< Return to Search


Tax pros: Follow the “Security Six” steps to help protect taxpayer data


Tax professionals should review security steps to make sure they are fully protecting sensitive taxpayer data. All tax pros should give their data safeguards a thorough review. Part of this review is following the “Security Six” protections.

Here is more info about these basic protections that everyone – especially tax professionals handling sensitive data – should use:

  1. Anti-virus software
  2. • This software scans computer files or memory for certain patterns that may indicate there’s malicious software – also called malware – on the device.
  3. • Anti-virus vendors find new issues and update malware daily. This is why it’s important for users to install the latest updates of the software.
  4. Firewalls
  5. • Firewalls provide protection against outside attackers. The firewall shields computers and networks from malicious or unnecessary web traffic. This helps prevents malicious software from accessing the user’s system.
  6. Two-factor authentication
  7. • Two-factor authentication adds an extra layer of protection beyond a password.
  8. • The returning user enters credentials like a username and password. Then, there’s another step, such as entering a security code.
  9. Backup software or services
  10. • Users should routinely back up critical files on their computers and hard drives to external sources.
  11. Drive encryption
  12. • Because tax professionals keep sensitive client data on their computers, users should consider drive encryption software.
  13. • Drive encryption is also known as disk encryption. It transforms data on the computer into unreadable files. This means only people who are authorized to access the data can do so. 
  14. Virtual private network
  15. • Many tax firms’ employees must occasionally connect to unknown networks or work from home. So, the office should establish an encrypted virtual private network. This allows for a more secure connection.
  16. • A VPN provides a secure, encrypted tunnel to transmit data between a remote user over the internet and the company network. 

More information:

Share this tip on social media — #IRSTaxTip: Tax pros: Follow the “Security Six” steps to help protect taxpayer data go.usa.gov/xV2uR

The post Tax pros: Follow the “Security Six” steps to help protect taxpayer data appeared first on Windham Region Chamber of Commerce.

Share this post & the power of local to your other favorite networks:
Read More on WindhamChamber.com