
Somewhere right now, a cybercriminal is setting New Year's resolutions too.
They're not staring at a vision board about "self-care" or "work-life balance."
They're reviewing what worked in 2025 and planning how to steal more in 2026.
And guess what, small businesses are their favorite target.
Not because you're careless.
Because you're busy.
And criminals love busy.
Here's their 2026 game plan, and how to ruin it.
Resolution #1: "I Will Send Phishing Emails That Don't Look Fake Anymore"
The era of laughably bad scam emails is over.
AI now writes messages that:
- Sound completely normal
- Use your company's language
- Reference real vendors you actually work with
- Skip the obvious red flags
They don't need typos to get you. They need timing.
And January is perfect timing. Everyone's distracted, moving fast, catching up from the holidays.
Here's what a modern phishing email looks like:
"Hi [your actual name], I tried to send the updated invoice, but the file bounced back. Can you confirm this is still the right email for accounting? Here's the new version — let me know if you have questions. Thanks, [name of your actual vendor]"
No Nigerian prince. No urgent wire transfer. Just a normal-sounding request from someone you recognize.
Your counter-move:
- Train your team to verify, not just read. Any request involving money or credentials gets confirmed through a separate channel.
- Use automatic email filtering that catches impersonation attempts — tools that flag when an email claims to be from your accountant but came from a server in Eastern Europe.
- Create a culture where questioning is praised, not punished. "I verified before responding" should be celebrated, not seen as paranoid.
Resolution #2: "I Will Impersonate Your Vendors… or Your Boss"
This one is brutal because it feels so real.
A vendor email arrives:
"Hey, we updated our bank details. Please use this new account for future payments."
Or a text from "the CEO" hits your bookkeeper:
"Urgent. Wire this now. I'm in a meeting and can't talk."
Sometimes it's not even text anymore.
Deepfake voice scams are rising. They clone voices from YouTube videos, podcast appearances, even voicemail greetings. The "CEO" calls your finance person and asks for a "quick favor," and it sounds exactly like them.
That's not sci-fi. That's Tuesday.
Your counter-move:
- Establish a simple callback policy for any bank account changes. Always verify through a known number, not one provided in the email.
- No payment moves without voice confirmation through established channels.
- MFA on every finance and admin account. Even if they get the password, they can't get in.
Resolution #3: "I Will Target Small Businesses Harder Than Ever"
For years, cybercriminals focused on big targets. Banks. Hospitals. Fortune 500 companies.
But enterprise security got better. Insurance requirements got tighter. Big companies became hard and annoying to attack.
So the smart criminals pivoted.
Instead of one $5 million attack that's difficult and risky, why not a hundred $50,000 attacks that are almost guaranteed to work?
Small businesses are now the primary target. You have money worth stealing. You have data worth ransoming. And you probably don't have a dedicated security team.
Attackers know:
- You're understaffed
- You don't have a security team
- You're juggling everything
- You assume "we're too small to be worth it"
That belief is their favorite vulnerability.
Your counter-move:
- Stop being low-hanging fruit. Basic security measures — MFA, regular updates, tested backups — make you harder than the business next door. Most attackers will move on.
- Remove "we're too small to be a target" from your vocabulary. You're not too small to be a target… just too small to make the news when you become a victim.
- Get professional help. You don't need an enterprise security team; you need a partner watching your back.
Resolution #4: "I Will Exploit New Employee Season and Tax Chaos"
January brings new hires. And new hires don't know your rules yet.
They're eager to impress. They want to be helpful. They're unlikely to question authority.
From an attacker's perspective? Perfect targets.
"Hey, I'm the CEO. Can you handle this quickly? I'm traveling and can't do it myself."
A veteran employee might think twice. A new hire who wants to make a good impression? They're already on it.
Tax season scams ramp up soon too. W-2 requests. Payroll phishing. Fake IRS notices.
The attack is simple: Someone impersonates your CEO or HR director and sends an "urgent" request to whoever handles payroll. "I need copies of all employee W-2s for a meeting with the accountant. Send ASAP."
Once they have those W-2s, every employee's Social Security number, address and salary is compromised. The criminals file fraudulent tax returns before your employees file theirs. Your people find out when their legitimate returns get rejected as "duplicates."
Your counter-move:
- Security training in onboarding. Before new hires get email access, they should know what scams look like and that nobody will ever ask them to buy gift cards urgently.
- Create explicit policies: "We never send W-2s via email." "Any payment request gets verified by phone." Write them down. Test people on them.
- Reward verification. The employee who calls to confirm a legitimate request should be praised, not made to feel paranoid.
Preventable Beats Recoverable. Every Time.
You have two choices with cybersecurity:
Option A: React after the attack. Pay the ransom, hire emergency help, notify customers, rebuild systems, repair your reputation. Cost: tens or hundreds of thousands of dollars. Timeline: weeks to months. Outcome: You might survive, but you'll never forget it.
Option B: Prevent the attack. Implement proper security. Train your team. Monitor for threats. Close vulnerabilities before they're exploited. Cost: a fraction of Option A. Timeline: ongoing, in the background. Outcome: Nothing happens — which is the whole point.
You don't buy a fire extinguisher after the building burns.
You buy it because you’d never need it.
How to Ruin Their Year
A good IT partner keeps you off the "easy target" list by:
- Monitoring your systems 24/7, catching threats before they become breaches
- Tightening access and credentials so one stolen password doesn't open everything
- Training your team on modern scams — not the obvious ones, the good ones
- Setting verification policies so wire fraud requires more than a convincing email
- Maintaining and testing backups so ransomware is an inconvenience, not an extinction event
- Patching before criminals exploit vulnerabilities, closing doors before anyone tries them
Fire prevention, not firefighting.
Criminals are setting their 2026 goals right now. They're optimistic about the year ahead. They're counting on businesses like yours to be unprepared, understaffed and unprotected.
Let's disappoint them.
Take Your Business Off Their Target List
Book a New Year Security Reality Check.
We'll show you where you're exposed, what matters most and how to stop being low-hanging fruit in 2026.
No scare tactics. No jargon. Just a clear picture of where you stand and what to do about it.
Book your 15-minute New Year Security Reality Check here
Because the best New Year's resolution is making sure you're not on someone else's list of goals to achieve.
