094 90 48200     Get SUPPORT

Aniar IT Services Blog

2 minutes reading time (323 words)

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Aniar IT Services can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 094 90 48200 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Privacy Google Best Practices Email Microsoft Business Computing Cloud Tech Term Android How To Internet VoIP Network Security Small Business Hackers User Tips Cloud Computing Data Backup Hardware Artificial Intelligence Chrome Malware Cybersecurity Smartphone Internet of Things Communication Software Collaboration Browser Innovation Managed IT Services Cybercrime Backup Data Recovery Computers Mobile Device Management Two-factor Authentication Windows Efficiency Data Communications Connectivity Vulnerability Business Management Word Office 365 Windows 10 Ransomware Saving Money Smartphones Business Data Security Money Data Protection Spam Unsupported Software Data Storage Managed IT BDR Mobile Devices Business Intelligence Update Identity Theft Outsourced IT Spam Blocking Network Business Continuity Passwords Windows 7 Apps Bring Your Own Device Managed IT services Operating System IT Management CES Redundancy App Telephone Systems Social Engineering Infrastructure BYOD Avoiding Downtime Content Management IT Services Website Phishing VPN Comparison Facebook IT Plan Upgrade Remote Monitoring Router OneNote Law Enforcement Virtualization Wireless Charging Inventory Public Cloud HIPAA USB Telephony Trending Criminal HaaS Entertainment Scam Holiday Business Mangement Smart Tech Wi-Fi Computer Fan Windows Server 2008 Digital Signature Server Data loss Google Apps Mobile Device Software Tips HBO Electronic Medical Records Computer Wire Hosted Solutions Botnet Telecommuting Addiction Machine Learning Online Shopping Productivity Disaster Recovery Gmail FENG Computer Care Credit Cards PDF Cortana Alert Workers Access Control Outlook Government Data Management Sports Skype Cleaning Travel Remote Work The Internet of Things Applications YouTube Voice over Internet Protocol Evernote Tools Work/Life Balance Recycling Devices Microsoft Office Patch Management Smart Office Fraud Gadgets Encryption IT Support Authentication Solid State Drive Frequently Asked Questions Recovery Human Resources Meetings Start Menu Keyboard Practices Windows 10s Google Drive Big Data Cache Downtime Sync Multi-Factor Security Millennials eWaste Thought Leadership Document Management Amazon Screen Mirroring Password Bandwidth Audit Physical Security Excel Staff Employer-Employee Relationship Charger Hosted Computing Private Cloud Blockchain Wireless Internet Root Cause Analysis Cast Value Workforce Legal Automation Flash Paperless Office Google Docs Amazon Web Services Social Media Accountants Settings Specifications Password Manager Nanotechnology Tip of the week Windows 10 Hard Drives Servers Public Speaking Twitter Search Presentation Lithium-ion battery HVAC Augmented Reality CrashOverride Emergency Wireless Technology 5G Tech Support Safety IBM Workplace Tips Hacker Productivity Managed Service Provider Marketing Budget Competition Customer Relationship Management Hiring/Firing IP Address Company Culture Fun WiFi Users Miscellaneous Customer Service Mobile Office Managing Stress Domains Wireless