(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. NTConnections can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (703) 288-9767 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency Business IT Support VoIP Email Managed Service Provider Miscellaneous IT Services Innovation Server Workplace Tips Disaster Recovery Network Security Business Continuity Data Windows Upgrade Network Software Hardware Business Management Save Money Saving Money Mobile Device Management Communication Computer Browser Android Virtualization Smartphones Smartphone Holiday communications Managed IT Services Microsoft Office User Tips Data Backup BYOD Cybercrime WiFi Windows 10 Outsourced IT Mobile Computing Computers Small Business Hacking Chrome Social Media Remote Monitoring Operating System IT Solutions Alert Cloud Computing VPN Apple Managed IT Services Big Data Application Proactive IT Ransomware Avoiding Downtime Data Recovery Marketing Employer-Employee Relationship The Internet of Things Office Budget Collaboration Quick Tips Information Technology Social Engineering Passwords Automation Going Green BDR Remote Computing Health Mobility Bring Your Own Device Gadgets Internet of Things Recovery spam Telephone Systems Bandwidth Private Cloud Compliance How To Vulnerability Data Security Managed IT Vendor Management Redundancy Wireless Technology User Error iPhone Two-factor Authentication Save Time Firewall Cybersecurity App Gmail Retail Memory Search Apps Phishing Networking Mouse Document Management Risk Management IT Support Antivirus Office 365 Data Management Data Protection PowerPoint Website Excel Analytics Router Windows 10 Business Intelligence Phone System Content Filtering Money Downtime Office Tips History Tablet Artificial Intelligence Value Lithium-ion battery CES Physical Security DDoS Unsupported Software Robot Mobile Office Customer Relationship Management Public Cloud Environment Update Google Drive IT Consultant Best Available Human Resources SaaS People Programming Saving Time Training Identity Theft Network Congestion Safety HIPAA Government Trending Online Currency Credit Cards Meetings HaaS Printer Fax Server Humor Black Market Law Enforcement Statistics Solid State Drive Current Events Data Storage Internet Exlporer Maintenance Workers Word Outlook Data storage Encryption Biometrics Comparison Business Owner Flexibility eWaste OneNote Hard Drives Administration Intranet IT Management Entertainment Work/Life Balance Facebook Running Cable IT Plan Unified Threat Management Skype Analyitcs Managing Stress Software as a Service Patch Management Advertising Data loss Telecommuting Cables Virus Sync Laptop LinkedIn Settings Content Management Scam Distributed Denial of Service Charger Software Tips Debate Virtual Desktop Remote Work Unified Communications Computer Accessories Telephony Touchpad IT service Hybrid Cloud Virtual Reality Blockchain Google Docs Relocation Computer Care Uninterrupted Power Supply Theft Cameras Start Menu Company Culture Video Surveillance Domains Windows 8.1 Update IaaS PDF Bloatware Staff Consultant Spam Blocking Voice over Internet Protocol Audit HBO Education Cleaning Customer Service Cortana Printer Server Mobile Keyboard Entrepreneur Digital Signature Multi-Factor Security Screen Mirroring Worker Commute Frequently Asked Questions Piracy Tech Support Fraud Hacker Google Apps Professional Services Cost Management Strategy User Computer Fan Lifestyle Cast Tip of the week Licensing Shadow IT Applications Print Server Amazon Science Infrastructure Tools Samsung Wireless Files Streaming Media Password Instant Messaging Analysis FENG Twitter Productivity Windows Server 2008 Wi-Fi Shortcut Amazon Web Services Windows 8 Password Manager Net Neutrality Crowdfunding Computer Repair SharePoint Colocation Accountants Electronic Medical Records Windows 7 Sports Bluetooth Online Shopping Tablets Business Mangement Botnet Monitor Hosted Solution Computing Infrastructure Notifications Legal Specifications Data Warehousing Windows Media Player Regulations YouTube USB Evernote Recycling Travel Touchscreen Reputation Wearable Technology End of Support Mobile Device Social Millennials Servers Hiring/Firing NarrowBand Wireless Charging Criminal WIndows 7 Customers Internet exploMicrosoft Best Practice Social Networking Root Cause Analysis Workforce Fiber-Optic Flash Chromecast IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Users Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content