(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. NTConnections can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (703) 288-9767 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Productivity Backup Hosted Solutions Internet Malware Google Mobile Devices Efficiency VoIP Business IT Support Network Security IT Services Email Managed Service Provider Miscellaneous Innovation Server Data Workplace Tips Disaster Recovery Business Continuity Network Upgrade Software Windows Business Management Communication Computer Managed IT Services Saving Money Hardware Mobile Device Management Virtualization Browser Smartphone Save Money Android Smartphones communications User Tips Data Backup Microsoft Office Outsourced IT Holiday Cybercrime Windows 10 Data Recovery WiFi Computers Internet of Things BYOD Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing Hacking Chrome Big Data Ransomware Small Business Automation Proactive IT Avoiding Downtime Collaboration IT Solutions VPN Managed IT Services Alert Application Apple Tech Term Social Engineering Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Budget The Internet of Things Quick Tips spam Cybersecurity Gadgets Telephone Systems Bandwidth Artificial Intelligence Managed IT Going Green Remote Computing Mobility Health Bring Your Own Device Recovery Save Time Firewall App Gmail Router Private Cloud Compliance How To Vulnerability Data Security Redundancy Wireless Technology Office 365 User Error IT Support Two-factor Authentication Document Management Vendor Management Data Protection Website Business Intelligence iPhone Money Downtime Facebook History Tablet Entertainment Lithium-ion battery Analytics Value Retail Memory Search Phishing Networking Mouse Identity Theft Apps Law Enforcement Data Management Productivity Risk Management PowerPoint Windows 10 Word Excel Antivirus Connectivity Phone System Office Tips Content Filtering Hard Drives Current Events Mobile Device Administration Work/Life Balance Maintenance IT Management Servers Running Cable Physical Security Smart Tech DDoS IT Plan Data loss Skype Unified Threat Management Robot CES Google Drive Public Cloud Mobile Office Environment Unsupported Software Customer Relationship Management Intranet Update Human Resources Content Management SaaS Best Available Training People Safety HIPAA Government Programming Network Congestion Cleaning Meetings Trending HaaS Credit Cards Education IT Consultant Fax Server Black Market Solid State Drive Humor Applications Saving Time Statistics Streaming Media Internet Exlporer Infrastructure Data storage Analysis Data Storage Online Currency Workers Encryption Biometrics Outlook Sports Business Owner Printer eWaste Comparison OneNote Windows 7 Flexibility USB YouTube Print Server Reputation Wearable Technology Specifications End of Support Data Warehousing Devices Evernote Students Windows Media Player Social Regulations Travel NarrowBand Recycling Customers IoT Millennials Internet exploMicrosoft Net Neutrality Hiring/Firing Root Cause Analysis Computer Repair Best Practice Wireless Charging Healthcare Social Networking WIndows 7 Chromecast Criminal Patch Management Workforce Advertising Thought Leadership Analyitcs Fiber-Optic Electronic Health Records Flash Managing Stress Settings Software as a Service Laptop Insurance Scam Distributed Denial of Service Telecommuting Content Filter Touchscreen LinkedIn Charger Cables Machine Learning Virus Virtual Desktop Sync IT service Touchpad Relocation Practices Remote Work Hybrid Cloud Storage Virtual Reality Software Tips Debate Computer Care Uninterrupted Power Supply Unified Communications HVAC Computer Accessories Telephony Domains Google Docs Blockchain Spam Blocking Hosted Computing IaaS PDF Addiction Bloatware Video Surveillance Theft Cameras Customer Service Start Menu Staff Keyboard Consultant Voice over Internet Protocol Audit Inventory Cache Entrepreneur HBO Mobile Tech Support Cortana Printer Server Digital Signature Multi-Factor Security Hacker Screen Mirroring Computer Fan Access Control Fraud Wireless Internet Worker Commute Cost Management Frequently Asked Questions Piracy Professional Services Shadow IT Google Apps Strategy User Wireless Lifestyle Files Science Cast Company Culture Licensing FENG Authentication Amazon Password Wire Instant Messaging Tip of the week Shortcut Tools Windows 8.1 Update Samsung Wi-Fi SharePoint Colocation Twitter Windows 8 Nanotechnology Electronic Medical Records Amazon Web Services Smart Office Windows Server 2008 Bluetooth Crowdfunding Password Manager Monitor Accountants Hosted Solution Computing Infrastructure Tablets Notifications Online Shopping Legal Paperless Office Botnet Business Mangement Books Emails CrashOverride IBM Emergency Webinar Worker Users Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile