Infracore LLC Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Infracore LLC can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (858) 509-1970 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, March 22 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Hosted Solutions Network Security Malware Productivity Software Microsoft User Tips Hackers Data Innovation Internet Tech Term Mobile Devices Smartphones Backup Hardware Business Email Workplace Tips Efficiency Windows 10 Browser Communications Data Backup Business Continuity Android Smartphone IT Services VoIP Business Management Cloud Computing Computer Outsourced IT Managed IT Services Alert Disaster Recovery Small Business Data Recovery Office Ransomware Managed IT Services Windows 10 Chrome Computers Miscellaneous Artificial Intelligence Router Communication Cybercrime Cybersecurity Windows Law Enforcement Network Internet of Things IT Support Money Passwords Health Telephone Systems Office 365 Holiday Social Media Password Applications Facebook Virtualization Collaboration Gadgets How To Mobile Device Quick Tips Server Productivity Wi-Fi Spam Private Cloud Social Engineering Google Drive Work/Life Balance Automation Saving Money Information Upgrade Word App Bring Your Own Device Microsoft Office Hacking Save Money Data Protection Voice over Internet Protocol Vulnerability Settings Mobility Keyboard Two-factor Authentication Mobile Device Management Encryption Apps Scam Data Breach Connectivity HaaS Paperless Office Office Tips Phishing Operating System Data Security BDR IT Support Managed Service CES Entertainment Remote Monitoring Website USB Value Flexibility Managed IT PDF Telephone System Telephony Firewall Networking Sports Content Management Windows 7 Legal Software as a Service Automobile Botnet Save Time Employer-Employee Relationship Managed Service Provider BYOD Charger Business Intelligence Government Blockchain Patch Management Data Storage Identity Theft Data Management Augmented Reality Meetings Update Cleaning OneNote Public Cloud Infrastructure Cryptocurrency Redundancy IT Management Worker Marketing Servers Spam Blocking Big Data Avoiding Downtime Computer Care VPN Human Resources Battery End of Support IT Plan History Fraud Access Control Google Docs Machine Learning Samsung Electronic Medical Records Comparison Virtual Assistant Bandwidth Remote Computing Unsupported Software Training Black Market Enterprise Content Management Display Windows 10s Windows Server 2008 Television Amazon Authentication Unified Threat Management Screen Mirroring Computer Accessories YouTube Help Desk HBO Telecommuting MSP Database Root Cause Analysis Leadership iPhone Gmail Vendor Management Specifications Computing Infrastructure Google Search FENG Advertising Google Apps Scalability Mouse Conferencing Software Tips Password Management Security Cameras Emergency Public Computer Relocation User Error Amazon Web Services Nanotechnology Mobile Computing Cast Bluetooth Outlook Troubleshooting Loyalty Remote Work Practices File Sharing Business Technology Recovery Recycling Wireless Monitor Digital Signature Proactive IT Skype Smart Technology Current Events Workers Addiction Smart Office Administrator Emails NIST Hacker Solid State Drive Flash Online Shopping Smart Tech Best Practice Camera Shortcuts Frequently Asked Questions SaaS Hosted Computing Travel eWaste Experience Millennials Techology Users Net Neutrality Start Menu Two Factor Authentication Knowledge Cache Information Technology Document Management Microchip Multi-Factor Security HIPAA Smartwatch Audit Humor Internet Exlporer Evernote Content Risk Management Search Social Excel Files Credit Cards Inventory Remote Worker Hiring/Firing WiFi Criminal Search Engine IT solutions Physical Security Music Data storage Workforce Virtual Reality ISP Tools Network Congestion Hybrid Cloud Password Manager Instant Messaging Trending Safe Mode Employee Computer Fan Sync Transportation Safety Wireless Charging Devices Video Games Audiobook Wireless Internet Warranty Politics Rootkit How to HVAC Vendor Tip of the week Books Assessment Wiring Data loss Employer Employee Relationship Bing Wearable Technology Accountants Worker Commute Cryptomining Downtime IT Consultant Apple Business Mangement Staff Education Digital Signage The Internet of Things Benefits Internet exploMicrosoft Cortana Thought Leadership Wire Printer webinar Thank You Twitter Congratulations Company Culture Compliance Managing Stress Biometric Security Webinar Regulation Printers CrashOverride

Recent Comments

Thaddeus Greer Can Chargers Be Interchanged Between Devices?
21 March 2019
The infracore is known as the heart of the information technology all over the world and the issue d...
AngusCousens What is Encryption, Anyways?
19 March 2019
When we hold the computer the basic and stylish accessories with the desktop is the requirement of e...
Kevyn Hawkins In the Midst of Chaotic Financial Markets, Technology Remains a Constant
15 March 2019
For the finance market we have to read this blog really and very carefully for the chapter of the pa...
Micheal williams Tip of the Week: Improve Email Open Rates With an Attention-Grabbing Title
15 March 2019
In this modern world, technology has changed the world and even it has created many chances to creat...
Maddison Franklin Tip of the Week: Improve Email Open Rates With an Attention-Grabbing Title
14 March 2019
IT is the heart of technology all over the world and there are many ease by the use of this technolo...