(713) 621-6000
Contact us today!

AltexIT Blog

Altex Business Solutions has been serving the Houston area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Altex Business Solutions can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (713) 621-6000 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *
    • Please enter the following code in the field below:*

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Privacy Hackers MediTouch Backup Business Computing Microsoft Hosted Solutions Business Google Productivity Malware Medisoft Disaster Recovery Network Security Internet Email Efficiency Business Continuity Mobile Devices Software HIPAA VoiP MACRA Innovation Managed IT Services IT Support Windows 10 Miscellaneous IT Services Data MIPS Android Server Workplace Tips Medisoft 21 Hardware Security Risk Assessment communications Computer Browser Outsourced IT Upgrade Managed Service Provider Windows Mobile Device Management User Tips Communication Ransomware Alert Hacking Virtualization Network Computers Holiday Data Backup Cybercrime Office Smartphone Smartphones Social Media ransomware Marketing Saving Money Save Money Chrome Quick Tips Business Management BYOD Social Engineering Mobile Computing Small Business Microsoft Office Electronic Health Records Employer-Employee Relationship Remote Monitoring Operating System Mobility Automation Remote Computing Information Technology VPN IT Solutions Application MACRA/MIPS Cloud Computing Telephone Systems Data Recovery Recovery Health BDR Office Tips Flexibility Spam Avoiding Downtime Collaboration Managed IT Services Passwords Cybersecurity Two-factor Authentication Bring Your Own Device Budget How To App WiFi Data Security Phishing Private Cloud Office 365 Big Data Managed IT Electronic Medical Records Money EHR Gadgets Data Breach Data Management HIPAA Security Gmail User Error EHR in the Cloud Bandwidth Apple Law Enforcement Internet of Things The Internet of Things PQRS Compliance Proactive IT Firewall Website EMR in the Cloud Work/Life Balance Search Facebook Unified Threat Management HaaS Wi-Fi Vulnerability Business Intelligence History Administration Apps Google Drive Save Time Data Protection Artificial Intelligence Lithium-ion battery Redundancy Password Black Market Wireless Technology Networking Retail Windows 10 Vendor Management Phone System iPhone Value Going Green Mobile Office Mouse HIPAA Compliant Medisoft 17 Meetings Data storage Worker Commute Document Management Computing Infrastructure Environment SaaS Analytics Robot Router Excel Risk Management Entertainment Identity Theft Virtual Reality End of Support Hacker Wireless Credit Cards IT Support Data Storage Training Antivirus Physical Security IT Consultant Legal Solid State Drive eWaste Word Workers Settings Public Cloud Mobile Device Safety Instant Messaging Encryption Memory Comparison IT Management Fax Server CMS Government Biometrics Shadow IT Touch Type Talk Outlook IT Plan PDF Applications Internet Exlporer Human Resources Network Congestion Content Filtering Unsupported Software Hard Drives DDoS Humor PowerPoint Best Practice OneNote Downtime CES Business Owner Update Colocation Spam Blocking time Physician burnout isn ’t fun Telecommuting How to Skype Analyitcs Online Currency Cables lytec Content Management Google Docs Data loss Social Networking patients YouTube Lytec Twitter Windows Media Player Altex HIPAA Remote Work HBO Unified Communications Start Menu Monitor webinar User Patch Management Blockchain Automobile Voice over Internet Protocol Screen Mirroring Frequently Asked Questions NarrowBand Charger Keyboard healthcare regulations Theft Meaningful Use Mobile Reputation Conferencing IaaS Claims Bluetooth Scam Staff Multi-Factor Security Cast Virtual Desktop Tip of the week Chromecast Computer Care Ransomware' Cortana Advancing Care Information Professional Services Windows 10s Customers Bloatware Automated USB Productivity Digital Signature Value Based Modify Trending Internet exploMicrosoft Windows Server 2008 Laptop Science Samsung SharePoint Medisoft Upgrade Fraud Google Apps Tools Entrepreneur WIndows 7 Uninterrupted Power Supply Accountants Top Medical Billing Software Systems Billing Lifestyle Advertising Customer Relationship Management Windows 7 Touchpad EHR Incentive 2015 Quality Payment Program Amazon Big Deal Infrastructure Audit Cost Management Streaming Media Managing Stress Cleaning Electronic Medical Records EMR HealthFusion ’s MediTouch software Data Warehousing Customer Service Regulations Windows 8 Medisoft V21 Wearable Technology Virus Amazon Web Services Lytec 2017 Password Manager Battery Botnet Computer Fan Relocation Tech Support IT service Hybrid Cloud Servers Tablet Running Cable Online Shopping Appointment reminders Business Mangement Education Disaster Travel FENG Emails Notifications PQRS Eligible Professionals Domains Specifications Video Games Flash Tablets Current Events ICD -10 code Evernote Electronic Statements Recycling Programming Netflix physician – Maintenance 2017 MACRA Millennials Scalability Sync Techology Knowledge October 1 Wireless Charging Consultant Online payments Criminal Users Software as a Service Files home Shortcut Sports MediTouch' People Workforce Software Tips Telephony Leadership Distributed Denial of Service codes Fiber-Optic Best Available BillFlash Productiity Root Cause Analysis Social

      Top Blog

        It was a routine morning in the office that day, recalls Dr. Lanter. He saw patients, the weather wasn’t bad. People in Rockaway were surfing before the storm, which is typical. “I figured it was going to rain, it was going to blow, but it was not going to be that bad. Big storms had come an...