2026 attack plan loading progress bar on dark cybersecurity background with icons of phishing, mask, lock, and email.

New Year's Resolutions for Cybercriminals (Spoiler: Your Business Is on Their List)

January 26, 2026

Right now, somewhere a cybercriminal is setting their own New Year's resolutions — but unlike you, they're not thinking about wellness or work-life balance.
Instead, they're reviewing their 2025 tactics and plotting how to execute bigger, smarter cyberattacks in 2026.

And small businesses are at the top of their target list.

Not because of negligence, but because busy entrepreneurs like you are prime targets.
Cybercriminals exploit distraction and overloaded schedules.

Here's their 2026 playbook — and how your business can shut it down before it starts.

Cybercriminal Resolution #1: Crafting Phishing Emails That Bypass Detection

The days of clumsy scam emails filled with typos and obvious flaws are over.

Today's AI-powered emails:

  • Sound exceptionally convincing and natural,
  • Mirror your company's unique tone and language,
  • Reference legitimate vendors you actually use,
  • Avoid classic warning signs to slip past your defenses.

These messages don't rely on errors — they rely on perfect timing. January, when everyone is rushing and catching up after holidays, is ideal.

Here's a typical example of a sophisticated phishing attempt:
"Hi [your actual name], I tried sending the updated invoice, but it bounced back. Can you confirm this is still the right accounting email? Here's the new version. Let me know if you have questions. Thanks, [name of your actual vendor]".

No royal Nigerian princes or urgent wire transfers — just a normal message from a trusted contact.

Your Defense Strategy:

  • Educate your team to verify payment or credential requests through a separate communication channel.
  • Implement advanced email filters that detect impersonation and suspicious sender origins.
  • Foster a workplace culture that encourages double-checking and questions without fear of judgment.

Cybercriminal Resolution #2: Impersonating Vendors and Executives to Trick Payments

This tactic feels dangerously authentic.
An email from a vendor might say: "Bank details updated, please send future payments to the new account."
Or a text from "the CEO" says: "Urgent wire transfer needed — I'm in a meeting and can't talk."

Even more concerning — deepfake voice scams are on the rise, cloning voices from videos and voicemails.
Imagine your "CEO" calling your finance team with a perfect impersonation asking for a quick favor.

That's not science fiction; it's happening today.

How to Counteract:

  • Set a strict callback policy for any changes in payment details, always verify via known phone numbers.
  • Require voice confirmation on all payment requests through established channels.
  • Enforce multi-factor authentication on every finance and administrative account to block unauthorized access.

Cybercriminal Resolution #3: Increasing Attacks on Small Businesses

Big corporations have improved defenses, making them less appealing to hackers.
So cybercriminals have shifted focus to small businesses — attacking multiple smaller targets for more guaranteed success.

Small businesses hold valuable data and assets but often lack dedicated security teams, making them attractive and vulnerable.

Attackers know you're usually:

  • Under-resourced,
  • Without a full-time security team,
  • Handling multiple roles,
  • Assuming "we're too small to matter."

That assumption is exactly what they exploit.

Protect Your Business By:

  • Implementing fundamental security like MFA, routine updates, and reliable backups to become a tougher target.
  • Rejecting the myth that small businesses aren't targets — you just might not make the headlines.
  • Partnering with cybersecurity experts who provide ongoing monitoring and support, not just reactive fixes.

Cybercriminal Resolution #4: Exploiting New Employees and Tax Season Confusion

New hires eager to impress and unfamiliar with your protocols are especially vulnerable.
Scammers impersonate executives with "urgent" requests that new employees may fulfill without question.

Tax season scams spike with fake W-2 requests, payroll phishing, and bogus IRS notices.
Once fraudsters collect W-2s, they steal identities and file fake tax returns before your team.

How to Stay Safe:

  • Provide targeted security training during onboarding before new hires access email.
  • Establish and enforce clear policies, such as "No W-2s sent via email" and mandatory phone verification for payment requests.
  • Encourage and recognize employees who verify suspicious requests—it's a strength, not paranoia.

Prevention Triumphs Over Recovery Every Time

You have two paths to cybersecurity:
Option A: Respond after a breach — pay ransom, emergency fixes, customer notifications, system rebuilding. Costs soar, timelines drag, and scars linger.
Option B: Proactively secure your business — train teams, monitor threats, and seal vulnerabilities. Costs a fraction of reactive fixes and keeps your business safe and sound.

Think of cybersecurity like a fire extinguisher—you install it not because you want to use it, but because you want to prevent disaster.

How to Keep Cybercriminals Off Your Radar

Partner with an IT provider who:

  • Monitors your environment 24/7 to intercept threats early,
  • Tightens access controls so one stolen credential doesn't unlock everything,
  • Educates your staff on sophisticated scams — the sneaky ones that bypass basic detection,
  • Implements stringent verification policies to prevent wire fraud,
  • Keeps your backups reliable and tested to minimize ransomware impact,
  • Ensures your systems are patched and up-to-date to close vulnerabilities.

Be proactive, not reactive.
Cybercriminals are mapping their attacks now, counting on you to be unprepared.
Let's stop them in their tracks.

Secure Your Business for 2026 and Beyond

Schedule a New Year Security Reality Check with us today.
Discover your risks, prioritize what matters, and learn how to become a tough target.

No hype, no jargon—just clear, actionable insights.

Click here or give us a call at (646) 989-9900 to book your Business Technology Alignment Assessment.

Your smartest New Year's resolution? Ensuring you're never on a criminal's target list.

Get In Touch

LastTech

1350 Ave. of the Americas, FL 2
New York, NY 10019

Phone: (646) 989-9900