253.777.0763    Get SUPPORT

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Graemouse Technologies can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 253.777.0763 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 26 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Communication Collaboration Social Engineering Efficiency Managed Service Cryptocurrency Windows 10 Safety VPN Networking Online Facebook Fraud Data Backup Twitter Best Practices The Internet of Things Windows 10 Internet of Things Managed IT Bring Your Own Device Office 365 Update Innovation Business Management Hackers Apps Cybercrime Privacy Telephone Systems BDR Password Manager Wi-Fi Browser IT Consultant Cloud Computing Computers Money Tech Term Supercomputer Avoiding Downtime Unsupported Software CES Document Management Marketing Keyboard Staff Outsourced IT Employer-Employee Relationship Mobile Devices Upgrade BYOD Human Resources Smartphone Password Management Data Security Phishing Conferencing VoIP Alert Criminal Passwords Google Drive Practices Travel Internet IT Management Data loss Router Backup Internet exploMicrosoft Title II Mobile Device Bandwidth Audit Gadgets Physical Security Android Blockchain Business Mangement Augmented Reality IT Services Public Cloud Government Applications Remote Monitoring Artificial Intelligence Smart Office Training Remote Worker Spam Flash Company Culture Software Email Business How To Cloud User Error Advertising IT Plan Hosted Computing Tip of the Week Voice over Internet Protocol Millennials OneNote IBM HIPAA Cleaning Workplace Tips Addiction Technology Credit Cards Website Solid State Drive Microsoft Office Windows 7 Managed IT Services Data Breach NIST Encryption Mobile Device Management Communications Server Private Cloud Network Security Business Computing Password Tools Business Intelligence Save Money Cybersecurity Redundancy Data Electronic Medical Records Computer Network Google Samsung Operating System Saving Money Sports Automation Ransomware Computer Care App Comparison Word Virtual Assistant Vulnerability Virtualization Law Enforcement Identity Theft Chrome Miscellaneous Big Data Security Windows Managed IT Services Specifications Cortana Connectivity Camera Smartphones Data Storage HBO Nanotechnology Start Menu Paperless Office Microsoft Telephone System Hosted Solutions Managing Stress Malware Social Media Information Evernote Settings Content Management Two-factor Authentication Data Protection IT Support Google Docs File Sharing Productivity Hardware Network Congestion User Tips Business Continuity Scam Smart Tech Emails Flexibility FCC Data Recovery Budget Spam Blocking Productivity Small Business Infrastructure

Newsletter Sign Up