fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Graemouse Technologies can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 253.777.0763 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, March 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

CES Machine Learning Saving Money Flash Server Password Manager Help Desk Sports Outsourced IT Net Neutrality Servers Leadership User Error Fraud Criminal Wire Update Comparison Passwords Google Drive Thought Leadership Small Business Smartphones Vulnerability Communication VPN Holiday Data Breach Private Cloud Paperless Office Word Save Money Telephone Systems Google Search Email Hackers Telephone System Computers Managed IT Ransomware Office 365 Meetings BYOD Mouse Windows 10 Audit Collaboration Applications Android Electronic Medical Records Hardware Cloud Computing Windows 7 Quick Tips Password Management Online Computer Care IT Services Chrome Automation Mobile Device Google Docs IT Support Tech Term Data Storage IT Plan Wi-Fi Mobility Data Recovery Business Intelligence Internet of Things Government App Unsupported Software Security Cameras Windows Cortana Phishing Wireless Charging Data Protection Upgrade Malware Windows 10 How To Employer-Employee Relationship Software as a Service Scam Authentication Productivity Computer Social Media Business Continuity YouTube Health Google Twitter Data Security Human Resources Network Security Backup Microsoft Training Software Internet Browser Cybercrime Tools Operating System Tip of the Week Enterprise Content Management Smartphone OneNote Screen Mirroring Mobile Computing Samsung Accountants Settings Networking Identity Theft Downtime Law Enforcement Spam Blocking Information Microsoft Office Cloud Augmented Reality Apps Managed IT Services Camera Remote Monitoring Credit Cards Virtualization Mobile Devices Data loss Access Control Network Managed IT Services Managed Service Spam Infrastructure Artificial Intelligence Website Two-factor Authentication Data IT Management Workplace Tips Botnet Privacy Miscellaneous Communications Password Encryption Telephony Bandwidth Cybersecurity Blockchain Administrator Content Management Mobile Device Management Business Mangement MSP Bring Your Own Device Business Computing Hosted Solutions Avoiding Downtime Proactive IT Cryptocurrency Business Management Router Connectivity Technology Title II User Tips Public Cloud Disaster Recovery Outlook Entertainment BDR Security VoIP Efficiency Data Backup Social Engineering Office Gadgets Solid State Drive Voice over Internet Protocol Facebook Innovation Alert Money Managed Service Provider Best Practices Business IT Consultant Virtual Assistant Redundancy Keyboard HBO Supercomputer

Newsletter Sign Up