(713) 621-6000
Contact us today!

AltexIT Blog

Altex Business Solutions has been serving the Houston area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

CPAs collect and store a treasure trove of sensitive information that is deemed valuable to cybercriminals. This includes client contact information, credit card information, and social security numbers. Plus, the bad guys know that even though smaller, local tax professionals might not have as many clients as a nationwide firm, but the chances that their data is easier to get to makes them a viable target.

How easy could it be for someone to steal all of your clients’ sensitive information? Depending on the security you have in place, it could be shockingly simple. All it takes is parking near a CPA firm and finding an exploit to get connected to their Wi-Fi. If proper measures aren’t in place, that is enough to give the criminal carte blanche access to any data that isn’t properly protected. Then they can simply drive up to the next tax professional in town and attempt it again.

If the hacker wants to save on gas, they could also target hundreds of thousands of tax professionals at once with a single mass email. The email could look like a legitimate message from a client or organization, but contain an attachment that installs malware and instantly gives the hacker access to what they want.

The time to protect yourself (and your clients) is now. The IRS is urging tax professionals to encrypt all sensitive data and ensure that their network is equipped with the proper measures to protect data. Educating employees on how to not get baited into fake phishing emails is also critical. Altex Business Solutions can audit your network and help you protect the identities of your clients. Don’t wait. Give us a call today at (713) 621-6000 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 25 September 2018
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

  • First Name *
  • Last Name *
    • Please enter the following code in the field below:*

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers MediTouch Backup Business Computing Network Security Hosted Solutions Malware Microsoft Productivity Google Internet Business Email Medisoft Mobile Devices Innovation Efficiency VoiP Disaster Recovery Business Continuity Managed IT Services Data HIPAA IT Services Software IT Support Miscellaneous MACRA Workplace Tips Windows 10 Data Backup Hardware MIPS Android Server communications Outsourced IT Computer Browser User Tips Network Communication Medisoft 21 Upgrade Managed Service Provider Windows Tech Term ransomware Data Recovery Security Risk Assessment Cybercrime Smartphone Mobile Device Management Smartphones Virtualization Computers Saving Money Ransomware Save Money Social Media Alert Hacking Internet of Things Holiday BDR Office Cloud Computing Electronic Health Records Automation Business Management Marketing Mobile Computing Microsoft Office Chrome Applications Artificial Intelligence Quick Tips BYOD Social Engineering Small Business Employer-Employee Relationship Cybersecurity Operating System Remote Monitoring Mobility Telephone Systems Remote Computing Collaboration Gadgets VPN Information Technology Passwords IT Solutions Application Managed IT Services MACRA/MIPS Recovery Health Big Data How To Office Tips Flexibility Law Enforcement Spam Facebook Data Security Avoiding Downtime Managed IT Office 365 Money Bandwidth HIPAA Security Two-factor Authentication Bring Your Own Device Budget App WiFi Website Windows 10 HIPAA Compliant Redundancy PQRS Password Phishing EMR in the Cloud Unified Threat Management Training Electronic Medical Records Firewall User Error Private Cloud IT Support Data Breach Router Business Intelligence Apple EHR Networking EHR in the Cloud Data Protection Data Management The Internet of Things Compliance Gmail Google Drive Settings Encryption Entertainment Search Black Market Document Management Sports History Administration Blockchain Work/Life Balance Identity Theft Proactive IT Save Time Instant Messaging Connectivity Lithium-ion battery Wi-Fi Vulnerability Wireless Technology Apps Retail Vendor Management HaaS Mobile Device Word Phone System Value iPhone Analysis Mobile Office Going Green Mouse IT Management Streaming Media Public Cloud IT Plan Cleaning Safety Worker Commute Environment Unsupported Software Analytics Robot CMS Government OneNote Excel Business Owner Virtual Reality PDF Shadow IT Spam Blocking Smart Tech Medisoft 17 CES Hacker Update Access Control Internet Exlporer Network Congestion DDoS USB Data loss Best Practice Content Management Antivirus IT Consultant Downtime File Sharing Colocation Meetings Paperless Office Data storage Computing Infrastructure Credit Cards YouTube Productivity SaaS Fax Server Memory Virtual Assistant Data Storage Biometrics Risk Management Outlook Legal End of Support Workers Windows 7 Wireless Content Filtering Infrastructure Human Resources Machine Learning Information Humor PowerPoint Hard Drives Physical Security Comparison Managed Service Education Touch Type Talk Solid State Drive Servers eWaste FENG Current Events ICD -10 code Business Mangement Video Games Travel Enterprise Content Management Analyitcs Specifications Proactive Practices Netflix Online Currency Electronic Statements 2017 MACRA Social Networking Evernote Flash Addiction Wearable Technology Windows Media Player Twitter Knowledge October 1 Recycling Scalability Password Management Relocation Users Millennials Remote Monitoring and Maintenance Hybrid Cloud Hosted Computing Tech Support IT service Online payments IoT MediTouch' Wireless Charging User Sync Cache Running Cable Notifications Leadership codes Criminal Software as a Service NIST Workforce Line of Business Software Tips Inventory Domains BillFlash Virtual Desktop Fiber-Optic Bluetooth Telephony Wireless Internet Cryptocurrency Root Cause Analysis How to Bloatware Telecommuting MSP physician – lytec Lytec Altex HIPAA Cables Techology Skype Wire Safe Mode Files webinar Science Google Docs Automobile Entrepreneur Remote Work Augmented Reality home WIndows 7 HBO Authentication People Patch Management Distributed Denial of Service Charger Keyboard Customer Relationship Management Unified Communications Start Menu Smart Office Voice over Internet Protocol Screen Mirroring Conferencing healthcare regulations Meaningful Use Cost Management Remote Worker time Physician burnout isn ’t fun Managing Stress Frequently Asked Questions Nanotechnology Big Deal Scam Computer Care Customer Service Theft Mobile Multi-Factor Security Business Technology Virus Cast Ransomware' Staff Advancing Care Information Windows 8 Value Based Modify Wiring patients Tip of the week Windows 10s Samsung Medisoft Upgrade Cortana Professional Services Students Monitor Trending Digital Signature Tablet Top Medical Billing Software Systems Billing Fraud GDPR Windows Server 2008 Devices NarrowBand Disaster IaaS EHR Incentive 2015 Quality Payment Program Google Apps Tools Healthcare Reputation Lifestyle Telephone System Claims Strategy Tablets HealthFusion ’s MediTouch software Programming Amazon E-Commerce Thought Leadership Chromecast Electronic Medical Records EMR Audit Medisoft V21 Maintenance Customers Internet exploMicrosoft Data Warehousing Automated Lytec 2017 Battery Amazon Web Services Camera Consultant Regulations Content Filter Laptop SharePoint Computer Fan Shortcut Password Manager Botnet HVAC Advertising Insurance Uninterrupted Power Supply Emails Appointment reminders Accountants Social Online Shopping Best Available Storage Touchpad Productiity PQRS Eligible Professionals

      Top Blog

        It was a routine morning in the office that day, recalls Dr. Lanter. He saw patients, the weather wasn’t bad. People in Rockaway were surfing before the storm, which is typical. “I figured it was going to rain, it was going to blow, but it was not going to be that bad. Big storms had come an...