(707) 268-8850    Get SUPPORT

Network Management Services Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Network Management Services can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (707) 268-8850 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup VoIP Hosted Solutions Google Mobile Devices Email Outsourced IT Data Recovery IT Support Data Tech Term Cloud Computing Saving Money Microsoft Software Internet of Things Business Continuity Efficiency Hardware Internet Communications BDR IT Services Cybercrime Business Cybersecurity Ransomware Small Business User Tips Smartphones Communication Disaster Recovery Android Artificial Intelligence Avoiding Downtime Save Money How To Managed IT Network Server Computers Alert Managed IT Services Smartphone Windows Gadgets Browser Phishing Firewall Miscellaneous Applications Social Media Mobile Device Management Two-factor Authentication Business Intelligence Mobility Passwords Money Business Management Data Security Data Protection Windows 10 Collaboration Productivity Vulnerability Router BYOD Social Engineering Chrome Law Enforcement Office 365 Identity Theft Facebook Blockchain Upgrade Remote Monitoring Word Virtualization Operating System Spam Productivity Flexibility Bandwidth Workplace Tips Telephone Systems Proactive IT Computer Connectivity IT Support VPN Redundancy Managed Service Provider Document Management Budget Private Cloud Compliance Quick Tips Website Smart Tech Virtual Assistant Employer-Employee Relationship IT Plan Settings Public Cloud Update Data Breach Data storage Credit Cards Content Filtering Office Tips Unsupported Software Mobile Device Analysis Data Storage Servers Windows 10 App Mobile Computing Wi-Fi Value Solid State Drive Infrastructure Holiday Hacking Spam Blocking Networking Sports Bring Your Own Device Information Password File Sharing Business Owner Apps Unified Threat Management Physical Security Information Technology Automation Work/Life Balance CES Government Managed Service Data loss Comparison Microsoft Office OneNote IT Management Encryption Google Drive Content Management Paperless Office Training Workers Windows 7 Big Data Access Control Gmail Cache Computing Infrastructure Outlook Specifications Humor CrashOverride Tools Save Time Files Trending Strategy Computer Care NIST Audit Telephony Theft Streaming Media Current Events HaaS Students Reputation Internet Exlporer Regulations Evernote Authentication Scam Apple Cast Recycling Wireless Internet webinar Frequently Asked Questions Millennials Insurance Telephone System Downtime Lifestyle HIPAA Samsung Hybrid Cloud Cryptocurrency Computer Fan Skype Google Apps Content Filter Knowledge Entertainment Human Resources Healthcare Charger Emails Customer End of Support Wireless Charging Nanotechnology Hard Drives iPhone eWaste Wire Conferencing Monitor History Excel Workforce USB Fraud Practices Root Cause Analysis Botnet Network Congestion Software Tips Accountants Safe Mode FENG Start Menu Storage Electronic Medical Records Google Docs Staff Electronic Health Records Internet exploMicrosoft HVAC Flash PDF Black Market Fiber-Optic MSP Criminal Tip of the week Telecommuting Augmented Reality Amazon Hosted Computing Meetings Travel Data Management IT Consultant Cortana Keyboard Wireless Technology Office Mobile Password Manager Remote Worker Data Warehousing Voice over Internet Protocol Safety Digital Signature Machine Learning Advertising Enterprise Content Management Windows 10s IBM Cables Devices Supercomputer Marketing Hacker Smart Office User Error Windows Server 2008 Remote Work Hosted Solution The Internet of Things Amazon Web Services Inventory Emergency Addiction Leadership Colocation HBO IoT SaaS Relocation Business Technology Professional Services Business Mangement Wiring Multi-Factor Security Legal Risk Management YouTube Cleaning Netflix Password Management Sync Education Unified Communications Thought Leadership Hiring/Firing Health Recovery Online Shopping Patch Management Screen Mirroring Software as a Service Computer Accessories Scalability Music Fun Users Camera Best Practice Politics Company Culture Customer Service Two Factor Authentication Audiobook Mobile Office Vendor Management Shadow IT Remote Monitoring and Maintenance Bluetooth Administration Wearable Technology Domains Assessment Printers Wireless Managing Stress Virtual Reality WiFi Transportation Line of Business Public Speaking Books Television Search Regulation Automobile Presentation Worker Commute Lithium-ion battery Webinar Benefits Worker Instant Messaging Troubleshooting Public Computer Video Games 5G Loyalty Tech Support Twitter IT solutions Battery Smart Technology Rootkit How to Techology Employer Employee Relationship Remote Computing Experience Competition Customer Relationship Management Content IP Address Proactive