More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

As tax identity theft impacts more and more consumers, a new survey from TrustedID, a comprehensive, identity protection and privacy service, indicated that more than half of consumers believe that the IRS is 100% responsible for ensuring that no one can file a return in their name and claim their tax refund.

According to the United States House Committee on Oversight & Government Reform, over 1.1 million tax returns were filed by identity thieves for the 2011 processing year, up more than 21 times from just 51,700 fraudulent returns in 2008. In addition, the Treasury Inspector General for Tax Administration believes that tax identity theft could cost the IRS approximately $21 billion in fraudulent returns in the next five years.

This fast-growing problem has created new challenges that will require the IRS to confront the latest opportunity for identity thieves: stealing tax refunds. National Taxpayer Advocate, Nina Olson, recently reviewed this growing problem, citing internal organizational as well as procedural issues and finding that the IRS has been ineffective in assisting tax identity theft victims. While the IRS is under fire, over 50% of consumers still believe that the IRS is trustworthy when it comes to protecting their social security number and other private information.

"Tax time is among the most vulnerable for consumers, with all of their most valuable personal information being compiled and shared," said Scott Mitic, CEO of TrustedID. "The IRS must find a way to protect consumers from falling victim to this growing threat and work to develop a swift resolution for victims. Additionally, while the IRS has some trust with consumers, the growing number of tax identity theft cases creates a serious and growing gap between perception and reality."

The TrustedID survey also found that more than half of the consumers surveyed were unaware of and confused about what tax identity theft is, and two-thirds of consumers did not have a good understanding of tax identity theft.

"Tax identity theft is a big problem that has grown exponentially over the course of a few short years. The IRS has an obligation to increase awareness of this threat and consumers need to familiarize themselves with the issue and how to protect themselves, especially since effective assistance might not be available, once their identity has been compromised," added Mitic.

To help proactively safeguard information during tax season, TrustedID offers the following tips:

  • Monitor your tax documents closely. Make a list of everyone who pays you, including employers, banks and brokerages. Make sure you receive hard copies in the mail of what they send to the IRS.
  • Beware of IRS-related scams. If you receive an email or phone call asking for your personal or financial information, delete it or send it to the FTC at spam@uce.gov for investigation. The IRS will never email taxpayers about issues related to their accounts or ask for your social security number or financial details over the phone. If you have any doubt whether a contact from the IRS is authentic, call them directly to confirm it.
  • Review carefully, if filing with a third party. When using software, a CPA or national tax agency to prepare your taxes, ensure you are reviewing all the information carefully and that all the original paperwork is returned to you.
  • Be diligent, if e-filing. With e-filing, evidence of fraud is difficult to find—there are no signed tax forms, envelopes, or fingerprints. It's easy for criminals to e-file using a real name, social security number and a phony W-2 or Schedule C. If you're filing your taxes online, be sure to use updated firewall, antivirus, and spyware software.
  • Take precautions, if mailing your filing. If filing by mail, walk the envelope inside the post office and hand it to an employee. Too much mail is stolen out of the USPS and driveway mailboxes. Send your return by certified mail because this alerts each mail carrier that the document needs extra protection. Plus, you will know when it arrives safely.

Methodology

This survey was completed between February 5 -10, 2013 by 1,278 individuals, 25 years old and older, across the country, using Survey Monkey's Targeted Audience. Participants had no affiliation with TrustedID. Key questions included whether or not respondents had heard of tax identity theft (Yes or No); to what extent they agreed that the IRS is 100% responsible for ensuring no one can file a return in their name and claim their refund (Totally Agree, Mostly Agree, Neutral, Somewhat Disagree, Totally Disagree); and how trustworthy the IRS is related to protecting social security numbers and personal information (Extremely Trustworthy, Very Trustworthy, Somewhat Trustworthy, Minimally Trustworthy, Not At All Trustworthy).

Featured

  • Survey Shows Election Anxiety Crosses Party Lines

    New reports of election worker intimidation are raising concerns about election interference. A majority of Americans (71%) are worried about voter intimidation or safety at the polls, and 75% want security cameras at their voting place, according to a new national survey. Read Now

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3