Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What’s the Government Doing to Protect Your Tax Returns?

What’s the Government Doing to Protect Your Tax Returns?

Last year’s United States’ tax season when the Internal Revenue Service (IRS) was breached and hackers used 464,000 stolen Social Security numbers to successfully E-file 101,000 fraudulent tax returns using false PINs. This incident should cause taxpayers to ask the question, “What’s the government doing to protect my tax returns?”

As reported by the IRS, the organization has made significant improvements over the past year in order to protect the identities of taxpayers from fraudulent returns “before, during, and after a tax return is filed.” From a November statement on irs.gov: “This is highlighted by the number of new people reporting stolen identities on federal tax returns falling by more than 50 percent, with nearly 275,000 fewer victims compared to a year ago.”

One new tool the IRS credits to dramatically combating identity theft is an annual Security Summit. This was a way for the IRS to begin identifying and implementing changes. According to the IRS, successful efforts of the summit have lead to:

  • Identity theft affidavits falling sharply: A decrease of 50 percent during the first nine months of 2016 compared to 2015.
  • More fraudulent returns stopped before processing: This factor also dropped by nearly 50 percent. From January through September of 2016, the IRS stopped 787,000 confirmed identity theft returns, totalling more than $4 billion.
  • A decrease in fraudulent refunds: Thanks to the number of bank partners increasing by 106 institutions since 2015, the number of suspect refunds stopped by banks and returned to the IRS dropped by more than 50 percent.
  • Shared information stopping more bad returns: This can be attributed to information provided by industry and state partners in order to improve IRS fraud filters, 57,000 bad tax returns were stopped that would have otherwise bypassed IRS processing filters.
  • Shared data elements helping to identify new areas: Adding new data elements on tax returns helped the IRS stop over 74,000 suspicious returns, preventing $372 million in fraudulent refunds from being paid.

While these improvements are indeed significant, any concerned taxpayer will take away from all of this that, though improved, the IRS still isn’t batting 1,000 when it comes to protecting citizens against identity theft. Therefore, continuing to be mindful of best security practices when it comes to handling sensitive data for all aspects of your business is still highly recommended.

To help businesses out, the IRS has prepared a list of critical steps you can take to protect yourself and your clients from identity theft.

  • Assure that taxpayer data, including data left on hardware and media, is never left unsecured.
  • Securely dispose of taxpayer information.
  • Require strong passwords (numbers, symbols, upper & lowercase) on all computers and tax software programs.
  • Require periodic password changes every 60-to-90 days.
  • Store taxpayer data in secure systems and encrypt information when transmitting across networks.
  • Ensure that email being sent or received, that contains taxpayer data, is encrypted and secure.
  • Make sure paper documents, computer disks, flash drives and other media are kept in a secure location and restrict access to authorized users only.
  • Use caution when allowing or granting remote access to internal networks containing sensitive data.
  • Terminate access to taxpayer information for anyone who is no longer employed by your business.
  • Create security requirements for your entire staff regarding computer information systems, paper records, and use of taxpayer data.
  • Provide periodic training to update staff members on any changes and ensure compliance.
  • Protect your facilities from unauthorized access and potential dangers.
  • Create a plan on required steps to notify clients should you be the victim of any data breach or theft.

When it comes to implementing many of these best practices and securing your network to protect against identity theft, Evolve IT is here to help. Call us today at (518) 203-2110 for your IT security assessment. Keep in mind that, while death and taxes are both guaranteed, identity theft can be prevented by taking the right precautions.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 14 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Hosted Solutions Microsoft Computer Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Network Security Ransomware Hardware Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Operating System Hacking WiFi Facebook The Internet of Things Social Media Bandwidth Firewall Mobile Device Management Money Network Content Filtering Cybercrime Managed Service Provider Website Outlook Smartphones Wireless Technology Android Employer-Employee Relationship Apple History Two-factor Authentication Small Business Phishing Best Practice App Alert Mobile Computing Networking communications Big Data Data storage Safety Data Unified Threat Management Windows Experience Quick Tips Search User BYOD Downtime Help Desk Hard Drives Passwords Displays Streaming Media Shortcut Visible Light Communication Disaster Remote Computing Micrsooft DDoS Heating/Cooling Business Growth End of Support Word Data Management Advertising Recovery Robot Society Sports Google Wallet Writing Business Management Spam Information Technology Running Cable Competition Windows 8 Internet of Things IT Services Presentation Hosted Solution Entrepreneur Windows XP Artificial Intelligence Documents Domains Tech Support Compliance Hacker Drones Retail Social Application Printer Browser Virtual Desktop Wireless Customer Service Managed IT services Unified Communications Securty Document Management Encryption SaaS VoIP Law Enforcement Bluetooth Router Office 365 Cortana Proactive IT Automation Saving Money Analytics Network Congestion Memory Lithium-ion battery Save Money intranet Music Deep Learning BDR Cryptocurrency Social Networking Laptop IBM Public Speaking Vendor Management Virtualization Education IP Address Google Docs Cleaning Holiday Processors Black Market Monitors Government YouTube Keyboard LiFi Staffing Augmented Reality Office Tips
QR-Code