253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Graemouse Technologies can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 253.777.0763 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 22 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Privacy Google Drive Cloud Computing Artificial Intelligence Cybercrime Redundancy IT Consultant Comparison Windows Server 2008 webinar Operating System Hardware Workers Office 365 Chrome Keyboard Mobile Devices Holiday Data Breach Money Productivity Small Business Windows User Error Update Relocation Technology Communications Unsupported Software Law Enforcement Computer Care HIPAA BYOD Save Money Travel Audit Best Practices Title II Internet exploMicrosoft Internet Exlporer Conferencing Cloud Data Automation Big Data Leadership Government Millennials IT Plan Google Apps Data loss Innovation Budget Online Credit Cards Staff Android Computers Data Protection Hosted Solutions Network OneNote Content Management Flexibility Remote Work Excel Telephony Downtime Identity Theft Bring Your Own Device Managed IT Human Resources Wi-Fi Data Backup Amazon Physical Security Network Congestion Malware Windows 10 Hiring/Firing Google Communication IT Services Telecommuting Telephone Systems Public Cloud Amazon Web Services IT Support Remote Monitoring Managed IT Services Password Solid State Drive Software Tips Outsourced IT Managed IT Services Efficiency Apple Tip of the Week Quick Tips Ransomware Security Business Computing The Internet of Things Business Two-factor Authentication Data Recovery Gmail VoIP Alert Employer-Employee Relationship Knowledge Internet Business Mangement Meetings Passwords Saving Money Social Engineering IT Management Apps iPhone Networking Business Intelligence Scam Data Storage How To Emails Windows 10 Cybersecurity Settings Electronic Medical Records Botnet Work/Life Balance Avoiding Downtime Virtualization Specifications Hackers Collaboration Email Smartphone Voice over Internet Protocol Private Cloud Mobile Device Management Flash Recovery Social Media Phishing Emergency Microsoft Blockchain Windows 7 Vulnerability Smartphones Gadgets Password Manager Tip of the week Health BDR Business Management Fraud Network Security Wireless Charging Facebook Advertising Upgrade Data Security HBO Humor Server CES Workforce VPN Backup Patch Management Supercomputer Website Browser Word Bandwidth Sync Safety Router Charger App Tools Trending Productivity Root Cause Analysis Spam Blocking Accountants HaaS Infrastructure Business Continuity Software User Tips Windows 10s End of Support Miscellaneous Multi-Factor Security Spam Internet of Things

Newsletter Sign Up