LOGO

PROVIDING OUTSTANDING
TAX SEMINARS SINCE 1995

REGISTER

    Sign up for our tax news emails for the latest tax changes:

    We will not share your email with anyone else

    Protect Your Data

    Data breaches and cyberattacks have become commonplace.  Practitioners must make sure that they secure their networks and data. 

    Make sure that your IT provider or personnel are constantly monitoring your system, updating your firewalls, operating systems, antivirus software and other protective systems.  Also make sure to regularly open files from your backup system, to make sure that you can access them and that they are backing up the most recent version of your files.  A backup system that does not work is like having no backup at all.

    Whenever software offers two-factor authorization for logging in, it is vital to activate that feature.  Such authorization typically involves sending a text message to the user’s phone with an authorization code that must be entered during log in, to verify the user.

    In addition, make sure that you and your staff always think before you click.  Data thieves regularly send emails posing as vendors, clients, or potential clients in an attempt to trick users into clicking on links or opening attachments.  Such links and attachments can allow data thieves to steal confidential client information or to control the computer.  In addition, phishing emails are often used in ransomware attacks, which have become increasingly common. 

    A company’s cyber defenses are only as good as the knowledge that each employee has about the dangers of clicking on such links or opening such attachments.  Make sure that all of your staff are aware of this, and remind them about it regularly.  When in doubt, don’t click!

    The information provided herein is provided with the understanding that the author and publisher are not engaged in rendering legal, accounting or other professional service. As such, M + O = CPE, Inc. and the author disclaim any responsibility or liability for the information supplied herein or the application of said information.