253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Graemouse Technologies can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 253.777.0763 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Best Practices Innovation Mobile Device Infrastructure Communications Office Nanotechnology Malware FCC Apps Phishing Telecommuting Tip of the Week Audit Computer Document Management Data Recovery Disaster Recovery Net Neutrality Saving Money Data Protection Redundancy Samsung Data OneNote Productivity Automation PDF Accountants Recycling Cybersecurity Social Engineering Employer-Employee Relationship Tools Machine Learning BYOD BDR Virtualization Paperless Office Website Gadgets Work/Life Balance IT Support Business Computing Microsoft Office IT Management Internet of Things Screen Mirroring Big Data Supercomputer Wireless Charging Android Evernote Collaboration Smart Tech Business Intelligence Update Windows 10 Value Email Computer Fan Title II Health Law Enforcement Data Breach Business Telephone Systems Spam Network Security Marketing Current Events Operating System Alert Small Business Cortana Scam Ransomware Security Workforce Network Congestion Start Menu Data Management Managed Service Provider Digital Signature Data Backup Software Tip of the week VoIP Keyboard Identity Theft Data Security Frequently Asked Questions User Tips IT Plan Cloud Computing Router Privacy Skype Government Browser Managed IT Services Google Docs Office 365 Upgrade Legal Chrome Spam Blocking Tech Term HBO Criminal Artificial Intelligence Passwords Voice over Internet Protocol Vulnerability Business Management Microsoft Hosted Solutions App Business Continuity Devices Hybrid Cloud Unsupported Software Gmail Facebook Recovery Knowledge Google USB Internet Google Apps Content Management Cloud Communication Files Encryption Windows 7 Server Windows 10 Thought Leadership Managed IT Services Word Online Shopping Hackers Twitter Solid State Drive Managed IT IT Consultant Settings Mobile Device Management Remote Monitoring Two-factor Authentication Mobile Devices IBM Hardware Wi-Fi Money Multi-Factor Security Comparison Netflix Technology Cybercrime VPN CES Google Drive Bring Your Own Device Cast FENG Connectivity Smartphones Outlook Computers IT Services Efficiency Private Cloud Windows Windows Server 2008 User Error History Smart Office Miscellaneous YouTube Smartphone Relocation Sports Data loss Excel Outsourced IT Bandwidth Network Public Cloud Data Storage Computer Care Online Amazon Web Services Avoiding Downtime Social Media eWaste Backup How To Telephony

Newsletter Sign Up