094 90 48200     Get SUPPORT

Aniar IT Services Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Aniar IT Services can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 094 90 48200 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 25 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Cloud Business Computing Email Microsoft Hackers Innovation Network Security Data Backup Malware Hardware Mobile Devices Internet VoIP Data Android Data Recovery Cloud Computing User Tips Communication Small Business Managed IT Services Artificial Intelligence Internet of Things Backup How To Smartphones Applications Windows Communications Network Collaboration Software IT Services Cybercrime Windows 10 Browser Computers Chrome Cybersecurity Saving Money Smartphone Spam Hosted Solutions Efficiency Workplace Tips Mobile Device Management Vulnerability Two-factor Authentication Business Management Passwords IT Support Word Data Protection Ransomware Gadgets Facebook Router Money Data Security Office 365 BDR Connectivity Outsourced IT Business CES Business Continuity Encryption Windows 7 Spam Blocking Managed IT services Infrastructure Content Management Bring Your Own Device Redundancy Operating System IT Management Computer Information VPN Telephone Systems Virtual Assistant Social Engineering App Password Blockchain BYOD Avoiding Downtime Managed Service Apps Phishing Save Money Comparison Paperless Office Microsoft Office IT Plan Remote Monitoring Law Enforcement Identity Theft OneNote Settings Virtualization Website Unsupported Software Managed IT Miscellaneous Upgrade Business Intelligence Update Data Storage Sports Social Media Server Software Tips Botnet Training Telecommuting Evernote Cleaning Disaster Recovery Fraud YouTube Computer Care Recycling Devices Skype Safe Mode Human Resources FENG Outlook Smart Office Government Authentication Cortana Alert Cache Travel Remote Worker Remote Work Keyboard Practices Wi-Fi Networking Voice over Internet Protocol Tools Work/Life Balance Amazon Patch Management eWaste Thought Leadership Start Menu Augmented Reality Staff Frequently Asked Questions Document Management Recovery Camera Bandwidth Wireless Internet Solid State Drive Wiring Charger Hosted Computing Meetings Sync Enterprise Content Management Multi-Factor Security Automation Windows 10s Google Drive Millennials Amazon Web Services Accountants Downtime Legal The Internet of Things Excel Password Manager Nanotechnology Screen Mirroring HIPAA USB Audit Physical Security Firewall Wireless Charging Inventory Employer-Employee Relationship Password Management Criminal Private Cloud Value MSP Workforce Holiday Root Cause Analysis Flash Servers Google Docs Big Data Telephone System Specifications Digital Signature Tip of the week Entertainment Business Mangement Smart Tech Cast Electronic Medical Records Wire Unified Threat Management Google Apps Mobile Device Telephony NIST Trending Addiction Public Cloud File Sharing Online Shopping Productivity HaaS HVAC Scam Credit Cards PDF Windows Server 2008 Machine Learning Gmail Cryptocurrency Data Management Computer Fan HBO Mobile Computing Workers Access Control Data loss Wireless Windows 10 Emergency Regulation CrashOverride Public Speaking Quick Tips Presentation Managed Service Provider Lithium-ion battery Company Culture Tech Support Hiring/Firing Wireless Technology 5G IBM Safety Managing Stress WiFi Productivity Fun Marketing Hacker Printers Budget Twitter Customer Relationship Management Competition IP Address Users Customer Service Hard Drives Compliance Search Mobile Office Domains