{"id":87439,"date":"2021-08-17t00:20:23","date_gmt":"2021-08-17t04:20:23","guid":{"rendered":"\/\/www.g005e.com\/?p=87439"},"modified":"2021-10-21t23:03:19","modified_gmt":"2021-10-22t03:03:19","slug":"what-tax-pros-need-to-know-about-cybersecurity","status":"publish","type":"post","link":"\/\/www.g005e.com\/2021\/08\/17\/what-tax-pros-need-to-know-about-cybersecurity\/","title":{"rendered":"cybersecurity for tax professionals"},"content":{"rendered":"
\"\"
welch<\/figcaption><\/figure>\n

checklist: the 24 steps to prevent and, if necessary, respond to breaches.<\/strong><\/p>\n

by amy welch<\/em><\/p>\n

last year, there were nearly 90,000 reports of tax identity theft, according to the federal trade commission.<\/p>\n

in fact, in june, an irs agent admitted to stealing someone\u2019s identity. law360.com reported special agent bryan cho, 49, pled guilty to aggravated identity theft and wire fraud in a brooklyn district court. it appears anyone can be a criminal!<\/p>\n

join donny shimamoto, <\/strong>cpa, citp, cgma, for “hybrid work: holistic approach to customer, employee & cybersecurity risks,” aug. 26, 3:30 pm et. register here<\/a> | learn more<\/a><\/p><\/blockquote>\n

it\u2019s also important to note that protecting taxpayer data is the law. according to the ftc safeguards rule, \u201ctax return preparers must create and enact security plans to protect client data. failure to do so may result in an ftc investigation.\u201d additionally, any \u201cfailures that lead to an unauthorized disclosure may subject you to penalties under sections 7216 and\/or 6713 of the internal revenue code.<\/p>\n

irs recommendations for tax practitioners<\/strong><\/p>\n

there are seven security and privacy recommendations listed in irs publication 4557, safeguarding taxpayer data: a guide for your business:<\/p>\n

1 \u2013 learn to recognize phishing emails, especially those pretending to be from the irs, e-services, a tax software provider, a new or existing client, or a cloud storage provider. never open an embedded link or any attachment from a suspicious email.<\/p>\n

2 \u2013 create a written information security plan using irs publication 4557, safeguarding taxpayer data, and small business information security \u2013 the fundamentals (nistir 7621r1), by the national institute of standards and technology.<\/p>\n

3 \u2013 review internal controls.<\/p>\n