history":[{"count":7,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/10827\/revisions"}],"predecessor-version":[{"id":10843,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/10827\/revisions\/10843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media\/10838"}],"wp:attachment":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media?parent=10827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/categories?post=10827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/tags?post=10827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}