2026 attack plan loading progress bar on dark cybersecurity background with icons of phishing, mask, lock, and email.

New Year's Resolutions for Cybercriminals (Spoiler: Your Business Is on Their List)

January 26, 2026

Right now, cybercriminals are drafting their own New Year's resolutions — but these aren't about wellness or work balance.

Instead, they're analyzing which tactics succeeded in 2025 and strategizing how to increase their thefts in 2026.

And guess who tops their list? Small businesses.

Not because you're careless, but because your busy schedule creates openings that criminals eagerly exploit.

Here's their playbook for 2026 — and how you can shut it down.

Resolution #1: "Craft Phishing Emails That Are Nearly Impossible to Spot"

The days of glaringly fake scam emails are history.

Thanks to AI, cybercriminals now send emails that:

  • Sound perfectly natural
  • Use your organization's own tone and language
  • Include references to actual partners you work with
  • Eliminate the usual red flags that once gave them away

Rather than relying on spelling errors, they exploit impeccable timing.

January is prime time — employees return from holidays overwhelmed and distracted.

Imagine a phishing email like this:

"Hi [your actual name], I attempted to send the updated invoice, but it bounced back. Is this still the correct accounting email? Here's the revised file — let me know if you have questions. Thanks, [your real vendor's name]"

No grandiose claims. No urgency. Just a plausible request from a familiar contact.

How to fight back:

  • Empower your team to verify every request, especially those involving payments or credentials, via a separate communication method.
  • Implement advanced email filters that detect impersonation attempts, such as suspicious server origins.
  • Encourage a workplace culture where double-checking is valued and rewarded.

Resolution #2: "Impersonate Your Vendors or Leadership to Trick You"

This attack is particularly insidious because it feels authentic.

An email might say:
"We've updated our bank details. Please send future payments to the new account."

Or a text from "the CEO" pressures your bookkeeper:
"Urgent transfer needed. I'm in a meeting and can't discuss."

And now, deepfake voice scams escalate threats — mimicking voices sourced from public media to make fraudulent calls.

This isn't science fiction; it's happening daily.

Prevention tips:

  • Require callbacks on known numbers for any bank-related changes.
  • Never authorize payments without voice confirmation through established channels.
  • Enable multi-factor authentication (MFA) on all finance and admin accounts.

Resolution #3: "Target Small Businesses More Aggressively Than Ever"

Cybercriminals historically focused on large corporations — banks, hospitals, Fortune 500 firms — but tighter security and insurance policies raised barriers.

So they shifted focus.

Rather than risking a single $5 million heist, they pursue numerous smaller attacks, each $50,000 and nearly guaranteed to succeed.

Small businesses are appealing targets because:

  • You're often understaffed
  • Don't have a dedicated security team
  • Are balancing multiple responsibilities
  • Assume you're too small to attract attacks

That last assumption is their biggest advantage.

To protect yourself:

  • Implement fundamental defenses like MFA, timely software updates, and regular, tested backups to increase your resiliency.
  • Discard the myth of being "too small to be targeted" — hackers exploit invisibility.
  • Partner with cybersecurity experts who provide vigilant oversight tailored to your needs.

Resolution #4: "Exploit Vulnerabilities Around New Hires and Tax Season"

January means onboarding new employees, who are eager and less familiar with company protocols — a perfect setup for scammers.

Attacks often involve impersonating executives:

"I'm the CEO. Please handle this urgently while I'm away."

Veteran staff might hesitate, but new hires may act immediately.

As tax season approaches, scams increase, targeting payroll and W-2 data through fraudulent requests.

Once attackers obtain W-2 forms, they can file fake tax returns and steal refunds.

How to respond:

  • Incorporate security awareness training into onboarding before granting email access.
  • Establish clear policies: never email W-2s, always verify payment requests by phone, and regularly test compliance.
  • Celebrate employees who take extra steps to verify suspicious requests.

Prevention Always Beats Recovery.

Your cybersecurity options:

Option A: Respond post-attack — pay ransoms, engage emergency services, notify clients, and rebuild, costing tens or hundreds of thousands and months of disruption.

Option B: Proactively secure your business — train staff, strengthen systems, monitor threats, and patch vulnerabilities at a fraction of Option A's cost.

Buy a fire extinguisher before a fire breaks out, not afterward.

How to Keep Your Business Off Cybercriminals' Radar:

A trusted IT partner will:

  • Continuously monitor your network to catch threats early
  • Secure access with strong authentication to limit damage from compromised credentials
  • Train your team to recognize subtle and sophisticated scams
  • Implement strict verification procedures for wire transfers
  • Maintain and test backups to mitigate ransomware impact
  • Patch systems promptly to seal security gaps

Focus on prevention, not crisis management.

This year, cybercriminals are optimistic about hitting unprepared businesses.

Let's make sure yours isn't one of them.

Request Your New Year Cybersecurity Assessment Today

We'll identify your vulnerabilities, prioritize the most urgent threats, and equip you to avoid becoming an easy target in 2026.

No intimidation, no confusing jargon — just clear, actionable insight.

Click here or give us a call at (949) 396-1100 to book your 15-Minute Discovery Call.

Because the best New Year's resolution is ensuring your business isn't on a cybercriminal's agenda.