Working Virtually: Protect Tax Data at Home and at Work with the "Security Six" – MyChesCo

WASHINGTON, D.C. With cyberthieves active during COVID-19, the Internal Revenue Service and the Security Summit partners are urging tax professionals to review critical security steps to ensure they are fully protecting client data whether working in the office or a remote location.

Many tax professionals have expanded telework options this year as firms, like other businesses, work to keep personnel safe, practice recommended safety guidelines and use technology to virtually serve their clients.

During this period, the Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency (CISA) have urged organizations to maintain a heightened state of alert as cybercriminals seek to exploit Covid-19 concerns.

To assist tax professionals with the security basics, the IRS, state tax agencies and nations tax industry are launching a five-part series called Working Virtually: Protecting Tax Data at Home and at Work. The special series is designed to help practitioners assess their home and office data security. The first recommendation covers the Security Six basic steps that should be taken for every work location. The series will continue each Tuesday through August 18.

The Security Summit partners urge tax professionals to take time this summer to give their data safeguards a thorough review and ensure that these protections are in place whether they work from home or the office, said IRS Commissioner Chuck Rettig.

Although the Security Summit a partnership between the IRS, states and the private-sector tax community is making major progress against tax-related identity theft, cybercriminals continue to evolve. They are aware that tax practitioners and their systems may be more vulnerable this year during COVID-19, especially if they are working remotely.

Although details may vary between commercial products, anti-virus software scans computer files or memory for certain patterns that may indicate the presence of malicious software (also called malware). Anti-virus software (sometimes more broadly referred to as anti-malware software) looks for patterns based on the signatures or definitions of known malware from cybercriminals. Anti-virus vendors find new issues and malware daily, so it is important that people have the latest updates installed on their computer.

Once users have installed an anti-virus package, they should scan their entire computer regularly by doing:

Sometimes the software will produce a dialog box with an alert that it has found malware and asks whether users want it to clean the file (to remove the malware). In other cases, the software may attempt to remove the malware without asking first.

When selecting an anti-virus package, tax professionals should learn about its features, so they know what to expect. Remember, keep security software set to automatically receive the latest updates so that it is always current.

A reminder about spyware, a category of malware intended to steal sensitive data and passwords without the users knowledge: Strong security software should protect against spyware. But remember, never click links within pop-up windows, never download free software from a pop-up, and never follow email links that offer anti-spyware software. The links and pop-ups may be installing the spyware they claim to be eliminating.

A reminder about phishing emails: A strong security package also should contain anti-phishing capabilities. Never open an email from a suspicious source, click on a link in a suspicious email or open an attachment to avoid being the victim of a phishing attack and having clients and firm data compromised.

Firewalls provide protection against outside attackers by shielding a computer or network from malicious or unnecessary web traffic and preventing malicious software from accessing systems. Firewalls can be configured to block data from certain suspicious locations or applications while allowing relevant and necessary data to pass through, according to CISA.

Firewalls may be broadly categorized as hardware or software. While both have their advantages and disadvantages, the decision to use a firewall is far more important than deciding which type used:

While properly configured firewalls may be effective at blocking some cyber-attacks, dont be lulled into a false sense of security. Firewalls do not guarantee that a computer will not be attacked. Firewalls primarily help protect against malicious traffic, not against malicious programs (malware), and may not protect the device if the user accidentally installs malware. However, using a firewall in conjunction with other protective measures (such as anti-virus software and safe computing practices) will strengthen resistance to attacks.

The Security Summit reminds tax pros that anti-virus software and firewalls cannot protect data if employees fall for email phishing scams and divulge sensitive data, such as usernames and passwords. The Summit reminds the tax community that users, not the software, is the first line of defense in protecting taxpayer data.

Tax software providers, email providers and others that require online accounts now offer customers two-factor authentication protections to access email accounts. Tax professionals should always use this option to prevent their accounts from being taken over by cybercriminals and putting their clients and colleagues at risk.

Two-factor authentication helps by adding an extra layer of protection beyond a password. Often two-factor authentication means the returning user must enter credentials (username and password) plus another step, such as entering a security code sent via text to a mobile phone. The idea is a thief may be able to steal the username and password but its highly unlikely they also would have a users mobile phone to receive a security code and complete the process.

The use of two-factor authentication and even three-factor authentication is on the rise, and tax preparers should always opt for a multi-factor authentication protection when it is offered, whether on an email account, tax software account or any password-protected product.

IRS Secure Access, which protects IRS.gov tools including e-Services, is an example of two-factor authentication.

Using the two-factor authentication options offered by tax software providers is critical to protect client data stored within those systems. Tax pros also can check their email account settings to see if the email provider offers two-factor protections.

Critical files on computers should routinely be backed up to external sources. This means a copy of the file is made and stored either online as part of a cloud storage service or similar product. Or, a copy of the file is made to an external disk, such as an external hard drive with multiple terabytes of storage capacity. Tax professionals should ensure that taxpayer data that is backed up also is encrypted for the safety of the taxpayer and the tax pro.

Given the sensitive client data maintained on tax practitioners computers, users should consider drive encryption software for full-disk encryption. Drive encryption, or disk encryption, transforms data on the computer into unreadable files for an unauthorized person accessing the computer to obtain data. Drive encryption may come as a stand-alone security software product. It may also include encryption for removable media, such as a thumb drive and its data.

This is critical for practitioners who work remotely. If a tax firms employees must occasionally connect to unknown networks or work from home, establish an encrypted Virtual Private Network (VPN) to allow for a more secure connection. A VPN provides a secure, encrypted tunnel to transmit data between a remote user via the Internet and the company network. Search for Best VPNs to find a legitimate vendor; major technology sites often provide lists of top services.

All tax professionals also should review their professional insurance policy to ensure the business is protected should a data theft occur. Some insurance companies will provide cybersecurity experts for their clients. These experts can help with technology safeguards and offer more advanced recommendations.

Having the proper insurance coverage is a common recommendation from tax professionals who have experienced data thefts.

Tax professionals also can get help with security recommendations by reviewing the recently revised IRSPublication 4557, Safeguarding Taxpayer Data, andSmall Business Information Security: The Fundamentalsby the National Institute of Standards and Technology.

Publication 5293, Data Security Resource Guide for Tax Professionals, provides a compilation data theft information available on IRS.gov. Also, tax professionals should stay connected to the IRS through subscriptions toe-News for Tax ProfessionalsandSocial Mediaor visit Identity Theft Central atIRS.gov/identitytheft.

Thanks for visiting! MyChesCo brings reliable information and resources to Chester County, Pennsylvania. Please consider supporting us in our efforts. Your generous donation will help us continue this work and keep it free of charge. Show your support today by clicking here and becoming a patron.

Original post:
Working Virtually: Protect Tax Data at Home and at Work with the "Security Six" - MyChesCo

Related Posts
This entry was posted in $1$s. Bookmark the permalink.