Firms are spending plenty on tech but are skimping when it comes to training their people to recognize an incoming attack. To read the full article in Financial Planning, click: The Cybersecurity Defense Advisors Forget.
-
-
The Internal Revenue Service has highlighted 12 abusive tax schemes it wants taxpayers and tax practitioners to be on alert for this year. Phishing and scam phone calls are the biggest repeat offenders. To read the full article in the Journal of Accountancy, click: IRS’ “Dirty Dozen” Scams—2019 Edition.
-
Even firms that believe they are too small to matter should think again. If a cyberattack happens at the firm’s outsourced CRM partner, portfolio management vendor or custodian, and clients’ personal information is compromised, where is your client going to turn first to demand an explanation? To read the full article in FinancialPlanning, click: When Your Vendor is Hacked, Doing Nothing Won’t Cut it.
-
As cybercriminals become more sophisticated and cast a wider net, tax practitioners should take a number of steps to protect themselves and their clients. Shannon Smith Retzke, Esq., explains that practitioners need to be careful about everything they do online as cybercriminals proliferate. To read the full article in The Tax Adviser, click: Phishing Scams Target Tax Professionals.
-
Here are the IRS’s Top “Dirty Dozen” Tax Scams for 2016 The Internal Revenue Service released its annual list of the “dirty dozen” worst tax scams, starting with identity theft and winding up with frivolous tax arguments. Sally P. Schreiber, senior editor of JofA, lists what taxpayers and practitioners need to watch out for. To read the full article in the Journal of Accountancy, click: 2016’s Dirty Dozen Tax Scams.
-
Phone fraud tops this year’s list of the biggest IRS tax scams of 2015, states Sally P. Schreiber, JD, senior editor of Journal of Accountancy, followed by phishing, identity theft, return preparer fraud, and hiding income offshore, rounding out the top five scams. The article delves into the many schemes, including suspicious e-mails, detecting identity theft, refund fraud, fake charities, and more, and includes details on identifying each of the dozen scams that will assist in providing taxpayer protection. To learn more about the top tax scams of 2015, click here. Image courtesy of Stuart Miles/FreeDigitalPhotos.net
-
External Attacks, Data Loss are Top Concerns Jeffrey Roman at Government Industry Security interviews Forensics expert Rob Lee who says its not new types of attacks that concern him. It’s the old ones that continue to impact organizations. How can organizations learn from past incidents and respond in 2013? The bulk of the cases he investigates are external breaches, not insider cases, says Lee, a seasoned forensics professional and curriculum lead and author for digital forensic and incident response training at the SANS Institute. When analyzing the incidents and reporting back to technical teams or executives, he’s often faced with the question, “How do…
-
How Much Do You Know about Protecting Personal and Corporate Information from Would-be Fraudsters? Find out what you know about how to analyze credit, what causes data breaches, what precautions to take when accessing hotspots in an airport with a laptop, current identity theft laws, and controlling physical access to restricted areas.