2026 attack plan loading progress bar on dark cybersecurity background with icons of phishing, mask, lock, and email.

New Year's Resolutions for Cybercriminals (Spoiler: Your Business Is on Their List)

January 26, 2026

Right now, somewhere out there, cybercriminals are already planning their New Year's resolutions.

Unlike your typical resolutions focused on "self-care" or "work-life balance," these criminals analyze their 2025 tactics and strategize how to steal more in 2026.

And guess who's at the top of their hit list? Small businesses.

Not because you're careless, but because you're busy.
Busy businesses are prime targets for cyberattackers.

Here's their 2026 strategy—and how you can stop them in their tracks.

Resolution #1: "I Will Craft Phishing Emails That Seem Authentic"

The days of obvious scam emails filled with typos are gone.

Today, AI-generated phishing emails:

  • Sound completely natural
  • Mirror your company's tone and language
  • Reference actual vendors you work with
  • Eliminate glaring red flags

Instead of relying on mistakes, attackers depend on perfect timing—like the busy hustle of January when everyone's distracted.

Picture a phishing email like this:

"Hi [your actual name], I attempted to send the updated invoice but it bounced back. Can you confirm this is the right email for accounting? Attached is the new version—let me know if you have any questions. Thanks, [name of your actual vendor]."

No dubious characters, no urgent money requests—just a believable message from a trusted contact.

How to defend yourself:

  • Train your team to verify any requests involving funds or credentials through separate channels.
  • Deploy intelligent email filters that flag impersonation attempts, especially suspicious server locations.
  • Foster a company culture where verifying requests is encouraged and praised, not dismissed as paranoia.

Resolution #2: "I Will Pretend to Be Your Vendors or Executives"

This tactic is dangerously convincing.

A vendor might email, "We've updated our bank information. Please use the new account for payments going forward."

Or your bookkeeper might receive a text from "the CEO": "Urgent—wire the payment now. I'm in a meeting and can't talk."

Even more alarming are rising deepfake voice scams, where attackers replicate executive voices from public recordings to request urgent favors.

Your defense plan:

  • Implement a callback policy for bank detail changes using known phone numbers, never the contacts listed in suspicious emails.
  • Demand voice confirmation via official channels before authorizing payments.
  • Activate multi-factor authentication (MFA) on all finance-related accounts to block unauthorized access.

Resolution #3: "I Will Increase Attacks on Small Businesses"

Big corporations have hardened security, making attacks costly and troublesome for criminals.

So they shift focus to small businesses for numerous smaller, more successful attacks.

Small businesses hold valuable data and funds but often lack dedicated security staff.

Attackers count on you being overwhelmed, understaffed, and assuming you're too small to be targeted.

That assumption is your greatest weakness.

Strengthen your defenses:

  • Implement fundamental security protocols like MFA, regular updates, and tested backups to deter most attacks.
  • Reject the myth that small equals safe—you're a prime target precisely because you fly under the radar.
  • Partner with cybersecurity experts who provide ongoing protection tailored to your needs.

Resolution #4: "I Will Exploit New Employees and Tax Season Confusion"

January means onboarding new employees who are eager but unfamiliar with company security protocols.

Attackers exploit this by impersonating CEOs or HR, issuing urgent requests like, "I need all employee W-2s now for an important accounting meeting."

Once attackers obtain W-2s, they commit identity theft and file fraudulent tax returns before your employees do.

Your protective measures:

  • Integrate security training into the onboarding process, teaching new hires to spot scams before they gain email access.
  • Create clear policies forbidding email transmission of sensitive documents like W-2s and requiring phone verification for payment requests.
  • Encourage and reward employees who verify requests, turning cautiousness into a company value.

Prevention Outweighs Recovery Every Time.

Your cybersecurity options:

Option A: Respond after a breach—pay ransoms, hire emergency support, notify clients, restore systems and your brand. This costs tens or hundreds of thousands and takes weeks to months, leaving a lasting scar.

Option B: Proactively secure your business—train staff, monitor threats, patch vulnerabilities, and maintain backups. This ongoing effort costs significantly less and ensures smooth operation.

Think of it like buying a fire extinguisher—you hope to never use it, but it's indispensable.

How to Stay Off Their Radar

A reliable IT partner will help by:

  • Providing 24/7 system monitoring to catch threats early
  • Securing access controls to limit damage from stolen credentials
  • Educating your team to recognize sophisticated scams
  • Instituting strict verification policies to combat wire fraud
  • Maintaining tested backups to minimize ransomware impact
  • Applying timely patches to close exploitable vulnerabilities

Prevention > reaction.

Cybercriminals are mapping their 2026 targets and counting on small businesses to be unprotected.

Let's defy their expectations.

Remove Your Business from Their Target List Today

Schedule a New Year Security Reality Check.

We'll identify your vulnerabilities, prioritize what matters, and help you become an unappealing target in 2026.

No hype. No jargon. Just clear, actionable insights.

Click here or give us a call at 760-770-5200 to book your Quick and Easy Call.

Your best New Year's resolution? Making sure your business is never on a cybercriminal's hit list.