New Year’s Resolutions for Cybercriminals (Spoiler: Your Business Is on Their List)

Hooded bad guy plotting to get your moneySomewhere right now, a cybercriminal is setting New Year’s resolutions too.

They’re not staring at a vision board about “self-care” or “work-life balance.” They’re not promising to drink more water or call their mother more often.

Nope. They’re reviewing what worked in 2025 and planning how to steal more in 2026.

And guess what? Small businesses are their favorite target. Not because you’re careless. Because you’re busy.

And criminals absolutely love busy.

Here’s their 2026 game plan — and how to ruin it. 😈


Resolution #1: “I Will Send Phishing Emails That Don’t Look Fake Anymore”

The era of laughably bad scam emails is officially over.

Remember those messages from a “Nigerian prince” with seventeen typos and random capitalization? Those were almost charming in their incompetence. You could spot them from across the room!

Yeah… those days are gone.

AI now writes phishing messages that:

  • Sound completely normal
  • Use your company’s actual language and terminology
  • Reference real vendors you genuinely work with
  • Skip all the obvious red flags

They don’t need typos to get you. They need timing.

And January? January is perfect timing. Everyone’s distracted, moving fast, catching up from the holidays, juggling a million things at once.

Here’s what a modern phishing email actually looks like:

“Hi [your actual name], I tried to send the updated invoice, but the file bounced back. Can you confirm this is still the right email for accounting? Here’s the new version — let me know if you have questions. Thanks, [name of your actual vendor]”

No Nigerian prince. No urgent wire transfer. No ALL CAPS SCREAMING. Just a normal-sounding request from someone you recognize.

That’s terrifying, right? It should be!

Your counter-move:

  • Train your team to verify, not just read. Any request involving money or credentials gets confirmed through a separate channel. Every. Single. Time.
  • Use automatic email filtering that catches impersonation attempts — tools that flag when an email claims to be from your accountant but actually came from a server in Eastern Europe.
  • Create a culture where questioning is praised, not punished. “I verified before responding” should be celebrated, not seen as paranoid. Seriously — buy that person lunch!

Resolution #2: “I Will Impersonate Your Vendors… or Your Boss”

This one is brutal because it feels so real.

A vendor email arrives:

“Hey, we updated our bank details. Please use this new account for future payments.”

Or a text from “the CEO” hits your bookkeeper:

“Urgent. Wire this now. I’m in a meeting and can’t talk.”

And sometimes? It’s not even text anymore.

Deepfake voice scams are rising. They clone voices from YouTube videos, podcast appearances, even voicemail greetings. The “CEO” calls your finance person and asks for a “quick favor” — and it sounds exactly like them.

That’s not sci-fi. That’s Tuesday. 😬 I wish I was exaggerating. I’m really not.

Your counter-move:

  • Establish a simple callback policy for any bank account changes. Always verify through a known number — not one provided in the email. Ever.
  • No payment moves without voice confirmation through established channels. Period. No exceptions. Not even for the CEO. Especially not for the CEO.
  • MFA on every finance and admin account. Even if they get the password, they can’t get in without that second factor.

Resolution #3: “I Will Target Small Businesses Harder Than Ever”

For years, cybercriminals focused on the big fish. Banks. Hospitals. Fortune 500 companies. The juicy targets with deep pockets.

But here’s what happened: Enterprise security got better. Insurance requirements got tighter. Big companies became hard and annoying to attack.

So, the smart criminals pivoted.

Think about it from their perspective: Instead of one $5 million attack that’s difficult and risky, why not a hundred $50,000 attacks that are almost guaranteed to work?

The math is brutal. And it works in their favor.

Small businesses are now the primary target. You have money worth stealing. You have data worth ransoming. And you probably don’t have a dedicated security team watching the gates 24/7.

Attackers know:

  • You’re understaffed
  • You don’t have a security team
  • You’re juggling everything
  • You assume “we’re too small to be worth it”

That last belief? That’s their favorite vulnerability. They’re counting on it!

Your counter-move:

  • Stop being low-hanging fruit. Basic security measures — MFA, regular updates, tested backups — make you harder than the business next door. Most attackers will just move on to easier prey. They’re lazy like that!
  • Remove “we’re too small to be a target” from your vocabulary. You’re not too small to be a target… just too small to make the news when you become a victim.
  • Get professional help. You don’t need an enterprise security team. You need a partner watching your back.

Resolution #4: “I Will Exploit New Employee Season and Tax Chaos”

January brings new hires. And new hires don’t know your rules yet.

They’re eager to impress. They want to be helpful. They’re unlikely to question authority — especially in their first few weeks.

From an attacker’s perspective? Perfect targets.

“Hey, I’m the CEO. Can you handle this quickly? I’m traveling and can’t do it myself.”

A veteran employee might think twice. A new hire who desperately wants to make a good impression? They’re already on it before they even finish reading.

And tax season scams are ramping up too. W-2 requests. Payroll phishing. Fake IRS notices. It’s like Christmas for cybercriminals. (Okay, technically it’s after Christmas, but you get the idea.)

The attack is devastatingly simple: Someone impersonates your CEO or HR director and sends an “urgent” request to whoever handles payroll.

“I need copies of all employee W-2s for a meeting with the accountant. Send ASAP.”

Once they have those W-2s, every employee’s Social Security number, address, and salary is compromised. The criminals file fraudulent tax returns before your employees file theirs. Your people find out when their legitimate returns get rejected as “duplicates.”

Can you imagine having to explain that to your team? Yikes. 😬

Your counter-move:

  • Security training in onboarding. Before new hires get email access, they should know what scams look like and that nobody will ever legitimately ask them to buy gift cards urgently. Ever!
  • Create explicit policies: “We never send W-2s via email.” “Any payment request gets verified by phone.” Write them down. Test people on them. Make it part of the culture.
  • Reward verification. The employee who calls to confirm a legitimate request should be praised, not made to feel paranoid. “Thanks for checking!” goes a long way.

Preventable Beats Recoverable. Every. Single. Time.

You have two choices with cybersecurity:

Option A: React after the attack.

Pay the ransom. Hire emergency help. Notify customers. Rebuild systems. Repair your reputation. Explain to everyone what happened.

  • Cost: Tens or hundreds of thousands of dollars
  • Timeline: Weeks to months
  • Outcome: You might survive, but you’ll never forget it

Option B: Prevent the attack.

Implement proper security. Train your team. Monitor for threats. Close vulnerabilities before they’re exploited.

  • Cost: A fraction of Option A
  • Timeline: Ongoing, in the background
  • Outcome: Nothing happens — which is the whole point!

You don’t buy a fire extinguisher after the building burns down.  You buy it so you never need it.

I know which option I’d choose!


How to Ruin Their Year

A good IT partner keeps you off the “easy target” list by:

  • Monitoring your systems 24/7 — catching threats before they become breaches
  • Tightening access and credentials — so one stolen password doesn’t open everything
  • Training your team on modern scams — not the obvious ones, the good ones
  • Setting verification policies — so wire fraud requires more than a convincing email
  • Maintaining and testing backups — so ransomware is an inconvenience, not an extinction event
  • Patching before criminals exploit vulnerabilities — closing doors before anyone tries them

That’s fire prevention, not firefighting. And honestly? It’s kind of beautiful when it works. 🔥➡️✅

Criminals are setting their 2026 goals right now. They’re optimistic about the year ahead. They’re counting on businesses like yours to be unprepared, understaffed, and unprotected.

Let’s disappoint them! 💪


Take Your Business Off Their Target List

Book a New Year Security Reality Check.

We’ll show you where you’re exposed, what matters most, and how to stop being low-hanging fruit in 2026.

No scare tactics. No jargon. Just a clear picture of where you stand and what to do about it.

[Book your 15-minute New Year Security Reality Check here]

Because the best New Year’s resolution is making sure you’re not on someone else’s list of goals to achieve. 🎯

Back to Blog

Share:

Related Posts

Five Reasons Why You Should QUIT Your IT Company

(…but not, of course, if they’re already CMIT Solutions! 😊) Let’s understand…

Read More

Is a Slow Leak Wrecking Your Minneapolis Business’s Data Security?

That nagging feeling. It’s like a slow leak in a car tire….

Read More

Your Business Tech Is Overdue for an Annual Physical

Ah, January. The month we all schedule the stuff we’ve been putting…

Read More