Post-Tax Season Security Tips

Tens of millions of tax returns have just been filed electronically for the tax year 2007. Anyone who has filed their taxes this way and has their personal information stored unprotected on their computer is vulnerable to the ever-growing threat of identity theft. Stored tax documents are a gold mine for hackers and thieves as every single tax return contains at least one person's social security number.

  • More than 8 million Americans have their identities stolen each year.
  • The FTC reported that in 2007 the top category of complaint (32 percent of total complaints received) was identity theft.
  • Consumers reported 2007 fraud losses totaling more than $1.2 billion.
  • The Associated Press recently reported: "Fraudulent tax returns filed as a result of identity theft jumped more than six fold over the past five years."
  • According to IDC, it's projected that black market trafficking of stolen electronic identities will increase to $1.6 billion by the year 2010.

The makers of Identity Finder offer post tax season security tips to prevent identity theft.

1. When storing a copy of your tax return on your computer, make sure you secure it with a password so that your SSN cannot be read if the file is lost.

2. Securely delete all electronic, financial documents used to prepare your tax returns so any personal information is safe.

3. Ignore all refund/rebate/warning e-mails claiming to come from the IRS and never click on links within those emails because it is most likely a phishing attack.

4. Do not provide personal information to anyone calling you claiming to be from the IRS; the IRS already has your information and it's likely to be an identity thief calling you.

5. Check your credit report with one of the three credit bureaus for free every four months at http://www.annualcreditreport.com to make sure your identity hasn't already been stolen.

6. Install the latest updates to your operating system so known Windows or Mac vulnerabilities can't be exploited by hackers.

7. Don't save your password in your Web browser when accessing banks and other institutions that keep your personal information because it could be leaked if you ever get a virus, Trojan or are hacked.

8. If you provided your bank account and routing information to the IRS for payment or refunds, check your bank accounts to ensure the proper transfer occurred.

9. Visit your bank account online and set up alerts on your accounts to monitor when high amounts of cash are withdrawn.

10. Make sure you do not receive incorrect payment liability or refund information; a thief could have filed a tax return on your behalf fraudulently. If you suspect tax preparation fraud, call the State Tax Department toll-free at 1-888-675-9437.

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities