Tax Security Tips

Tax Security Tips

It’s that most wonderful time of the year when we cheerfully pay Uncle Sam what we owe. Unfortunately, not only do we have to deal with the stress of filing taxes, we have to watch for ways cyber criminals can take advantage of us. Here are tax security tips:

Phishing in HR and Accounting

Throughout the year, but especially at tax time, be aware that criminals use fraudulent emails to try to trick people into giving up sensitive, identifying information. 

If you work in HR or accounting, be suspicious of any requests for employees’ information. If you get an email asking for W2 information that looks like it’s from the IRS or from an employee in your company, don’t immediately reply. For tax security, always follow up this kind of request with a phone call directly to the sender. You might also have a policy in place about where W2 information can and can’t be sent. 

Keep in mind that the IRS typically does not email requests for information. In fact, the IRS offers help in identifying and reporting phishing scams on this page of its website.

Tax Security for Employees

If your employer or any department of your company requests identifying information, follow up with a phone call or a face-to-face conversation with the supposed requester. Just think: Leaving your desk to head over to accounting could help you get your steps in for the day and you might even pass that candy jar that’s always stocked with m&m’s. Score! 

Also be extra vigilant about emails that claim to come from the IRS or services like Turbo Tax. Never click on unexpected links in an email. Go to the organization’s official website and look for a way to contact them directly.   

If you do use online sites like Turbo Tax, be sure to follow best practices for passwords:

  • Create a strong password that is at least eight characters and a mix of capital and lowercase letters, numbers and symbols.
  • Use a password vault (we like 1Password) to generate and store passwords.
  • Choose a unique password that you’re not using on other sites.
  • Change your password at the start of the tax season each year.
  • Turn on multi-factor (or two-factor) authentication whenever the option is available.

Facebook scams can pop up around tax time, too. Watch for any links that might be shared for services like Turbo Tax or the IRS. These links could take you to a site that looks like the real thing, but is a sham site created to collect identifying information from unsuspecting users. 

If You’ve Been Breached, Beware

If your personally identifiable information (PII) has been stolen in the past, be extra wary when filing taxes. Once your Social Security number or birth date has been exposed, it’s best to file your taxes early every year and monitor your credit. You should also use an identity shield tool like ID Shield. 

Many employers offer identity shield subscriptions as a benefit. For the sake of tax security, be sure to ask your HR department, and if it’s offered, use it. Happy tax day!  

Posted in
Joshua Gray | Intrust IT Support Cincinnati

Josh Rees

Josh Rees, Client Success Manager, has been with Intrust for over 5 years and started as a service technician for a year before moving to his current position. He acts as quarterback for Intrust, making sure that we are all on the same page. In his spare time, Josh is a huge comic book collector.

Share this Blog

Enterprise Password Management Promo Wide

Is Your Name or Birthday a Part of Your Password?

If so, you’re a part of the 59 percent of people who don’t follow proper password hygiene. More than 70 percent of passwords are used for more than one system, meaning if cybercriminals crack one, they can access a lot more accounts.

Our free Enterprise Password Management Guide will give you the best password hygiene practices to help you secure your computer and your business.

Download the Guide

Explore the Latest Trends in IT

Cybersecurity Strategies for Municipalities 8 Expert Tips - Intrust IT

Cybersecurity Strategies for Municipalities: 8 Expert Tips

Municipalities tasked with safeguarding sensitive data and critical infrastructure are increasingly the targets of cyberattacks. Municipalities often handle a vast...
Business Continuity Guide for City Managers - Intrust IT

Business Continuity Guide for City Officials

The resilience of a city's operations hinges on its ability to effectively weather unforeseen challenges. From natural disasters to cyber...
Integrating AI for Enhanced Security - Intrust IT

Integrating AI for Enhanced Security

Organizations face an unprecedented array of cybersecurity threats, and now, cybercriminals are actively leveraging artificial intelligence (AI) to help create...
Cybersecurity for Small Businesses Threat Management Strategies - Intrust IT

Cybersecurity for Small Businesses: Threat Management Strategies

The threat of cybercrime looms larger than ever before. With each passing year, we witness a staggering rise in cyberattacks,...
The Crucial Role of Data Backup in Business Continuity and Disaster Recovery - Intrust IT

The Crucial Role of Data Backup in Business Continuity and Disaster Recovery

Data is the lifeblood of any modern business operation. All organizations rely heavily on digital information, from customer and financial...
What is Two Factor Authentication, and Why Does it Matter - Intrust IT

What Is Two Factor Authentication, and Why Does It Matter?

You’ve likely seen security updates on your phone or computer asking you to set up 2FA or MFA to increase...