drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Spring 2026
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

2026 Security New Year’s Resolutions and Predictions

by Jon Seals | January 8, 2026 | | 0 comments

By Jeff Liford, Associate Director, Fenix24

If the impact and complexity of cyberattacks taught us anything in 2025, it’s that security failures are no longer about missing tools. They’re about broken fundamentals under real threat actor pressure.

In fact, most attacks happen without exotic exploits. Identity, misconfigurations, tokens, and trusted access are compromised faster than organizations can patch or detect.

Considering what we as security practitioners learned during 2025 (myself included), I will offer my 2026 New Years top resolutions and predictions.

Resolution #1: I will fix my backups.
Off-domain. Immutable. Tested and validated. Backups only matter if they survive the attack and restore when needed.

Resolution #2: I will enforce authentication hygiene.
No more “123456.” MFA is not optional in 2026.  Accounts that can’t have MFA (service accounts) will be extremely limited in scope/permissions/access. No more Domain Admin Service Accounts will be allowed.

Resolution #3: I will document my assets.
Asset visibility is not optional in 2026. If I can’t quickly identify what exists, who owns it, and how it connects, I don’t control my environment. I’m guessing.

Resolution #4: I will design for failure.
I will assume compromise and design the environment to resist it in layers, with assured recovery. Enforced segmentation and access control are critical to security posture. Resilience is built before the incident, not during it.

Resolution #5: I will stop trusting inherited risk.
“How we’ve always done it” is not a security strategy. I will reassess legacy decisions and ensure vendors and partners are aligned with my security posture.

My Top-5 Predictions for 2026: Self-Improvement is Hard

Prediction #1: Immutability struggles persist.
The industry is learning the power that immutability has to change outcomes in ransomware attacks. True immutability significantly improves the chances an organization can reasonably consider resisting a ransom. As a result, regulators and insurers will begin to demand: “Show me your immutable backups.”

But even as that demand rises, execution will lag. Pressure does not equal results or competence. This does not — by itself — result in backup technology being implemented quickly, correctly, or being properly tested.  We’ll also continue to see vendors jump on the immutability wagon with their own interpretations of immutable tech. Organizations should demand immutability without conditions or compromises.  If anyone can delete the data, it is not immutable.

Prediction #2: Zero trust is secretly a compliance exercise.

The importance of zero trust methodologies will continue to rise as more organizations and institutions attempt to enshrine this as a required standard and not a best practice. 

Continuous authentication and micro-segmentation would certainly solve a lot of hurts in modern cyber breaches, but most organizations lack the willpower to make the cultural shift required to implement zero trust frameworks.

Zero trust depends on well-known security behaviors that organizations already struggle with. What seems much more likely is organizations will invest in technologies labeled as zero trust, configure them with effective “any any” rules, and celebrate the compliance win.

Prediction #3: Continuous monitoring tells us what we already know.

There’s a lot of attention on continuous threat exposure and continuous monitoring, particularly in the age of AI. We can anticipate moves away from static, point-in-time assessment methodologies in favor of AI-enabled, real time big data platforms.  

This shift does not improve outcomes alone, because visibility is not the true problem.  SIEM/SOAR technology is not new. You can ignore continuous monitoring platforms just as effectively as you can ignore your SIEM or a pen test. This is about doing the hard work of executing security fundamentals well (vulnerability management, patching, asset control, least privilege, least access). Do you really need an AI to point out these issues in your enterprise? 

Prediction #4: Deepfakes and social engineering proliferate.

Human-centric attacks continue to be wildly effective. AI, deepfake technology, and emotionally-charged social engineering will continue to drive identity fraud and business email compromise. People remain a key vulnerability point.

Depressingly, some of the most catastrophic breaches of the year will also trace their roots back to social engineering. The industry will continue to tell itself that users are the problem and conveniently forget that their administrators are also users.  

Security controls should assume users will click on the phishing link. The blast radius should be constrained by architecture and design. Perhaps worst of all, the truly catastrophic failures will surface in privileged workflows (helpdesks, admins, MSPs) where speed is more important than verification. Environments architected for administrative convenience are also architected for threat actor convenience.

Prediction #5: Vendor and supply chain security remains dubious.

Vendor supply chains will come under increased pressure around their security controls, transparency, and regulatory requirements as more vendors are pushed to validate their security postures. Several high-profile breaches of 2025 were initiated through third party vendors, including software providers, firewall vendors, and MSPs. 

Despite this pressure, security will remain challenged. Organizations outsource critical trust boundaries, underwrite mountains of assumed risk, fail to verify alignment, and then act surprised when something goes wrong. 

No one is prepared to fire their vendors and take everything in-house, and I’m not saying they should. Organizations need to start asking tough questions of their third-party vendors, and they need to plan for how their environment will react to security compromises in those vendors. You can outsource labor, but you should not outsource responsibility for security outcomes.

2026 Bonus rounds

1) A major AI vendor will leak all the data you put into it.

2) A major RMM breach will cascade to thousands of downstream customers ransomed.

About the author

Jeff Liford is an IT leader, educator, and cybersecurity resilience expert with more than 15 years of experience across the military, federal, and private sectors. As Associate Director at Fenix24, he leads high-impact cyber incident recovery efforts and strategic process improvement initiatives.

A former U.S. Army Senior Intelligence Analyst and long-time Adjunct Professor at the University of Alaska Anchorage, Jeff blends hands-on technical expertise with a passion for teaching. His work focuses on building resilient systems, mentoring future engineers, and empowering teams to grow through disruption.

Related Content

  1. Future-Proof Business Security: Strategies for Long-Term Resilience
    The Future of Business Protection
  2. Integration of Cybersecurity into Physical Security Realm
  3. Why 2026 Will Break Corporate Security
    Why 2026 Will Break Corporate Security

Recent Posts

ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies

January 12, 2026

LambdaTest Rebrands to TestMu AI, the Agentic AI platform for Quality Engineering

January 12, 2026

The Workforce Has Changed; Disaster Recovery Must Change With It

January 9, 2026

Why Effective CTEM Must be an Intelligence-Led Program

January 9, 2026

Ridge Security Announces Powerful New AWS, Windows Pentesting Features for RidgeBot 6.0

January 9, 2026

Cybersecurity Nightmares of 2025 and the Path to Resilience in 2026

January 9, 2026

Archives

  • January 2026 (16)
  • December 2025 (45)
  • November 2025 (58)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2026 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Spring 2026 | The Future Runs on Resilience

    Leave your details below for a chance to win a free pass to DRJ Spring 2026 | The Future Runs on Resilience. The winner will be announced on January 16. Join us for DRJ's 74th Conference!
    Enter Now