253.777.0763    Get SUPPORT

Graemouse Technologies Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Graemouse Technologies can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 253.777.0763 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 11 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Server VPN Private Cloud Alert Network Security Website IT Consultant Apple Browser Infrastructure Internet Exlporer Enterprise Content Management Start Menu Employer-Employee Relationship Efficiency Bring Your Own Device Save Money Social Media Password Cybercrime Accountants Voice over Internet Protocol Quick Tips Hybrid Cloud Spam Blocking Internet CES Evernote Comparison Credit Cards Business Public Cloud Operating System Emails Office 365 Authentication Health Mobile Device Management Internet of Things Windows Conferencing Windows 7 Network Congestion HaaS Network User Tips Scam Two-factor Authentication Collaboration BDR Physical Security Data Protection Smartphones Best Practices Disaster Recovery Information Specifications Encryption Communications HIPAA Cloud Computing Microsoft Backup Wire Law Enforcement Help Desk Mobile Computing Word Tip of the Week Managed IT Phishing Outsourced IT Privacy Solid State Drive Microsoft Office Thought Leadership Password Manager Title II Passwords Data loss Data Storage Google Drive Sports Android FCC Business Computing Virtualization Data Breach Money VoIP Tools Cybersecurity Content Management Computer Managed IT Services BYOD Technology HVAC Unsupported Software Mouse Small Business Software as a Service Cleaning Software Office Saving Money Human Resources IT Management Miscellaneous Administrator Facebook Meetings Networking Tech Term OneNote Servers IT Services Augmented Reality Unified Threat Management Communication Supercomputer Criminal Hardware Ransomware Social Engineering Wi-Fi Managed Service Relocation Blockchain Connectivity Remote Monitoring Apps MSP Managed IT Services Productivity Hackers Cloud Mobile Devices Email IT Plan Telephony Avoiding Downtime Automation Data Recovery Mobile Device Windows 10 Business Continuity Malware Artificial Intelligence Training Data Keyboard Computer Care Spam End of Support Telephone System Hiring/Firing YouTube Google Router Flash Chrome Bandwidth Virtual Assistant Google Docs Hosted Solutions Machine Learning Business Management IT Support Applications Devices Update Security Computers Travel Business Intelligence Vulnerability How To Files Redundancy Smartphone Paperless Office Workplace Tips Data Backup Identity Theft Upgrade App Windows 10 Innovation Flexibility Excel Government Holiday Telephone Systems Settings Gadgets Access Control Business Mangement Data Security Fraud

Newsletter Sign Up