Cybersecurity February 25, 2026 · 8 min read

State of Cybersecurity for Inland Empire Businesses (2026)

eTop

BJ Pote

CEO, eTop Technology

The Inland Empire is one of the fastest-growing business regions in the country. Logistics, healthcare, legal, manufacturing, professional services. The economic engine here is real, and it’s accelerating. But growth brings attention, and not all of it is welcome.

Cybercriminals don’t just target Fortune 500 companies in major metros. They target opportunity. And a region full of growing mid-size businesses, many of which are still building out their security posture, represents a very large opportunity.

I’ve spent over a decade protecting businesses in this region. Here’s what the cybersecurity landscape looks like for Inland Empire businesses heading into 2026, and what you should be doing about it.

The IE Threat Landscape Right Now

Ransomware Is Not Slowing Down

Nationally, ransomware attacks against small and mid-size businesses increased significantly through 2025 and show no signs of slowing in 2026. But the nature of these attacks has shifted in a way that hits businesses in our region particularly hard.

Attackers used to go after big targets with big ransom demands. Now they’ve shifted to volume. They’re hitting smaller businesses with ransom demands in the $50,000 to $500,000 range. Not big enough to make national news, but big enough to cripple a 40-person law firm or a medical practice or a logistics company in Ontario or Riverside.

The reason is economics. A Fortune 500 company has a dedicated security team that makes attacks harder. A 75-person company in Rancho Cucamonga running basic antivirus and no EDR (endpoint detection and response) is a much easier payday. The attackers have done the math, and the math says go after the mid-market.

We’ve personally responded to ransomware incidents at IE businesses where the attacker was in the network for weeks before deploying the ransomware. In one case, the attacker had exfiltrated client data before locking everything down, adding a data breach notification requirement on top of the operational disruption. That incident cost the business over $300,000 in recovery, legal fees, and lost revenue. They had 55 employees.

Business Email Compromise Is the Quiet Epidemic

Ransomware gets the headlines, but BEC (business email compromise) is causing more aggregate financial damage to businesses in our region. BEC attacks are simple and devastatingly effective. An attacker compromises or impersonates a legitimate email account and tricks someone into wiring money, changing payment details, or sharing sensitive information.

We see this constantly in the IE business community. A real estate transaction gets intercepted with fraudulent wire instructions. An accounts payable clerk receives what looks like a legitimate email from the CEO requesting an urgent wire transfer. A vendor’s email gets compromised and sends fake invoices to all their clients.

These attacks work because they exploit trust, not technology. Your firewall won’t stop them. Your antivirus won’t catch them. The only defenses are email security tools, MFA (multi-factor authentication) on every account, and training your people to verify requests through a second channel before sending money.

Phishing Has Gone AI-Powered

The phishing emails of 2026 are not the poorly written Nigerian prince scams of 2010. Attackers are using AI tools to generate highly convincing phishing emails that are grammatically perfect, contextually relevant, and personalized to the recipient. They reference real projects, real colleagues, and real business details scraped from LinkedIn and company websites.

For IE businesses with public-facing operations, like law firms listing their attorneys online, medical practices with provider directories, or logistics companies with public contract announcements, attackers have rich material to craft targeted phishing campaigns. The more information you make available about your organization and your people, the more ammunition attackers have.

We’re seeing phishing success rates increase even among employees who have gone through security awareness training. The old advice of “look for typos and weird email addresses” is no longer sufficient. Modern phishing requires modern defenses: AI-powered email filtering, link analysis, and continuous training that adapts to current attack patterns.

The Compliance Pressure Is Intensifying

Regulatory requirements have tightened significantly, and this directly impacts IE businesses.

FTC Safeguards Rule

The expanded FTC Safeguards Rule now requires financial institutions, which includes a broad range of businesses beyond banks, to implement specific cybersecurity controls. Auto dealers, mortgage brokers, tax preparers, financial advisors, and many others fall under this rule. The Inland Empire has thousands of businesses in these categories.

The requirements include encryption, access controls, MFA, continuous monitoring, incident response plans, and regular risk assessments. Non-compliance carries real penalties, and the FTC has been actively enforcing.

HIPAA and Healthcare

With the IE’s growing healthcare sector, HIPAA compliance is a major factor. The Department of Health and Human Services has increased enforcement and raised penalty amounts. The proposed updates to the HIPAA Security Rule add more specific technical requirements around network segmentation, patch management, and vulnerability scanning.

For the medical practices, dental offices, behavioral health providers, and healthcare-adjacent businesses throughout Riverside and San Bernardino counties, this means cybersecurity is no longer optional. It’s a regulatory requirement with teeth.

California Privacy Rights Act (CPRA)

California’s privacy regulations continue to evolve and add requirements for businesses handling consumer data. For IE businesses serving California consumers, which is most of them, this means data protection, breach notification procedures, and privacy impact assessments are compliance obligations, not just best practices. If you haven’t already, you should also have a Written Information Security Program (WISP) documenting how your business protects personal data.

What IE Businesses Should Prioritize in 2026

I’m going to be direct about what I think matters most, based on what we’re actually seeing in the field. Not theoretical best practices from a textbook, but the things that will make the biggest practical difference for a typical IE business.

Priority 1: MFA on Everything

If you do nothing else from this list, do this. Multi-factor authentication on every account that supports it. Email, VPN, cloud applications, admin consoles. Everything.

MFA stops the majority of account compromise attacks dead. It’s the single highest-impact security control you can implement, and for most cloud services, it’s free. There is no excuse for not having MFA enabled across your organization in 2026.

We still encounter businesses where the owner’s Microsoft 365 account, with global admin privileges, has no MFA. That’s a skeleton key sitting on the front porch.

Priority 2: Replace Antivirus with EDR

Traditional antivirus compares files against known threats. EDR monitors behavior and catches the fileless attacks, living-off-the-land techniques, and zero-days that antivirus misses. For a mid-size business, it’s the most important endpoint security upgrade you can make.

Priority 3: Email Security Beyond the Defaults

Microsoft 365 and Google Workspace include basic email filtering. It’s not enough. You need a dedicated email security layer that provides advanced phishing detection, link sandboxing, attachment scanning, and impersonation protection.

Given that email is the primary attack vector for both ransomware and BEC, this is where your defense needs to be strongest. A dedicated cybersecurity solution for email catches threats that the default filters miss.

Priority 4: Backup and Recovery That Actually Works

Having backups is not enough. Your backups need to be:

  • Immutable (so ransomware can’t encrypt them)
  • Offsite (so a physical disaster doesn’t take out your backups too)
  • Tested regularly (so you know recovery actually works)
  • Fast enough to meet your business continuity requirements

We test backups for every client on a regular schedule. The number of businesses we’ve onboarded that had backup systems running but not actually producing recoverable backups is alarming. If you haven’t tested a restore recently, you don’t know if your backups work. Full stop.

Priority 5: Security Awareness Training

Your employees are your last line of defense. When a phishing email gets past the filters, and some inevitably will, the only thing standing between your business and a breach is whether your employee clicks the link or reports it.

Security awareness training needs to be continuous, not annual. Monthly simulated phishing tests, short training modules on current threats, and a culture where reporting suspicious emails is encouraged, not punished. The goal isn’t to shame people who click. It’s to build the muscle memory to pause and verify.

The Bottom Line for IE Businesses

The Inland Empire is a great place to build a business. I’ve been doing it here for over a decade and I wouldn’t want to be anywhere else. But the growth that makes this region exciting also makes it a target.

The businesses that will thrive here are the ones that treat cybersecurity as a business function, not an IT expense. The ones that invest in prevention because they understand that the cost of a breach is orders of magnitude higher than the cost of protection - and because their cyber insurance policies now demand it. The ones that work with partners who understand the local landscape and the specific challenges IE businesses face.

If you want to know where your business stands, we offer a no-cost security assessment that gives you a clear picture of your current posture and specific recommendations for improvement. No sales pitch, just an honest evaluation from a team that’s been protecting IE businesses for over 12 years. Let’s talk.

eTop

BJ Pote

CEO, eTop Technology

eTop Technology has spent over 15 years in IT and over 12 years serving the Inland Empire as a trusted managed IT provider. We host the Business Tech Playbook podcast and are passionate about helping business leaders make smarter technology decisions.

How Secure Is Your Business?

Most breaches start with gaps businesses don’t know they have. Our free IT security assessment identifies vulnerabilities before attackers do — with zero obligation.

Get Your Free Security Assessment →

Or call us directly: 951-398-0021