Why Protecting Your Tax Data Is More Important than Ever

Why Protecting Your Tax Data Is More Important than Ever

For individuals and many businesses, Tax Day is April 18 this year – and while it isn’t necessarily a celebration for most, completing returns on time can be immensely satisfying…and a huge relief. However, in recent years a disturbing new trend is on the rise – cybercrime relating to tax returns and tax-related data. For its victims, Tax Day represents inconvenience and loss.

Every year, in the run-up to the tax filing deadline, data breaches are becoming more frequent and larger in scope. With Tax Day approaching, businesses and individual filers should be aware that the sensitive data they are required to submit to the IRS may not be as secure as they may assume. For example:

  • In August 2015, the IRS was sued by taxpayers after it fell prey to a massive data breach affecting 330,000 people. Hackers reportedly stole personal information including Social Security numbers and accessed completed tax returns from the IRS. Multiple reports suggest that thieves were able to use this information to steal more than $50 million in federal funds.
  • Later, in February 2016, the IRS reported that the data breach was more than twice as big as initially realized. Instead of 330,000, the IRS reported that the data breach may have affected more than 700,000 victims.

Those affected are undoubtedly still feeling the effects from this theft, and we have learned the hard way that the IRS is not immune to cybertheft. As businesses and individuals increasingly file taxes and reports online, data breaches are becoming more common. This is especially true in the first quarter of the year, leading up to Tax Day, when more online financial activity occurs, and criminals know there is valuable, and, in some cases, easily obtainable information being transmitted to and from the IRS. A recent survey conducted by Impulse Research Group on behalf of Experian showed that almost half of respondents filed their own taxes electronically, another 20 percent file taxes by mail, and 30 percent file taxes with the help of a tax professional. As a result, information can be redirected without the knowledge of the individual.

A critical first step to preventing tax-related identity theft is to ensure that tax documents are securely stored and archived and that proper destruction of documents takes place after the period of limitations for a return runs out, usually three years per IRS guidelines. In addition, businesses should protect from phishing scams by educating employees on proper handling of documents that contain Social Security and tax ID numbers, as well as any sensitive employee data. Suspicious emails shouldn’t be opened; instead, users should go directly to the source, such as IRS.gov, rather than opening unsolicited emails or clicking on random links. Employees should also be trained to never respond to unsolicited requests for business or personal data of any kind, and companies should request removal from solicitation lists for business loans, credit cards and lines of credit – and those solicitation documents should be destroyed.

Cybersecurity is paramount, and businesses should use encrypted electronic payment forms, rather than paper, whenever possible. Electronic banking and transaction networks are inherently more secure than postal mail or fax and should be used as part of an overall IT security chain. For businesses of ANY size, including small- to medium-sized businesses, key elements of the security chain should encompass:

  • Encrypted communication – Via Virtual Private Network tunneling, to prevent sensitive traffic from going across the public internet, and protecting endpoints like laptops and desktops.
  • Encryption “retention”– Smartphones, hard drives and computers can contain sensitive information; when full disk encryption is in place, it prevents access to this information. However, as old equipment is discarded, encryption should be kept in place to protect the data on those devices.
  • Protection of data in transit and in the cloud – Leveraging full disk encryption to ensure that even if thieves intercept data, they can’t do anything with it.
  • Multi-factor authentication – Multi-tiered user authentication that makes it harder for an impostor to hijack login credentials and access data.
  • Firewalls – For blocking unauthorized access to company networks and systems, preventing data breaches and installation of viruses, malware and other code designed to steal sensitive information.

Overall, consumers and businesses should not underestimate the value of personal data. The unfortunate fact is that there is a thriving criminal market for this information, and cybercriminals are increasingly sophisticated. Tax season reminds us to be vigilant about data protection in order to prevent damage to businesses and personal finances – not to mention avoiding the stressful administrative headaches associated with data breaches. Doing as much as possible to secure data and keep personal identifying information safe – physically and electronically, including via the IT security chain – reduces the chance that even a successful data breach can do harm and ultimately protects and even enhances trust. And that is invaluable.


Featured

  • 2025 Gun Violence Statistics Show Signs of Progress

    Omnilert, a national leader in AI-powered safety and emergency communications, has released its 2025 Gun Violence Statistics, along with a new interactive infographic examining national and school-related gun violence trends. In 2025, the U.S. recorded 38,762 gun-violence deaths, highlighting the continued importance of prevention, early detection, and coordinated response. Read Now

  • Big Brand Tire & Service Rolls Out Interface Virtual Perimeter Guard

    Interface Systems, a managed service provider delivering remote video monitoring, commercial security systems, business intelligence, and network services for multi-location enterprises, today announced that Big Brand Tire & Service, one of the nation’s fastest-growing independent tire and automotive service providers, has eliminated costly overnight break-ins and significantly reduced trespassing and vandalism at a high-risk location. The company achieved these results by deploying Interface Virtual Perimeter Guard, an AI-powered perimeter security solution designed to deter incidents before they occur. Read Now

  • The Evolution of ID Card Printing: Customer Challenges and Solutions

    The landscape of ID card printing is evolving to meet changing customer needs, transitioning from slow, manual processes to smart, on-demand printing solutions that address increasingly complex enrollment workflows. Read Now

  • TSA Awards Rohde & Schwarz Contract for Advanced Airport Screening Ahead of Soccer World Cup 2026

    Rohde & Schwarz, a provider of AI-based millimeter wave screening technology, announced today it has won a multi-million dollar award from TSA to supply its QPS201 AIT security scanners to passenger security screening checkpoints at selected Soccer World Cup 2026 host city airports. Read Now

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.