(707) 268-8850    Get SUPPORT

Network Management Services Blog

Network Management Services has been serving the Eureka area since 1995, providing IT Support including technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Network Management Services can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (707) 268-8850 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 25 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Managed IT Services Privacy Backup Malware Hackers Google VoIP Hosted Solutions Email Data Backup Outsourced IT IT Support Mobile Devices Data Recovery Microsoft Software Saving Money Business Continuity Cloud Computing Innovation Internet Internet of Things Data Ransomware Small Business Business Cybercrime Efficiency Communications Cybersecurity Hardware Disaster Recovery BDR Tech Term Android IT Services How To Smartphones Managed IT Smartphone Computers Browser User Tips Avoiding Downtime Server Communication Alert Artificial Intelligence Business Intelligence Law Enforcement Mobile Device Management Two-factor Authentication Collaboration Managed IT Services Money Router BYOD Data Protection Social Engineering Data Security Vulnerability Business Management Mobility Windows Chrome Phishing Office 365 Remote Monitoring Private Cloud Windows 10 Bandwidth Spam Save Money Identity Theft Operating System Compliance Word Budget Firewall Gadgets Productivity Upgrade Virtualization Redundancy Social Media Proactive IT Telephone Systems Connectivity Flexibility Computer Network Passwords Managed Service Provider VPN Document Management Website Google Drive Data storage Facebook CES Spam Blocking Value Public Cloud OneNote Networking Office Tips Holiday IT Management Content Management Mobile Device Windows 7 App IT Plan Credit Cards Apps Productivity Unsupported Software Workers Information Technology Servers Infrastructure Automation Big Data Employer-Employee Relationship Content Filtering Analysis Miscellaneous Data loss Comparison Windows 10 Bring Your Own Device Wi-Fi Solid State Drive Update Work/Life Balance Hacking Business Owner Data Storage Smart Tech Physical Security Quick Tips Data Breach Government Google Docs Colocation Insurance webinar Criminal Legal Recovery Samsung Telecommuting Tip of the week Content Filter Human Resources Save Time Cables Mobile Healthcare Voice over Internet Protocol Computing Infrastructure Entertainment Data Warehousing Practices Conferencing Hard Drives Remote Work USB Windows Server 2008 Storage Staff Monitor Unified Communications Professional Services Apple Electronic Health Records Multi-Factor Security Hosted Computing IT Support Windows 10s Hybrid Cloud Digital Signature Supercomputer Theft Tools iPhone Machine Learning Trending History Inventory Blockchain Black Market SaaS PDF Hosted Solution Regulations Addiction Downtime Encryption Google Apps Password Safety YouTube Training Lifestyle The Internet of Things Risk Management Access Control Hiring/Firing Fraud Office Cache Root Cause Analysis Strategy Current Events Botnet Mobile Computing User Error Software Tips Authentication Education Amazon Flash Relocation Wireless Internet Meetings Knowledge Password Manager Travel Health Charger HIPAA Nanotechnology Emails Applications Amazon Web Services Humor Wire HVAC Accountants Network Congestion Business Mangement HaaS Electronic Medical Records Files Internet Exlporer HBO Reputation Online Shopping Sync Sports Data Management Screen Mirroring IT Consultant Gmail Software as a Service Workplace Tips Unified Threat Management Specifications End of Support Keyboard Outlook Customer Devices Cortana Evernote Emergency Telephony Smart Office Audit Wireless Technology Cast IoT Leadership Recycling Cleaning Millennials Internet exploMicrosoft IBM Frequently Asked Questions Thought Leadership Netflix Computer Fan Wireless Charging Hacker Patch Management Skype Paperless Office Marketing eWaste Microsoft Office Computer Care Workforce Advertising Excel Streaming Media Settings FENG Fiber-Optic Scam Start Menu Students Audiobook Bluetooth Customer Service Wearable Technology Mobile Office Transportation Domains Best Practice Shadow IT Benefits Worker Administration Public Speaking Loyalty Troubleshooting Twitter CrashOverride Lithium-ion battery Smart Technology Rootkit Augmented Reality Tech Support Video Games Battery Competition Techology Two Factor Authentication Company Culture Fun Vendor Management Politics Remote Computing Assessment Users Managing Stress Scalability Television Books Automobile Wireless Search Webinar Virtual Reality Public Computer Enterprise Content Management Presentation IT solutions Worker Commute Password Management 5G Employer Employee Relationship Instant Messaging Experience WiFi NIST Content Computer Accessories How to Customer Relationship Management Music IP Address

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *