Infracore LLC Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Infracore LLC can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (858) 509-1970 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Google Business computing Network Security Hosted Solutions Microsoft Hackers Malware Data Innovation Software Internet Business Hardware Smartphones Backup User Tips Tech Term Windows 10 Data Backup Browser Business Continuity Email Mobile Devices Computer Android VoIP Managed IT Services Business Management Alert Workplace Tips Data Recovery Small Business Communications Cloud Computing Productivity IT Services Smartphone Outsourced IT Efficiency Chrome Computers Disaster Recovery Miscellaneous Managed IT Services Ransomware Office Cybercrime Law Enforcement Communication Network Artificial Intelligence Telephone Systems Office 365 How To Internet of Things Social Media Password Applications Collaboration Cybersecurity Facebook Virtualization Windows IT Support Router Productivity Money Windows 10 Passwords Information Holiday Social Engineering Gadgets Google Drive Word Work/Life Balance Quick Tips Saving Money Server Upgrade App Spam Health Wi-Fi Mobile Device Management Private Cloud Managed Service Keyboard BDR Phishing Scam Data Breach Mobile Device Data Protection Apps Automation Voice over Internet Protocol Data Security HaaS Office Tips Two-factor Authentication IT Support Vulnerability Bring Your Own Device Connectivity Microsoft Office Hacking Save Money Firewall Networking Data Storage Paperless Office VPN Legal Human Resources Fraud OneNote Mobility Automobile Managed Service Provider Employer-Employee Relationship Google Docs Redundancy Government IT Management Charger Virtual Assistant Patch Management Avoiding Downtime Comparison Spam Blocking Data Management Website CES Public Cloud IT Plan Cleaning Telephone System Sports Worker Operating System Big Data Content Management Marketing Unsupported Software Software as a Service Computer Care Battery End of Support Remote Monitoring Business Intelligence Managed IT Blockchain History Identity Theft Telephony Electronic Medical Records Update Samsung Bandwidth Infrastructure Remote Computing Training Encryption Windows 7 Entertainment Settings Flexibility PDF BYOD Servers USB Value Computing Infrastructure Advertising Password Manager Scalability Search Engine Vendor Management Workforce Solid State Drive Flash Safe Mode Emergency Public Computer Wireless Charging Devices Meetings Travel Wireless Internet Warranty Bluetooth Trending Frequently Asked Questions Relocation User Error Access Control Start Menu Wiring Save Time Wireless HVAC Troubleshooting Loyalty Audit Smart Technology Current Events Business Mangement Monitor Machine Learning Bing Accountants Cortana Thought Leadership Best Practice Wire Printer Staff Excel Amazon Authentication Tools Unified Threat Management IT solutions Physical Security Enterprise Content Management SaaS Telecommuting Computer Fan Sync Techology Users MSP Two Factor Authentication Knowledge Gmail Information Technology YouTube Help Desk Experience Humor Internet Exlporer Google Apps Data loss Content Mouse Risk Management Specifications Tip of the week Amazon Web Services Nanotechnology Downtime Mobile Computing Hiring/Firing Search Files Password Management Remote Work Practices The Internet of Things Virtual Reality Hybrid Cloud File Sharing Network Congestion Recovery Recycling webinar Instant Messaging Data storage Music Transportation Safety Workers Addiction Screen Mirroring Video Games Audiobook Smart Office Administrator Politics Rootkit Digital Signature Windows 10s Windows Server 2008 Books Assessment Online Shopping Smart Tech Root Cause Analysis Camera Employer Employee Relationship HBO How to NIST Hosted Computing FENG Worker Commute Apple Augmented Reality IT Consultant eWaste Conferencing Software Tips Shortcuts Wearable Technology Education Internet exploMicrosoft Benefits Cache Cast Document Management Microchip Millennials Television Evernote Botnet Computer Accessories Multi-Factor Security HIPAA Outlook Black Market Cryptocurrency Credit Cards Inventory Skype iPhone Remote Worker Leadership WiFi Criminal Emails Congratulations Webinar CrashOverride Twitter Company Culture Compliance Managing Stress Regulation Thank You Printers

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Phillip Bond A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016
11 December 2018
A checklist of the components is done for the widening of the elements. The scope of the check list ...
Erickson Ferry Tip of the Week: Useful Shortcuts for Google
30 November 2018
Your blog was too good. I was exceptionally satisfied to discover this site. I needed to thank you f...
Alex Ling Would Your Users be Tricked by Social Engineering?
27 November 2018
I came to know about the user that was tricked by the users in this community this was all on social...
Daniel Mcmahon Ancient Greek Computer in Serious Need of Firmware Update
23 November 2018
Computers which are imported from the Greek now want to update the all software that is firmware tra...
Cameran Moon Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
22 November 2018
Infra core was the heart of IT they told us that if we download a wrong application it will infect o...