IRS Tip – Tax pros: Follow the “Security Six” steps to help

IRS Tax Tip 2019-117, August 27, 2019… Tax professionals should review security steps to make sure they are fully protecting sensitive taxpayer data. All tax pros should give their data safeguards a thorough review. Part of this review is following the “Security Six” protections. Here is more info about these basic protections that everyone – especially tax professionals handling sensitive data – should use: Anti-virus software This software scans computer files or memory for certain patterns that may indicate there’s malicious software – also called malware – on the device. Anti-virus vendors find new issues and update malware daily. This is why it’s important for users to install the latest updates of the software. Firewalls Firewalls provide protection against outside attackers. The firewall shields computers and networks from malicious or unnecessary web traffic. This helps prevents malicious software from accessing the user’s system. Two-factor authentication Two-factor authentication adds an extra layer of protection beyond a password. The returning user enters credentials like a username and password. Then, there’s another step, such as entering a security code. Backup software or services Users should routinely back up critical files on their computers and hard drives to external sources. Drive encryption Because tax professionals keep sensitive client data on their computers, users should consider drive encryption software. Drive encryption is also knowns as disk encryption. It transforms data on the computer into unreadable files. This means only people who are authorized to access the data can do so. Virtual private network Many tax firms’ employees must occasionally connect to unknown networks or work from home. So, the office should establish an encrypted virtual private network. This allows for a more secure connection. A VPN provides a secure, encrypted tunnel to transmit data between a remote user over the internet and the company network.

Leave a comment

Your email address will not be published. Required fields are marked *