Chances are, you or someone in your family has been a victim of identity theft. There are so many opportunities for thieves to obtain your personal data from sites that are outside your control. (Remember the Anthem and Target data breaches?). There isn’t much you can do about identity theft with the information you’ve given to other companies, but you can protect your data that is in your control. One strategy is to protect yourself from those posing as illegitimate companies and the IRS. Here are some tips from the IRS:
Don’t take the Bait; Avoid Phishing and Malware to Protect Your Personal Data
“Update your account now.” “You just won a cruise!” “The IRS has a refund waiting for you.”
In the cyber world of phishing, the sentences are “bait” – lures from emails, telephone calls and texts all designed to separate you from your cash, your passwords, your social security number or your very identity.
The IRS has teamed up with state revenue departments and the tax industry to make sure you understand the dangers to your personal and financial data. Taxes. Security. Together. Working in partnership with you, we can make a difference.
No doubt you’ve heard that warning to beware of phishing many times. But, phishing remains a problem because it works. Cybercriminals on a daily basis concoct new ways to trick people into turning over cash or sensitive data that can affect your taxes.
When it comes to this type of crime, the main line of defense is not technology, it is you.
Criminals pose as a person or organization you trust and/or recognize. They may hack a friend’s email account and send mass emails under their name. They may pose as your bank, credit card company or tax software provider. Or, they may pose as a state, local or federal agency such as the Internal Revenue Service or a state agency. Criminals go to great lengths to create websites that appear legitimate but contain phony log-in pages.
Just remember: No legitimate organization – not your bank, not your tax software company, not the IRS – will ever ask for sensitive information through unsecured methods such as emails. And the IRS never sends unsolicited emails or makes calls with threats of lawsuits or jail.
Scam emails and websites also can infect your computer with malware without you even knowing it. The malware can give the criminal access to your device, enabling them to access all your sensitive files or track your keyboard strokes, exposing login information.
Here are a few simple steps you can take to protect yourself:
- Avoid suspicious phishing emails that appear to be from the IRS or other companies; do not click on the links- go directly to their websites instead.
- Beware of phishing scams asking you to update or verify your accounts.
- To avoid malware, don’t open attachments in emails unless you know who sent it and what it contains.
- Download and install software only from websites you know and trust.
- Use security software to block pop-up ads, which can contain viruses.
- Ensure your family understands safe online and computer habits.
To learn additional steps you can take to protect your personal and financial data, visit Taxes. Security. Together.
______________________________________________________________________________
IRS CIRCULAR 230 DISCLAIMER: To ensure compliance with requirements imposed by the U.S. Department of the Treasury and Internal Revenue Service, we inform you that any tax advice contained in this e-mail (including any attachments) is not intended or written to be used, and may not be used, for the purpose of (a) avoiding penalties under the Internal Revenue Code or state tax authority, or (b) promoting, marketing, or recommending to another party any transaction or matter addressed herein. Any accounting, business or tax advice contained in this communication, including attachments and enclosures, is not intended as a thorough, in-depth analysis of specific issues, nor a substitute for a formal opinion, nor is it sufficient to avoid tax-related penalties. If desired, (Firm) would be pleased to perform the requisite research and provide you with a detailed written analysis. Such an engagement may be the subject of a separate engagement letter that would define the scope and limits of the desired consultation services.