Contact us today!
(808) 529-4605

Indevtech Blog

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Indevtech can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (808) 529-4605 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Malware Backup Microsoft Windows 10 Innovation Internet Network Security Software Data User Tips Mobile Devices Smartphones Hardware Email Business Browser Efficiency Productivity VoIP Tech Term Computer Business Continuity Workplace Tips Data Backup Miscellaneous Ransomware Disaster Recovery Cybercrime Business Management communications IT Services Smartphone Android Alert Windows Cloud Computing Data Recovery Outsourced IT Office Productivity Network Chrome Server Telephone Systems Computers Automation Managed IT Services Save Money Upgrade Managed IT Services Quick Tips Money Law Enforcement Virtualization Artificial Intelligence Facebook Communication Collaboration Social Media Internet of Things Small Business Passwords Spam How To App Applications Health Password Social Engineering IT Support Windows 10 Office 365 Router Office Tips Cybersecurity Two-factor Authentication Word Holiday Wi-Fi Work/Life Balance Google Drive Bandwidth Bring Your Own Device Gadgets History Information Gmail Operating System Mobile Device Management Remote Computing BDR Data Breach Recovery Sports Encryption Flexibility Data Security Data Management Phishing Safety VPN Apps Microsoft Office Scam Mouse Managed Service Provider Managed Service Voice over Internet Protocol Settings Vulnerability Data Protection Mobile Device Networking Private Cloud HaaS Keyboard Entertainment Connectivity Marketing Hacking Application Blockchain Downtime IT Support Fraud User Error BYOD Firewall Employer-Employee Relationship Saving Money Physical Security Data Storage Data storage Avoiding Downtime End of Support Wearable Technology Hiring/Firing Cleaning Comparison IT Management Google Docs Patch Management PDF Spam Blocking Human Resources Mobility USB Meetings Servers Training YouTube Mobile Computing IT Plan Website Telephony Robot Legal Remote Monitoring Retail Windows 7 Black Market Managed IT Identity Theft Battery Business Intelligence eWaste CES The Internet of Things Unsupported Software Infrastructure Paperless Office Virtual Assistant Update Big Data Internet Exlporer Content Management OneNote Software as a Service Electronic Medical Records DDoS Charger Government Best Practice Budget Telephone System Public Cloud Redundancy Password Management Shortcuts Travel Experience Devices Computing Infrastructure MSP Excel Workforce Save Time Uninterrupted Power Supply Audit Microchip Tools Audiobook Distributed Denial of Service SaaS Wireless Technology Access Control How to Trending People Business Mangement Touchpad Customer Service Accountants Scalability WiFi Emergency Knowledge Cortana Wire Hybrid Cloud Camera Sync Worker HIPAA NIST Root Cause Analysis Music Automobile Shortcut Amazon Thought Leadership File Sharing Tip of the week Telecommuting Social Networking Computer Fan Search Engine Chromecast Authentication Apple Mobile Office Smart Technology Recycling Rootkit Fax Server Instant Messaging Notifications Network Congestion IT solutions Google Apps Smart Office Cryptocurrency Monitor IBM Amazon Web Services Internet exploMicrosoft Users Augmented Reality Windows Server 2008 Employer Employee Relationship Tech Support Netflix FENG Bing Value Risk Management Assessment Remote Work Nanotechnology iPhone HBO Specifications Two Factor Authentication webinar Criminal Practices Relocation IT Consultant Workers Document Management Information Technology Windows 10s Warranty Staff Safe Mode Reputation Data loss Troubleshooting Supercomputer Online Shopping Addiction Advertising Virtual Reality Remote Worker Running Cable Computer Accessories Shadow IT HVAC Techology Help Desk Politics Streaming Media Television Maintenance Smart Tech Outlook Conferencing Printer Skype Vendor Management Hosted Computing Humor Transportation Samsung Going Green Customers Screen Mirroring Lithium-ion battery Evernote Cache Worker Commute Wiring Flash Bluetooth Enterprise Content Management Botnet Public Computer Credit Cards Files Education Frequently Asked Questions Millennials Environment Emails Social Solid State Drive Administrator Start Menu Content NarrowBand Programming Biometrics Inventory Search Software Tips Multi-Factor Security Benefits Leadership Password Manager Machine Learning Laptop Wireless Customer Relationship Management Digital Signature Video Games Cast Computer Care Books Current Events Wireless Charging Wireless Internet Unified Threat Management CrashOverride Webinar Company Culture Compliance IT solutions Managing Stress Regulation Printers Twitter Thank You Congratulations