(707) 268-8850    Get SUPPORT

Network Management Services Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Network Management Services can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (707) 268-8850 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Mobile Devices VoIP Hosted Solutions Email Google Tech Term Data Data Recovery Outsourced IT IT Support Microsoft Internet of Things Software IT Services Cloud Computing Saving Money Internet BDR Business Continuity Efficiency Hardware Communications Communication Small Business Cybercrime Smartphones Business Cybersecurity Ransomware Disaster Recovery Android Artificial Intelligence User Tips Server Alert Smartphone Managed IT Services Windows Gadgets Browser Avoiding Downtime Save Money How To Managed IT Network Computers Money Computer Data Security Data Protection Windows 10 Business Management Passwords Collaboration Productivity Vulnerability Router Social Engineering Chrome Law Enforcement BYOD Firewall Phishing Applications Miscellaneous Social Media Mobile Device Management Workplace Tips Two-factor Authentication Business Intelligence Mobility VPN IT Support Redundancy Managed Service Provider Document Management Private Cloud Compliance Budget Identity Theft Facebook Office 365 Remote Monitoring Blockchain Upgrade Word Operating System Productivity Virtualization Bandwidth Spam Flexibility Telephone Systems Proactive IT Connectivity Bring Your Own Device Information Password Sports File Sharing Business Owner Unified Threat Management Physical Security Information Technology Automation Apps Government Managed Service Data loss Work/Life Balance CES Comparison OneNote Encryption Google Drive Microsoft Office IT Management Training Workers Windows 7 Access Control Content Management Paperless Office Smart Tech Big Data Virtual Assistant Quick Tips Settings Public Cloud Website Employer-Employee Relationship IT Plan Data Breach Update Credit Cards Content Filtering Office Tips Data storage Mobile Device Analysis Unsupported Software Servers Data Storage Windows 10 App Value Solid State Drive Infrastructure Mobile Computing Hacking Wi-Fi Spam Blocking Networking Holiday Tip of the week Telecommuting Amazon Hosted Computing Meetings Travel Data Management Criminal Keyboard Office Augmented Reality Mobile Password Manager IT Consultant Cortana Digital Signature Machine Learning Advertising Wireless Technology Enterprise Content Management Windows 10s Cables Devices Supercomputer Remote Worker Data Warehousing Voice over Internet Protocol User Error Safety Windows Server 2008 Remote Work Hosted Solution Amazon Web Services Inventory Emergency IBM Smart Office HBO IoT SaaS Relocation The Internet of Things Business Technology Professional Services Business Mangement Addiction Leadership Colocation Marketing Hacker YouTube Cleaning Netflix Password Management Sync Education Unified Communications Thought Leadership Hiring/Firing Health Wiring Multi-Factor Security Legal Risk Management Recovery Online Shopping Patch Management Screen Mirroring Software as a Service Outlook Specifications Humor CrashOverride Tools Save Time Gmail Cache Computing Infrastructure Strategy Computer Care NIST Audit Telephony Theft Streaming Media Current Events Files Camera Trending Reputation Internet Exlporer Regulations Evernote Authentication Scam Apple Cast HaaS Students Frequently Asked Questions Millennials Insurance Telephone System Downtime Recycling Wireless Internet webinar HIPAA Samsung Hybrid Cloud Cryptocurrency Computer Fan Skype Google Apps Content Filter Knowledge Lifestyle Healthcare Charger Emails Customer End of Support Wireless Charging Nanotechnology Hard Drives iPhone Entertainment Human Resources History Excel Workforce USB Fraud Practices Root Cause Analysis Botnet eWaste Wire Conferencing Monitor Accountants Safe Mode FENG Start Menu Storage Electronic Medical Records Network Congestion Software Tips Staff Electronic Health Records Internet exploMicrosoft HVAC Flash PDF Black Market Fiber-Optic MSP Google Docs Lithium-ion battery Instant Messaging Troubleshooting Public Computer Worker Video Games Loyalty Twitter IT solutions 5G Battery Smart Technology Tech Support How to Techology Rootkit Remote Computing Experience Employer Employee Relationship Competition Customer Relationship Management Proactive Content Scalability Music Fun Computer Accessories IP Address Company Culture Two Factor Authentication Users Best Practice Politics Vendor Management Shadow IT Customer Service Remote Monitoring and Maintenance Audiobook Mobile Office Wearable Technology Assessment Bluetooth Administration Managing Stress Domains Virtual Reality Printers Wireless Transportation Line of Business WiFi Books Television Search Regulation Automobile Public Speaking Worker Commute Webinar Presentation Benefits