094 90 48200     Get SUPPORT

Aniar IT Services Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Aniar IT Services can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 094 90 48200 to get started.

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘P...
Why Your IT Toolkit Should Include a VPN
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Data Backup User Tips Data Recovery Cloud Business Computing Email Microsoft Hackers Innovation Network Security Hardware Data Cloud Computing Malware Internet VoIP Managed IT Services Browser Workplace Tips Hosted Solutions Business Mobile Devices Android Communication Windows 10 Small Business Internet of Things Chrome How To Artificial Intelligence Backup Smartphones Network Smartphone Communications IT Support IT Services Software Word Cybercrime Applications Computers Office 365 Efficiency Windows BDR Saving Money Information Cybersecurity Outsourced IT Spam Collaboration Business Continuity Business Management Computer Facebook Productivity Connectivity Ransomware Gadgets Router Data Security Money Miscellaneous Server Mobile Device Management Vulnerability Managed Service Data Protection Two-factor Authentication Passwords Mobile Device Social Engineering Telephone System Apps Avoiding Downtime Remote Monitoring Phishing IT Plan OneNote Microsoft Office Settings Sports Comparison Virtualization CES Google Docs Software as a Service Unsupported Software Fraud Encryption Infrastructure Website Data Storage Human Resources Law Enforcement Content Management Telephony Keyboard Scam Upgrade VPN Managed IT Password Update Spam Blocking Business Intelligence Social Media Blockchain Virtual Assistant Bring Your Own Device Windows 7 Operating System IT Management Paperless Office Managed IT services Save Money App Redundancy Voice over Internet Protocol BYOD Holiday Telephone Systems Google Drive Identity Theft Google Apps Frequently Asked Questions Recovery Entertainment Warranty Screen Mirroring Electronic Medical Records Wire Start Menu Unified Threat Management Employer-Employee Relationship Addiction Sync Multi-Factor Security NIST Audit Physical Security Online Shopping File Sharing Root Cause Analysis Gmail WiFi The Internet of Things HVAC Help Desk Private Cloud Credit Cards PDF Millennials Workers Access Control Excel Machine Learning Printer Cast Data Management Mobile Computing Cryptocurrency Evernote Cleaning Training Recycling Devices Flash Big Data Public Cloud Value Workforce Authentication Tip of the week YouTube Mouse Specifications Smart Office Data loss Cache Trending Safe Mode Computer Fan Practices Remote Worker eWaste Thought Leadership HaaS Networking Shortcuts Software Tips Amazon Bandwidth Windows Server 2008 Microchip Staff Charger Hosted Computing HBO Document Management Camera Cortana Alert Wireless Internet FENG Wiring Legal Automation Enterprise Content Management Amazon Web Services Accountants Botnet Telecommuting Password Manager Nanotechnology Computer Care Search Engine Disaster Recovery Wireless Charging Inventory Outlook Government Wi-Fi HIPAA USB Skype Firewall Meetings Criminal Password Management Solid State Drive Travel Remote Work MSP Downtime Business Mangement Smart Tech Patch Management Augmented Reality Servers Bing Windows 10s Digital Signature Tools Work/Life Balance Wireless Technology 5G Tech Support Fun Safety IBM Productivity Marketing Hacker Budget Compliance Competition Customer Relationship Management Hard Drives IP Address Search Users Regulation Quick Tips Customer Service Mobile Office CrashOverride Domains Company Culture Wireless Windows 10 Mobility Managed Service Provider Public Speaking Managing Stress Emergency Presentation Printers Lithium-ion battery Hiring/Firing Twitter