IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Infracore LLC can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (858) 509-1970 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, September 22 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Microsoft Software Malware Hackers Innovation Tech Term Backup Smartphones Internet Data Windows 10 Hosted Solutions Hardware Email Android Mobile Devices Business VoIP Managed IT Services Small Business Alert Browser Business Continuity IT Services Ransomware Outsourced IT Computers Disaster Recovery User Tips Business Management Data Backup Smartphone Cloud Computing Computer Office Artificial Intelligence Efficiency Law Enforcement Cybercrime Miscellaneous Communications Productivity Communication Passwords Router Managed IT Services Social Media Telephone Systems Password Applications How To Collaboration Cybersecurity Facebook Virtualization Chrome Windows Workplace Tips Network Data Recovery Internet of Things Productivity Money Health App Gadgets Social Engineering Office 365 Windows 10 Saving Money Quick Tips Upgrade Work/Life Balance Server IT Support Microsoft Office Bring Your Own Device Data Protection Save Money Private Cloud Hacking Vulnerability Spam Holiday Wi-Fi Two-factor Authentication Google Drive Mobile Device Management Automation Connectivity Apps Data Breach Phishing HaaS Word Office Tips IT Support Data Security Unsupported Software Comparison PDF Virtual Assistant Electronic Medical Records Remote Monitoring Samsung Website CES Remote Computing Managed IT Training Bandwidth Entertainment Sports Managed Service Provider USB Value Content Management Government Flexibility Windows 7 Settings Firewall Networking Legal BYOD Business Intelligence Employer-Employee Relationship Data Storage Blockchain Public Cloud Mobility Automobile Keyboard Charger Update Identity Theft OneNote Infrastructure Patch Management Encryption IT Management Data Management Redundancy Avoiding Downtime Cleaning End of Support Spam Blocking Information Mobile Device Worker History Paperless Office Scam VPN Marketing IT Plan Big Data Computer Care Operating System Managed Service Battery BDR The Internet of Things Employer Employee Relationship Cortana Thought Leadership Wire How to webinar Books Assessment Staff iPhone IT Consultant Amazon Authentication Unified Threat Management Screen Mirroring Wearable Technology Advertising Enterprise Content Management Worker Commute Windows 10s Windows Server 2008 MSP Root Cause Analysis Gmail Relocation User Error YouTube Education HBO Benefits Telecommuting FENG Telephony Computer Accessories Google Apps Black Market Conferencing Software Tips Television Specifications Telephone System Leadership Amazon Web Services Nanotechnology Monitor Mobile Computing Cast Voice over Internet Protocol Password Management File Sharing Scalability Botnet Vendor Management Recovery Recycling Computing Infrastructure Outlook Remote Work Practices Skype Bluetooth Workers Addiction Smart Office Emails Emergency Public Computer Digital Signature Save Time Online Shopping Smart Tech Camera Wireless Troubleshooting Loyalty NIST Solid State Drive Flash Hosted Computing Augmented Reality Meetings Travel eWaste Humor Internet Exlporer Frequently Asked Questions Smart Technology Current Events Best Practice Start Menu Cache Files Document Management Millennials Evernote Data storage SaaS Multi-Factor Security HIPAA Hybrid Cloud Cryptocurrency Audit Credit Cards Inventory Remote Worker Information Technology Experience Criminal Servers Techology Users Excel Two Factor Authentication Knowledge Content Tools Risk Management Password Manager IT solutions Physical Security Workforce Sync Hiring/Firing Wireless Charging Devices Wireless Internet Search Trending Human Resources Apple Safe Mode Computer Fan Network Congestion Fraud Access Control Wiring Instant Messaging Data loss Music Google Docs Internet exploMicrosoft HVAC Virtual Reality Tip of the week Video Games Audiobook Downtime Politics Rootkit Business Mangement Machine Learning Transportation Safety Accountants Congratulations Twitter Company Culture Compliance Managing Stress Regulation Webinar Printers WiFi CrashOverride Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AgustinMMontgomery MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For
19 September 2018
You have to share this wonderful article about how to handle the mobile payments and speedypaper rev...
JohnSHarper Tip of the Week: Working from Google Home
18 September 2018
Sharing these type tips are very effective for the readers and working from Google home is no secret...
Jesse Icely Study Finds that 45% of Virtual Machines Would Run More Efficiently in the Cloud
13 September 2018
Study has been pivotal goal for the generations. It has been marked with https://www.rushmyessays.or...
Malcolm Curtis Why You’ll Want to Consider Hosted VoIP Telephony
11 September 2018
VoIP was a new technology that was launched in this country this was just amazing it need 5g to get ...
Nomlanga Leach Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database
08 September 2018
Marketing database was reveal this year by a hacker that was not good news this was happened many ti...