Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What’s the Government Doing to Protect Your Tax Returns?

What’s the Government Doing to Protect Your Tax Returns?

Last year’s United States’ tax season when the Internal Revenue Service (IRS) was breached and hackers used 464,000 stolen Social Security numbers to successfully E-file 101,000 fraudulent tax returns using false PINs. This incident should cause taxpayers to ask the question, “What’s the government doing to protect my tax returns?”

As reported by the IRS, the organization has made significant improvements over the past year in order to protect the identities of taxpayers from fraudulent returns “before, during, and after a tax return is filed.” From a November statement on irs.gov: “This is highlighted by the number of new people reporting stolen identities on federal tax returns falling by more than 50 percent, with nearly 275,000 fewer victims compared to a year ago.”

One new tool the IRS credits to dramatically combating identity theft is an annual Security Summit. This was a way for the IRS to begin identifying and implementing changes. According to the IRS, successful efforts of the summit have lead to:

  • Identity theft affidavits falling sharply: A decrease of 50 percent during the first nine months of 2016 compared to 2015.
  • More fraudulent returns stopped before processing: This factor also dropped by nearly 50 percent. From January through September of 2016, the IRS stopped 787,000 confirmed identity theft returns, totalling more than $4 billion.
  • A decrease in fraudulent refunds: Thanks to the number of bank partners increasing by 106 institutions since 2015, the number of suspect refunds stopped by banks and returned to the IRS dropped by more than 50 percent.
  • Shared information stopping more bad returns: This can be attributed to information provided by industry and state partners in order to improve IRS fraud filters, 57,000 bad tax returns were stopped that would have otherwise bypassed IRS processing filters.
  • Shared data elements helping to identify new areas: Adding new data elements on tax returns helped the IRS stop over 74,000 suspicious returns, preventing $372 million in fraudulent refunds from being paid.

While these improvements are indeed significant, any concerned taxpayer will take away from all of this that, though improved, the IRS still isn’t batting 1,000 when it comes to protecting citizens against identity theft. Therefore, continuing to be mindful of best security practices when it comes to handling sensitive data for all aspects of your business is still highly recommended.

To help businesses out, the IRS has prepared a list of critical steps you can take to protect yourself and your clients from identity theft.

  • Assure that taxpayer data, including data left on hardware and media, is never left unsecured.
  • Securely dispose of taxpayer information.
  • Require strong passwords (numbers, symbols, upper & lowercase) on all computers and tax software programs.
  • Require periodic password changes every 60-to-90 days.
  • Store taxpayer data in secure systems and encrypt information when transmitting across networks.
  • Ensure that email being sent or received, that contains taxpayer data, is encrypted and secure.
  • Make sure paper documents, computer disks, flash drives and other media are kept in a secure location and restrict access to authorized users only.
  • Use caution when allowing or granting remote access to internal networks containing sensitive data.
  • Terminate access to taxpayer information for anyone who is no longer employed by your business.
  • Create security requirements for your entire staff regarding computer information systems, paper records, and use of taxpayer data.
  • Provide periodic training to update staff members on any changes and ensure compliance.
  • Protect your facilities from unauthorized access and potential dangers.
  • Create a plan on required steps to notify clients should you be the victim of any data breach or theft.

When it comes to implementing many of these best practices and securing your network to protect against identity theft, Evolve IT is here to help. Call us today at (518) 203-2110 for your IT security assessment. Keep in mind that, while death and taxes are both guaranteed, identity theft can be prevented by taking the right precautions.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Privacy Email Productivity Business Malware Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Google Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Hardware Network Security Ransomware Hacking WiFi Facebook Operating System Microsoft Office Office The Internet of Things Social Media Backup Apps Business Continuity Bandwidth Disaster Recovery Communication Employer-Employee Relationship History Two-factor Authentication Mobile Device Management Money Small Business Phishing Network App Managed Service Provider Mobile Computing Outlook Big Data communications Safety Unified Threat Management Quick Tips Wireless Technology Android Apple Smartphones Firewall Best Practice Content Filtering Cybercrime Alert Website Networking Data storage Data Windows Experience Black Market Memory YouTube Processors Application Staffing Office Tips LiFi BYOD Deep Learning Customer Service Downtime Passwords BDR Streaming Media Help Desk Disaster Micrsooft Visible Light Communication Vendor Management Router Business Growth Office 365 Data Management Recovery Robot Advertising Society Monitors Analytics Sports Saving Money intranet Google Wallet Lithium-ion battery Spam Running Cable Information Technology Windows 8 Displays Internet of Things Social Networking Hosted Solution Windows XP IT Services Public Speaking Documents Artificial Intelligence Tech Support End of Support IP Address Compliance Virtualization Drones Government Social Printer Writing Augmented Reality Browser Keyboard Search Virtual Desktop User Wireless Hard Drives Securty Unified Communications Document Management Remote Computing Encryption Shortcut Law Enforcement DDoS SaaS VoIP Heating/Cooling Word Proactive IT Retail Cortana Network Congestion Save Money Business Management Music Managed IT services Competition Cryptocurrency Presentation Laptop Entrepreneur Bluetooth Domains IBM Google Docs Education Cleaning Automation Hacker Holiday
QR-Code