Post-Tax Season Security Tips

Tens of millions of tax returns have just been filed electronically for the tax year 2007. Anyone who has filed their taxes this way and has their personal information stored unprotected on their computer is vulnerable to the ever-growing threat of identity theft. Stored tax documents are a gold mine for hackers and thieves as every single tax return contains at least one person's social security number.

  • More than 8 million Americans have their identities stolen each year.
  • The FTC reported that in 2007 the top category of complaint (32 percent of total complaints received) was identity theft.
  • Consumers reported 2007 fraud losses totaling more than $1.2 billion.
  • The Associated Press recently reported: "Fraudulent tax returns filed as a result of identity theft jumped more than six fold over the past five years."
  • According to IDC, it's projected that black market trafficking of stolen electronic identities will increase to $1.6 billion by the year 2010.

The makers of Identity Finder offer post tax season security tips to prevent identity theft.

1. When storing a copy of your tax return on your computer, make sure you secure it with a password so that your SSN cannot be read if the file is lost.

2. Securely delete all electronic, financial documents used to prepare your tax returns so any personal information is safe.

3. Ignore all refund/rebate/warning e-mails claiming to come from the IRS and never click on links within those emails because it is most likely a phishing attack.

4. Do not provide personal information to anyone calling you claiming to be from the IRS; the IRS already has your information and it's likely to be an identity thief calling you.

5. Check your credit report with one of the three credit bureaus for free every four months at http://www.annualcreditreport.com to make sure your identity hasn't already been stolen.

6. Install the latest updates to your operating system so known Windows or Mac vulnerabilities can't be exploited by hackers.

7. Don't save your password in your Web browser when accessing banks and other institutions that keep your personal information because it could be leaked if you ever get a virus, Trojan or are hacked.

8. If you provided your bank account and routing information to the IRS for payment or refunds, check your bank accounts to ensure the proper transfer occurred.

9. Visit your bank account online and set up alerts on your accounts to monitor when high amounts of cash are withdrawn.

10. Make sure you do not receive incorrect payment liability or refund information; a thief could have filed a tax return on your behalf fraudulently. If you suspect tax preparation fraud, call the State Tax Department toll-free at 1-888-675-9437.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3