Contact us today!
(808) 529-4605

Indevtech Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Indevtech can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (808) 529-4605 to get started.

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Backup Malware Microsoft Software Windows 10 Internet Network Security Innovation Smartphones Hosted Solutions Mobile Devices Email Data Browser Tech Term Productivity Efficiency Hardware VoIP Disaster Recovery Ransomware Business User Tips Business Continuity Cybercrime Android Computer Miscellaneous Alert IT Services Business Management Smartphone Windows Office Automation Save Money Telephone Systems Upgrade Network Cloud Computing communications Data Backup Workplace Tips Outsourced IT Computers Managed IT Services Facebook Money Collaboration Social Media Law Enforcement Small Business Artificial Intelligence Quick Tips Server Chrome Virtualization Productivity Internet of Things Managed IT Services Cybersecurity Social Engineering How To Applications Communication Data Recovery Password Health Office Tips Passwords Router App Remote Computing Bandwidth Bring Your Own Device Gadgets Gmail Operating System Mobile Device Management Wi-Fi Spam Two-factor Authentication Work/Life Balance Windows 10 History Office 365 VPN Hacking Networking Data Breach Flexibility Data Security Safety Word Application Settings Recovery Google Drive Phishing Holiday Entertainment Apps Marketing Microsoft Office IT Support Vulnerability Private Cloud Data Protection Encryption Sports HaaS Connectivity Managed Service Provider Data Management BDR Public Cloud Electronic Medical Records Redundancy Keyboard Blockchain Downtime IT Support Charger BYOD Meetings YouTube Data Storage Physical Security End of Support Firewall Employer-Employee Relationship Data storage Avoiding Downtime Budget Comparison eWaste The Internet of Things IT Management PDF Hiring/Firing Spam Blocking Mobility Internet Exlporer Patch Management Saving Money DDoS IT Plan Website Information Best Practice USB Windows 7 Legal Remote Monitoring Battery CES Scam Business Intelligence Black Market Identity Theft Training User Error Managed IT Unsupported Software Managed Service Infrastructure Paperless Office Update Virtual Assistant Mobile Device Content Management Mobile Computing Wearable Technology Cleaning OneNote Mouse Robot Retail Government Big Data Cast Computer Care Digital Signature Telephone System Emails Notifications Maintenance Video Games Wireless Charging Wireless Internet Public Computer Computing Infrastructure Password Management Benefits Leadership Excel Workforce Unified Threat Management Fraud Devices Content Tech Support Travel Books Current Events Trending MSP Touchpad Access Control Audit Tools How to Business Mangement Social Hybrid Cloud Accountants Save Time Sync Scalability Cortana Wire Experience HIPAA NIST Tip of the week Telecommuting Programming Biometrics Camera Amazon Thought Leadership Audiobook SaaS Running Cable Shadow IT Root Cause Analysis Emergency Knowledge Streaming Media Customer Relationship Management File Sharing Authentication Worker Computer Fan Apple Recycling Google Docs Instant Messaging Google Apps Smart Office Music Automobile Internet exploMicrosoft Users Human Resources Cryptocurrency Smart Technology Lithium-ion battery Windows Server 2008 Monitor Amazon Web Services Servers Network Congestion HBO Specifications Customer Service Augmented Reality Remote Work Nanotechnology Rootkit Environment FENG Value iPhone Criminal NarrowBand Social Networking Information Technology Practices Employer Employee Relationship Netflix Windows 10s Telephony Shortcut Relocation Workers Document Management IBM Advertising Virtual Reality Staff Safe Mode Two Factor Authentication webinar Reputation Online Shopping Addiction Risk Management Assessment Data loss HVAC IT Consultant Outlook Fax Server Remote Worker Techology Smart Tech Uninterrupted Power Supply IT solutions Distributed Denial of Service Wireless Technology Voice over Internet Protocol Going Green Hosted Computing Computer Accessories People Skype Humor Troubleshooting Supercomputer Worker Commute Conferencing Flash Customers Evernote Cache Politics Television Screen Mirroring Files Education Enterprise Content Management Transportation Samsung Frequently Asked Questions Millennials Wiring Credit Cards Vendor Management Botnet Chromecast Software Tips Multi-Factor Security Laptop Wireless Inventory Bluetooth Mobile Office Solid State Drive Start Menu Search Password Manager Machine Learning CrashOverride Congratulations Company Culture WiFi Compliance Webinar Managing Stress Regulation IT solutions Printers Twitter Thank You