Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Indevtech can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (808) 529-4605 to get started.

Sign Up For Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *

      Request a Consultation

      Request a
      Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for you!

      Contact Us!

      Free Consultation
       

      Tag Cloud

      Tip of the Week Security Privacy Technology Best Practices Cloud Business Computing Hackers Google Backup Software Malware Microsoft Windows 10 Internet Network Security Email Smartphones Hosted Solutions Browser Productivity Innovation Efficiency Mobile Devices Business Disaster Recovery Ransomware Data Cybercrime Computer Business Continuity Android Hardware VoIP User Tips Smartphone Office Business Management Alert Miscellaneous Automation Windows Managed IT Services Computers Upgrade Telephone Systems communications Chrome Outsourced IT Law Enforcement Collaboration Productivity Tech Term Virtualization IT Services Small Business Money Quick Tips Cloud Computing Data Backup Internet of Things App How To Cybersecurity Social Engineering Office Tips Router Save Money Social Media Facebook Server Workplace Tips Artificial Intelligence Health Network Password History Communication Remote Computing Data Recovery Managed IT Services Spam Two-factor Authentication Bring Your Own Device Work/Life Balance Mobile Device Management Wi-Fi Passwords Office 365 Bandwidth Gmail Operating System Marketing Data Security Private Cloud Networking HaaS Vulnerability Data Breach Application Data Protection Connectivity Flexibility Phishing Entertainment Word Managed Service Provider Apps Hacking Windows 10 Data Management VPN Recovery Safety Holiday Google Drive Settings BYOD The Internet of Things Scam Avoiding Downtime DDoS Comparison Applications Black Market Spam Blocking Retail Encryption Keyboard CES Remote Monitoring Government Cleaning Business Intelligence Public Cloud Downtime IT Support Content Management Update Employer-Employee Relationship Meetings Data storage eWaste PDF USB Data Storage Internet Exlporer Microsoft Office Best Practice Mouse Robot IT Management User Error Mobility BDR Big Data Electronic Medical Records Website IT Plan Sports Wearable Technology Charger Identity Theft Windows 7 Managed IT Legal Budget Infrastructure Battery Unsupported Software Mobile Device Physical Security OneNote Gadgets Hiring/Firing End of Support YouTube Redundancy Patch Management Netflix Employer Employee Relationship Fax Server Trending Computing Infrastructure Internet exploMicrosoft Access Control Lithium-ion battery Assessment Amazon Risk Management Sync Scalability Wire Relocation Root Cause Analysis IT Consultant Recycling IT Support Computer Accessories Mobile Computing Advertising NarrowBand Authentication Television Amazon Web Services Politics Techology Transportation Instant Messaging Smart Office Humor Uninterrupted Power Supply Samsung Criminal People Distributed Denial of Service Bluetooth Specifications Users HBO Wireless Technology Nanotechnology Windows 10s Public Computer Online Shopping Telephony Benefits Social Document Management Data loss Leadership Mobile Office Biometrics Virtual Reality Programming Outlook Chromecast Skype Smart Tech Notifications Evernote Experience Firewall Paperless Office Screen Mirroring Tech Support Worker Millennials Worker Commute Hybrid Cloud Frequently Asked Questions Start Menu Solid State Drive Automobile Wireless Charging Music Blockchain Smart Technology Social Networking Computer Care Search Machine Learning Apple Cast Shadow IT Streaming Media Rootkit Workforce Excel Digital Signature Tools Devices Monitor Audit IBM IT solutions Cortana HIPAA Two Factor Authentication How to iPhone webinar Environment Training Telecommuting Information Technology Tip of the week Accountants Thought Leadership Reputation Computer Fan Supercomputer Google Apps Troubleshooting Human Resources Google Docs Conferencing Going Green Vendor Management Maintenance Remote Work Windows Server 2008 Value Customers FENG Workers Staff Servers Files Emails Laptop Content Wireless Practices Addiction Current Events Books Save Time Customer Relationship Management Voice over Internet Protocol HVAC Hosted Computing Touchpad SaaS Credit Cards Audiobook Flash Botnet Cache Knowledge Password Manager Emergency Customer Service Multi-Factor Security Education Saving Money Software Tips Inventory Running Cable Shortcut Fraud Travel Video Games Wireless Internet Network Congestion Business Mangement Password Management NIST WiFi Company Culture Managing Stress Thank You Twitter Congratulations Webinar Enterprise Content Management IT solutions CrashOverride
      QR-Code