Identity Theft - Problems and Prevention Steps
|
|
- Polly Roberts
- 3 years ago
- Views:
Transcription
1 Identity Theft and the Tax Practice Edward K. Zollars, CPA New Mexico Tax Conference Today s Session Identity Theft in General Size of the Problem Working with an Affected Client Avoiding Being Part of the Problem 2 1
2 Identity Theft Size of the Problem 3 It s a Growth Industry for Tax ID Theft Easy to monetize Electronic filing used fast refunds as a selling point Criminals dump fake returns into the system early in the process By design the system cannot easily catch this Information reporting (including withholding) not required to be filed until long after return processing begins Only a single factor generally used for system to identify the taxpayer (social security number) Problem is growing each year Treasury Inspector General (TIGTA) issued two reports in
3 12/4/15 #PSTECH 5 #PSTECH 6 TIGTA has reason t o believe a much larger number escaped detection the real numbers may be twice as high 3
4 12/4/15 #PSTECH 7 #PSTECH 8 4
5 #PSTECH 9 IRS Criminal Prosecutions Number is rising But clearly the vast majority of criminals get away with their crime Statistics through April 10, 2014 reported by IRS Criminal Investigation Division 10 5
6 First Lady of Tax Fraud Used prepaid debit cards loaded with refunds from falsified returns from 2009 through 2012 Filed from Perpetrator s home Various hotels around Tampa, Florida (the capital of tax refund fraud) Scheme netted her and her partner nearly $4.5 million 11 Identity Theft Working with the Affected Client 12 6
7 IRS Advice to Reduce Chance of ID Theft Don t carry documents with SSNs on them with you Limit giving out SSN Protect financial information Check credit report at least annually Secure all personal information at home Computer safety Firewalls Anti-spam/virus software Password security Ed s tip DON T BE AN IDIOT Don t give out personal information You did not initiate contact Not verified ID 13 The One Thing Clients Need to Be Told: The IRS does not initiate contact with taxpayers by or social media tools to request personal or financial information. The IRS does not send s stating you are being electronically audited or that you are getting a refund. This includes any type of electronic communication, such as text messages and social media channels. - IRS FAQ on Identity Protection Tips 14 7
8 The One Thing Clients Need to Be Told: The IRS does not initiate contact with taxpayers by or social media tools to request personal or financial information. The Note IRS does Neither not send do s stating you are being electronically banks, brokers, audited or that etc. you are getting a refund. This includes any type of electronic communication, such as text messages and social media channels. - IRS FAQ on Identity Protection Tips 15 IRS Procedures 16 8
9 IRS Indicators of Tax ID Theft Notice more than return has been filed for taxpayer s identification number Collections for year in which no tax was due IRS shows more wages than taxpayer received Taxpayer has state or federal benefit cancelled due to reported income change 17 What to Do Next? IRS Notice Received Contact IRS to stop the computer s autopilot functions Get Power of Attorney Document all communications with IRS Consider use of taxpayers advocate office if process threatens to roll over client Reach out to IRS ID Theft Unit ( ) No IRS Notice (Yet) Contact IRS ID Theft Unit ( , x245) Explain why taxpayer believes at risk Lost or stolen wallet/purse Home robbery Questionable credit activity Ask IRS to secure account and flag as potential ID theft victim 18 9
10 IRS Form IRS Form Used to document issues related to identity theft Also provides a cover sheet for information needed to document client s identity Remember IRS needs to conclude your client is who they say they are 19 Form
11 Form Hurry Up and Wait Client needs to understand this is going to take time Refunds are likely going to be delayed (significantly) Executor may have issues closing an estate Mortgages/refinancings will be difficult to obtain Other taxing agencies may be involved May have other, nontax, ID theft issues IRS unlikely to be able to speed this up much without creating a bigger problem 22 11
12 IRS Identity Protection PIN (IP PIN) Six digit number issued by IRS Originally limited to prior victims of identity theft IRS testing expansion in 3 highest risk markets (Florida, Georgia, DC) Submitted with return Electronic returns will be rejected without it Paper returns will take much longer to process 23 IRS Identity Protection PIN (IP PIN) 24 12
13 IRS Identity Protection PIN (IP PIN) What if find out: Taxpayer never noticed he/she was assigned one? Taxpayer loses the document? Recovery of IP PIN Originally had to call IRS, have new IP PIN issued after IRS confirmed identity Online option started this year to use taxpayer must have Social security number Date of birth address and Filing status and mailing address from most recently filed tax return 25 Identity Theft Avoiding Being Part of the Problem 26 13
14 CPA Firms and Data CPA Firm Clients are High Worth Targets Professionals Just Want to Work in Their Area Look at Protecting Your Clients 27 IRS Publication on Protecting Data FS , Publication 4557 Outlines steps preparers should take Reminds us of our responsibilities Remember New Mexico has its own law in this area as well Most likely to be cited as standard of care if breech occurs 28 14
15 IRS Recommended Steps Top-notch security software that includes a firewall, antimalware and anti-virus programs; make sure they are set to automatically update so that the software can stay current against the latest threats; and consider having firewalls for both hardware and software. 29 IRS Recommended Steps An education program for all employees to ensure they understand the dangers of phishing s and other threats to taxpayer data. Publication 4557 has several items related to employees such as halting their access to the preparer s computer systems if they leave employment
16 IRS Recommended Steps Strong passwords that are changed periodically; consider having different levels of password protection. For example, have one password to access the computer system and a separate password to access tax software or client files. That way, if the computer system is breached, perhaps not all of the information will be exposed. 31 IRS Recommended Steps Secure wireless connection. If Wi-Fi is used, protect taxpayer data by making sure it is password protected and encrypted programs to exchange PII information with taxpayers
17 IRS Recommended Steps Back up taxpayer data frequently, perhaps on an external hard drive, and ensure that the hard-drive is kept in a secure location with limited access by others 33 IRS Recommended Steps Store any paper files in a secure location
18 IRS Recommended Steps Access IRS e-services weekly during the filing season and periodically throughout the year to see the number of returns filed using the preparer s EFIN. If the number is excessive, contact the e-help Desk for e-services immediately. 35 Full Disk Encryption Microsoft Windows BitLocker In Windows Professional for Windows 7 and later Not obvious how to install if computer lacks TPM module Inexpensive non-enterprise laptops often lack it Can be installed Apple OSX Filevault 2 Third Party Options Veracrypt Symantec PGP Full Disk Encryption Can be used on removable drives as well 36 18
19 Small is Convenient and Easy to Lose Content of the drive Users copy all kinds of data onto thumbdrives Often only delete data when the drive fills up A thumbdrive used by a CPA could contain Client personal information Firm detailed information Security information (passwords, etc.) Data files that contain personal information clients obtained from their customers, employees, vendors, etc. (think payroll) Generally no record is kept of data that has been transferred to a drive 37 Phones, Tablets, Etc. ios Device Locking options Erase if fail 10 times option Long password option Remote device management Fingerprint reader (iphone 5S only) Android Devices Locking options Additional options (though likely less secure if use them) Can use long passwords Remote device management Fingerprint reader (currently Galaxy S5) 38 19
20 Organizations and Identity Theft 39 Organizations and Identity Theft We have met the enemy and he is us. -Walt Kelly, Pogo 40 20
21 End User Behavior Problems Far more important than all the security hardware software you have installed Cannot delegate or outsource this issue Issues Targeted phishing attacks The disaster that is Outlook (or any mail client) Every user (even rainmakers, managing partners, senior tax partners, etc.) must understand risks of what they do with their computers and devices 41 Issue Most employees are exposed to their firm's IT and computer policies on the day they are hired, but seldom are reminded after that. Firms should review their policies annually and incorporate new IT considerations, such as tablet device and smartphone usage and social media concerns, and then provide annual training on any updated policies. Employees should also be educated on current cyber security threats and social engineering scams impacting them and their clients, to further minimize the possibility of becoming a victim. PPC Auditing and Accounting Update, May
22 SANS Recommended Program Perform gap analysis (find the weak links) Provide training to address the weak link problems Security program implemented to Common attacks directed against the individual user (phishing, attachments, etc.) Make delivery short and convenient for users Continually update for current attacks (watch for notices of phishing attacks from organizations like AICPA, IRS, etc.) Mandate annual completion for every employee ENFORCE THE POLICY (ESPECIALLY AT THE TOP) Test employees from time to time to see if they are following the policy 43 Risk to the Firm Requirement to maintain confidentiality Ethics Rule 301/New ET Sec Note upcoming codification s use of terms safeguards and threats as key concepts State data breach laws In all U.S. states, territories and District of Columbia except for Alabama, New Mexico and South Dakota See links in material to state(s) of interest to you 44 22
23 Additional Issues Definition of personal information under statute Basically name Along with any of the following Social security number Driver s license Account number, etc. that grants access to financial account Nature of notification defined by statute Realize NOT JUST LIMITED TO CLIENTS 45 Contact Information Edward K. Zollars, CPA edzollars@thomaszollarslynch.com
Today s Session. Identity Theft and the Tax Practice 12/7/15. Identity Theft in General. Size of the Problem. Working with an Affected Client
Identity Theft and the Tax Practice Edward K. Zollars, CPA 61 st Annual MNCPA Tax Conference http://www.cperesources.com http://www.currentfederaltaxdevelopments.com Today s Session Identity Theft in General
More informationIRS & Partners Combat Tax-Related Identity Theft What s New for 2016
IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number
More informationWhat s New Collection Fall 2015
What s New Collection Fall 2015 Anita Douglas Senior Stakeholder Liaison December 2, 2015 1 What s New Collection Compliance realignment What s Collection look like today Federal Tax Deposit Alerts Early
More informationPresented by Dave Olsen, CPA, President
Presented by Dave Olsen, CPA, President My Frame of Reference 15 Years in Public Practice 11 Years in Tax & Accounting Software (20% of prof. e-files) 3 Year term on IRS ETAAC committee and Security Sub-Group
More informationTaxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA
Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number
More informationTax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Brian Wozniak IRS Stakeholder Liaison November 4, 2015 1 Prevention and Detection In recent years, the IRS has made numerous
More informationJune 2015 Newsletter
June 2015 Newsletter News From Silver Bridge CPAs TAX TIPS & TRICKS Consider Setting Up an Idaho Medical Savings Account! The state of Idaho has established a tax deduction for contributions made to an
More informationNews Release Date: 11/23/15
News Release Date: 11/23/15 Identity Theft Cross References www.irs.gov IRS Pub 4557, Safeguarding Taxpayer Data IRS Pub 5027, Identity Theft Information for Taxpayers IRS Pub 5199, Tax Preparer Guide
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationTax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity
More informationTaxes & Identity Theft
Taxes & Identity Theft Brian Wozniak IRS Stakeholder Liaison June 4, 2015 What is tax-related identity theft? Tax-related identity theft occurs when someone uses your Social Security Number (SSN) to file
More informationWRITTEN TESTIMONY OF JOHN A
WRITTEN TESTIMONY OF JOHN A. KOSKINEN COMMISSIONER INTERNAL REVENUE SERVICE BEFORE THE SENATE FINANCE COMMITTEE ON UNAUTHORIZED ATTEMPTS TO ACCESS TAXPAYER DATA JUNE 2, 2015 Chairman Hatch, Ranking Member
More informationTax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud
What is tax-related identity theft? Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Bill Wilde Local Taxpayer Advocate Taxpayer Advocate Service Revised February 1, 2015
More informationTax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Anita Douglas, Senior Stakeholder Liaison May 27, 2015
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Anita Douglas, Senior Stakeholder Liaison May 27, 2015 What is tax-related identity theft? Tax-related identity theft occurs
More informationCriminal Investigation
Criminal Investigation Stolen Identity Refund Fraud (SIRF) Nneka Sutherland Special Agent (267) 941 6281 Nneka.Sutherland@ci.irs.gov Joseph Carl Special Agent (267) 941 6117 Joseph.Carl@ci.irs.gov IRS
More informationCyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationIdentity Theft and Online Security
Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security
More informationWhy you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
More informationCyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s
Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices
More informationCertified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
More informationCyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
More informationTYPES OF POSSIBLE IDENTITY THEFT
Identity Theft What is Identity Theft? Identity theft occurs when someone uses your personal information such as your name, social security number, and or other identifying information without your permission
More informationHelping the Identity Theft Victim
Helping the Identity Theft Victim Seminar Objectives Increase awareness of how to help IDT victims Improve understanding of Taxpayer Protection Program, Identity Protection Specialized Unit, and Identity
More informationIntercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
More informationData Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
More informationIdentity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud
Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such
More informationWhat are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
More informationHow the IRS Helps Taxpayers and Assist Victims
How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?
More informationHow the IRS Helps Taxpayers and Assists Victims
How the IRS Helps Taxpayers and Assists Victims Combating Identity Theft and Online Fraud Justin McCarty January, 2014 What is identity theft? Identity theft occurs when someone uses your personal information
More informationWhy Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
More informationFraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
More informationTREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Identity Protection Personal Identification Numbers Are Not Provided to All Eligible Taxpayers September 24, 2014 Reference Number: 2014-40-086 This report
More informationTax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?
1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationIdentity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
More informationIdentity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012
Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is
More informationIRS Resources for Payroll Professionals
IRS Resources for Payroll Professionals Glenn Gizzi Winter 2015 American Payroll Association Leading advocate for advancement of payroll professionals Connects payroll industry with employers and government
More informationPerception and knowledge of IT threats: the consumer s point of view
Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of
More informationID Theft & Impact on Florida
1 ID Theft & Impact on Florida 2 3 Personal Identity Information (PII) Each Record of PII = $$$ to Criminals 4 Identity Theft & the Crimes it Promotes Credit Card Fraud Bank Account Take-Overs, Identity
More informationTax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Robert Glantz Criminal Investigator Maggie Romaniello SL Field Area Manger What is
More informationComputer Security at Columbia College. Barak Zahavy April 2010
Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationINTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
More informationIRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012
IRS Payroll Topics Alan Gregerson March 15, 2012 VOH to Hires Act of 2011 Qualified Veteran WOTC 1 The New Voluntary Classification Settlement Program (VCSP) No Expiration VCSP Advantages The application
More informationCertified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
More informationIdentity Theft. What it is and How to Protect Yourself
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationSection 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationPreventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge. (edited transcript)
Preventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge (edited transcript) Kristen Landreth: The title of this presentation is Preventing and Detecting Identity Theft: Partnering
More informationWritten Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
More informationFrom Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense
1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationPROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs The Identity Theft and Fraud Protection Act (Act No. 190) allows for the collection, use
More informationBelmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
More informationTREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION There Are Billions of Dollars in July 19, 2012 Reference Number: 2012-42-080 This report has cleared the Treasury Inspector General for Tax Administration
More informationPrivacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
More informationOnline Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
More informationAdvising Victims of Tax Identity Theft
Advising Victims of Tax Identity Theft Individual and Business IRS Nationwide Tax Forum 2013 Revised July 12, 2013 Martin Press, Esq. Gunster Attorneys at Law Las Olas Centre, 450 East Las Olas Boulevard,
More informationIIABSC 2015 - Spring Conference
IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
More informationIRS Criminal Investigation. Special Agent Christine Shanley Supervisory Special Agent Michael Rivera
IRS Criminal Investigation Special Agent Christine Shanley Supervisory Special Agent Michael Rivera Criminal Investigation Mission CI Services the American public by investigating criminal violations of
More informationNovember 2014 Seminar IRS UPDATES. Oklahoma City Chapter OSCPA. Miscellaneous Topics. Anita Douglas Senior Stakeholder Liaison November 13, 2014
Oklahoma City Chapter OSCPA November 2014 Seminar Anita Douglas Senior Stakeholder Liaison November 13, 2014 1 IRS UPDATES 2 Miscellaneous Topics Same Sex Couples: Guidance for Employers Form 8822-B -
More informationAdams County, Colorado
Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014 Table of Contents
More informationOnline Banking Customer Awareness and Education Program
Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are
More informationNavigating the New MA Data Security Regulations
Navigating the New MA Data Security Regulations Robert A. Fisher, Esq. 2009 Foley Hoag LLP. All Rights Reserved. Presentation Title Data Security Law Chapter 93H Enacted after the TJX data breach became
More informationSound Business Practices for Businesses to Mitigate Corporate Account Takeover
Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.
More informationCyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
More informationCyber Security for Businesses
Cyber Security for Businesses Computer crimes involve the illegal use of or the unauthorized entry into a computer system to tamper, interfere, damage, or manipulate the system or information stored in
More informationTHE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM
Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationInfrastructure Our Tax Securing Presented by:
Securing Our Tax Infrastructure Security and Fraud in the efile Age FTA Technology Conference August 15, 2011 Presented by: Clinton Mugge Joan Barr 8/15/11 1 [ Agenda ] 1 2 3 4 Security Threats Impact
More informationLIGC-ACC Presentation November 9, 2015
Bryan Frank, DDIS Info Sec Corp, panelist Jennifer M. Mone, Deputy General Counsel, Hofstra University, panelist Keith J. Frank, Partner, Forchelli, Curto, Deegan, Schwartz, Mineo & Terrana,. LLP, moderator
More informationNew IRS Tax Payments Online!
166 W. University Parkway; Suite B Tel: (731) 664-7777 Fax: (731) 664-1544 sipescpa.com August 2015 New IRS Tax Payments Online! You can now make a payment online direct to the Internal Revenue Service.
More informationSBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
More informationTop tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
More informationIdentity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
More informationThe University of North Carolina at Charlotte Identity Theft Prevention Program
The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),
More informationArkansas Small Business Forum. IRS Identity Theft Prevention Efforts
Arkansas Small Business Forum IRS Identity Theft Prevention Efforts Contact Information Name: Gregory Metcalf Phone Number: 501-396-5912 Email Address: gregory.o.metcalf@irs.gov A persistent threat to
More informationData Security in a Mobile, Cloud-Based World
Data Security in a Mobile, Cloud-Based World Jacob Buckley-Fortin CEO ehana What we ll cover Trends Risks Recommendations 1 Trends Mobile Has Taken Over Trend #1 2 3 450 million users worldwide Adopted
More informationCybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference
Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Christopher T. Van Marter Senior Deputy Prosecuting Attorney Chief White Collar Crime Unit Department of the Prosecuting Attorney
More informationMust score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.
April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific
More informationWhitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
More informationDESCRIPTION OF H.R. 3832, THE STOLEN IDENTITY REFUND FRAUD PREVENTION ACT OF 2015
DESCRIPTION OF H.R. 3832, THE STOLEN IDENTITY REFUND FRAUD PREVENTION ACT OF 2015 Scheduled for Markup by the HOUSE COMMITTEE ON WAYS AND MEANS on April 28, 2016 Prepared by the Staff of the JOINT COMMITTEE
More informationsuntrust.com 800.SUNTRUST
suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally
More informationNational Credit Union Administration. Tips to Safely Conduct Financial Transactions Over the Internet
National Credit Union Administration Tips to Safely Conduct Financial Transactions Over the Internet NCUA 8061 January 2007 Introduction As use of the Internet continues to expand, more credit unions are
More informationEncryption Made Simple for Lawyers
Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important
More informationSecurity Awareness. ITS Security Training. Fall 2015
Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data
More informationIdentity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationIdentity Theft and Tax Fraud
HEARING BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION, EFFICIENCY AND FINANCIAL MANAGEMENT U.S. HOUSE OF REPRESENTATIVES Identity Theft and Tax Fraud November
More informationProtecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting
More informationTranscript Tax Fraud & Identity Theft - Protecting your clients and yourself Webinar
Slide 1 Good morning and welcome to today s webinar. I am Larry Womac and I will be your presenter. With me are our subject matter experts Joseph Adversalo and Nepoh Lappia. Slide 2 Today s webinar is
More informationPresented By: Corporate Security Information Security Treasury Management
Presented By: Corporate Security Information Security Treasury Management Is Your Business Prepared for a Cyber Incident? It s not a matter of if, it s a matter of when Cyber Attacks are on the Rise; Physical
More informationDSHS CA Security For Providers
DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public
More information