Why Protecting Your Tax Data Is More Important than Ever

Why Protecting Your Tax Data Is More Important than Ever

For individuals and many businesses, Tax Day is April 18 this year – and while it isn’t necessarily a celebration for most, completing returns on time can be immensely satisfying…and a huge relief. However, in recent years a disturbing new trend is on the rise – cybercrime relating to tax returns and tax-related data. For its victims, Tax Day represents inconvenience and loss.

Every year, in the run-up to the tax filing deadline, data breaches are becoming more frequent and larger in scope. With Tax Day approaching, businesses and individual filers should be aware that the sensitive data they are required to submit to the IRS may not be as secure as they may assume. For example:

  • In August 2015, the IRS was sued by taxpayers after it fell prey to a massive data breach affecting 330,000 people. Hackers reportedly stole personal information including Social Security numbers and accessed completed tax returns from the IRS. Multiple reports suggest that thieves were able to use this information to steal more than $50 million in federal funds.
  • Later, in February 2016, the IRS reported that the data breach was more than twice as big as initially realized. Instead of 330,000, the IRS reported that the data breach may have affected more than 700,000 victims.

Those affected are undoubtedly still feeling the effects from this theft, and we have learned the hard way that the IRS is not immune to cybertheft. As businesses and individuals increasingly file taxes and reports online, data breaches are becoming more common. This is especially true in the first quarter of the year, leading up to Tax Day, when more online financial activity occurs, and criminals know there is valuable, and, in some cases, easily obtainable information being transmitted to and from the IRS. A recent survey conducted by Impulse Research Group on behalf of Experian showed that almost half of respondents filed their own taxes electronically, another 20 percent file taxes by mail, and 30 percent file taxes with the help of a tax professional. As a result, information can be redirected without the knowledge of the individual.

A critical first step to preventing tax-related identity theft is to ensure that tax documents are securely stored and archived and that proper destruction of documents takes place after the period of limitations for a return runs out, usually three years per IRS guidelines. In addition, businesses should protect from phishing scams by educating employees on proper handling of documents that contain Social Security and tax ID numbers, as well as any sensitive employee data. Suspicious emails shouldn’t be opened; instead, users should go directly to the source, such as IRS.gov, rather than opening unsolicited emails or clicking on random links. Employees should also be trained to never respond to unsolicited requests for business or personal data of any kind, and companies should request removal from solicitation lists for business loans, credit cards and lines of credit – and those solicitation documents should be destroyed.

Cybersecurity is paramount, and businesses should use encrypted electronic payment forms, rather than paper, whenever possible. Electronic banking and transaction networks are inherently more secure than postal mail or fax and should be used as part of an overall IT security chain. For businesses of ANY size, including small- to medium-sized businesses, key elements of the security chain should encompass:

  • Encrypted communication – Via Virtual Private Network tunneling, to prevent sensitive traffic from going across the public internet, and protecting endpoints like laptops and desktops.
  • Encryption “retention”– Smartphones, hard drives and computers can contain sensitive information; when full disk encryption is in place, it prevents access to this information. However, as old equipment is discarded, encryption should be kept in place to protect the data on those devices.
  • Protection of data in transit and in the cloud – Leveraging full disk encryption to ensure that even if thieves intercept data, they can’t do anything with it.
  • Multi-factor authentication – Multi-tiered user authentication that makes it harder for an impostor to hijack login credentials and access data.
  • Firewalls – For blocking unauthorized access to company networks and systems, preventing data breaches and installation of viruses, malware and other code designed to steal sensitive information.

Overall, consumers and businesses should not underestimate the value of personal data. The unfortunate fact is that there is a thriving criminal market for this information, and cybercriminals are increasingly sophisticated. Tax season reminds us to be vigilant about data protection in order to prevent damage to businesses and personal finances – not to mention avoiding the stressful administrative headaches associated with data breaches. Doing as much as possible to secure data and keep personal identifying information safe – physically and electronically, including via the IT security chain – reduces the chance that even a successful data breach can do harm and ultimately protects and even enhances trust. And that is invaluable.


Featured

  • Survey: 84 Percent of Healthcare Organizations Spotted Cyberattack in Last 12 Months

    Netwrix, a vendor specializing in cybersecurity solutions focused on data and identity threats, surveyed 1,309 IT and security professionals globally and recently released findings for the healthcare sector based on the data collected. It reveals that 84% of organizations in the healthcare sector spotted a cyberattack on their infrastructure within the last 12 months. Phishing was the most common type of incident experienced on premises, similar to other industries. Read Now

  • Keynote Speakers Announced for ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. Read Now

    • Industry Events
    • ISC West
  • Study: Video Doorbells Have a 71% Service Attach Rate

    Parks Associates recently announced a new white paper, Consumer IoT Product Development: Managing Costs, Optimizing Revenues, which provides companies with a business-planning blueprint to evaluate how a consumer IoT solution will perform across its lifetime. Subscription services, such as video storage and professional monitoring, can be critical for covering ongoing cloud and support costs Read Now

  • Michigan City Fights Retail Crime With AI-Powered Video Surveillance, 911 Camera Sharing

    To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3