document.createElement(‘aside’);
http://www.accountingtoday.com
The Internal Revenue Service is warning tax professionals that identity thieves are trying to remotely take control over their computers to file fraudulent tax returns using the names and IDs of their clients.
The IRS urged tax preparers Fridays to double-check the settings on their tax prep software and enable all security measures to safeguard their clients’ information. They should pay particular attention to any usernames and passwords for accessing their tax software. The IRS said it is aware of approximately two dozen cases in recent days where tax professionals have been victimized.
The IRS has been working with state tax authorities and the tax industry on an initiative called the Security Summit to combat identity theft. Together they recently launched the Protect Your Clients; Protect Yourself campaign to raise awareness of criminals targeting tax professionals and their clients’ information.
“This latest incident reinforces the need for all tax professionals to review their computer settings as soon as possible,” said IRS Commissioner John Koskinen in a statement. “Identity thieves continue to evolve and look for new areas to exploit, especially as our fraud filters become more effective. The prompt identification of these attacks is another example of the great benefits that result from the close working relationship the IRS now has with the tax industry and the states through the Security Summit initiative. Information is flowing more rapidly between our groups as we continue our efforts to protect taxpayers.”
Koskinen recently recorded a video that the IRS posted on YouTube this week urging tax professionals to take precautions to safeguard their cybersecurity.
The IRS pointed out that the attacks are occurring as the Oct. 17 deadline approaches for filing tax extensions. The IRS warned of a similar remote control attack this past spring, just before the April 15 tax day deadline.
To prevent identity thieves from remotely accessing computers, the IRS is urging tax preparers to run a security “deep scan” to search for viruses and malware. They should also strengthen their passwords for accessing both their computers and software. The password should be at least eight digits long (although more is better), using a mix of numbers, letters and special characters.
Tax pros should also be on the lookout for phishing scams and not click on links or open attachments from unknown senders. They should educate all staff members about the dangers of phishing scams in the form of emails, texts and calls.
Tax practitioners should also review any software their employees use to remotely access the network or their IT support vendor uses to remotely troubleshoot technical problems and support the systems in the office. Remote access software is a potential target for identity thieves to gain entry and take control of a machine.
The IRS recently issued instructions to tax professionals on how to monitor their PTIN activity. Tax pros should also review Publication 4557, Safeguarding Taxpayer Data, a Guide for Your Business, which provides a checklist to help safeguard taxpayer information and enhance office security. Another guide, Data Breach Information for Tax Professionals, provides information on what action to take if one becomes a victim.
‘);
var $text = $(”).text(text);
var $meta = $(”);
var $newComment = $comment.append($text).append($meta);
if ($(‘.no-comments’).length) {
$(‘.no-comments’).after($(”).append($newComment));
$(‘.no-comments’).remove();
} else {
$(‘#comments-box .comment’).last().after($newComment);
}
$(‘.comments-count’).each(function(){
$(this).text(+$(this).text()+1);
});
}
function ajaxBusyTest() {
buttonOff();
setTimeout(buttonOn, 3000);
}
var commentOptions = {
client_id: ‘webcpa_news’,
story_id: ‘79150’,
user_id: ”,
comment_message: ” // textarea or NOCOMMENT
};
function postComment(options, callback, doButtonOff) {
callback = callback || function(){};
doButtonOff = typeof doButtonOff === ‘undefined’ ? true : doButtonOff;
var opts = $.extend(true, {}, commentOptions);
$.extend(true, opts, options);
if (doButtonOff) buttonOff();
$.ajax({
type:”POST”,
url: ‘/apps/custom/ajax_post_comment.php’,
data: opts,
success: function(data) {
callback($.parseJSON(data));
if (doButtonOff) buttonOn();
}
});
};
function showNotification(message) {
$.fancybox(message+’
Return to article.’);
};
$.fn.extend({
charWarden: function (outSelector, limit) {
return this.each(function(){
var $this = $(this);
var $out = $(outSelector);
var _limit = limit;
var _chars = 0;
function handler(e) {
_chars = e.target.value.length;
var left = _limit – _chars;
if (left = (page-1)*listCount i 3 (page (pageCount -2)) {
showMin = pageCount – 4;
if (showMin ‘;
if (page 1) {text += ‘
‘;}
while (count ‘ + count + ”;
if (showMax != count) {
text += ‘ | ‘;
}
text += ”;
count++;
}
if (page
‘;}
text += ”;
$(pagination).html(text);
}
function scrollToTop(){
$(‘html, body’).animate({
scrollTop: parseInt($(“#comments”).offset().top)
}, 700);
}
showPage(page);
if (pageCount 1){
buildPagination(page,pageCount);
$(pagination+” li.arrow_double_right a”).live(‘click’,function(){
page = pageCount;
showPage(page);
buildPagination(page,pageCount);
scrollToTop();
});
$(pagination+” li.arrow_right a”).live(‘click’,function(){
showPage(++page);
buildPagination(page,pageCount);
scrollToTop();
});
$(pagination+” li.numbers a”).live(‘click’,function(){
page = $(this).data(‘number’);
//console.log(“pageCount: “+pageCount+” page: “+page);
showPage(page);
buildPagination(page,pageCount);
scrollToTop();
});
$(pagination+” li.arrow_left a”).live(‘click’,function(){
showPage(–page);
buildPagination(page,pageCount);
scrollToTop();
});
$(pagination+” li.arrow_double_left a”).live(‘click’,function(){
page = 1;
showPage(page);
buildPagination(page,pageCount);
scrollToTop();
});
}
}
$(function(){ // DOM ready
paginateComments();
$(‘.scroll-into-view’).each(function(i){if (i == 0) this.scrollIntoView();});
$(‘.reset-form’).click(function(e){
e.preventDefault();
this.form.reset();
});
$(‘#comment_message’).charWarden(‘#chars-remaining’, 4096);
$(‘.comment-notify’).click(function(e) {
e.preventDefault();
var options = {
comment_notify: ‘TRUE’,
comment_message: ‘NOCOMMENT’
};
var notification = function(data) {
if (data.success) {
$(‘.not-following’).hide();
$(‘.following’).show();
showNotification(data.success);
} else if (data.error) {
showNotification(data.error);
}
};
postComment(options, notification);
});
$(‘#wrapperForm’).on(‘submit’, function(e) {
e.preventDefault();
var options = {
comment_notify: $(‘#comment_notify’).prop(‘checked’) ? ‘TRUE’ : ”,
comment_message: $(‘#comment_message’).val()
};
var notification = function(data) {
if (data.success) {
if ($(‘#comment_notify:checked’).length) {
$(‘.not-following’).hide();
$(‘.following’).show();
}
document.wrapperForm.reset();
addPostOptimistically(options.comment_message);
$(‘#comment_message’).change();
} else if (data.error) {
showNotification(data.error);
}
};
postComment(options, notification);
});
$(‘a.username’).fancybox({
‘hideOnOverlayClick’: false,
‘centerOnScroll’ : true,
‘autoScale’ : false,
‘autoDimensions’ : false,
‘width’: 435,
‘height’: 205,
‘onClosed’: function() {
if ($(‘#do-refresh’).length) location.reload();
}
});
}); // end DOM ready
})(jQuery);