ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. i-medIT can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at 630-549-6199 to get started.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Cloud Backup Microsoft Innovation Small Business Email Hardware Android Business Cybercrime Smartphones Efficiency Software Malware How To Network Security Ransomware Data Backup VoIP Windows Mobile Devices Data Computers Chrome Mobile Device Management Productivity Business Management User Tips Internet Cybersecurity Social Engineering Cloud Computing Business Continuity Managed IT Services Browser Disaster Recovery Safety Phishing Spam Bring Your Own Device Data Breach Operating System Social Media Gadgets Data Recovery Data Security Vulnerability Communication App Upgrade Telephone Systems Money Smartphone Internet of Things Computer Law Enforcement Windows 10 Outsourced IT Alert Collaboration Managed IT Services Two-factor Authentication Server Automation Data storage Private Cloud Google Drive Spam Blocking Save Money Passwords Data Protection Wi-Fi Public Cloud Redundancy Avoiding Downtime BYOD Gmail Comparison Apps Office 365 Communications The Internet of Things Virtualization Miscellaneous Remote Monitoring Bandwidth Hosted Solutions Business Intelligence Update Router CES Government BDR Downtime Data Storage Windows 10 Recovery Word IT Management VPN Quick Tips OneNote IT Plan Saving Money Network Artificial Intelligence Unsupported Software Physical Security Internet Exlporer Staff Legal Multi-Factor Security Fraud Flash Root Cause Analysis DDoS Big Data Electronic Medical Records Work/Life Balance Password Manager Travel Software Tips Charger Keyboard Trending Outlook Health Amazon Microsoft Office Business Mangement Facebook webinar Windows 10s YouTube Computer Care Digital Signature Humor Amazon Web Services Hybrid Cloud Sync Meetings Networking Hiring/Firing Recycling Conferencing Files Samsung Encryption Specifications Online Shopping PDF IBM Patch Management eWaste HBO Office Emails History Solid State Drive Value Accountants Monitor Evernote Telephony Data loss Going Green Supercomputer Uninterrupted Power Supply Scam Criminal Password Black Market Relocation Audit NarrowBand Data Management Millennials Wireless Charging Skype Screen Mirroring Budget Office Tips User Error Frequently Asked Questions Computer Fan Wireless Technology Workforce Cortana Start Menu Cast Cleaning Sports Content Management HaaS Google Docs Netflix Excel FENG IT Services Telecommuting Google Apps Tools Reputation Current Events Tech Support Holiday Blockchain Website Robot Apple IT Support Remote Work End of Support Tip of the week Employer-Employee Relationship Laptop Customer Knowledge Shadow IT HIPAA Flexibility Voice over Internet Protocol iPhone Identity Theft Internet exploMicrosoft Windows Server 2008 Chromecast Workers Marketing Managed IT Touchpad Hacking Network Congestion Settings Human Resources Managed Service Provider Credit Cards Advertising Windows 7 Productivity Automobile Infrastructure Botnet IT Consultant Vendor Management Politics How to Thank You Best Practice Books Save Time Congratulations Experience Mobile Device Emergency Music Video Games Battery Employer Employee Relationship Scalability Education Information Technology Computer Accessories Content Webinar Loyalty Workplace Tips Computing Infrastructure Transportation Bluetooth Audiobook Techology WiFi IT solutions SaaS Instant Messaging Applications Benefits Entertainment Users Wireless Firewall Worker IT Support Assessment Wearable Technology Virtual Reality Smart Technology Rootkit Television USB Two Factor Authentication Worker Commute Remote Computing Training Risk Management Mobility CrashOverride Public Computer Troubleshooting Search