{"id":572,"date":"2026-01-28T08:08:23","date_gmt":"2026-01-28T14:08:23","guid":{"rendered":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/?p=572"},"modified":"2026-01-23T08:30:26","modified_gmt":"2026-01-23T14:30:26","slug":"new-years-resolutions-for-cybercriminals","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/blog\/new-years-resolutions-for-cybercriminals\/","title":{"rendered":"New Year&#8217;s Resolutions for Cybercriminals (Spoiler: Your Business Is on Their List)"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-medium wp-image-573 alignleft\" src=\"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-content\/uploads\/sites\/89\/2026\/01\/4-300x300.png\" alt=\"Hooded bad guy plotting to get your money\" width=\"300\" height=\"300\" srcset=\"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-content\/uploads\/sites\/89\/2026\/01\/4-300x300.png 300w, https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-content\/uploads\/sites\/89\/2026\/01\/4-1024x1024.png 1024w, https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-content\/uploads\/sites\/89\/2026\/01\/4-150x150.png 150w, https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-content\/uploads\/sites\/89\/2026\/01\/4-768x768.png 768w, https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-content\/uploads\/sites\/89\/2026\/01\/4.png 1500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Somewhere right now, a cybercriminal is setting New Year&#8217;s resolutions too.<\/p>\n<p>They&#8217;re not staring at a vision board about &#8220;self-care&#8221; or &#8220;work-life balance.&#8221; They&#8217;re not promising to drink more water or call their mother more often.<\/p>\n<p>Nope. They&#8217;re reviewing what worked in 2025 and planning how to steal more in 2026.<\/p>\n<p>And guess what? Small businesses are their\u00a0<em>favorite<\/em>\u00a0target.\u00a0Not because you&#8217;re careless. Because you&#8217;re\u00a0<strong><em>busy<\/em><\/strong>.<\/p>\n<p>And criminals absolutely love busy.<\/p>\n<p>Here&#8217;s their 2026 game plan \u2014 and how to ruin it. \ud83d\ude08<\/p>\n<hr class=\"my-8 border-t border-border\" \/>\n<h2 id=\"resolution-1-i-will-send-phishing-emails-that-dont-look-fake-anymore\" class=\"group relative my-6 text-foreground text-2xl font-semibold\">Resolution #1: &#8220;I Will Send Phishing Emails That Don&#8217;t Look Fake Anymore&#8221;<\/h2>\n<p>The era of laughably bad scam emails is officially over.<\/p>\n<p>Remember those messages from a &#8220;Nigerian prince&#8221; with seventeen typos and random capitalization? Those were almost charming in their incompetence. You could spot them from across the room!<\/p>\n<p>Yeah&#8230; those days are gone.<\/p>\n<p>AI now writes phishing messages that:<\/p>\n<ul>\n<li>Sound completely normal<\/li>\n<li>Use your company&#8217;s actual language and terminology<\/li>\n<li>Reference real vendors you genuinely work with<\/li>\n<li>Skip all the obvious red flags<\/li>\n<\/ul>\n<p>They don&#8217;t need typos to get you. They need\u00a0<em>timing<\/em>.<\/p>\n<p>And January? January is\u00a0<em>perfect<\/em>\u00a0timing. Everyone&#8217;s distracted, moving fast, catching up from the holidays, juggling a million things at once.<\/p>\n<p>Here&#8217;s what a modern phishing email actually looks like:<\/p>\n<blockquote class=\"my-4 border-l-4 border-primary\/30 bg-muted\/30 py-2 pl-4 italic text-muted-foreground\"><p><strong><em>&#8220;Hi [your actual name], I tried to send the updated invoice, but the file bounced back. Can you confirm this is still the right email for accounting? Here&#8217;s the new version \u2014 let me know if you have questions. Thanks, [name of your actual vendor]&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>No Nigerian prince. No urgent wire transfer. No ALL CAPS SCREAMING. Just a normal-sounding request from someone you recognize.<\/p>\n<p>That&#8217;s terrifying, right? It should be!<\/p>\n<p><strong>Your counter-move:<\/strong><\/p>\n<ul>\n<li><strong>Train your team to verify, not just read.<\/strong>\u00a0Any request involving money or credentials gets confirmed through a separate channel. Every. Single. Time.<\/li>\n<li><strong>Use automatic email filtering that catches impersonation attempts<\/strong>\u00a0\u2014 tools that flag when an email claims to be from your accountant but actually came from a server in Eastern Europe.<\/li>\n<li><strong>Create a culture where questioning is praised, not punished.<\/strong>\u00a0&#8220;I verified before responding&#8221; should be celebrated, not seen as paranoid. Seriously \u2014 buy that person lunch!<\/li>\n<\/ul>\n<hr class=\"my-8 border-t border-border\" \/>\n<h2 id=\"resolution-2-i-will-impersonate-your-vendors-or-your-boss\" class=\"group relative my-6 text-foreground text-2xl font-semibold\">Resolution #2: &#8220;I Will Impersonate Your Vendors&#8230; or Your Boss&#8221;<\/h2>\n<p>This one is brutal because it feels so\u00a0<em>real<\/em>.<\/p>\n<p>A vendor email arrives:<\/p>\n<blockquote class=\"my-4 border-l-4 border-primary\/30 bg-muted\/30 py-2 pl-4 italic text-muted-foreground\"><p><strong><em>&#8220;Hey, we updated our bank details. Please use this new account for future payments.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>Or a text from &#8220;the CEO&#8221; hits your bookkeeper:<\/p>\n<blockquote class=\"my-4 border-l-4 border-primary\/30 bg-muted\/30 py-2 pl-4 italic text-muted-foreground\"><p><strong><em>&#8220;Urgent. Wire this now. I&#8217;m in a meeting and can&#8217;t talk.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>And sometimes? It&#8217;s not even text anymore.<\/p>\n<p>Deepfake voice scams are rising. They clone voices from YouTube videos, podcast appearances, even voicemail greetings. The &#8220;CEO&#8221;\u00a0<em>calls<\/em>\u00a0your finance person and asks for a &#8220;quick favor&#8221; \u2014 and it sounds exactly like them.<\/p>\n<p>That&#8217;s not sci-fi. That&#8217;s Tuesday. \ud83d\ude2c\u00a0I wish I was exaggerating. I&#8217;m really not.<\/p>\n<p><strong>Your counter-move:<\/strong><\/p>\n<ul>\n<li><strong>Establish a simple callback policy for any bank account changes.<\/strong>\u00a0Always verify through a known number \u2014 not one provided in the email. Ever.<\/li>\n<li><strong>No payment moves without voice confirmation through established channels.<\/strong>\u00a0Period. No exceptions. Not even for the CEO.\u00a0<em>Especially<\/em>\u00a0not for the CEO.<\/li>\n<li><strong>MFA on every finance and admin account.<\/strong>\u00a0Even if they get the password, they can&#8217;t get in without that second factor.<\/li>\n<\/ul>\n<hr class=\"my-8 border-t border-border\" \/>\n<h2 id=\"resolution-3-i-will-target-small-businesses-harder-than-ever\" class=\"group relative my-6 text-foreground text-2xl font-semibold\">Resolution #3: &#8220;I Will Target Small Businesses Harder Than Ever&#8221;<\/h2>\n<p>For years, cybercriminals focused on the big fish. Banks. Hospitals. Fortune 500 companies. The juicy targets with deep pockets.<\/p>\n<p>But here&#8217;s what happened: Enterprise security got better. Insurance requirements got tighter. Big companies became hard and\u00a0<em>annoying<\/em>\u00a0to attack.<\/p>\n<p>So, the smart criminals pivoted.<\/p>\n<p>Think about it from their perspective: Instead of one $5 million attack that&#8217;s difficult and risky, why not a hundred $50,000 attacks that are almost\u00a0<em>guaranteed<\/em>\u00a0to work?<\/p>\n<p>The math is brutal. And it works in their favor.<\/p>\n<p>Small businesses are now the primary target. You have money worth stealing. You have data worth ransoming. And you probably don&#8217;t have a dedicated security team watching the gates 24\/7.<\/p>\n<p>Attackers know:<\/p>\n<ul>\n<li>You&#8217;re understaffed<\/li>\n<li>You don&#8217;t have a security team<\/li>\n<li>You&#8217;re juggling everything<\/li>\n<li>You assume &#8220;we&#8217;re too small to be worth it&#8221;<\/li>\n<\/ul>\n<p>That last belief? That&#8217;s their\u00a0<em>favorite<\/em>\u00a0vulnerability. They&#8217;re counting on it!<\/p>\n<p><strong>Your counter-move:<\/strong><\/p>\n<ul>\n<li><strong>Stop being low-hanging fruit.<\/strong>\u00a0Basic security measures \u2014 MFA, regular updates, tested backups \u2014 make you harder than the business next door. Most attackers will just move on to easier prey. They&#8217;re lazy like that!<\/li>\n<li><strong>Remove &#8220;we&#8217;re too small to be a target&#8221; from your vocabulary.<\/strong>\u00a0You&#8217;re not too small to be a target&#8230; just too small to make the news when you become a victim.<\/li>\n<li><strong>Get professional help.<\/strong>\u00a0You don&#8217;t need an enterprise security team. You need a partner watching your back.<\/li>\n<\/ul>\n<hr class=\"my-8 border-t border-border\" \/>\n<h2 id=\"resolution-4-i-will-exploit-new-employee-season-and-tax-chaos\" class=\"group relative my-6 text-foreground text-2xl font-semibold\">Resolution #4: &#8220;I Will Exploit New Employee Season and Tax Chaos&#8221;<\/h2>\n<p>January brings new hires. And new hires don&#8217;t know your rules yet.<\/p>\n<p>They&#8217;re eager to impress. They want to be helpful. They&#8217;re unlikely to question authority \u2014 especially in their first few weeks.<\/p>\n<p>From an attacker&#8217;s perspective?\u00a0<em>Perfect<\/em>\u00a0targets.<\/p>\n<blockquote class=\"my-4 border-l-4 border-primary\/30 bg-muted\/30 py-2 pl-4 italic text-muted-foreground\"><p><strong><em>&#8220;Hey, I&#8217;m the CEO. Can you handle this quickly? I&#8217;m traveling and can&#8217;t do it myself.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>A veteran employee might think twice. A new hire who desperately wants to make a good impression? They&#8217;re already on it before they even finish reading.<\/p>\n<p>And tax season scams are ramping up too. W-2 requests. Payroll phishing. Fake IRS notices. It&#8217;s like Christmas for cybercriminals. (Okay, technically it&#8217;s\u00a0<em>after<\/em>\u00a0Christmas, but you get the idea.)<\/p>\n<p>The attack is devastatingly simple: Someone impersonates your CEO or HR director and sends an &#8220;urgent&#8221; request to whoever handles payroll.<\/p>\n<blockquote class=\"my-4 border-l-4 border-primary\/30 bg-muted\/30 py-2 pl-4 italic text-muted-foreground\"><p><strong><em>&#8220;I need copies of all employee W-2s for a meeting with the accountant. Send ASAP.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>Once they have those W-2s, every employee&#8217;s Social Security number, address, and salary is compromised. The criminals file fraudulent tax returns\u00a0<em>before<\/em>\u00a0your employees file theirs. Your people find out when their legitimate returns get rejected as &#8220;duplicates.&#8221;<\/p>\n<p>Can you imagine having to explain\u00a0<em>that<\/em>\u00a0to your team? Yikes. \ud83d\ude2c<\/p>\n<p><strong>Your counter-move:<\/strong><\/p>\n<ul>\n<li><strong>Security training in onboarding.<\/strong>\u00a0Before new hires get email access, they should know what scams look like and that\u00a0<em>nobody<\/em>\u00a0will ever legitimately ask them to buy gift cards urgently. Ever!<\/li>\n<li><strong>Create explicit policies:<\/strong>\u00a0&#8220;We never send W-2s via email.&#8221; &#8220;Any payment request gets verified by phone.&#8221; Write them down. Test people on them. Make it part of the culture.<\/li>\n<li><strong>Reward verification.<\/strong>\u00a0The employee who calls to confirm a legitimate request should be praised, not made to feel paranoid. &#8220;Thanks for checking!&#8221; goes a long way.<\/li>\n<\/ul>\n<hr class=\"my-8 border-t border-border\" \/>\n<h2 id=\"preventable-beats-recoverable-every-single-time\" class=\"group relative my-6 text-foreground text-2xl font-semibold\">Preventable Beats Recoverable. Every. Single. Time.<\/h2>\n<p>You have two choices with cybersecurity:<\/p>\n<p><strong>Option A: React after the attack.<\/strong><\/p>\n<p>Pay the ransom. Hire emergency help. Notify customers. Rebuild systems. Repair your reputation. Explain to everyone what happened.<\/p>\n<ul>\n<li><strong>Cost:<\/strong>\u00a0Tens or hundreds of thousands of dollars<\/li>\n<li><strong>Timeline:<\/strong>\u00a0Weeks to months<\/li>\n<li><strong>Outcome:<\/strong>\u00a0You might survive, but you&#8217;ll never forget it<\/li>\n<\/ul>\n<p><strong>Option B: Prevent the attack.<\/strong><\/p>\n<p>Implement proper security. Train your team. Monitor for threats. Close vulnerabilities before they&#8217;re exploited.<\/p>\n<ul>\n<li><strong>Cost:<\/strong>\u00a0A fraction of Option A<\/li>\n<li><strong>Timeline:<\/strong>\u00a0Ongoing, in the background<\/li>\n<li><strong>Outcome:<\/strong>\u00a0Nothing happens \u2014 which is the whole point!<\/li>\n<\/ul>\n<p>You don&#8217;t buy a fire extinguisher\u00a0<em>after<\/em>\u00a0the building burns down.\u00a0\u00a0You buy it so you never need it.<\/p>\n<p>I know which option I&#8217;d choose!<\/p>\n<hr class=\"my-8 border-t border-border\" \/>\n<h2 id=\"how-to-ruin-their-year\" class=\"group relative my-6 text-foreground text-2xl font-semibold\">How to Ruin Their Year<\/h2>\n<p>A good IT partner keeps you off the &#8220;easy target&#8221; list by:<\/p>\n<ul>\n<li><strong>Monitoring your systems 24\/7<\/strong>\u00a0\u2014 catching threats before they become breaches<\/li>\n<li><strong>Tightening access and credentials<\/strong>\u00a0\u2014 so one stolen password doesn&#8217;t open everything<\/li>\n<li><strong>Training your team on modern scams<\/strong>\u00a0\u2014 not the obvious ones, the\u00a0<em>good<\/em>\u00a0ones<\/li>\n<li><strong>Setting verification policies<\/strong>\u00a0\u2014 so wire fraud requires more than a convincing email<\/li>\n<li><strong>Maintaining and testing backups<\/strong>\u00a0\u2014 so ransomware is an inconvenience, not an extinction event<\/li>\n<li><strong>Patching before criminals exploit vulnerabilities<\/strong>\u00a0\u2014 closing doors before anyone tries them<\/li>\n<\/ul>\n<p>That&#8217;s fire prevention, not firefighting. And honestly? It&#8217;s kind of beautiful when it works. \ud83d\udd25\u27a1\ufe0f\u2705<\/p>\n<p>Criminals are setting their 2026 goals right now. They&#8217;re optimistic about the year ahead. They&#8217;re counting on businesses like yours to be unprepared, understaffed, and unprotected.<\/p>\n<p><em><strong>Let&#8217;s disappoint them!<\/strong><\/em> \ud83d\udcaa<\/p>\n<hr class=\"my-8 border-t border-border\" \/>\n<h2 id=\"take-your-business-off-their-target-list\" class=\"group relative my-6 text-foreground text-2xl font-semibold\">Take Your Business Off Their Target List<\/h2>\n<p><strong>Book a New Year Security Reality Check.<\/strong><\/p>\n<p>We&#8217;ll show you where you&#8217;re exposed, what matters most, and how to stop being low-hanging fruit in 2026.<\/p>\n<p>No scare tactics. No jargon. Just a clear picture of where you stand and what to do about it.<\/p>\n<p><a href=\"https:\/\/go.scheduleyou.in\/ykXGqMEHrU?cid=is:~Contact.Id~\" target=\"_blank\" rel=\"noopener\"><strong>[Book your 15-minute New Year Security Reality Check here]<\/strong><\/a><\/p>\n<p>Because the best New Year&#8217;s resolution is making sure you&#8217;re not on someone\u00a0<em>else&#8217;s<\/em>\u00a0list of goals to achieve. \ud83c\udfaf<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Somewhere right now, a cybercriminal is setting New Year&#8217;s resolutions too. They&#8217;re&#8230;<\/p>\n","protected":false},"author":148,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-572","post","type-post","status-publish","format-standard","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/posts\/572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/users\/148"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/comments?post=572"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/posts\/572\/revisions"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/media?parent=572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/categories?post=572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/plymouth-mn-1102\/wp-json\/wp\/v2\/tags?post=572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}