2026 attack plan loading progress bar on dark cybersecurity background with icons of phishing, mask, lock, and email.

New Year's Resolutions for Cybercriminals (Spoiler: Your Business Is on Their List)

January 26, 2026

Right now, somewhere a cybercriminal is crafting their own New Year's resolutions.

Unlike goals about mindfulness or work-life harmony, theirs revolve around refining tactics to steal more effectively in 2026.

Unfortunately, small businesses are their prime targets.

It's not because you're negligent,
but because your busy schedule makes you vulnerable.
And attackers thrive on that busyness.

Here's their playbook for 2026—and crucial strategies to thwart their plans.

Resolution #1: "I Will Craft Phishing Emails That Seamlessly Blend In"

The days of glaringly obvious scam emails are behind us.

Advanced AI now generates emails that:

  • Sound authentic and natural
  • Mirror your company's unique communication style
  • Incorporate references to actual vendors you work with
  • Avoid typical warning signs that raise suspicion

These attackers don't rely on spelling mistakes—they rely on timing.

January is perfect: everyone's distracted, rushing, and recovering from holidays.

A typical modern phishing email might say:

"Hi [your actual name], I tried sending the updated invoice but it bounced back. Can you please confirm if this is still the correct email for accounting? Here's the latest version — let me know if you have questions. Thanks, [name of your actual vendor]"

No scams about royal inheritances or urgent wire transfers—just a plausible request from a known contact.

How to Fight Back:

  • Train your staff to verify requests rather than just read them. Always confirm financial or credential-related requests through a separate, trusted channel.
  • Implement sophisticated email filters that detect impersonation attempts—flag emails purportedly from your accountant but routed from suspicious locations.
  • Foster an environment where double-checking is encouraged. "I verified before responding" should be applauded, not dismissed as paranoia.

Resolution #2: "I Will Impersonate Your Vendors or Leadership"

This tactic hit hardest because it feels authentic.

A vendor email declares:
"Hey, we've updated our bank info. Please send future payments to this new account."

Or your bookkeeper receives a text from "the CEO":
"Urgent. Wire this now. I'm in a meeting and can't talk."

It's not just texts anymore.

Deepfake voice scams are surging. Fraudsters clone voices from online videos, podcasts, or voicemail greetings. Suddenly, a "CEO" calls finance requesting a "quick favor," sounding exactly like them.

This isn't sci-fi—it's today's reality.

Protect Yourself:

  • Enforce a strict callback policy for any bank detail changes. Always verify using a pre-established phone number—not one in an email.
  • Never approve payments without verified voice confirmation through known channels.
  • Enable multi-factor authentication on all finance and admin accounts to block unauthorized access—even if passwords are compromised.

Resolution #3: "I Will Intensify Attacks on Small Businesses"

Previously, criminals zeroed in on big targets: banks, hospitals, Fortune 500 companies.

But as enterprise security improved and regulations tightened, big companies became tougher marks.

The smart criminals shifted tactics.

Rather than risk one $5 million heist, they're opting for multiple $50,000 hits with a higher success rate.

Small businesses now bear the brunt. You hold valuable assets and sensitive data but often lack dedicated security teams.

Hackers know you're:

  • Short-staffed
  • Without specialized security personnel
  • Wearing many hats simultaneously
  • Operating under the misconception of being "too small to matter"

That mindset is their ultimate vulnerability.

How to Respond:

  • Don't be easy prey. Basic protections like MFA, timely updates, and reliable backups make you a tougher target than competitors. Most attackers will look elsewhere.
  • Erase the phrase "too small to be targeted" from your mindset. You may be overlooked by headlines but not by cyber thieves.
  • Seek expert assistance. You don't need a massive security team—just a reliable partner safeguarding your interests.

Resolution #4: "I Will Exploit New Employee Onboarding and Tax Season Confusion"

January brings fresh hires who are unfamiliar with your protocols.

New employees want to make a good impression and may hesitate to question unusual requests.

From an attacker's view: ideal victims.

Examples include:
"Hey, CEO here. Can you handle this quickly? I'm traveling and unable to discuss."

Veteran staff might hesitate, but eager new hires often comply without question.

Tax season scams also escalate: fake W-2 requests, payroll phishing, counterfeit IRS notices.

The attack pattern: an impersonation of the CEO or HR sends urgent requests for employee W-2s. Upon receiving these, scammers gain access to confidential data and file fraudulent tax returns before your employees can.

Prevention Tactics:

  • Integrate security awareness into onboarding. Before accessing email, new hires must recognize scam signs and understand you will never request urgent gift card purchases.
  • Implement explicit policies: "No W-2s sent via email." "All payment requests require phone verification." Document and regularly test adherence.
  • Reward employees who verify suspicious requests to promote a vigilant culture.

Prevention Outweighs Recovery Every Time.

Your cybersecurity choices boil down to:

Option A: React after a breach—pay ransoms, hire emergency services, notify clients, rebuild systems, and mend your reputation. Costs run into tens or hundreds of thousands and recovery can drag on for months.

Option B: Proactively secure your business—train your staff, monitor threats, patch vulnerabilities, and stop attacks before they start. This approach is cost-effective and runs seamlessly in the background.

Think of it as buying a fire extinguisher before a fire—it's prevention, not reaction.

How to Keep Your Business Off Their Radar

A trusted IT partner helps you become an unattractive target by:

  • Monitoring your network 24/7 for early threat detection
  • Strengthening access controls so one compromised password won't unhinge everything
  • Educating your team on sophisticated, emerging scam techniques
  • Putting strict verification policies in place to prevent wire fraud
  • Ensuring backups are always current and tested, making ransomware setbacks minor inconveniences
  • Applying timely software patches to close security gaps before exploitation

Focus on preventing fires, not putting them out.

Cybercriminals are setting confident goals for 2026, counting on businesses like yours to be unprepared and overstretched.

Let's prove them wrong.

Secure Your Business in the New Year

Schedule your New Year Security Reality Check today.

Discover your vulnerabilities, prioritize protections, and learn how to stop being easy prey in 2026.

No hype. No technical jargon.
Just clear, actionable insights tailored for your business.

Click here or give us a call at 920-818-0900 to book your 15-Minute Discovery Call.

Because the best resolution is ensuring you're never the cybercriminal's goal for the year ahead.