Tips to Protect Against Identity Theft

Data breaches and identity theft have led to an increase in fraudulent tax filings, and tens of thousands of honest taxpayers have been subjected to delays in their legitimate refund claims, according to the Internal Revenue Service.

Most CPA firms are good custodians of client data, but occasionally a laptop or USB (thumb) drive will go missing with unencrypted confidential data on it. Such losses give rise to potential data breaches, which can be expensive for firms. The more cost-effective approach is to implement robust data security measures. Furthermore, firms that become proficient at security will be better able to assist clients with their own data security needs.
Loss Prevention Tips

Follow these basic loss prevention tips for better security:

Ensure that laptops, desktops, USB drives, servers, smart phones and other devices do not contain any confidential data that is unencrypted.
Consider remote laptop security measures to prevent access to protected files in the event of theft or loss.
Ensure that email messages and attachments containing confidential data are encrypted with file encryption and digital certificates.
Use strong passwords, and do not write them down or share them. Passwords should be “salted” with random bits and symbols such as #, $, and &. Change passwords at least every 90 days.
Physical security should be provided for computers and endpoints, as with any other valuable assets, including building security and access codes, and locking up all servers, laptops, desktops and mobile devices.
Do not download personal software onto business computers because of the risk of downloading viruses or worms along with the software.

Firms should consider engaging in a continuous data security process that operates in three areas:
1) Risk Assessment

Utilize software tools for assessing and analyzing the security of most computer systems. Many software companies also provide security updates to protect from threats that have been identified, and most updates can be applied automatically. Have a computer specialist conduct a more thorough assessment and analysis to highlight vulnerabilities and provide risk reduction tips.
2) Comprehensive Written Plan

A written information security plan:
- outlines the specific ways the firm will protect data;
- sets forth policies, procedures and staff responsibilities, including what staff members are not allowed to do, and what they are required to do (such as immediately reporting any actual or potential security problems);
- covers areas such as the Internet, social media, email usage, and record retention and destruction; and
- details the reporting and other requirements of the states in question and the state agencies to which breaches are to be reported. Some states require firms to be compliant with the state’s privacy laws if the firm has the privacy data of a resident in that state. Some states require a written security plan by law.
3) Regular Staff Training

Teach the written plan to staff to ensure that each employee knows what the firm is doing and what he or she is required to do, including best practices for addressing new and continuing risks (e.g., social engineering, phishing and web application attacks). New laws or regulations should be reflected in changes to the plan. Training sessions to update staff on such changes will make the plan a dynamic, living document that staff uses and relies upon. Better data security measures will help ensure that private information remains confidential and available only to authorized parties. Firms will avoid or reduce the high costs associated with data breaches, and strong data security measures will become selling points that many clients appreciate.

Share this post

Leave a comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.

Latest Articles

  • 02 Oct

    Navigating Complex Conflicts of Interest

    While potential "conflict of interest" issues often arise because of married clients getting a divorce, other types of "splits" that may involve a dispute among shareholders, LLC members, partners and beneficiaries also present potential conflict-of-interest situations. The latter scenario... read more

  • 19 Aug

    Do You Believe You Will Never Be Sued?

    Some CPAs believe that they will never be sued and therefore believe they do not need professional liability or other forms of insurance. The reasons for this position vary, but some common ones include, "I don't make mistakes," "All of my clients are friends," or "I do tax work only." The... read more

  • 27 Jul

    Exclusive Policyholder Benefits

    Risk management services and resources to help you with today's practice challenges

    CAMICO knows that insurance alone is not a solution for reducing risks. That's why you have access to CAMICO’s proven approaches that have helped numerous CPA firms manage risk and avoid claims.... read more