Skip to main content

What Actually Happens After a Cyber Attack

19 May 2026 | By CIO Tech

Ransomware does not just encrypt your files. It encrypts your week.

Most small business owners think a cyber attack means a pop-up on a screen and a phone call to their IT person. The reality is messier. It is days of uncertainty, hard decisions made under pressure, and costs that go well beyond the ransom demand. The average cost of a cyber incident for a small business in Australia is over $46,000, and that does not include the time you lose or the clients who quietly move on.

This is what the first 72 hours actually look like, not as a hypothetical, but as the reality businesses face when basic security controls are missing. If you want a structured first-hour response template before you ever need it, our Incident Response 60-Minute Playbook is free.

Hour 0 to 4: Discovery and Chaos

It usually starts with a staff member who cannot open their files. Or a screen that displays a ransom note demanding payment in cryptocurrency. Or an email from a client asking why they received a strange invoice from your account.

The first few hours are confusion. You do not know what has been affected, how it got in, or whether it is still spreading. If you have an IT provider, you call them. If you do not, you are searching the internet for answers while your business is offline.

Every device that connects to your network is now suspect. If the attacker got in through one machine, they may have moved laterally, that is, jumped from one computer to another across your network. Until someone can confirm otherwise, nothing is safe to use.

Your staff are standing around. Phones might still work, but email, files, and any software that runs on your network are unavailable.

Hour 4 to 24: Assessment and Hard Decisions

An incident response specialist, if you can get one at short notice, starts by isolating affected systems. That means pulling devices off the network to stop the spread. It also means your business is still down.

The next step is working out what happened. How did the attacker get in? A phishing email, an unpatched system, a reused password, a remote access tool left open. In most small business incidents, the entry point is something basic that should have been locked down. When the ACSC publishes an alert about an active campaign, our ACSC Alert Response Playbook shows the triage steps to take in the first 24 hours.

Binary code on a digital screen
The first 48 hours after an attack decide the damage.

Then comes the data question. Has client data been accessed or stolen? If so, you may have obligations under the Notifiable Data Breaches scheme. That means reporting the breach to the Office of the Australian Information Commissioner (OAIC) and notifying every person whose data was affected. This is not optional. It is law.

And then there is the ransom itself. Pay or do not pay. If your backups are gone or were never tested, you may have no other way to recover your data. Law enforcement advises against paying. But when your entire client database is locked and you have no backup, the decision is not academic.

Hour 24 to 72: Recovery and Fallout

Even after the immediate threat is contained, recovery takes days. Systems need to be rebuilt. Data needs to be restored, if it can be. Every application needs to be checked and reinstalled.

During this time, you are also managing the human side. Clients are asking why you are not responding. Staff are anxious. If client data was exposed, you are having uncomfortable phone calls. If you are in a regulated industry, medical, legal, financial, there may be additional reporting obligations.

The costs stack up. Incident response fees. Lost revenue. Staff downtime. Potential fines. Reputational damage that is hard to measure but real.

A business with 20 staff that loses three days of productivity has lost 480 working hours. Add the direct costs of investigation, recovery, and notification, and you are well past the $46,000 average.

What Makes the Difference

The businesses that recover quickly have a few things in common. They have backups that are tested and stored offsite. They have endpoint detection and response (EDR), software that watches for suspicious behaviour on devices and can isolate a compromised machine before the damage spreads. They have multi-factor authentication (MFA) on every account, so a stolen password alone is not enough to get in.

None of these are expensive or complicated. They are basic controls. The Australian Cyber Security Centre publishes a framework called the Essential Eight, eight specific security controls that address the most common attack methods. Most small businesses have implemented one or two of them. The ones that get through incidents without catastrophic damage have implemented most of them.

The difference between a contained incident and a business-threatening crisis is almost always preparation, not luck.

What You Can Do Right Now

You do not need to become a security expert. You need to know where your gaps are and close the obvious ones first.

Start with the basics. Are your backups running, and has anyone tested a restore recently? Is MFA turned on for every account that supports it? Are your systems being patched regularly, meaning security updates are applied, not just ignored? Does anyone monitor your network for unusual activity?

If you are not sure about the answers, that is the problem. A 10-minute IT Maturity Assessment will show you where you stand and where the gaps are. It is free, and it gives you a clear picture, no commitment required.

Stop putting off IT that works

Book an IT Audit

$990 one-off. 90-day deep dive into your IT environment with a prioritised action plan.

Book IT Audit

Free IT Health Check

Takes 3 minutes. See where your IT stands and what to fix first.

Free IT Health Check

Cyber Posture Snapshot

Your details 1 / 10

How exposed is your business?

Six quick questions, two short ones to tailor the result, and you'll see where your business stands. About two minutes. Plain English, no jargon.

We'll use your email to send a copy of your result. No spam, no pushy sales calls.

Question 1 of 9

When your team logs in to email and business apps, do they need a code from their phone as well as a password?

Question 2 of 9

If a ransomware attack locked all your files tomorrow, could you restore them from a backup?

Question 3 of 9

When Microsoft or Apple release a critical security update, how fast does it land on your computers?

Question 4 of 9

How many people in your business can install software or change system settings on any work computer?

Question 5 of 9

If a staff member got a fake invoice or "urgent" email pretending to be from you right now, what would happen?

Question 6 of 9

When a staff member leaves, when does their access to email, files, and apps actually get cut off?

Question 7 of 9

How many people work in your business?

Question 8 of 9

Who looks after your IT today?

Question 9 of 9

What sort of business are you?

Tailoring your result...

Hi there, here's where your business stands.

Your Cyber Posture
Critical gaps Critical
Notable exposure Notable
Mixed picture Mixed
On the right track On track

Notable exposure

Your two biggest gaps

  1. 1
  2. 2

Where this leaves you on Essential Eight

  • MFA Multi-factor authentication
  • Backups Regular backups
  • Patching Covers 2 of 8: Patch applications + Patch operating systems
  • Admin access Restrict administrative privileges

This snapshot covers 5 of the 8 Essential Eight controls. The full IT Maturity Assessment covers all 8, plus Microsoft 365 hardening, device management, and staff training.