If you process or store Form W-2 Wage and Tax Statements, you are a target. The Form W-2 contains everything a malicious actor needs to file a false tax return with the Internal Revenue Service (IRS) and steal a refund. Because a W-2 contains a consumer Social Security number (SSN), it is highly valued on the dark web, and therefore highly sought after by thieves.Read more »
W-2 Image Exploits: With the Tax Season Come the Thieves Posted on: January 10, 2019 In: Data Privacy & Cybersecurity
- March 14, 2019 ‘Full Moon’ Costs Denied by Supreme Court in Oracle Copyright Case
- March 12, 2019 FLSA Double Time
- February 27, 2019 It’s a Bird, It’s a Plane, No… It’s Cryptojacking!
2fa 9th circuit after-acquired evidence agreements america invents act anti-money laundering audit bank secrecy act biometric bitcoin breach notification business california canada cease and desist client notification coast guard compliance confidentiality congress consent order consumer consent consumer notification copyright critical security controls cryptocurrency cybersecurity cyber threat data breach data privacy data security dmarc ebt electronic protected health information employee handbook employers employment employment law equifax essential employees eu eu-u.s. privacy shield european unioin european union executive order fcra federal circuit federal trade commission foreign filing gdpr hacking hippa identity theft illinois indictment infringement internet internet service provider inter partes review ipr sovereign immunity irs justice department malware massachusetts meltdown me too microsoft office 365 misconduct multi-factor identification new mexico nist framework nist security controls non-competition ocabr oracle passwords patent litigation patents payroll personal data ptab ransomware regulations scheduling secret sauce security rule social engineering social media spectre statute supervisory authorities supreme court tax preparers tax returns technology trade secrets uspto virginia w2 washington