The Real Cost of a Data Breach for a Mid-Size Business in 2026

The IBM Cost of a Data Breach Report puts the average breach at $4.88 million in 2024. That number gets cited a lot. What gets cited less is what that looks like for a 75-person company in Naperville that isn't a bank or a hospital — just a regular business that got hit. Let me walk through what actually happens.

The Headline Number Is Just the Start

$4.88 million is an average, and averages are notoriously misleading when the dataset includes Fortune 500 companies and government agencies alongside small regional businesses. Large enterprise breaches pull that number up significantly. For mid-size businesses — the 50 to 200 person companies that make up the backbone of the Chicago metro economy — the realistic number is smaller but still capable of doing serious damage.

The breaches I've seen in the Chicago area for companies in that size range tend to run $200,000 to $800,000 all-in when you count everything: direct costs, lost revenue, remediation, insurance complications, and the long tail of reputational damage. For a business operating on thin margins — and most of them are — that range is the difference between a painful year and a company that doesn't make it. Saying "we're not a big enough target to worry about enterprise-level breach costs" is technically accurate and completely misses the point.

Direct Costs: The Bills That Show Up Immediately

These are the line items that hit your bank account within weeks of an incident. They're painful because they're real money leaving immediately, before you've had a chance to assess the full damage.

  • Incident response firm: $25,000 to $100,000 or more depending on scope and how fast you need boots on the ground. This isn't optional — you need professionals who do this every day, not your internal IT team trying to figure it out while everything is on fire.
  • Forensic investigation: Understanding exactly what was accessed, what was exfiltrated, and when the attacker first got in. Required for legal purposes, required for notification, and required for actually fixing the problem.
  • Legal counsel: Breach notification laws in Illinois and at the federal level require it. Your attorney isn't a luxury here — they're the one keeping you on the right side of statutes that carry their own penalties.
  • Breach notification: Printing, mailing, and operating a call center for affected customers. Depending on how many records were involved, this alone can run tens of thousands of dollars.
  • Credit monitoring services: Typically 12 to 24 months of monitoring for every affected individual. At $10 to $20 per person per year, this scales quickly.
  • Regulatory fines: HIPAA violations can run $100 to $50,000 per violation, with annual caps that still allow for catastrophic total exposure. If you touch health data in any capacity, this category deserves serious attention.

None of these are speculative. Every item on that list is something businesses write checks for after a breach. And you're usually writing several of them at the same time, while also trying to keep the business running.

Indirect Costs: The Ones Nobody Budgets For

Downtime is the killer that most businesses don't factor into their pre-breach calculations. The average ransomware recovery takes 21 days. Three weeks. Think about what three weeks of degraded or zero operations costs your specific business. For a professional services firm billing hourly, it's three weeks of billable time you'll never recover. For a distributor, it's three weeks of orders you can't fulfill. The number is different for every company, but it's almost always larger than people expect.

Beyond downtime, the indirect cost categories that tend to surprise business owners include:

  • Lost contracts and client churn: Clients who leave after a breach rarely announce it's because of the breach. They just don't renew. More on this in the next section.
  • Diverted staff time: Your best people — the ones you most need focused on revenue-generating work — will spend months on remediation, documentation, regulatory response, and answering questions from clients, insurers, and regulators. That opportunity cost doesn't show up on an invoice but it's very real.
  • Increased cyber insurance premiums: After a claim, premium increases of 2x to 3x are common. You may also find coverage terms tightened or exclusions added at renewal.
  • Remediation and infrastructure rebuild: The work required to actually fix what the attacker exploited and harden the environment so it doesn't happen again. This is what you should have invested in before the breach, and now you're paying for it at emergency rates while everything else is also on fire.

Reputational Damage: The Long Tail

This is the hardest to quantify and the most consistently underestimated. A breach becomes public — it always does. Local news picks it up, industry publications run the story, the internet indexes it permanently. When prospects Google your company name six months after an incident, that coverage is often still on the first page of results. It doesn't go away.

Existing clients start asking questions you don't have comfortable answers to. Prospects who were close to signing go quiet. Referral partners who had recommended you become more cautious. None of this shows up on a balance sheet as "breach-related loss," but the causal relationship is direct.

I've seen companies lose 15 to 20 percent of their customer base in the 12 months following a breach. Not because the breach was catastrophic or data was dramatically mishandled — but because trust is hard to rebuild, and clients who have alternatives will quietly exercise them. The business that loses 18 percent of its revenue base in year one is also the business that enters year two with less capital to invest in the recovery, which compounds the problem further.

The Cyber Insurance Trap

Most business owners I talk to have a version of the same plan: "We have cyber insurance, so we're covered." I understand why that's reassuring. I also need you to read your policy before you need it, because the gap between what business owners expect and what policies actually cover is significant.

Here is what I see repeatedly in real-world claims situations:

  • Sub-limits for ransomware payments: Your $2 million policy may have a $500,000 sub-limit for ransomware-specific costs. When the ransom demand comes in at $750,000, you're covering the difference.
  • Business interruption waiting periods and caps: Most policies have a retention period — typically 8 to 24 hours — before business interruption coverage kicks in. They also have caps on total payout that may not cover your actual revenue loss over a 21-day outage.
  • Security controls attestation at claim time: Insurers increasingly require evidence that you maintained the security controls you represented at policy purchase — MFA, patching cadence, endpoint protection. If you let those slip and then file a claim, you may find coverage denied on the basis that you misrepresented your security posture.
  • Failure to maintain adequate controls: Coverage is increasingly being denied outright for "failure to maintain adequate security controls." This isn't a technicality buried in fine print — it's a real exclusion that insurers are actively using.

Cyber insurance is a legitimate part of a risk management strategy. It is not a substitute for one.

What Recovery Actually Looks Like for a 50-Person Company

Let me walk through a scenario I've seen play out more than once in the Chicago area. Monday morning, employees arrive to find files encrypted and a ransom demand displayed on screens across the office. The demand is $300,000 in Bitcoin. The attacker claims to have exfiltrated customer data before encrypting.

Now the decision tree begins. Do you pay? Paying doesn't guarantee you get a working decryption key. It doesn't guarantee the attacker actually deletes the stolen data. And it funds the next attack. Do you rebuild from backups? That assumes you have backups that are recent, complete, and — critically — stored offline where the attacker couldn't reach them. Most companies that haven't tested their backups recently find out in this moment that the backups are also compromised, or that recovery from backup takes far longer than anyone estimated.

Either path takes weeks and costs six figures. Payroll still happens. Rent still happens. Clients still expect deliverables, and some of them have contract SLAs that you're now in breach of. Most businesses at this size have no tested incident response plan — they have a general sense of what they'd probably do, which is not the same thing. Most have no offline backups. Most don't know how long recovery will take until they're in it, at which point it's too late to make a different choice.

The Math on Prevention vs. Remediation

A comprehensive security program for a 75-person business — MFA across all applications, endpoint detection and response, network monitoring, annual security assessment, staff security awareness training — costs roughly $30,000 to $80,000 per year depending on your existing infrastructure and how much you're building from scratch versus filling gaps.

One breach costs $200,000 to $800,000 minimum, and that's before you account for the reputational tail. The ROI on prevention isn't complicated math. You're comparing a known, manageable annual investment against an uncertain but potentially catastrophic one-time event. The uncertainty doesn't make the risk smaller — in some ways it makes the case for prevention stronger, because you can control the cost of prevention and you cannot control the cost of a breach.

The threat landscape is also not static. AI-powered attacks are making the attacker's job easier and faster, which is a trend I covered in detail in my post on AI and cybersecurity in 2026. The calculus on prevention investment only improves as attacks become more automated and lower-cost to execute at scale. If you're not sure where to start, a security evaluation is the most efficient way to identify your highest-priority gaps and build a remediation roadmap that makes sense for your size and budget.

The businesses that survive breaches are the ones that treated security as a cost of doing business before the breach happened, not after. If you're reading this and your security posture is "we haven't been hit yet," that's not a strategy — it's luck. And luck is not a reliable business continuity plan.

TJ
Tomasz J

Co-founder & Security Engineer, ExColo — 15+ years in cybersecurity, networking, and cloud infrastructure

Tomasz has led security and infrastructure projects for organizations across the Chicago area, specializing in Cisco security platforms, OpenStack, and Zero Trust architecture. He writes to share what he's learned in the field — the wins, the hard lessons, and the things vendors don't tell you.

About the team →