SlideShare a Scribd company logo
Cyber Security Tips: Non-profit Groups Say Beware
of Fraud, ID Theft at Tax Time
Tuesday, April 18 might feel far-off, but the tax filing deadline will be here before you know it. That also
means it’s primetime for cyber thieves and their devious online scams. – which occursTax identity theft
when someone uses your Social Security number to file a tax return and then steals your refund – is on
the rise. According to the Federal Trade Commission (FTC), there was a nearly 50 percent increase in
identity theft complaints in 2015, and by far the biggest contributor to the surge was the spike in tax
refund fraud.
Ohio ranked 12th in the U.S. for identity theft complaints in 2015 with 134.4 per 100,000 population.
Ohio ranked 18th for fraud and other complaints with 606.8 per 100,000.
At this time last year, the Internal Revenue Service (IRS) reported a 400 percent increase in email
phishing and malware incidents aimed at both taxpayers and tax professionals.
Cyber crooks are crafty: they can break into your account or device and literally steal your digital life –
and your money. and Identity Theft Resource Center (ITRC)The National Cyber Security Alliance (NCSA)
have teamed up to share cautionary tips for spotting cyber tricks, proactive online safety steps and
invaluable advice about how to get help if you fall victim to tax identity theft.
Don’t Become a Victim: Watch Out for Tax Season Tricks
Online outlaws will attempt to lure you in a variety of ways. Watch out for the following:
· Fraudulent tax returns: The FTC recommends trying to file your tax return as soon as possible. The IRS
only accepts one tax return per Social Security number. If the file is yours and it’s in early, it makes it
impossible for a cyber thief to submit another return with your personal information. It’s also important
to always use smart practices with your personal information. Remember to only share your Social
Security number when it’s absolutely necessary. Check your credit report regularly for shady activity and
never throw papers with critical information – like your Social Security number or bank account
information – in the trash. It’s best to shred all paper containing personal data.
· Phishing and malware: Cybercriminals will try to get you to do “something” so they can steal your
personal information. Watch out for unsolicited emails, texts, social media posts or fake websites that
may prompt you to click on a link or to share valuable personal and financial information. Armed with
this information, online thieves can pilfer funds and/or commit identity theft. And unfamiliar links or
attachments can contain malware ‒ viruses, spyware and other unwanted software that gets installed
on your computer or mobile device without your consent – which can infect your computer files if
opened.
· Imposters claiming to be Internal Revenue Agents: The IRS will never email or call you demanding
immediate payment without having first mailed a bill. Nor will they ask for a credit or debit card number
via email or phone.
· Tax preparer fraud: The overwhelming majority of tax preparers provide honest services, but some
unscrupulous individuals may target unsuspecting taxpayers and the result can be refund fraud and/or
identity theft. The IRS reminds anyone filing a tax return that their preparer must sign it with their IRS
Preparer Identification Number.
Stay Cyber Safe – Practice NCSA’s Tax Season Tips
National Cyber Security Alliance (NCSA) has some easy-to-use STOP. THINK. CONNECT.™ tips to help
protect you against fraudster tricks:
· Keep all machines clean: Having updated software on all devices that connect to the internet is critical.
This includes security software, web browsers and operating systems for PCs and your mobile devices.
Having current software is a strong defense against viruses and malware that can steal logon credentials
or potentially use your computer to generate spam.
· Lock down your login: Fortify your online accounts by enabling the strongest authentication tools
available, such as biometrics, security keys or a unique one-time code through an app on your mobile
device. Your usernames and passwords are not enough to protect key accounts like email, banking and
social media.
· Make better passwords: If your passwords are too short or easy to guess, it’s like giving a cyber thief
your banking PIN. Longer passwords and those that combine capital and lowercase letters with numbers
and symbols provide better protection.
· Get savvy about Wi-Fi hotspots: Public wireless networks are not secure. Cybercriminals can potentially
intercept internet connections while you are filing highly personal information on public WiFi.
· When in doubt, throw it out: Links in email are often the way bad guys get access to your personal
information. If it looks weird, even if you know the source, it’s best to delete.
· Think before your act: Be leery of communications that implore you to act immediately – especially if
you are told you owe money to the IRS and it must be paid promptly.
· File your tax forms on secure https sites only.
· Ask if your tax preparation service has checked for malware issues.
If You Think You’re a Victim…
Follow these ITRC tips to get help as a victim of tax identity theft:
· If you suspect identity theft: If you think you have tax issues related to identity theft, contact the IRS
immediately, even if you don’t have any evidence that it has affected your tax return. You can call the
IRS Identity Protection Specialized Unit (IPSU) at 1-800-908-4490.
· File an ID Theft Affidavit: You can document the identity theft by submitting a police report and the IRS
ID Theft Affidavit (Form 14039)
· Contact your state tax organization: Your state taxes may be affected as well.
· Document your case: Download the free ID Theft Help app from ITRC to track your case as you go
through the resolution process.
· File early: Get your tax refund before thieves do.
· Call the ITRC: You can receive no-cost assistance from a victim advisor by calling 888.400.5530.
Reminders from NCSA and ITRC
“With the tremendous amount of personal and financial information that is available online, tax season
is paradise for cybercriminals. There are many ways that identity thieves can get their hands on your
money or your data. Some of them require high-tech skill sets like hacking and writing malicious
software. Others are less involved and basically amount to tricking you into complying. Unfortunately,
even the most low-tech tax scam can cause lasting and expensive damage,” said Michael Kaiser, NCSA’s
executive director. “Remember that personal information is like money. You must value it and protect it.
During intensely busy online timeframes – and throughout the year ‒ it’s critical for everyone to learn
how to take simple security precautions to protect themselves and their personal information, and to
share the responsibility of protecting others online. Practicing good cybersecurity empowers all internet
users to reap the benefits of connectivity with greater confidence.”
“All of us, from large government agencies down to individual taxpayers, play a significant role in
minimizing tax refund fraud,” said Eva Velasquez, ITRC President & CEO. “Avoiding scams and fraud
attempts is only one part of the prevention equation. It means staying vigilant about where your
personal data ends up, monitoring your credit report routinely for signs of suspicious activity, and filing
your return as early as possible to beat a thief to it.”
Resources to Help You Stay Safe this Tax Season
Here are a few resources that can help you protect your identity and be safer and more secure online
this tax season – and year-round:
STOP. THINK. CONNECT.™ Tips and Advice
Identity Theft Resource Center
The Federal Trade Commission’s IdentityTheft.gov
The U.S. Department of Homeland Security’s STOP. THINK. CONNECT.™ Identity Theft and Internet
Scams Tip Card
1.https://tinyurl.com/zmndat4 https://krebsonsecurity.com/2016/01/ftc-tax-fraud-behind-47-spike-in-
id-theft/ (January 2016)
2. https://tinyurl.com/grz84vf http://www.accountingtoday.com/news/irs-warns-of-surge-in-phishing-
and-malware-schemes-targeting-preparers-and-taxpayers
3. https://tinyurl.com/hoqga4m https://www.fool.com/retirement/2016/12/27/3-tax-scams-to-watch-
out-for-in-2017.aspx (Tips)
The National Cyber Security Alliance (NCSA) is the nation’s leading nonprofit, public-private partnership
promoting cybersecurity and privacy education and awareness. For more information on NCSA, please
visit staysafeonline.org/about-us/overview/.
Founded in 1999, the Identity Theft Resource Center® (ITRC) is a nationally recognized non-profit
organization which provides no-cost victim assistance and consumer education through its toll-free call
center, website and highly visible social media efforts. Visit http://www.idtheftcenter.org. Victims may
contact the ITRC at 888-400 -5530.

More Related Content

Viewers also liked

Delivering Your Products To Customers In USA – by United States Postal Servic...
Delivering Your Products To Customers In USA – by United States Postal Servic...Delivering Your Products To Customers In USA – by United States Postal Servic...
Delivering Your Products To Customers In USA – by United States Postal Servic...
eTailing India
 
Brochure - Succesvol Vanuit Eigen Kracht2
Brochure - Succesvol Vanuit Eigen Kracht2Brochure - Succesvol Vanuit Eigen Kracht2
Brochure - Succesvol Vanuit Eigen Kracht2Heleen Van Ommeren
 
Faciliter l'accès à l'information grâce à un moteur de recherche
Faciliter l'accès à l'information grâce à un moteur de rechercheFaciliter l'accès à l'information grâce à un moteur de recherche
Faciliter l'accès à l'information grâce à un moteur de recherche
KnowledgeConsult
 
Competition law
Competition lawCompetition law
Competition law
Hitesh Kumar Singh
 
Limelets marketing plan
Limelets marketing planLimelets marketing plan
Limelets marketing plan
Cal Poly Agribusiness
 
Concevez votre site web avec php et mysql
Concevez votre site web avec php et mysqlConcevez votre site web avec php et mysql
Concevez votre site web avec php et mysql
José De Araùjo Fernandes
 
Triptyque GTD
Triptyque GTDTriptyque GTD
Triptyque GTD
Nicolas Stampf
 
Vigie février 2017
Vigie février 2017Vigie février 2017
Vigie février 2017
Dominique Gayraud
 
Packaging for eCommerce & Retail at eTailing India Expo'17
Packaging for eCommerce & Retail at eTailing India Expo'17Packaging for eCommerce & Retail at eTailing India Expo'17
Packaging for eCommerce & Retail at eTailing India Expo'17
eTailing India
 
Enabling Indian Ecommerce Sellers and Brands GO GLOBAL at eTailing India Expo'17
Enabling Indian Ecommerce Sellers and Brands GO GLOBAL at eTailing India Expo'17Enabling Indian Ecommerce Sellers and Brands GO GLOBAL at eTailing India Expo'17
Enabling Indian Ecommerce Sellers and Brands GO GLOBAL at eTailing India Expo'17
eTailing India
 

Viewers also liked (13)

Delivering Your Products To Customers In USA – by United States Postal Servic...
Delivering Your Products To Customers In USA – by United States Postal Servic...Delivering Your Products To Customers In USA – by United States Postal Servic...
Delivering Your Products To Customers In USA – by United States Postal Servic...
 
folder_Refleks-Topteams
folder_Refleks-Topteamsfolder_Refleks-Topteams
folder_Refleks-Topteams
 
Brochure - Succesvol Vanuit Eigen Kracht2
Brochure - Succesvol Vanuit Eigen Kracht2Brochure - Succesvol Vanuit Eigen Kracht2
Brochure - Succesvol Vanuit Eigen Kracht2
 
folder_Refleks-PPO
folder_Refleks-PPOfolder_Refleks-PPO
folder_Refleks-PPO
 
Abc
AbcAbc
Abc
 
Faciliter l'accès à l'information grâce à un moteur de recherche
Faciliter l'accès à l'information grâce à un moteur de rechercheFaciliter l'accès à l'information grâce à un moteur de recherche
Faciliter l'accès à l'information grâce à un moteur de recherche
 
Competition law
Competition lawCompetition law
Competition law
 
Limelets marketing plan
Limelets marketing planLimelets marketing plan
Limelets marketing plan
 
Concevez votre site web avec php et mysql
Concevez votre site web avec php et mysqlConcevez votre site web avec php et mysql
Concevez votre site web avec php et mysql
 
Triptyque GTD
Triptyque GTDTriptyque GTD
Triptyque GTD
 
Vigie février 2017
Vigie février 2017Vigie février 2017
Vigie février 2017
 
Packaging for eCommerce & Retail at eTailing India Expo'17
Packaging for eCommerce & Retail at eTailing India Expo'17Packaging for eCommerce & Retail at eTailing India Expo'17
Packaging for eCommerce & Retail at eTailing India Expo'17
 
Enabling Indian Ecommerce Sellers and Brands GO GLOBAL at eTailing India Expo'17
Enabling Indian Ecommerce Sellers and Brands GO GLOBAL at eTailing India Expo'17Enabling Indian Ecommerce Sellers and Brands GO GLOBAL at eTailing India Expo'17
Enabling Indian Ecommerce Sellers and Brands GO GLOBAL at eTailing India Expo'17
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Cyber Security Tips: Non-profit Groups Say Beware of Fraud, ID Theft at Tax Time

  • 1. Cyber Security Tips: Non-profit Groups Say Beware of Fraud, ID Theft at Tax Time Tuesday, April 18 might feel far-off, but the tax filing deadline will be here before you know it. That also means it’s primetime for cyber thieves and their devious online scams. – which occursTax identity theft when someone uses your Social Security number to file a tax return and then steals your refund – is on the rise. According to the Federal Trade Commission (FTC), there was a nearly 50 percent increase in identity theft complaints in 2015, and by far the biggest contributor to the surge was the spike in tax refund fraud. Ohio ranked 12th in the U.S. for identity theft complaints in 2015 with 134.4 per 100,000 population. Ohio ranked 18th for fraud and other complaints with 606.8 per 100,000. At this time last year, the Internal Revenue Service (IRS) reported a 400 percent increase in email phishing and malware incidents aimed at both taxpayers and tax professionals. Cyber crooks are crafty: they can break into your account or device and literally steal your digital life – and your money. and Identity Theft Resource Center (ITRC)The National Cyber Security Alliance (NCSA) have teamed up to share cautionary tips for spotting cyber tricks, proactive online safety steps and invaluable advice about how to get help if you fall victim to tax identity theft. Don’t Become a Victim: Watch Out for Tax Season Tricks Online outlaws will attempt to lure you in a variety of ways. Watch out for the following:
  • 2. · Fraudulent tax returns: The FTC recommends trying to file your tax return as soon as possible. The IRS only accepts one tax return per Social Security number. If the file is yours and it’s in early, it makes it impossible for a cyber thief to submit another return with your personal information. It’s also important to always use smart practices with your personal information. Remember to only share your Social Security number when it’s absolutely necessary. Check your credit report regularly for shady activity and never throw papers with critical information – like your Social Security number or bank account information – in the trash. It’s best to shred all paper containing personal data. · Phishing and malware: Cybercriminals will try to get you to do “something” so they can steal your personal information. Watch out for unsolicited emails, texts, social media posts or fake websites that may prompt you to click on a link or to share valuable personal and financial information. Armed with this information, online thieves can pilfer funds and/or commit identity theft. And unfamiliar links or attachments can contain malware ‒ viruses, spyware and other unwanted software that gets installed on your computer or mobile device without your consent – which can infect your computer files if opened. · Imposters claiming to be Internal Revenue Agents: The IRS will never email or call you demanding immediate payment without having first mailed a bill. Nor will they ask for a credit or debit card number via email or phone. · Tax preparer fraud: The overwhelming majority of tax preparers provide honest services, but some unscrupulous individuals may target unsuspecting taxpayers and the result can be refund fraud and/or identity theft. The IRS reminds anyone filing a tax return that their preparer must sign it with their IRS Preparer Identification Number. Stay Cyber Safe – Practice NCSA’s Tax Season Tips National Cyber Security Alliance (NCSA) has some easy-to-use STOP. THINK. CONNECT.™ tips to help protect you against fraudster tricks: · Keep all machines clean: Having updated software on all devices that connect to the internet is critical. This includes security software, web browsers and operating systems for PCs and your mobile devices. Having current software is a strong defense against viruses and malware that can steal logon credentials or potentially use your computer to generate spam. · Lock down your login: Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passwords are not enough to protect key accounts like email, banking and social media. · Make better passwords: If your passwords are too short or easy to guess, it’s like giving a cyber thief your banking PIN. Longer passwords and those that combine capital and lowercase letters with numbers and symbols provide better protection. · Get savvy about Wi-Fi hotspots: Public wireless networks are not secure. Cybercriminals can potentially intercept internet connections while you are filing highly personal information on public WiFi.
  • 3. · When in doubt, throw it out: Links in email are often the way bad guys get access to your personal information. If it looks weird, even if you know the source, it’s best to delete. · Think before your act: Be leery of communications that implore you to act immediately – especially if you are told you owe money to the IRS and it must be paid promptly. · File your tax forms on secure https sites only. · Ask if your tax preparation service has checked for malware issues. If You Think You’re a Victim… Follow these ITRC tips to get help as a victim of tax identity theft: · If you suspect identity theft: If you think you have tax issues related to identity theft, contact the IRS immediately, even if you don’t have any evidence that it has affected your tax return. You can call the IRS Identity Protection Specialized Unit (IPSU) at 1-800-908-4490. · File an ID Theft Affidavit: You can document the identity theft by submitting a police report and the IRS ID Theft Affidavit (Form 14039) · Contact your state tax organization: Your state taxes may be affected as well. · Document your case: Download the free ID Theft Help app from ITRC to track your case as you go through the resolution process. · File early: Get your tax refund before thieves do. · Call the ITRC: You can receive no-cost assistance from a victim advisor by calling 888.400.5530. Reminders from NCSA and ITRC “With the tremendous amount of personal and financial information that is available online, tax season is paradise for cybercriminals. There are many ways that identity thieves can get their hands on your money or your data. Some of them require high-tech skill sets like hacking and writing malicious software. Others are less involved and basically amount to tricking you into complying. Unfortunately, even the most low-tech tax scam can cause lasting and expensive damage,” said Michael Kaiser, NCSA’s executive director. “Remember that personal information is like money. You must value it and protect it. During intensely busy online timeframes – and throughout the year ‒ it’s critical for everyone to learn how to take simple security precautions to protect themselves and their personal information, and to share the responsibility of protecting others online. Practicing good cybersecurity empowers all internet users to reap the benefits of connectivity with greater confidence.” “All of us, from large government agencies down to individual taxpayers, play a significant role in minimizing tax refund fraud,” said Eva Velasquez, ITRC President & CEO. “Avoiding scams and fraud attempts is only one part of the prevention equation. It means staying vigilant about where your personal data ends up, monitoring your credit report routinely for signs of suspicious activity, and filing your return as early as possible to beat a thief to it.”
  • 4. Resources to Help You Stay Safe this Tax Season Here are a few resources that can help you protect your identity and be safer and more secure online this tax season – and year-round: STOP. THINK. CONNECT.™ Tips and Advice Identity Theft Resource Center The Federal Trade Commission’s IdentityTheft.gov The U.S. Department of Homeland Security’s STOP. THINK. CONNECT.™ Identity Theft and Internet Scams Tip Card 1.https://tinyurl.com/zmndat4 https://krebsonsecurity.com/2016/01/ftc-tax-fraud-behind-47-spike-in- id-theft/ (January 2016) 2. https://tinyurl.com/grz84vf http://www.accountingtoday.com/news/irs-warns-of-surge-in-phishing- and-malware-schemes-targeting-preparers-and-taxpayers 3. https://tinyurl.com/hoqga4m https://www.fool.com/retirement/2016/12/27/3-tax-scams-to-watch- out-for-in-2017.aspx (Tips) The National Cyber Security Alliance (NCSA) is the nation’s leading nonprofit, public-private partnership promoting cybersecurity and privacy education and awareness. For more information on NCSA, please visit staysafeonline.org/about-us/overview/. Founded in 1999, the Identity Theft Resource Center® (ITRC) is a nationally recognized non-profit organization which provides no-cost victim assistance and consumer education through its toll-free call center, website and highly visible social media efforts. Visit http://www.idtheftcenter.org. Victims may contact the ITRC at 888-400 -5530.