Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What’s the Government Doing to Protect Your Tax Returns?

What’s the Government Doing to Protect Your Tax Returns?

Last year’s United States’ tax season when the Internal Revenue Service (IRS) was breached and hackers used 464,000 stolen Social Security numbers to successfully E-file 101,000 fraudulent tax returns using false PINs. This incident should cause taxpayers to ask the question, “What’s the government doing to protect my tax returns?”

As reported by the IRS, the organization has made significant improvements over the past year in order to protect the identities of taxpayers from fraudulent returns “before, during, and after a tax return is filed.” From a November statement on irs.gov: “This is highlighted by the number of new people reporting stolen identities on federal tax returns falling by more than 50 percent, with nearly 275,000 fewer victims compared to a year ago.”

One new tool the IRS credits to dramatically combating identity theft is an annual Security Summit. This was a way for the IRS to begin identifying and implementing changes. According to the IRS, successful efforts of the summit have lead to:

  • Identity theft affidavits falling sharply: A decrease of 50 percent during the first nine months of 2016 compared to 2015.
  • More fraudulent returns stopped before processing: This factor also dropped by nearly 50 percent. From January through September of 2016, the IRS stopped 787,000 confirmed identity theft returns, totalling more than $4 billion.
  • A decrease in fraudulent refunds: Thanks to the number of bank partners increasing by 106 institutions since 2015, the number of suspect refunds stopped by banks and returned to the IRS dropped by more than 50 percent.
  • Shared information stopping more bad returns: This can be attributed to information provided by industry and state partners in order to improve IRS fraud filters, 57,000 bad tax returns were stopped that would have otherwise bypassed IRS processing filters.
  • Shared data elements helping to identify new areas: Adding new data elements on tax returns helped the IRS stop over 74,000 suspicious returns, preventing $372 million in fraudulent refunds from being paid.

While these improvements are indeed significant, any concerned taxpayer will take away from all of this that, though improved, the IRS still isn’t batting 1,000 when it comes to protecting citizens against identity theft. Therefore, continuing to be mindful of best security practices when it comes to handling sensitive data for all aspects of your business is still highly recommended.

To help businesses out, the IRS has prepared a list of critical steps you can take to protect yourself and your clients from identity theft.

  • Assure that taxpayer data, including data left on hardware and media, is never left unsecured.
  • Securely dispose of taxpayer information.
  • Require strong passwords (numbers, symbols, upper & lowercase) on all computers and tax software programs.
  • Require periodic password changes every 60-to-90 days.
  • Store taxpayer data in secure systems and encrypt information when transmitting across networks.
  • Ensure that email being sent or received, that contains taxpayer data, is encrypted and secure.
  • Make sure paper documents, computer disks, flash drives and other media are kept in a secure location and restrict access to authorized users only.
  • Use caution when allowing or granting remote access to internal networks containing sensitive data.
  • Terminate access to taxpayer information for anyone who is no longer employed by your business.
  • Create security requirements for your entire staff regarding computer information systems, paper records, and use of taxpayer data.
  • Provide periodic training to update staff members on any changes and ensure compliance.
  • Protect your facilities from unauthorized access and potential dangers.
  • Create a plan on required steps to notify clients should you be the victim of any data breach or theft.

When it comes to implementing many of these best practices and securing your network to protect against identity theft, Evolve IT is here to help. Call us today at (518) 203-2110 for your IT security assessment. Keep in mind that, while death and taxes are both guaranteed, identity theft can be prevented by taking the right precautions.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 15 April 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Internet Best Practices Technology Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Google Hosted Solutions Computer Microsoft Upgrade Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Network Security Ransomware Hardware Communication Hacking WiFi The Internet of Things Social Media Facebook Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Operating System Android Apple Employer-Employee Relationship Two-factor Authentication History Best Practice Small Business Phishing Alert App Networking Data storage Smartphones Mobile Computing communications Data Windows Big Data Experience Safety Unified Threat Management Quick Tips Mobile Device Management Money Network Firewall Managed Service Provider Content Filtering Cybercrime Outlook Website Wireless Technology Social Monitors Printer Browser Hacker Wireless Virtual Desktop Unified Communications Displays Securty Application Document Management Encryption Customer Service VoIP Law Enforcement SaaS End of Support Router Proactive IT Cortana Office 365 Network Congestion Save Money Writing Saving Money Music Analytics Lithium-ion battery intranet Cryptocurrency Laptop IBM Social Networking Google Docs Education Cleaning Retail Holiday Public Speaking Virtualization Black Market YouTube Processors IP Address Staffing Office Tips LiFi BYOD Managed IT services Downtime Government Keyboard Passwords Streaming Media Help Desk Augmented Reality Disaster Search User Micrsooft Visible Light Communication Bluetooth Hard Drives Remote Computing Shortcut Business Growth Data Management Advertising Automation Recovery DDoS Robot Word Society Memory Sports Heating/Cooling Google Wallet Spam Information Technology Deep Learning Running Cable Business Management Windows 8 BDR Internet of Things IT Services Hosted Solution Windows XP Artificial Intelligence Vendor Management Documents Competition Entrepreneur Tech Support Compliance Presentation Domains Drones
QR-Code