As the Internal Revenue Service warned tax professionals in November, malicious actors are currently attempting to hack into tax preparers’ networks to steal 2020 tax return information. If you are a professional tax preparer, you are a target – regardless of the size of your business.
Read more »Tag: w2
-
Tax Return Theft: Tips for Prevention and Response Posted on: January 06, 2020 In: Data Privacy & Cybersecurity
-
W-2 Image Exploits: With the Tax Season Come the Thieves Posted on: January 10, 2019 In: Data Privacy & Cybersecurity
If you process or store Form W-2 Wage and Tax Statements, you are a target. The Form W-2 contains everything a malicious actor needs to file a false tax return with the Internal Revenue Service (IRS) and steal a refund. Because a W-2 contains a consumer Social Security number (SSN), it is highly valued on the dark web, and therefore highly sought after by thieves.
Read more »
Blog Search
Featured Posts
- May 10, 2022 NCAA Takes Action to Address “Collectives” and “Booster” Involvement in NIL Activity
- May 09, 2022 Can Your Coffee Maker Be Hacked? Cybersecurity Issues and the Growing Internet of Things
- April 15, 2022 Federal Law Ends Mandatory Arbitration of Sexual Harassment and Sexual Assault Claims
Blog Tags
alabama
arkansas
audit
bank secrecy act
biometric data
blockchain
breach notification
california
canada
ccpa
cisa
client notification
colorado
congress
connecticut
consumer data
consumer notification
consumer rights
coronavirus
covid-19
cpa
cppa
cpra
cryptocurrency
cyberattack
cybersecurity
cyber threat
cyberwarfare
data breach
data privacy
data protection
data security
email
employment
equifax
eu
european union
executive order
fbi
fcra
federal trade commission
financial fraud kill chain
fincen
fraud
ftc
gdpr
hacking
healthcare
hhsocr
hipaa
holiday season
human resources
identity theft
illinois
incident response
information security
irs
legislation
legislative alert
malware
managed service providers
maryland
massachusetts
microsoft exchange servers
microsoft office 365
multi-factor authentication
multi-factor identification
new jersey
new mexico
new york
nist
nist security controls
office for civil rights
personal data
personal information
phishing
privacy law
privacy protection patchwork
protected health information
ransomware
regulations
reporting requirements
russia ukraine conflict
sec
social engineering
social media
statute
strengthening american cybersecurity act
supreme court
tax returns
treasury department
utah
vcdpa
video-teleconferencing
virginia
w2
washington
websites
wire transfers
zoom