{"id":51489,"date":"2022-08-16T11:37:25","date_gmt":"2022-08-16T18:37:25","guid":{"rendered":"https:\/\/lapost.us\/?p=51489"},"modified":"2022-08-16T11:37:25","modified_gmt":"2022-08-16T18:37:25","slug":"security-summit-tax-pros-can-help-clients-battle-identity-theft-risk","status":"publish","type":"post","link":"https:\/\/lapost.us\/?p=51489","title":{"rendered":"Security Summit: Tax pros can help clients battle identity theft risk"},"content":{"rendered":"<p>IR-2022-151, <strong>Aug. 16, 2022,\u00a0\u00a0WASHINGTON<\/strong> \u2013 The Security Summit partners today concluded a special summer education campaign by outlining steps tax professionals can take to help clients from becoming statistics in identity-theft related tax-fraud scams.<\/p>\n<p>&nbsp;<\/p>\n<p>The IRS, state tax agencies and the tax industry \u2013 working together as the <a href=\"https:\/\/www.irs.gov\/newsroom\/security-summit\">Security Summit<\/a> \u2013 have been combatting identity theft since 2015. This is the final part in a five-part summer series sponsored by the Summit partners to highlight critical steps tax professionals can take to protect client data. The \u201cProtect Your Clients; Protect Yourself\u201d campaign is an effort to urge tax professionals to secure their computer systems and protect client data following the pandemic and its aftermath.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cIdentity thieves always seem to find a hook to lure victims, and we increasingly see tax professionals as a target given the sensitive client data they handle,\u201d said IRS Commissioner Chuck Rettig. \u201cTax professionals have their hands full taking care of their clients and staying on top of the latest in professional developments. But they shouldn\u2019t overlook the basics of protecting their data and their systems. Missing these basic steps can be devastating to a tax pro \u2013 and their clients. But a few common-sense steps and being aware of security basics can go a long way to provide important protection.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>While many may be working from home either full- or part-time, the IRS and Security Summit partners urge the use of virtual private networks, or VPNs, to securely conduct business.<\/p>\n<p>&nbsp;<\/p>\n<p>Online business\/commerce and banking should only be done while using a secure browser connection -never at a coffee shop, restaurant or other business offering \u2018free wifi.\u2019 One way users can tell if they\u2019re using a secure browser is by looking for a small lock visible in the lower right corner or upper left of the web browser window.<\/p>\n<p>&nbsp;<\/p>\n<p>Some additional considerations:<\/p>\n<ul>\n<li>Be cautious of email attachments and web links. Do not open a link or attachment that arrives unexpectedly. Always call the sender to confirm receipt and validity of any unexpected links or attachments before opening.<\/li>\n<li>Use separate personal and business computers, mobile devices and email accounts. This is particularly important for those who may share hardware with other family members, especially children, who may not be aware of safety protocols.<\/li>\n<li>Do not send sensitive business information to personal email devices. Do not conduct business, including online business banking, on a personal computer or device. Likewise, do not engage in web surfing, gaming or video downloading on business computers or devices.<\/li>\n<li>Do not share USB drives or external hard drives between personal and business computers or devices. Never connect an unknown\/untrusted piece of hardware into the system or network. Also do not insert any unknown CD\/DVD or USB drive. Disable the \u201cAutorun\u201d feature for USB ports and optical drives on business computers to help prevent malicious programs from being installed.<\/li>\n<li>Be careful with downloads. Do not download software from an unknown web page. Always exercise caution with freeware or shareware.<\/li>\n<li>Use strong passwords. Never give out usernames or passwords to others. Strong passwords consist of a random sequence of letters to include upper and lower-case, numbers and special characters. Ideally, passwords should be at least 12 characters long. For systems or applications that have sensitive information, use multiple forms of identification (multifactor or dual-factor authentication).<\/li>\n<li>Change default passwords. Many devices come with default administrative passwords. Change them immediately and regularly thereafter. Default passwords are easily found or known by hackers.<\/li>\n<li>Change passwords often. Every three months is recommended. Consider using a password management application to store passwords. Passwords to devices and applications that contain business information should not be reused.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Additional resources<\/h2>\n<p>In addition to reviewing IRS\u00a0<a href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p4557.pdf\">Publication 4557, Safeguarding Taxpayer Data<\/a>, tax professionals can also get help with security recommendations by reviewing <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2016\/NIST.IR.7621r1.pdf\">Small Business Information Security: The Fundamentals<\/a>\u00a0by the National Institute of Standards and Technology. The IRS <a href=\"http:\/\/www.irs.gov\/identitytheft\">Identity Theft Central<\/a> pages for tax pros, individuals and businesses have important details as well.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p5293.pdf\">Publication 5293, Data Security Resource Guide for Tax Professionals<\/a>, provides a compilation of data theft information available on IRS.gov.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IR-2022-151, Aug. 16, 2022,\u00a0\u00a0WASHINGTON \u2013 The&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-51489","post","type-post","status-publish","format-standard","hentry","category-business"],"_links":{"self":[{"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/posts\/51489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lapost.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=51489"}],"version-history":[{"count":1,"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/posts\/51489\/revisions"}],"predecessor-version":[{"id":51490,"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/posts\/51489\/revisions\/51490"}],"wp:attachment":[{"href":"https:\/\/lapost.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=51489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lapost.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=51489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lapost.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=51489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}