IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Infracore LLC can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (858) 509-1970 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Software Microsoft Google Business computing Hackers Malware Network Security Windows 10 Backup Business Smartphones Business Continuity Innovation Email Android Hardware Managed IT Services Alert Small Business Office Hosted Solutions Browser Disaster Recovery Data Computers Computer VoIP Ransomware Outsourced IT Efficiency Business Management Internet Mobile Devices Cybercrime Data Backup Virtualization Productivity Cloud Computing Smartphone Telephone Systems Productivity How To User Tips Chrome Law Enforcement Quick Tips Money Cybersecurity Collaboration Windows Social Engineering Work/Life Balance Communications Managed IT Services IT Services Miscellaneous App Health Passwords Password Social Media HaaS Vulnerability Artificial Intelligence IT Support Spam Hacking Holiday Wi-Fi Mobile Device Management Facebook Apps Data Recovery Data Security Communication Office Tips Bring Your Own Device Upgrade Router Windows 10 Office 365 Phishing Private Cloud Data Breach Two-factor Authentication Google Drive Remote Computing Samsung History BYOD Value Flexibility Automobile Comparison PDF Redundancy Mobility Avoiding Downtime Managed Service Provider Data Protection Data Management Worker Workplace Tips Big Data Business Intelligence Battery Remote Monitoring Automation Electronic Medical Records Server Network Saving Money End of Support VPN Microsoft Office Data Storage Internet of Things Update Legal Charger Keyboard OneNote Patch Management IT Management CES Employer-Employee Relationship Spam Blocking Scam IT Plan Government Gadgets Operating System Computer Care Word Unsupported Software Public Cloud Marketing How to Safety Files Managed IT Wearable Technology Root Cause Analysis Infrastructure Benefits Software Tips HIPAA Worker Commute Conferencing Multi-Factor Security Hybrid Cloud Computer Accessories Windows 7 Entertainment Credit Cards Black Market Bandwidth Botnet USB Password Manager Firewall Human Resources Emails Trending Apple Bluetooth Flash Solid State Drive Fraud Scalability Networking Travel Troubleshooting Meetings Business Mangement Smart Technology Staff iPhone Audit Amazon Loyalty Gmail Current Events User Error Relocation Two Factor Authentication Physical Security IT solutions Specifications SaaS Monitor Sync Risk Management Computer Fan Amazon Web Services Data loss Recycling Knowledge Digital Signature IT Support Information Technology Instant Messaging Rootkit Politics The Internet of Things Online Shopping Books Screen Mirroring eWaste Network Congestion Internet Exlporer Humor HBO Encryption Millennials Assessment Data storage Training Telephony FENG Evernote Cast Criminal Education IT Consultant Recovery Save Money Outlook Settings Workforce Television Vendor Management Skype Wireless Charging Emergency Computing Infrastructure Leadership Google Docs Internet exploMicrosoft Save Time Frequently Asked Questions Accountants BDR Public Computer Start Menu Cortana Applications Website Advertising Excel Telecommuting Best Practice Wireless Cleaning Tools Experience Google Apps Content Management Users Voice over Internet Protocol Hiring/Firing Tip of the week Content Remote Work Mobile Device Search Techology Music Downtime Workers Transportation Blockchain Virtual Reality webinar Employer Employee Relationship Windows Server 2008 Audiobook Windows 10s Identity Theft Video Games Webinar WiFi Thank You Congratulations CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...