TL;DR

  • The average data breach costs $4.88 million according to IBM's 2024 Cost of a Data Breach Report, and organisations with tested incident response plans save $2.66 million per breach compared to those without.
  • Most SMBs have no incident response plan: A 2024 Hiscox Cyber Readiness Report found that 41% of small businesses experienced a cyber incident in the past year, yet fewer than 30% had a formal response plan in place.
  • Cyber insurance increasingly requires it: Insurance underwriters now routinely ask for documented incident response procedures. No plan often means denied claims or declined coverage.
  • You can deploy one in an afternoon: A good incident response plan doesn't require a security team or a six-figure consulting engagement. Template-based approaches get you 90% of the way there.

The $4.88 Million Question No SMB Can Ignore

Every small business owner believes the same thing: "It won't happen to us." The data tells a different story. According to IBM's 2024 Cost of a Data Breach Report, the global average cost of a data breach reached $4.88 million — a 10% increase from the previous year and the highest figure ever recorded. While enterprise breaches drive the average up, small businesses are not immune to devastating financial impact. The National Cyber Security Alliance reports that 60% of small businesses that suffer a major cyberattack close their doors within six months.​‌‌‌​‌‌‌‍​‌‌​‌​​​‍​‌‌‌‌​​‌‍​​‌​‌‌​‌‍​‌‌​​‌​‌‍​‌‌‌​‌‌​‍​‌‌​​‌​‌‍​‌‌‌​​‌​‍​‌‌‌‌​​‌‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌‌​‌‍​‌‌​​​‌​‍​​‌​‌‌​‌‍​‌‌​‌‌‌​‍​‌‌​​‌​‌‍​‌‌​​‌​‌‍​‌‌​​‌​​‍​‌‌‌​​‌‌‍​​‌​‌‌​‌‍​‌‌​

‌​​‌‍​‌‌​‌‌‌​‍​‌‌​​​‌‌‍​‌‌​‌​​‌‍​‌‌​​‌​​‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​​‌​‌‌​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​​​​‍​‌‌​‌‌‌‌‍​‌‌​‌‌‌​‍​‌‌‌​​‌‌‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌‌​​​​‍​‌‌​‌‌​​‍​‌‌​​​​‌‍​‌‌​‌‌‌​‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌‌​

The critical difference between businesses that survive an incident and those that don't is preparation. IBM's same report found that organisations with an incident response plan and regular testing saved an average of $2.66 million per breach compared to those without. That's not a minor advantage — it's the difference between a recoverable incident and an existential crisis.

An incident response plan (IRP) is a documented set of procedures that tells your team exactly what to do when a security incident occurs. It covers who to contact, how to contain the damage, when to notify regulators and customers, how to preserve evidence, and how to recover operations. Without one, your team will spend critical hours in panic mode — making decisions that often make the situation worse.​‌‌‌​‌‌‌‍​‌‌​‌​​​‍​‌‌‌‌​​‌‍​​‌​‌‌​‌‍​‌‌​​‌​‌‍​‌‌‌​‌‌​‍​‌‌​​‌​‌‍​‌‌‌​​‌​‍​‌‌‌‌​​‌‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌‌​‌‍​‌‌​​​‌​‍​​‌​‌‌​‌‍​‌‌​‌‌‌​‍​‌‌​​‌​‌‍​‌‌​​‌​‌‍​‌‌​​‌​​‍​‌‌‌​​‌‌‍​​‌​‌‌​‌‍​‌‌​‌​​‌‍​‌‌​‌‌‌​‍​‌‌​​​‌‌‍​‌‌​‌​​‌‍​‌‌​​‌​​‍​‌‌​​‌​‌‍​‌‌​‌‌‌​‍​‌‌‌​‌​​‍​​‌​‌‌​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​​​​‍​‌‌​‌‌‌‌‍​‌‌​‌‌‌​‍​‌‌‌​​‌‌‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌‌​​​​‍​‌‌​‌‌​​‍​‌‌​​​​‌‍​‌‌​‌‌‌​‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌‌​


Why SMBs Are Particularly Vulnerable

Small and medium-sized businesses face a unique combination of high exposure and low preparedness that makes them attractive targets for cybercriminals.

The Threat Landscape Has Shifted

Verizon's 2024 Data Breach Investigations Report found that 46% of all data breaches impact businesses with fewer than 1,000 employees. Attackers have recognised that SMBs often lack the security controls, monitoring capabilities, and response procedures that make larger organisations harder targets. Automated attack tools and ransomware-as-a-service platforms have lowered the barrier to entry, meaning your business doesn't need to be specifically targeted — it just needs to be vulnerable.

The 277-Day Problem

IBM reports that the mean time to identify and contain a breach is 277 days — roughly nine months. For a small business without monitoring and response procedures, breaches can go undetected for even longer. Every day of uncontained breach increases the cost and damage exponentially. Customer data continues to be exfiltrated, systems continue to be compromised, and the eventual recovery becomes more complex and expensive.

Regulatory Requirements Are Tightening

Australia's Notifiable Data Breaches (NDB) scheme requires organisations to notify the Office of the Australian Information Commissioner (OAIC) and affected individuals within 30 days of becoming aware of an eligible data breach. GDPR requires notification within 72 hours. US states have varying notification requirements, with some as short as 30 days. Without a pre-built notification process, meeting these deadlines while simultaneously managing the incident is nearly impossible.


What a Good Incident Response Plan Contains

An effective incident response plan for an SMB doesn't need to be a 200-page enterprise document. It needs to be practical, accessible, and actionable. Here are the essential components:

1. Roles and Responsibilities

Define who does what during an incident. Identify your incident commander, technical lead, communications lead, and legal contact. Include phone numbers, email addresses, and backup contacts. This seems obvious, but when a breach hits at 2am on a Saturday, knowing exactly who to call is invaluable.

2. Incident Classification and Severity Levels

Not every security event requires the same response. Define severity levels (Critical, High, Medium, Low) with clear criteria so your team can quickly assess the situation and escalate appropriately.

3. Incident-Specific Playbooks

Different incidents require different responses. A ransomware attack has different containment steps than a phishing compromise or a data breach. Pre-built playbooks with step-by-step instructions for each scenario eliminate decision paralysis.

4. Communication Templates

You'll need to notify customers, regulators, law enforcement, your insurance provider, and potentially the media. Writing these communications during a crisis leads to legal exposure and reputational damage. Pre-drafted templates with fill-in-the-blank sections ensure consistent, legally reviewed messaging.

5. Evidence Preservation Guidelines

Improper evidence handling can void your cyber insurance claim and compromise any legal proceedings. Your IRP should include clear instructions on what to preserve, how to maintain chain of custody, and what NOT to do (like wiping systems before forensic analysis).

6. Recovery and Post-Incident Review

Define how you'll restore operations and conduct a post-incident review to prevent recurrence. This is where learning happens and where your security posture actually improves.


The Cyber Insurance Connection

If your business has cyber insurance — or is applying for coverage — your incident response plan is directly relevant to your coverage. According to a 2024 Marsh McLennan report, 73% of cyber insurance applications now ask whether the organisation has a documented incident response plan. Many underwriters require it as a condition of coverage.

More critically, your insurer will evaluate your response during an actual incident. Proper evidence preservation, timely notification, and documented decision-making can mean the difference between an approved claim and a denied one. A well-executed IRP demonstrates due diligence and can significantly reduce the friction of the claims process.


How to Get Started Today

You have three options for creating an incident response plan:

Option 1: Build from scratch. Research NIST SP 800-61 and ISO 27035, study other organisations' plans, and write your own. This is free but takes weeks of work and requires security expertise to do properly.

Option 2: Hire a consultant. A security consultant will build a custom IRP for your organisation. Expect to pay $3,000-$15,000+ depending on scope and complexity. This produces a high-quality plan but is cost-prohibitive for many SMBs.

Option 3: Use a battle-tested template. Start with a professionally-built template that's been used in real incident responses, customise it with your company-specific information, and deploy it in an afternoon.

Ready to stop fumbling in the dark? The Incident Response Plan Template from lilMONSTER includes the complete IRP, 6 incident playbooks, communication templates, evidence collection checklists, and a tabletop exercise kit — all for $47 AUD. Deploy yours this afternoon. Get Instant Access →


Frequently Asked Questions

Review your IRP at least annually, and after every actual incident. Personnel changes, new systems, and evolving threats all require updates. The tabletop exercise is an excellent mechanism for identifying gaps and keeping the plan current.

Yes — and your insurance may require it. Cyber insurance covers financial losses but doesn't replace the operational response. Having a plan actually improves your insurance terms and reduces premiums. Many insurers now require a documented IRP as a condition of coverage.

The most common mistake is wiping or reimaging compromised systems before forensic evidence is collected. This destroys evidence needed for insurance claims, legal proceedings, and understanding the full scope of the breach. Your IRP should explicitly address evidence preservation before any cleanup begins.

A template is an excellent starting point, but you must customise it with your specific contact information, systems, regulatory requirements, and business processes. A customised template is vastly better than no plan at all, and significantly better than a generic document that nobody has reviewed.

An incident response plan focuses on detecting, containing, and recovering from security incidents specifically. A disaster recovery plan covers broader business continuity scenarios including natural disasters, power outages, and equipment failures. Ideally, your IRP feeds into your DR plan as one type of scenario.


Monster has spent 15+ years helping businesses respond to cybersecurity incidents. The Incident Response Plan Template distills that experience into a ready-to-deploy framework for SMBs. Learn more →

Ready to strengthen your security?

Talk to lilMONSTER. We assess your risks, build the tools, and stay with you after the engagement ends. No clipboard-and-leave consulting.

Get a Free Consultation