(707) 268-8850    Get SUPPORT

Network Management Services Blog

Network Management Services has been serving the Eureka area since 1995, providing IT Support including technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Network Management Services can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (707) 268-8850 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Cloud Technology Best Practices Business Computing Network Security Privacy Managed IT Services Hackers Backup VoIP Malware Google Email Data Backup Outsourced IT Software IT Support Mobile Devices Business Continuity Innovation Microsoft Hosted Solutions Small Business Business Saving Money Efficiency Cloud Computing Hardware Communications Data Recovery Disaster Recovery Server Ransomware Avoiding Downtime How To Cybercrime Cybersecurity Smartphones Alert Android BDR Data Browser User Tips Managed IT Internet Computers Internet of Things Communication Chrome Phishing Windows BYOD Social Engineering IT Services Data Security Mobile Device Management Mobility Managed IT Services Two-factor Authentication Vulnerability Firewall Artificial Intelligence Smartphone Gadgets Private Cloud Budget Law Enforcement Save Money Business Intelligence Proactive IT Social Media Telephone Systems Operating System Windows 10 Business Management Money Passwords Remote Monitoring Flexibility Data Protection Spam Collaboration VPN Compliance Workers Physical Security Government Apps Document Management Update Google Drive Content Filtering Productivity Data Storage Public Cloud Employer-Employee Relationship Miscellaneous Office Tips Upgrade Virtualization Bring Your Own Device App CES Windows 10 Wi-Fi OneNote Work/Life Balance Computer IT Management Information Technology Identity Theft Managed Service Provider IT Plan Router Credit Cards Data Breach Word Unsupported Software Quick Tips Office 365 Bandwidth Value Data storage Spam Blocking Holiday Redundancy Solid State Drive Network Comparison Hacking Business Owner Risk Management Advertising Specifications Training Outlook Safety Telephony Audit Evernote Legal Recycling Colocation Productivity Current Events The Internet of Things Cast Recovery Hiring/Firing Millennials Frequently Asked Questions Wireless Charging Skype Computer Fan Save Time Facebook eWaste Computing Infrastructure Knowledge Big Data Excel HIPAA Emails Workforce Charger Fiber-Optic Apple Start Menu FENG Mobile Device Criminal Network Congestion Google Docs Electronic Medical Records Tip of the week Hybrid Cloud Telecommuting Cables iPhone Mobile Human Resources Data Management History IT Consultant Voice over Internet Protocol Data Warehousing Unified Threat Management Windows Server 2008 Keyboard Black Market PDF Remote Work Unified Communications Professional Services Emergency Staff Password Content Management Leadership Multi-Factor Security Windows 7 Cortana Netflix Office Theft Automation Tools Wireless Technology Patch Management Digital Signature Blockchain User Error Trending IBM Computer Care Regulations Marketing Settings Relocation Hacker Google Apps Health Microsoft Office Scam Downtime Encryption webinar Lifestyle Samsung Servers Fraud Humor Infrastructure Files Botnet Website Root Cause Analysis HaaS Internet Exlporer Conferencing Mobile Computing Reputation Software Tips Flash Amazon Password Manager Networking Travel Meetings End of Support Hard Drives IT Support Customer Monitor Windows 10s Amazon Web Services Business Mangement Supercomputer Data loss Accountants Internet exploMicrosoft HBO SaaS Sync Hosted Solution Online Shopping Gmail Software as a Service Screen Mirroring How to Tech Support Two Factor Authentication Politics Vendor Management Assessment Competition Best Practice Fun WiFi Users Shadow IT Television Books Administration Automobile Webinar Wireless Public Computer Search IT solutions Presentation Video Games Employer Employee Relationship Cleaning Experience Battery 5G CrashOverride Techology Content Remote Computing Computer Accessories Music Education Audiobook Scalability Customer Relationship Management Bluetooth Wearable Technology Applications IP Address Transportation Strategy Entertainment Customer Service USB Virtual Reality Mobile Office Domains Benefits Analysis Workplace Tips Worker Loyalty Troubleshooting Worker Commute Public Speaking Smart Technology Instant Messaging Rootkit Lithium-ion battery Augmented Reality

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *