IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Infracore LLC can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (858) 509-1970 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Business computing Google Software Microsoft Network Security Backup Malware Hackers Windows 10 Internet Smartphones Android Business Email Browser Alert Data Small Business Business Continuity Innovation Managed IT Services Hosted Solutions Hardware Computer VoIP Ransomware Office Business Management Computers Disaster Recovery Smartphone Cybercrime Efficiency Productivity Tech Term Law Enforcement Outsourced IT User Tips Cloud Computing Chrome Cybersecurity Collaboration Virtualization IT Services Telephone Systems Artificial Intelligence Data Backup Money Mobile Devices Communications How To Productivity Health Passwords Windows Internet of Things Social Media Password Work/Life Balance Quick Tips Office 365 Data Recovery Communication Facebook Managed IT Services Social Engineering Miscellaneous Router Upgrade App Phishing Workplace Tips Word Data Breach Apps Private Cloud Vulnerability Spam Google Drive Bring Your Own Device HaaS Two-factor Authentication IT Support Mobile Device Management Data Security Data Protection Windows 10 Network Automation Saving Money Office Tips Hacking Holiday Wi-Fi Connectivity VPN IT Plan Operating System Data Management Worker Big Data Unsupported Software Government Gadgets Managed IT CES Website Battery Public Cloud Samsung Electronic Medical Records Server Windows 7 Content Management Marketing Bandwidth BYOD Value Microsoft Office History Identity Theft Legal Redundancy Infrastructure Keyboard Avoiding Downtime Charger Flexibility Patch Management Applications PDF Cleaning Mobility Scam Mobile Device Managed Service Provider Remote Monitoring Comparison Computer Care Remote Computing Entertainment USB Update Data Storage Business Intelligence End of Support OneNote IT Management Employer-Employee Relationship Spam Blocking Automobile Paperless Office Tools Criminal Workforce Wireless Charging Advertising Two Factor Authentication Devices Tip of the week Machine Learning Downtime Google Docs Wireless Risk Management Accountants BDR webinar Cortana Windows 10s Thought Leadership Windows Server 2008 YouTube Instant Messaging Root Cause Analysis Safety Rootkit Politics Books Software Tips Telecommuting Techology Conferencing Google Apps Botnet Voice over Internet Protocol Training Files Education Practices Remote Work Emails Flash Workers Solid State Drive Hybrid Cloud Save Money Addiction Travel Blockchain Meetings Networking Vendor Management Emergency Computing Infrastructure Hosted Computing Cache Audit Loyalty Save Time Apple Servers HIPAA Multi-Factor Security Current Events Credit Cards IT solutions Inventory Physical Security Wireless Internet Best Practice Sync Password Manager Computer Fan SaaS iPhone Experience HVAC Human Resources Data loss Trending Knowledge Fraud IT Support User Error Relocation Users Access Control Wire Business Mangement The Internet of Things Hiring/Firing Content Monitor Music Search Staff Screen Mirroring Network Congestion Amazon Transportation Virtual Reality Authentication HBO Sports Video Games Telephony Gmail FENG Information Technology Assessment Employer Employee Relationship Audiobook Wearable Technology How to Recovery Cast Specifications IT Consultant Amazon Web Services Settings Internet Exlporer Benefits Humor Worker Commute Nanotechnology Outlook Smart Office Skype Recycling Television Computer Accessories Data storage Black Market Digital Signature Leadership Online Shopping Firewall Smart Tech Frequently Asked Questions Document Management Scalability Start Menu eWaste Public Computer Bluetooth Troubleshooting Encryption Millennials Evernote Internet exploMicrosoft Smart Technology Excel Thank You CrashOverride WiFi Congratulations Twitter Company Culture Managing Stress Webinar Enterprise Content Management Password Management NIST

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...