More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

As tax identity theft impacts more and more consumers, a new survey from TrustedID, a comprehensive, identity protection and privacy service, indicated that more than half of consumers believe that the IRS is 100% responsible for ensuring that no one can file a return in their name and claim their tax refund.

According to the United States House Committee on Oversight & Government Reform, over 1.1 million tax returns were filed by identity thieves for the 2011 processing year, up more than 21 times from just 51,700 fraudulent returns in 2008. In addition, the Treasury Inspector General for Tax Administration believes that tax identity theft could cost the IRS approximately $21 billion in fraudulent returns in the next five years.

This fast-growing problem has created new challenges that will require the IRS to confront the latest opportunity for identity thieves: stealing tax refunds. National Taxpayer Advocate, Nina Olson, recently reviewed this growing problem, citing internal organizational as well as procedural issues and finding that the IRS has been ineffective in assisting tax identity theft victims. While the IRS is under fire, over 50% of consumers still believe that the IRS is trustworthy when it comes to protecting their social security number and other private information.

"Tax time is among the most vulnerable for consumers, with all of their most valuable personal information being compiled and shared," said Scott Mitic, CEO of TrustedID. "The IRS must find a way to protect consumers from falling victim to this growing threat and work to develop a swift resolution for victims. Additionally, while the IRS has some trust with consumers, the growing number of tax identity theft cases creates a serious and growing gap between perception and reality."

The TrustedID survey also found that more than half of the consumers surveyed were unaware of and confused about what tax identity theft is, and two-thirds of consumers did not have a good understanding of tax identity theft.

"Tax identity theft is a big problem that has grown exponentially over the course of a few short years. The IRS has an obligation to increase awareness of this threat and consumers need to familiarize themselves with the issue and how to protect themselves, especially since effective assistance might not be available, once their identity has been compromised," added Mitic.

To help proactively safeguard information during tax season, TrustedID offers the following tips:

  • Monitor your tax documents closely. Make a list of everyone who pays you, including employers, banks and brokerages. Make sure you receive hard copies in the mail of what they send to the IRS.
  • Beware of IRS-related scams. If you receive an email or phone call asking for your personal or financial information, delete it or send it to the FTC at spam@uce.gov for investigation. The IRS will never email taxpayers about issues related to their accounts or ask for your social security number or financial details over the phone. If you have any doubt whether a contact from the IRS is authentic, call them directly to confirm it.
  • Review carefully, if filing with a third party. When using software, a CPA or national tax agency to prepare your taxes, ensure you are reviewing all the information carefully and that all the original paperwork is returned to you.
  • Be diligent, if e-filing. With e-filing, evidence of fraud is difficult to find—there are no signed tax forms, envelopes, or fingerprints. It's easy for criminals to e-file using a real name, social security number and a phony W-2 or Schedule C. If you're filing your taxes online, be sure to use updated firewall, antivirus, and spyware software.
  • Take precautions, if mailing your filing. If filing by mail, walk the envelope inside the post office and hand it to an employee. Too much mail is stolen out of the USPS and driveway mailboxes. Send your return by certified mail because this alerts each mail carrier that the document needs extra protection. Plus, you will know when it arrives safely.

Methodology

This survey was completed between February 5 -10, 2013 by 1,278 individuals, 25 years old and older, across the country, using Survey Monkey's Targeted Audience. Participants had no affiliation with TrustedID. Key questions included whether or not respondents had heard of tax identity theft (Yes or No); to what extent they agreed that the IRS is 100% responsible for ensuring no one can file a return in their name and claim their refund (Totally Agree, Mostly Agree, Neutral, Somewhat Disagree, Totally Disagree); and how trustworthy the IRS is related to protecting social security numbers and personal information (Extremely Trustworthy, Very Trustworthy, Somewhat Trustworthy, Minimally Trustworthy, Not At All Trustworthy).

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3