Why Protecting Your Tax Data Is More Important than Ever

Why Protecting Your Tax Data Is More Important than Ever

For individuals and many businesses, Tax Day is April 18 this year – and while it isn’t necessarily a celebration for most, completing returns on time can be immensely satisfying…and a huge relief. However, in recent years a disturbing new trend is on the rise – cybercrime relating to tax returns and tax-related data. For its victims, Tax Day represents inconvenience and loss.

Every year, in the run-up to the tax filing deadline, data breaches are becoming more frequent and larger in scope. With Tax Day approaching, businesses and individual filers should be aware that the sensitive data they are required to submit to the IRS may not be as secure as they may assume. For example:

  • In August 2015, the IRS was sued by taxpayers after it fell prey to a massive data breach affecting 330,000 people. Hackers reportedly stole personal information including Social Security numbers and accessed completed tax returns from the IRS. Multiple reports suggest that thieves were able to use this information to steal more than $50 million in federal funds.
  • Later, in February 2016, the IRS reported that the data breach was more than twice as big as initially realized. Instead of 330,000, the IRS reported that the data breach may have affected more than 700,000 victims.

Those affected are undoubtedly still feeling the effects from this theft, and we have learned the hard way that the IRS is not immune to cybertheft. As businesses and individuals increasingly file taxes and reports online, data breaches are becoming more common. This is especially true in the first quarter of the year, leading up to Tax Day, when more online financial activity occurs, and criminals know there is valuable, and, in some cases, easily obtainable information being transmitted to and from the IRS. A recent survey conducted by Impulse Research Group on behalf of Experian showed that almost half of respondents filed their own taxes electronically, another 20 percent file taxes by mail, and 30 percent file taxes with the help of a tax professional. As a result, information can be redirected without the knowledge of the individual.

A critical first step to preventing tax-related identity theft is to ensure that tax documents are securely stored and archived and that proper destruction of documents takes place after the period of limitations for a return runs out, usually three years per IRS guidelines. In addition, businesses should protect from phishing scams by educating employees on proper handling of documents that contain Social Security and tax ID numbers, as well as any sensitive employee data. Suspicious emails shouldn’t be opened; instead, users should go directly to the source, such as IRS.gov, rather than opening unsolicited emails or clicking on random links. Employees should also be trained to never respond to unsolicited requests for business or personal data of any kind, and companies should request removal from solicitation lists for business loans, credit cards and lines of credit – and those solicitation documents should be destroyed.

Cybersecurity is paramount, and businesses should use encrypted electronic payment forms, rather than paper, whenever possible. Electronic banking and transaction networks are inherently more secure than postal mail or fax and should be used as part of an overall IT security chain. For businesses of ANY size, including small- to medium-sized businesses, key elements of the security chain should encompass:

  • Encrypted communication – Via Virtual Private Network tunneling, to prevent sensitive traffic from going across the public internet, and protecting endpoints like laptops and desktops.
  • Encryption “retention”– Smartphones, hard drives and computers can contain sensitive information; when full disk encryption is in place, it prevents access to this information. However, as old equipment is discarded, encryption should be kept in place to protect the data on those devices.
  • Protection of data in transit and in the cloud – Leveraging full disk encryption to ensure that even if thieves intercept data, they can’t do anything with it.
  • Multi-factor authentication – Multi-tiered user authentication that makes it harder for an impostor to hijack login credentials and access data.
  • Firewalls – For blocking unauthorized access to company networks and systems, preventing data breaches and installation of viruses, malware and other code designed to steal sensitive information.

Overall, consumers and businesses should not underestimate the value of personal data. The unfortunate fact is that there is a thriving criminal market for this information, and cybercriminals are increasingly sophisticated. Tax season reminds us to be vigilant about data protection in order to prevent damage to businesses and personal finances – not to mention avoiding the stressful administrative headaches associated with data breaches. Doing as much as possible to secure data and keep personal identifying information safe – physically and electronically, including via the IT security chain – reduces the chance that even a successful data breach can do harm and ultimately protects and even enhances trust. And that is invaluable.


Featured

  • 2024 Security Today New Product of the Year Award Winners Announced

    More than 20 companies are being recognized this year for products that help keep us safe. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3