TL;DR: On February 6, 2026, a ransomware attack at BridgePay Network Solutions, a payment gateway processing roughly 40 million transactions per month for small businesses, local governments, and water utilities, knocked payment systems offline across multiple states. Some merchants reverted to cash-only operations for days. The lesson for NC small businesses is that payment processor concentration is now a single point of failure that can stop revenue overnight, regardless of how well your own network is secured. Diversifying payment rails is no longer optional.
Key takeaway: According to BleepingComputer's reporting on the BridgePay attack, a single ransomware incident at a fintech vendor cascaded into payment outages for thousands of small businesses and dozens of local governments. The businesses themselves were not breached; their cash flow stopped because their vendor was.
Need a payment-resilience review? Preferred Data Corporation has been building business continuity plans for North Carolina businesses since 1987. BBB A+ rated. Call (336) 886-3282 or request a continuity assessment.
What happened in the BridgePay ransomware attack?
The BridgePay ransomware attack is a February 2026 cybersecurity incident in which ransomware operators encrypted systems at BridgePay Network Solutions, halting payment processing for thousands of downstream customers. According to WaterISAC's TLP:CLEAR advisory, the disruption rippled across local governments, water utilities, and small businesses in several states.
Key facts:
- Date of attack: February 6, 2026
- Processed volume: ~40 million transactions per month for the affected platform
- Downstream impact: Local governments, water utilities, retail merchants, and SMBs across multiple states
- Real-world consequence: Some merchants forced to cash-only operations; utility bill payments delayed
- Public confirmation: BridgePay publicly confirmed the ransomware nature of the attack
- Federal involvement: Government Technology reported coordination with the FBI
According to Bryan Texas Utilities' communications, approximately 70,000 customers were unable to pay their utility bills online for an extended period because BTU's payment processor was down.
Why does a payment processor outage matter to NC small businesses?
A payment processor outage matters to NC small businesses because most small businesses operate on thin cash flow margins and depend on a single payment rail for daily revenue. If that rail goes down for 24 to 96 hours, payroll, payables, and operations are all at risk, even if the business itself was never directly attacked.
According to the Resilience Factor analysis from ISMS.online, the BridgePay incident demonstrated four systemic risks small businesses share:
- Vendor concentration: A handful of payment processors handle a disproportionate share of US transactions
- Single-rail dependence: Most SMBs have one POS, one gateway, and one merchant account
- Weak contingency planning: Few SMBs have written procedures for processor outages
- Cascade impact: A single vendor outage stops revenue at hundreds or thousands of businesses simultaneously
For NC industries that PDC serves, the exposure is sector-specific:
| Industry | Common Payment Dependency | Outage Impact |
|---|---|---|
| Manufacturing | ACH for vendor and customer payments | Disrupted AR collections, AP pressure |
| Construction | Job-cost billing, AIA progress payments, ACH | Project draws delayed, payroll risk |
| Retail / restaurant | Card-present processors, POS systems | Revenue stops within hours |
| Professional services | ACH, credit card on file, recurring billing | AR aging, missed payroll cycle |
| Healthcare | Patient payment portals, ACH for insurance reimbursement | Cash flow gap, statement backlog |
| Utilities / local government | Online bill pay gateways | Customer service crisis, late fee waivers |
If you cannot answer "what is our plan when our processor goes down for 72 hours" in writing, you have the same exposure as the businesses BridgePay's outage stranded in February 2026.
Review PDC's business continuity services.
What is concentration risk in payment processing?
Concentration risk in payment processing is the heightened systemic risk that results from many businesses relying on a small number of payment service providers for critical revenue functions. According to Medium analysis of the BridgePay attack, "just a handful of key players now support a significant proportion of global digital payments, meaning a single disruption can cascade across multiple sectors and industries at once."
For a NC small business, concentration risk shows up in three forms:
Direct concentration
You use one payment processor for every transaction. If that processor is down, you cannot process payments at all.
Fourth-party concentration
You use two processors, but both rely on the same upstream gateway, acquiring bank, or settlement processor. The redundancy is illusory.
Operational concentration
You have an alternative processor, but your POS, accounting system, or e-commerce platform is hard-wired to the primary. Switching requires a developer, not a manager.
Key takeaway: According to the eSecurity Planet analysis of BridgePay, the businesses that recovered fastest were those that maintained dual-rail payment capability and had pre-tested the switchover procedure. Plans that exist only on paper failed in production.
How can a NC small business reduce payment processor risk?
A NC small business reduces payment processor risk by diversifying payment rails, pre-testing switchover procedures, and adding business interruption coverage to its cyber insurance. The work is mostly procedural rather than technical, and can be completed in a single quarter for most NC small businesses.
Step 1: Inventory payment rails (this week)
List every way money moves in and out of the business:
- Card-present POS (in store or jobsite)
- Card-not-present online (e-commerce, customer portals)
- ACH (vendor and customer)
- Wire (high-value transactions)
- Recurring billing platform (subscription, retainer)
- Mobile or contactless (Apple Pay, Google Pay)
- Paper check
- Cash
For each rail, document the processor, the dependent systems (POS, accounting, CRM, e-commerce), and the average daily volume.
Step 2: Identify single points of failure
For each rail, ask:
- If this processor were unavailable for 72 hours, what is the financial impact?
- Do we have a pre-tested alternative, or only a hypothetical one?
- Are our POS, accounting, and e-commerce systems portable to another processor?
- Do we have at least one rail that does not depend on this processor?
If your card-present POS, online checkout, and recurring billing all flow through the same processor, you have direct concentration risk.
Step 3: Build dual-rail capability
Best-in-class NC small businesses now maintain:
- A primary card-present processor with a tested secondary
- A primary card-not-present gateway with a tested secondary
- An ACH origination relationship at a second bank
- Paper-check fallback procedures for high-value vendor payments
- Manual key-in capability with documented MID/TID for the secondary processor
Step 4: Document the switchover playbook
A 2-page playbook that anyone in the office can execute, covering:
- Who has authority to switch processors
- How to log in to the secondary processor and activate it
- How to reconfigure the POS or e-commerce platform
- How to communicate the outage to customers
- How to reconcile the books once the primary is restored
- How to invoke business interruption coverage with the insurer
Step 5: Tabletop test it once a year
The first time you switch processors should not be during an actual outage. Walk through the playbook once a year, ideally in coordination with your IT and finance leads. Update it based on what you learn.
Learn more about PDC's managed IT and continuity services.
What does the BridgePay attack tell us about water utility and government cyber risk?
The BridgePay attack tells us that critical infrastructure operators, including water utilities and local governments, are exposed to ransomware attacks through their payment processors, not just their operational technology. According to The Record's reporting on the BridgePay incident, affected entities included municipalities in Texas, Florida, and other states.
For NC water utilities, public-service authorities, and county governments, the implications are concrete:
1. Customer service collapse during an outage
If residents cannot pay water, sewer, or property tax bills online, call volume to customer service spikes overnight. Late-fee waivers, payment plan accommodations, and reconciliation work consume staff time for weeks.
2. SCADA is not the only OT risk
OT cyber programs at utilities focus heavily on SCADA, plant control, and field automation. Payment processing is treated as IT, often by a small staff with limited visibility. BridgePay shows that the "IT" side of utility operations can be just as disruptive as a SCADA outage.
3. Vendor due diligence for payment processors
Most NC utility procurement processes evaluated payment processors on cost, integration, and reliability. CPG 2.0 (see our CPG 2.0 implementation guide for NC small businesses) now expects supply chain due diligence including cybersecurity posture, breach history, and contractual response obligations.
4. Statewide coordination
Multi-state outages like BridgePay's reveal the need for industry information-sharing through groups like WaterISAC, MS-ISAC, and CISA's regional advisors. NC utilities and local governments should join, monitor, and act on these advisories.
What should NC small business owners do this week?
NC small business owners should treat the BridgePay attack as a stress test of their own payment resilience, and they should complete the audit within 30 days. The next BridgePay-style outage will not announce itself.
Action checklist:
- [ ] Inventory every payment rail and the processor behind it
- [ ] Identify the single most concentrated processor in your stack
- [ ] Open a secondary processor account (most can be done in 2 weeks)
- [ ] Document the manual switchover procedure in a 2-page playbook
- [ ] Confirm cyber insurance covers business interruption from vendor outages
- [ ] Add payment processor outages to your annual tabletop exercise
- [ ] Subscribe to industry threat intelligence: WaterISAC, MS-ISAC, or CISA advisories
Need help? Preferred Data Corporation builds business continuity plans for NC manufacturers, construction firms, retailers, healthcare practices, and professional services companies. Call (336) 886-3282 or contact us.
Key takeaway: The BridgePay attack proved that small businesses can lose 72 hours of revenue without anyone ever touching their network. Payment processor diversification, switchover playbooks, and tabletop testing are the difference between a one-day inconvenience and a quarter-defining cash flow crisis.
Why partner with Preferred Data Corporation on business continuity?
PDC has been protecting North Carolina businesses since 1987 and has built business continuity plans for manufacturers, construction firms, healthcare practices, retailers, and professional services companies across the Piedmont Triad, Research Triangle, and Charlotte metros. Our continuity engagements include:
- Payment rail inventory and concentration analysis
- Vendor risk tiering and contractual review
- Dual-rail processor activation and testing
- Business continuity and disaster recovery planning
- Cyber insurance alignment to operational risk
- Tabletop exercises tailored to your industry
- On-site response within 200 miles of High Point
We focus on the cash flow consequences of cyber risk, not just the technology.
About Preferred Data Corporation
Preferred Data Corporation (PDC) is a managed IT and cybersecurity provider headquartered at 1208 Eastchester Drive, Suite 131, High Point, NC 27265. Founded in 1987, PDC serves NC manufacturers, construction firms, retailers, and professional services companies.
Get a payment-resilience review:
- Call <a href="tel:3368863282">(336) 886-3282</a>
- Visit <a href="https://preferreddata.com/contact" target="_blank" rel="noopener noreferrer">preferreddata.com/contact</a>
- Email <a href="mailto:[email protected]">[email protected]</a>
Frequently Asked Questions
How long does a typical payment processor outage last?
According to eSecurity Planet's coverage of payment processor incidents, payment processor outages from ransomware typically last 48 hours to 14 days for full restoration, with partial functionality returning in 2 to 5 days. The BridgePay outage lasted multiple days for many merchants.
Will cyber insurance cover business interruption from a vendor outage?
Sometimes. Many SMB cyber insurance policies cover business interruption only when the loss is on the insured's own network. Endorsements for "contingent business interruption" (loss from a vendor outage) are increasingly available but often optional. Review the policy with your broker.
How quickly can I open a secondary payment processor?
For most NC small businesses, opening a secondary card-not-present account takes 5 to 14 business days. Card-present (terminal-based) accounts take 2 to 4 weeks because of hardware shipping and configuration. ACH origination at a secondary bank typically takes 3 to 6 weeks. Start now.
Is a payment processor breach the same as a card data breach?
No. A processor outage from ransomware is generally a service availability event, not a cardholder data exposure event. However, if the processor's data stores were exfiltrated, downstream merchants may have PCI DSS notification and remediation obligations. Review the processor's breach disclosures and your PCI obligations with your QSA or managed cybersecurity partner.
How does the BridgePay attack compare to BEC fraud?
Business Email Compromise (BEC) fraud is an attack on a specific business's email and payment instructions; the BridgePay attack is an attack on a shared payment processor that affects all of its customers. BEC requires a targeted scam against your team; processor ransomware requires nothing from you and still stops your revenue. See our Business Email Compromise defense guide for related coverage.
Related Resources
- Managed IT Services for NC Small Businesses
- Cybersecurity Services for NC Businesses
- CISA CPG 2.0: Free Cybersecurity Framework for NC SMBs
- Vendor Risk Management in the AI Age
- Third-Party Data Breaches: Small Business Supply Chain Defense
- Business Email Compromise Defense Guide
- Backup Testing and Validation for NC Businesses
- IT Services in High Point, NC
- IT Services in Greensboro, NC
- IT Services in Charlotte, NC
- IT Services in Raleigh, NC