Tips to Protect Against Identity Theft

Data breaches and identity theft have led to an increase in fraudulent tax filings, and tens of thousands of honest taxpayers have been subjected to delays in their legitimate refund claims, according to the Internal Revenue Service.

Most CPA firms are good custodians of client data, but occasionally a laptop or USB (thumb) drive will go missing with unencrypted confidential data on it. Such losses give rise to potential data breaches, which can be expensive for firms. The more cost-effective approach is to implement robust data security measures. Furthermore, firms that become proficient at security will be better able to assist clients with their own data security needs.
Loss Prevention Tips

Follow these basic loss prevention tips for better security:

Ensure that laptops, desktops, USB drives, servers, smart phones and other devices do not contain any confidential data that is unencrypted.
Consider remote laptop security measures to prevent access to protected files in the event of theft or loss.
Ensure that email messages and attachments containing confidential data are encrypted with file encryption and digital certificates.
Use strong passwords, and do not write them down or share them. Passwords should be “salted” with random bits and symbols such as #, $, and &. Change passwords at least every 90 days.
Physical security should be provided for computers and endpoints, as with any other valuable assets, including building security and access codes, and locking up all servers, laptops, desktops and mobile devices.
Do not download personal software onto business computers because of the risk of downloading viruses or worms along with the software.

Firms should consider engaging in a continuous data security process that operates in three areas:
1) Risk Assessment

Utilize software tools for assessing and analyzing the security of most computer systems. Many software companies also provide security updates to protect from threats that have been identified, and most updates can be applied automatically. Have a computer specialist conduct a more thorough assessment and analysis to highlight vulnerabilities and provide risk reduction tips.
2) Comprehensive Written Plan

A written information security plan:
- outlines the specific ways the firm will protect data;
- sets forth policies, procedures and staff responsibilities, including what staff members are not allowed to do, and what they are required to do (such as immediately reporting any actual or potential security problems);
- covers areas such as the Internet, social media, email usage, and record retention and destruction; and
- details the reporting and other requirements of the states in question and the state agencies to which breaches are to be reported. Some states require firms to be compliant with the state’s privacy laws if the firm has the privacy data of a resident in that state. Some states require a written security plan by law.
3) Regular Staff Training

Teach the written plan to staff to ensure that each employee knows what the firm is doing and what he or she is required to do, including best practices for addressing new and continuing risks (e.g., social engineering, phishing and web application attacks). New laws or regulations should be reflected in changes to the plan. Training sessions to update staff on such changes will make the plan a dynamic, living document that staff uses and relies upon. Better data security measures will help ensure that private information remains confidential and available only to authorized parties. Firms will avoid or reduce the high costs associated with data breaches, and strong data security measures will become selling points that many clients appreciate.

Share this post

Leave a comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.

Latest Articles

  • 13 Nov

    How to respond to subpoenas

    CPA firms are often uncertain about whether or how to respond to a subpoena, as they also need to comply with a number of rules and regulations that are intended to protect client confidentiality. The following Q&A focuses on understanding the nature of subpoenas and how CPA firms can ... read more

  • 13 Nov

    The New 'Hosting Services' Interpretation

    Under the new "Hosting Services" ethics interpretation in the AICPA's Code of Professional Conduct (ET §1.295.143), effective July 1, 2019, CPA independence is impaired by taking responsibility for hosting a client's data or records. As such, if the only way that the client can access its... read more

  • 05 Nov

    FASB ASC 606 – Don’t Get Revenue Wrecked

    by Duncan B. Will, CPA/ABV/CFF, CFE

    Of course, you're relieved and exhausted – in addition to the traditional tax and accounting services you perform for your clients as their accountant and trusted adviser, you've helped them address the new tax law, consulted on a... read more