094 90 48200     Get SUPPORT

Aniar IT Services Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Aniar IT Services can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 094 90 48200 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Google User Tips Tech Term Cloud Email Data Backup Microsoft Data Data Recovery Productivity Innovation Network Security Hosted Solutions Mobile Devices Hackers Cloud Computing Malware Workplace Tips Hardware Internet VoIP Communication IT Services Windows 10 Smartphone Communications IT Support Android Managed IT Services Browser Internet of Things Backup Artificial Intelligence Business Smartphones Efficiency Network Business Management Small Business Software Router Chrome How To Cybersecurity Windows Information Computer Collaboration Word Gadgets Cybercrime Mobile Device Office 365 Computers Applications Saving Money BDR Server Spam Outsourced IT Business Continuity Two-factor Authentication Vulnerability Passwords Managed Service Data Protection Paperless Office Holiday Phishing Ransomware Facebook Connectivity Settings Data Security Money Miscellaneous Encryption Mobile Device Management Disaster Recovery Windows 7 Wi-Fi Password Virtual Assistant Managed IT services Blockchain Bring Your Own Device Augmented Reality Automation Operating System IT Management Redundancy Voice over Internet Protocol App Telephone Systems Save Money Social Engineering BYOD Apps Meetings Google Drive Avoiding Downtime Identity Theft Microsoft Office Telephone System Comparison Private Cloud IT Plan Remote Monitoring OneNote Google Docs Website Law Enforcement Sports Machine Learning Access Control Virtualization Telephony Upgrade CES Unsupported Software Cryptocurrency Data Storage Managed IT Social Media Fraud Software as a Service Scam Business Intelligence Human Resources Update Infrastructure Content Management Keyboard Spam Blocking Botnet VPN Bandwidth Cortana Alert Save Time Staff FENG Microchip Computer Care Smartwatch Skype Wireless Internet Document Management Camera Outlook Government Charger Hosted Computing Legal Wiring Business Technology Travel Remote Work Amazon Web Services Accountants Enterprise Content Management Mobility Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Search Engine Patch Management Health Start Menu HIPAA USB Solid State Drive Frequently Asked Questions Recovery Wireless Charging Inventory Multi-Factor Security The Internet of Things Criminal Windows 10s Firewall Hacker Downtime Password Management Social Sync Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Millennials Digital Signature Servers Bing WiFi Employee Electronic Medical Records Wire Audit Physical Security Entertainment Warranty Excel Google Apps Employer-Employee Relationship Big Data Addiction Unified Threat Management Online Shopping Root Cause Analysis NIST Vendor Gmail Cast File Sharing ISP Value Workforce Credit Cards PDF HVAC Help Desk Flash Digital Signage Specifications Data Management Printer Tip of the week Workers Display Trending Public Cloud Mobile Computing Evernote Cleaning Recycling Devices Training Cryptomining HaaS Data loss Google Search Computer Fan YouTube Mouse Windows Server 2008 Authentication Safe Mode Security Cameras Cache Software Tips Smart Office Quick Tips HBO Practices eWaste Thought Leadership Remote Worker Database Telecommuting Amazon Networking Shortcuts Emergency Company Culture Presentation Lithium-ion battery Managed Service Provider Tech Support Managing Stress Wireless Technology 5G IBM Printers Safety Hiring/Firing Productivity Twitter Marketing Budget Fun Customer Relationship Management Competition IP Address Users Compliance Customer Service Mobile Office Hard Drives Search Domains Regulation Wireless Windows 10 CrashOverride Public Speaking