Aug 062018
 

The irs security summit outlined critical steps for tax professionals to protect their computers and email as well as safeguarding sensitive taxpayer data. The “Security Six” protections fall into several major security categories. The irs security summit partnership urges tax professionals across the nation to avoid overlooking these basic security details as identity thieves increasingly target practitioners in search of valuable taxpayer data.

There is a dizzying array of cyber threats that confront tax professionals and many others. It’s not easy to keep up with all the viruses, worms, Trojan horses, bots-or even the terminology. The irs security summit stated that it’s essential that all tax professionals deploy strong security software that will do the job in maintaining security.

The Internal Revenue Service, state tax agencies and the private sector tax industry-known as the irs security summit-today are trying to help tax professionals decipher the confusing world of security software that is key to safeguarding taxpayer data stored on practitioner’s computer networks. This is the second in a series called “Protect your Clients; Protect Yourself: Tax Security 101.” The irs security summit awareness campaign is intended to provide tax professionals with the basic information they need to better protect taxpayer data and to help prevent the filing of fraudulent tax returns.

The six basic things to be ware of are. Having a good antivirus software. This is crucial to keep virus’s from stealing passwords and data and protecting your computer. Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary network traffic and preventing malicious software from downloading onto your computer.

Two factor authentication adds an additional layer of protection, by having a code sent via a telephone to prevent hackers from gaining access to your computer. Having backup software and services is also crucial.  Having drive encryption is is added layer of protection and can be stand alone thumb drive or in the drive itself. And last but not least, having a data security plan in place to go along with the overall planning of your business, is just good business practice these days.


  •  08/06

 Leave a Reply

(required)

(required)

This site uses Akismet to reduce spam. Learn how your comment data is processed.