The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/27/2019
/ Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Theft ,
Hackers ,
Identity Theft ,
IRS ,
Personally Identifiable Information ,
Popular ,
State Taxes ,
Tax Returns
The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/15/2019
/ Cyber Crimes ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Identity Theft ,
Income Taxes ,
IRS ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
Social Security Numbers ,
Tax Planning ,
Tax Returns
The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/14/2019
/ Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Data Theft ,
Email ,
FBI ,
Hackers ,
IRS ,
Phishing Scams ,
Popular ,
Ransomware
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
6/27/2018
/ Bitcoin Mining ,
Blacklist ,
Computer Servers ,
Computer Virus Protection ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Mining ,
Data Protection ,
Data Security ,
Digital Currency ,
Hackers ,
Internet of Things ,
Malware ,
Mobile Devices ,
Operating System Developers ,
Passwords ,
Popular ,
Risk Mitigation ,
Software Developers ,
US-CERT ,
User Names ,
Websites
While it may be better known as “Cyber Monday”, today also marks the start of the second annual National Tax Security Awareness Week (November 27 to December 1). The Internal Revenue Service, state tax agencies and the tax...more
11/27/2017
/ Cyber Attacks ,
Cybersecurity ,
Cybersecurity Summit ,
Data Protection ,
Data Security ,
Hackers ,
Identity Theft ,
IRS ,
Personally Identifiable Information ,
Phishing Scams ,
W-2
Since it was first announced by Presidential Proclamation in 2013, we mark each October as National Cybersecurity Awareness Month. The Department of Homeland Security explains that, in 2017, designation is “designed to engage...more
On Friday, May 12, 2017, a malicious ransomware program known as WannaCry was discovered infecting computer systems all over the world. It set off alarms globally, and so far has infected over 200,000 computers across more...more
5/19/2017
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
FBI ,
Hackers ,
Incident Response Plans ,
Malware ,
Microsoft ,
National Security Agency (NSA) ,
Ransomware ,
US-CERT
Someone may be using your laptop or your desktop web camera to watch and listen to you without your knowledge. It happens, and yes, it’s downright creepy. And to think that someone may be spying on your kids that way is...more
Earlier this month, the California Attorney General’s Office released the 2016 Data Breach Report covering years 2012 through 2015 for the State of California (the “AG’s Report”). The AG’s Report reveals that 557 data...more
As part of the government’s recent clarion call to improve our individual and collective cybersecurity posture, several federal and state agencies have released a variety of guidelines, frameworks, best practices and tips. ...more
9/8/2015
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Department of Justice (DOJ) ,
FCC ,
Federal Trade Commission (FTC) ,
Hackers ,
National Security Agency (NSA) ,
NIST ,
SBA ,
Securities and Exchange Commission (SEC) ,
Small Business ,
U.S. Commerce Department ,
Websites
A fictional cyber-terrorist weaponizing a medical device by hacking into it has become a familiar plot premise in recent Hollywood dramas. Unfortunately, the risk of harm from medical device hacking has now become an...more