Tips for Dealing with Dangerous Tax Scams

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Tips for Dealing with Dangerous Tax Scams-5 Next

Infected or Insecure Computers

If the computer you are using has malware or spyware installed on it, any information that you enter could be captured by keylogging software. If preparing your own tax return, always use a computer that is running up-to-date anti-malware, and has a firewall. Another risk is that when your computer is running file-sharing software, information can be accidentally exposed. For example, if teenagers use the same computer on which the tax preparation is done and have downloaded peer-to-peer software, make sure the settings on the application do not allow for access to areas on the computer where sensitive data, like tax information, is stored. Better yet, don't use a computer that has peer-to-peer software on it.

Cyber criminals and scammers view tax season as a prime opportunity. There are many ways that you can fall victim to their attacks and scams. The IRS has issued numerous consumer warnings about the fraudulent use of the IRS name or logo by scammers that are trying to trick consumers into providing their personal information (identity theft) in order to steal their financial assets or commit fraud. In addition, tax preparers and tax software vendors are often impersonated. Scammers use email, the web, postal mail, telephone and fax to set up their victims.

In this slideshow, Marie White, CEO of Security Mentor, a security awareness provider, discusses some of the serious tax scams and tax fraud, and offer ways to help you avoid them.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.