2026 attack plan loading progress bar on dark cybersecurity background with icons of phishing, mask, lock, and email.

New Year's Resolutions for Cybercriminals (Spoiler: Your Business Is on Their List)

January 26, 2026

Right now, somewhere a cybercriminal is mapping out their New Year's resolutions.

Unlike those focusing on self-care or balancing work and life,
they're reviewing their 2025 tactics and planning how to enhance their theft methods in 2026.

Small businesses? They're at the top of their hit list.

Not due to your negligence.
Because busy businesses are prime prey.
And cybercriminals thrive on your hustle.

Here's a rundown of their 2026 strategy—and powerful ways you can disrupt it.

Resolution #1: "I Will Craft Phishing Emails That Truly Deceive"

The days of obvious, poorly written scam emails are over.

Today's AI creates emails that:

  • Read naturally and convincingly
  • Mirror your company's communication style
  • Mention actual vendors you collaborate with
  • Avoid typical warning signs

These emails rely not on glaring errors, but on impeccable timing.

January, when everyone is rushing and distracted after holidays, offers perfect cover.

Imagine this in your inbox:

"Hi [your actual name], I attempted to send the updated invoice but it bounced back. Can you confirm this is still the correct email for accounting? Here's the revised file—let me know if you have any questions. Thanks, [actual vendor name]"

No grandiose scams or urgent fund requests—just a familiar, believable message.

Your defense:

  • Train your team to verify all money or credential requests through separate communication channels.
  • Implement smart email filters that detect impersonations, like an accountant's email originating from an unexpected region.
  • Foster an environment where verification is praised—encourage your team to say, "I checked before proceeding."

Resolution #2: "I Will Pretend to Be Your Vendors or Executives"

This scam is especially dangerous due to its realism.

Consider emails like:
"Our bank details have changed. Please update your records for payments."

Or texts appearing to be from your CEO:
"Urgent wire transfer needed. I'm currently in a meeting and can't talk."

Even voice scams are evolving.

Using deepfake technology, scammers replicate voices from online media. They might call your finance team sounding exactly like the CEO, requesting fast favors.

This is today's reality, not a sci-fi tale.

Your counter-action:

  • Enforce callback protocols on any bank detail change, confirming via recognized phone numbers—not email contacts.
  • Require voice confirmation for any payment requests through established channels.
  • Enable Multi-Factor Authentication (MFA) on all finance and administrative accounts to block unauthorized access even if passwords are compromised.

Resolution #3: "I Will Intensify Attacks on Small Businesses"

Previously, cybercriminals targeted big corporations: banks, hospitals, large enterprises.

As their defenses improved, attackers shifted tactics.

Rather than risking a single $5 million hit, they now prefer numerous $50,000 attacks on smaller businesses—simple and profitable.

Small businesses hold valuable data and funds but often lack dedicated security.

The perpetrators know you are:

  • Short-staffed
  • Without a specialized security team
  • Managing multiple priorities simultaneously
  • Believing "we're too small to be targeted"

That last assumption is their greatest advantage.

How to protect yourself:

  • Implement fundamental security layers like MFA, timely updates, and verified backups—make yourself tougher than nearby businesses and deter most attackers.
  • Eliminate the phrase "we're too insignificant to be targeted" from your mindset. You're not invisible—you simply fly under the news radar when attacked.
  • Engage cybersecurity experts to partner with you, providing steady protection without needing an in-house team.

Resolution #4: "I Will Exploit New Employees and Tax Season Confusion"

January brings fresh hires unfamiliar with your policies.

They aim to impress and act quickly, rarely questioning directives.

Scammers see this eagerness as an opportunity.

Consider a fake urgent message:
"I'm the CEO, traveling. I need you to handle this immediately."

Seasonal scams spike too: fraudulent W-2 requests, payroll phishing, fake IRS communications.

The scheme often impersonates top executives, requesting employee W-2s under urgent pretexts.

These stolen documents expose sensitive data like social security numbers and salaries, allowing criminals to file false tax returns before employees can.

Your response plan:

  • Include security training during onboarding—before new hires access email—teaching scam identification and clear rules (e.g., no urgent gift card purchases requested).
  • Set explicit policies such as "W-2s are never shared via email" and "all payment requests require phone verification," then regularly test adherence.
  • Encourage and reward verification actions—employees who confirm suspicious requests should be recognized, not criticized.

Preventing breaches is always better than recovering from them.

Your cybersecurity approach boils down to two options:

Option A: Respond after a breach—pay ransoms, hire crisis teams, inform stakeholders, rebuild infrastructure, and restore your brand. Cost: massive financial and time losses. Outcome: survival with lasting scars.

Option B: Preempt attacks by enforcing strong security, training teams, and proactively addressing vulnerabilities. Cost: manageable ongoing investment. Outcome: seamless business continuity.

Just as you wouldn't wait for a fire to buy an extinguisher, secure your business *now* to avoid future crises.

How to Make Their 2026 Plans Fail

An expert IT partner helps you evade easy exploitation by:

  • Providing 24/7 system monitoring to detect and stop threats promptly
  • Strengthening access controls to prevent breaches from stolen credentials
  • Educating your team on sophisticated scams beyond the obvious
  • Enforcing verification policies so wire fraud can't succeed on a convincing email alone
  • Maintaining and testing backups, ensuring ransomware incidents are inconveniences, not disasters
  • Applying patches swiftly to close vulnerabilities before criminals exploit them

Focus on fire prevention, not firefighting.

While criminals eagerly prepare their 2026 agenda, counting on businesses like yours to slip up,
let's work together to frustrate their efforts.

Remove Your Business from Their Hit List

Schedule your New Year Security Reality Check today.

We'll assess your vulnerabilities, prioritize security measures, and guide you on avoiding common pitfalls that make businesses easy targets.

No fear-mongering. No complicated jargon. Just clear, actionable insights.

Click here or give us a call at (858) 538-4729 to book your Consultation.

Because the most valuable New Year's resolution is protecting your business from becoming someone else's goal.

Schedule Your Consultation

From cybersecurity to compliance, we guide you every step of the way. Break radio silence and get clarity, support, and a concrete plan that closes gaps, protects systems, and retains your DoD contracts with confidence.

NDIA San Diego logo with bold white letters on a transparent background.

Contact Us

ITS Team

Phone:
(858) 538-4729

Address:
11405 W Bernardo Court Suite 211
San Diego, CA 92127