Securing Financial Information During Tax Season
April 5, 2017 By Christopher George cybersecurity, data security, Education, financial information
Cybersecurity is important year-round, but becomes especially critical in tax season. Throughout this time, business owners are frequently sharing sensitive information with outside professionals and key employees via the internet. Many small organizations do not have the same cybersecurity resources as larger corporations, making them a prime target for hackers.
Leading up to tax season, as a small business owner, you should begin gathering all tax documents and ensure you are taking the following basic security precautions:
- When sharing sensitive or identifying information with a CPA, outside tax professional, or other employees via email, use encryption to safeguard data. You can also use a secure email sender that will automatically delete the message after a set number of days. Double checking email addresses to verify the intended end-recipient will also help prevent information from falling into the wrong hands.
- Phishing attacks are another way organizations are targeted during tax season. Cybercriminals pose as company employees or tax professionals using false email addresses to request confidential information. Staff members should never reply directly with the information requested or click on any links in the email. Instead, they should first confirm the request with the sender by phone. If the request is legitimate, sending a new encrypted message to the email address on file will ensure the data is secure.
- Another way to avoid cybersecurity breaches is by using complicated passwords for online accounting services. The most common passwords in the world are “123456” and “password.” Steer away from using family names and birthdates in passwords as they can be easily hacked. Only a mix of capital and lower case letters, numbers and symbols should be used to better protect your information.
Talk with your tax professional about the security solutions they utilize to guard the data you share with them. If you will be communicating via email, ask what types of email encryption options they have. If you use an online service, look on their website to see what security features they provide. Password-protection safeguards and email encryption services are vital in preventing attacks.
Meet with all your employees to make sure they are aware of potential risks to their online data and provide them with strategies to protect themselves from threats. Quite often, security breach issues created by staff members are due to unintentional mistakes. Remind your employees to verify that all received emails came from a reputable sender by carefully checking the email address for accuracy. Staff members should never click on any links contained in emails unless they are from a reputable sender. If a request for information or the content of an email seems odd, or contains grammatical errors, they should contact the sender by phone to confirm the message. Finally, review the importance of only using familiar WiFi networks to avoid sharing accidents and establish strong password guidelines.
Click here for details on how our Premonition™ Security Suite will help safeguard your company data, or call us at (855) PRO-TELL.
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)