Identity Theft - Problems and Prevention Steps

Size: px
Start display at page:

Download "Identity Theft - Problems and Prevention Steps"

Transcription

1 Identity Theft and the Tax Practice Edward K. Zollars, CPA New Mexico Tax Conference Today s Session Identity Theft in General Size of the Problem Working with an Affected Client Avoiding Being Part of the Problem 2 1

2 Identity Theft Size of the Problem 3 It s a Growth Industry for Tax ID Theft Easy to monetize Electronic filing used fast refunds as a selling point Criminals dump fake returns into the system early in the process By design the system cannot easily catch this Information reporting (including withholding) not required to be filed until long after return processing begins Only a single factor generally used for system to identify the taxpayer (social security number) Problem is growing each year Treasury Inspector General (TIGTA) issued two reports in

3 12/4/15 #PSTECH 5 #PSTECH 6 TIGTA has reason t o believe a much larger number escaped detection the real numbers may be twice as high 3

4 12/4/15 #PSTECH 7 #PSTECH 8 4

5 #PSTECH 9 IRS Criminal Prosecutions Number is rising But clearly the vast majority of criminals get away with their crime Statistics through April 10, 2014 reported by IRS Criminal Investigation Division 10 5

6 First Lady of Tax Fraud Used prepaid debit cards loaded with refunds from falsified returns from 2009 through 2012 Filed from Perpetrator s home Various hotels around Tampa, Florida (the capital of tax refund fraud) Scheme netted her and her partner nearly $4.5 million 11 Identity Theft Working with the Affected Client 12 6

7 IRS Advice to Reduce Chance of ID Theft Don t carry documents with SSNs on them with you Limit giving out SSN Protect financial information Check credit report at least annually Secure all personal information at home Computer safety Firewalls Anti-spam/virus software Password security Ed s tip DON T BE AN IDIOT Don t give out personal information You did not initiate contact Not verified ID 13 The One Thing Clients Need to Be Told: The IRS does not initiate contact with taxpayers by or social media tools to request personal or financial information. The IRS does not send s stating you are being electronically audited or that you are getting a refund. This includes any type of electronic communication, such as text messages and social media channels. - IRS FAQ on Identity Protection Tips 14 7

8 The One Thing Clients Need to Be Told: The IRS does not initiate contact with taxpayers by or social media tools to request personal or financial information. The Note IRS does Neither not send do s stating you are being electronically banks, brokers, audited or that etc. you are getting a refund. This includes any type of electronic communication, such as text messages and social media channels. - IRS FAQ on Identity Protection Tips 15 IRS Procedures 16 8

9 IRS Indicators of Tax ID Theft Notice more than return has been filed for taxpayer s identification number Collections for year in which no tax was due IRS shows more wages than taxpayer received Taxpayer has state or federal benefit cancelled due to reported income change 17 What to Do Next? IRS Notice Received Contact IRS to stop the computer s autopilot functions Get Power of Attorney Document all communications with IRS Consider use of taxpayers advocate office if process threatens to roll over client Reach out to IRS ID Theft Unit ( ) No IRS Notice (Yet) Contact IRS ID Theft Unit ( , x245) Explain why taxpayer believes at risk Lost or stolen wallet/purse Home robbery Questionable credit activity Ask IRS to secure account and flag as potential ID theft victim 18 9

10 IRS Form IRS Form Used to document issues related to identity theft Also provides a cover sheet for information needed to document client s identity Remember IRS needs to conclude your client is who they say they are 19 Form

11 Form Hurry Up and Wait Client needs to understand this is going to take time Refunds are likely going to be delayed (significantly) Executor may have issues closing an estate Mortgages/refinancings will be difficult to obtain Other taxing agencies may be involved May have other, nontax, ID theft issues IRS unlikely to be able to speed this up much without creating a bigger problem 22 11

12 IRS Identity Protection PIN (IP PIN) Six digit number issued by IRS Originally limited to prior victims of identity theft IRS testing expansion in 3 highest risk markets (Florida, Georgia, DC) Submitted with return Electronic returns will be rejected without it Paper returns will take much longer to process 23 IRS Identity Protection PIN (IP PIN) 24 12

13 IRS Identity Protection PIN (IP PIN) What if find out: Taxpayer never noticed he/she was assigned one? Taxpayer loses the document? Recovery of IP PIN Originally had to call IRS, have new IP PIN issued after IRS confirmed identity Online option started this year to use taxpayer must have Social security number Date of birth address and Filing status and mailing address from most recently filed tax return 25 Identity Theft Avoiding Being Part of the Problem 26 13

14 CPA Firms and Data CPA Firm Clients are High Worth Targets Professionals Just Want to Work in Their Area Look at Protecting Your Clients 27 IRS Publication on Protecting Data FS , Publication 4557 Outlines steps preparers should take Reminds us of our responsibilities Remember New Mexico has its own law in this area as well Most likely to be cited as standard of care if breech occurs 28 14

15 IRS Recommended Steps Top-notch security software that includes a firewall, antimalware and anti-virus programs; make sure they are set to automatically update so that the software can stay current against the latest threats; and consider having firewalls for both hardware and software. 29 IRS Recommended Steps An education program for all employees to ensure they understand the dangers of phishing s and other threats to taxpayer data. Publication 4557 has several items related to employees such as halting their access to the preparer s computer systems if they leave employment

16 IRS Recommended Steps Strong passwords that are changed periodically; consider having different levels of password protection. For example, have one password to access the computer system and a separate password to access tax software or client files. That way, if the computer system is breached, perhaps not all of the information will be exposed. 31 IRS Recommended Steps Secure wireless connection. If Wi-Fi is used, protect taxpayer data by making sure it is password protected and encrypted programs to exchange PII information with taxpayers

17 IRS Recommended Steps Back up taxpayer data frequently, perhaps on an external hard drive, and ensure that the hard-drive is kept in a secure location with limited access by others 33 IRS Recommended Steps Store any paper files in a secure location

18 IRS Recommended Steps Access IRS e-services weekly during the filing season and periodically throughout the year to see the number of returns filed using the preparer s EFIN. If the number is excessive, contact the e-help Desk for e-services immediately. 35 Full Disk Encryption Microsoft Windows BitLocker In Windows Professional for Windows 7 and later Not obvious how to install if computer lacks TPM module Inexpensive non-enterprise laptops often lack it Can be installed Apple OSX Filevault 2 Third Party Options Veracrypt Symantec PGP Full Disk Encryption Can be used on removable drives as well 36 18

19 Small is Convenient and Easy to Lose Content of the drive Users copy all kinds of data onto thumbdrives Often only delete data when the drive fills up A thumbdrive used by a CPA could contain Client personal information Firm detailed information Security information (passwords, etc.) Data files that contain personal information clients obtained from their customers, employees, vendors, etc. (think payroll) Generally no record is kept of data that has been transferred to a drive 37 Phones, Tablets, Etc. ios Device Locking options Erase if fail 10 times option Long password option Remote device management Fingerprint reader (iphone 5S only) Android Devices Locking options Additional options (though likely less secure if use them) Can use long passwords Remote device management Fingerprint reader (currently Galaxy S5) 38 19

20 Organizations and Identity Theft 39 Organizations and Identity Theft We have met the enemy and he is us. -Walt Kelly, Pogo 40 20

21 End User Behavior Problems Far more important than all the security hardware software you have installed Cannot delegate or outsource this issue Issues Targeted phishing attacks The disaster that is Outlook (or any mail client) Every user (even rainmakers, managing partners, senior tax partners, etc.) must understand risks of what they do with their computers and devices 41 Issue Most employees are exposed to their firm's IT and computer policies on the day they are hired, but seldom are reminded after that. Firms should review their policies annually and incorporate new IT considerations, such as tablet device and smartphone usage and social media concerns, and then provide annual training on any updated policies. Employees should also be educated on current cyber security threats and social engineering scams impacting them and their clients, to further minimize the possibility of becoming a victim. PPC Auditing and Accounting Update, May

22 SANS Recommended Program Perform gap analysis (find the weak links) Provide training to address the weak link problems Security program implemented to Common attacks directed against the individual user (phishing, attachments, etc.) Make delivery short and convenient for users Continually update for current attacks (watch for notices of phishing attacks from organizations like AICPA, IRS, etc.) Mandate annual completion for every employee ENFORCE THE POLICY (ESPECIALLY AT THE TOP) Test employees from time to time to see if they are following the policy 43 Risk to the Firm Requirement to maintain confidentiality Ethics Rule 301/New ET Sec Note upcoming codification s use of terms safeguards and threats as key concepts State data breach laws In all U.S. states, territories and District of Columbia except for Alabama, New Mexico and South Dakota See links in material to state(s) of interest to you 44 22

23 Additional Issues Definition of personal information under statute Basically name Along with any of the following Social security number Driver s license Account number, etc. that grants access to financial account Nature of notification defined by statute Realize NOT JUST LIMITED TO CLIENTS 45 Contact Information Edward K. Zollars, CPA edzollars@thomaszollarslynch.com

Today s Session. Identity Theft and the Tax Practice 12/7/15. Identity Theft in General. Size of the Problem. Working with an Affected Client

Today s Session. Identity Theft and the Tax Practice 12/7/15. Identity Theft in General. Size of the Problem. Working with an Affected Client Identity Theft and the Tax Practice Edward K. Zollars, CPA 61 st Annual MNCPA Tax Conference http://www.cperesources.com http://www.currentfederaltaxdevelopments.com Today s Session Identity Theft in General

More information

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number

More information

What s New Collection Fall 2015

What s New Collection Fall 2015 What s New Collection Fall 2015 Anita Douglas Senior Stakeholder Liaison December 2, 2015 1 What s New Collection Compliance realignment What s Collection look like today Federal Tax Deposit Alerts Early

More information

Presented by Dave Olsen, CPA, President

Presented by Dave Olsen, CPA, President Presented by Dave Olsen, CPA, President My Frame of Reference 15 Years in Public Practice 11 Years in Tax & Accounting Software (20% of prof. e-files) 3 Year term on IRS ETAAC committee and Security Sub-Group

More information

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Brian Wozniak IRS Stakeholder Liaison November 4, 2015 1 Prevention and Detection In recent years, the IRS has made numerous

More information

June 2015 Newsletter

June 2015 Newsletter June 2015 Newsletter News From Silver Bridge CPAs TAX TIPS & TRICKS Consider Setting Up an Idaho Medical Savings Account! The state of Idaho has established a tax deduction for contributions made to an

More information

News Release Date: 11/23/15

News Release Date: 11/23/15 News Release Date: 11/23/15 Identity Theft Cross References www.irs.gov IRS Pub 4557, Safeguarding Taxpayer Data IRS Pub 5027, Identity Theft Information for Taxpayers IRS Pub 5199, Tax Preparer Guide

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity

More information

Taxes & Identity Theft

Taxes & Identity Theft Taxes & Identity Theft Brian Wozniak IRS Stakeholder Liaison June 4, 2015 What is tax-related identity theft? Tax-related identity theft occurs when someone uses your Social Security Number (SSN) to file

More information

WRITTEN TESTIMONY OF JOHN A

WRITTEN TESTIMONY OF JOHN A WRITTEN TESTIMONY OF JOHN A. KOSKINEN COMMISSIONER INTERNAL REVENUE SERVICE BEFORE THE SENATE FINANCE COMMITTEE ON UNAUTHORIZED ATTEMPTS TO ACCESS TAXPAYER DATA JUNE 2, 2015 Chairman Hatch, Ranking Member

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud What is tax-related identity theft? Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Bill Wilde Local Taxpayer Advocate Taxpayer Advocate Service Revised February 1, 2015

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Anita Douglas, Senior Stakeholder Liaison May 27, 2015

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Anita Douglas, Senior Stakeholder Liaison May 27, 2015 Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Anita Douglas, Senior Stakeholder Liaison May 27, 2015 What is tax-related identity theft? Tax-related identity theft occurs

More information

Criminal Investigation

Criminal Investigation Criminal Investigation Stolen Identity Refund Fraud (SIRF) Nneka Sutherland Special Agent (267) 941 6281 Nneka.Sutherland@ci.irs.gov Joseph Carl Special Agent (267) 941 6117 Joseph.Carl@ci.irs.gov IRS

More information

Cyber Self Assessment

Cyber Self Assessment Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Identity Theft and Online Security

Identity Theft and Online Security Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Cyber Security Best Practices

Cyber Security Best Practices Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters

More information

TYPES OF POSSIBLE IDENTITY THEFT

TYPES OF POSSIBLE IDENTITY THEFT Identity Theft What is Identity Theft? Identity theft occurs when someone uses your personal information such as your name, social security number, and or other identifying information without your permission

More information

Helping the Identity Theft Victim

Helping the Identity Theft Victim Helping the Identity Theft Victim Seminar Objectives Increase awareness of how to help IDT victims Improve understanding of Taxpayer Protection Program, Identity Protection Specialized Unit, and Identity

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

How the IRS Helps Taxpayers and Assist Victims

How the IRS Helps Taxpayers and Assist Victims How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?

More information

How the IRS Helps Taxpayers and Assists Victims

How the IRS Helps Taxpayers and Assists Victims How the IRS Helps Taxpayers and Assists Victims Combating Identity Theft and Online Fraud Justin McCarty January, 2014 What is identity theft? Identity theft occurs when someone uses your personal information

More information

Why Email Encryption is Essential to the Safety of Your Business

Why Email Encryption is Essential to the Safety of Your Business Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Identity Protection Personal Identification Numbers Are Not Provided to All Eligible Taxpayers September 24, 2014 Reference Number: 2014-40-086 This report

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012 Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is

More information

IRS Resources for Payroll Professionals

IRS Resources for Payroll Professionals IRS Resources for Payroll Professionals Glenn Gizzi Winter 2015 American Payroll Association Leading advocate for advancement of payroll professionals Connects payroll industry with employers and government

More information

Perception and knowledge of IT threats: the consumer s point of view

Perception and knowledge of IT threats: the consumer s point of view Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of

More information

ID Theft & Impact on Florida

ID Theft & Impact on Florida 1 ID Theft & Impact on Florida 2 3 Personal Identity Information (PII) Each Record of PII = $$$ to Criminals 4 Identity Theft & the Crimes it Promotes Credit Card Fraud Bank Account Take-Overs, Identity

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Robert Glantz Criminal Investigator Maggie Romaniello SL Field Area Manger What is

More information

Computer Security at Columbia College. Barak Zahavy April 2010

Computer Security at Columbia College. Barak Zahavy April 2010 Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012 IRS Payroll Topics Alan Gregerson March 15, 2012 VOH to Hires Act of 2011 Qualified Veteran WOTC 1 The New Voluntary Classification Settlement Program (VCSP) No Expiration VCSP Advantages The application

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Identity Theft. What it is and How to Protect Yourself

Identity Theft. What it is and How to Protect Yourself Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Preventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge. (edited transcript)

Preventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge. (edited transcript) Preventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge (edited transcript) Kristen Landreth: The title of this presentation is Preventing and Detecting Identity Theft: Partnering

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense 1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs The Identity Theft and Fraud Protection Act (Act No. 190) allows for the collection, use

More information

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C. Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION There Are Billions of Dollars in July 19, 2012 Reference Number: 2012-42-080 This report has cleared the Treasury Inspector General for Tax Administration

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Advising Victims of Tax Identity Theft

Advising Victims of Tax Identity Theft Advising Victims of Tax Identity Theft Individual and Business IRS Nationwide Tax Forum 2013 Revised July 12, 2013 Martin Press, Esq. Gunster Attorneys at Law Las Olas Centre, 450 East Las Olas Boulevard,

More information

IIABSC 2015 - Spring Conference

IIABSC 2015 - Spring Conference IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

IRS Criminal Investigation. Special Agent Christine Shanley Supervisory Special Agent Michael Rivera

IRS Criminal Investigation. Special Agent Christine Shanley Supervisory Special Agent Michael Rivera IRS Criminal Investigation Special Agent Christine Shanley Supervisory Special Agent Michael Rivera Criminal Investigation Mission CI Services the American public by investigating criminal violations of

More information

November 2014 Seminar IRS UPDATES. Oklahoma City Chapter OSCPA. Miscellaneous Topics. Anita Douglas Senior Stakeholder Liaison November 13, 2014

November 2014 Seminar IRS UPDATES. Oklahoma City Chapter OSCPA. Miscellaneous Topics. Anita Douglas Senior Stakeholder Liaison November 13, 2014 Oklahoma City Chapter OSCPA November 2014 Seminar Anita Douglas Senior Stakeholder Liaison November 13, 2014 1 IRS UPDATES 2 Miscellaneous Topics Same Sex Couples: Guidance for Employers Form 8822-B -

More information

Adams County, Colorado

Adams County, Colorado Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014 Table of Contents

More information

Online Banking Customer Awareness and Education Program

Online Banking Customer Awareness and Education Program Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are

More information

Navigating the New MA Data Security Regulations

Navigating the New MA Data Security Regulations Navigating the New MA Data Security Regulations Robert A. Fisher, Esq. 2009 Foley Hoag LLP. All Rights Reserved. Presentation Title Data Security Law Chapter 93H Enacted after the TJX data breach became

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Cyber Security for Businesses

Cyber Security for Businesses Cyber Security for Businesses Computer crimes involve the illegal use of or the unauthorized entry into a computer system to tamper, interfere, damage, or manipulate the system or information stored in

More information

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Infrastructure Our Tax Securing Presented by:

Infrastructure Our Tax Securing Presented by: Securing Our Tax Infrastructure Security and Fraud in the efile Age FTA Technology Conference August 15, 2011 Presented by: Clinton Mugge Joan Barr 8/15/11 1 [ Agenda ] 1 2 3 4 Security Threats Impact

More information

LIGC-ACC Presentation November 9, 2015

LIGC-ACC Presentation November 9, 2015 Bryan Frank, DDIS Info Sec Corp, panelist Jennifer M. Mone, Deputy General Counsel, Hofstra University, panelist Keith J. Frank, Partner, Forchelli, Curto, Deegan, Schwartz, Mineo & Terrana,. LLP, moderator

More information

New IRS Tax Payments Online!

New IRS Tax Payments Online! 166 W. University Parkway; Suite B Tel: (731) 664-7777 Fax: (731) 664-1544 sipescpa.com August 2015 New IRS Tax Payments Online! You can now make a payment online direct to the Internal Revenue Service.

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

The University of North Carolina at Charlotte Identity Theft Prevention Program

The University of North Carolina at Charlotte Identity Theft Prevention Program The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),

More information

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts Arkansas Small Business Forum IRS Identity Theft Prevention Efforts Contact Information Name: Gregory Metcalf Phone Number: 501-396-5912 Email Address: gregory.o.metcalf@irs.gov A persistent threat to

More information

Data Security in a Mobile, Cloud-Based World

Data Security in a Mobile, Cloud-Based World Data Security in a Mobile, Cloud-Based World Jacob Buckley-Fortin CEO ehana What we ll cover Trends Risks Recommendations 1 Trends Mobile Has Taken Over Trend #1 2 3 450 million users worldwide Adopted

More information

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Christopher T. Van Marter Senior Deputy Prosecuting Attorney Chief White Collar Crime Unit Department of the Prosecuting Attorney

More information

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific

More information

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication with ERP Applications Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password

More information

DESCRIPTION OF H.R. 3832, THE STOLEN IDENTITY REFUND FRAUD PREVENTION ACT OF 2015

DESCRIPTION OF H.R. 3832, THE STOLEN IDENTITY REFUND FRAUD PREVENTION ACT OF 2015 DESCRIPTION OF H.R. 3832, THE STOLEN IDENTITY REFUND FRAUD PREVENTION ACT OF 2015 Scheduled for Markup by the HOUSE COMMITTEE ON WAYS AND MEANS on April 28, 2016 Prepared by the Staff of the JOINT COMMITTEE

More information

suntrust.com 800.SUNTRUST

suntrust.com 800.SUNTRUST suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally

More information

National Credit Union Administration. Tips to Safely Conduct Financial Transactions Over the Internet

National Credit Union Administration. Tips to Safely Conduct Financial Transactions Over the Internet National Credit Union Administration Tips to Safely Conduct Financial Transactions Over the Internet NCUA 8061 January 2007 Introduction As use of the Internet continues to expand, more credit unions are

More information

Encryption Made Simple for Lawyers

Encryption Made Simple for Lawyers Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important

More information

Security Awareness. ITS Security Training. Fall 2015

Security Awareness. ITS Security Training. Fall 2015 Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

Identity Theft and Tax Fraud

Identity Theft and Tax Fraud HEARING BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION, EFFICIENCY AND FINANCIAL MANAGEMENT U.S. HOUSE OF REPRESENTATIVES Identity Theft and Tax Fraud November

More information

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting

More information

Transcript Tax Fraud & Identity Theft - Protecting your clients and yourself Webinar

Transcript Tax Fraud & Identity Theft - Protecting your clients and yourself Webinar Slide 1 Good morning and welcome to today s webinar. I am Larry Womac and I will be your presenter. With me are our subject matter experts Joseph Adversalo and Nepoh Lappia. Slide 2 Today s webinar is

More information

Presented By: Corporate Security Information Security Treasury Management

Presented By: Corporate Security Information Security Treasury Management Presented By: Corporate Security Information Security Treasury Management Is Your Business Prepared for a Cyber Incident? It s not a matter of if, it s a matter of when Cyber Attacks are on the Rise; Physical

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information