The annual global cost of cybercrime is high and getting higher all the time. In fact, cyber criminals reap a windfall from their activities that is estimated to have been $450 billion in 2015 and is anticipated to climb to an annual $10.5 trillion average by 2025. In the United States alone, the FBI received reports of 800,944 cybercrime complaints involving $10.3 billion in 2022. Almost all of that cybercrime began with—and continues to start with—a social engineering concept known as “phishing.”
Certain business organizations, among which are those referred to as “financial institutions,” are charged by the FTC with taking particular steps to protect their customers’ financial information. Included in the category of financial institutions are professional tax preparers. Professional tax preparers normally maintain a significant amount of taxpayer information in various files—electronic and paper—that would be a treasure trove for cyber criminals.
In this course, tax preparers are introduced to the problem of cybercrime and its costs, offered methods that can be expected to reduce the chances of becoming a cybercrime victim, and informed of proper steps to take if they do become victims of cybercrime. Accordingly, it will examine cybercrime and will discuss:
- The extent of the cybercrime problem;
- The potential costs to a tax preparer whose taxpayer data have been breached;
- The best practices a tax preparer may implement to avoid becoming a cybercrime victim; and
- What a tax preparer should do if its taxpayer data has been breached.
Course Publication Date:
February 20, 2024
This course is available with
NO ADDITIONAL FEE if you have an active
self study membership or
all access membership or can be purchased for
$30.00!
Author: | Paul Winn |
Course No: | TECH-SECURE-3184 |
Recommended CPE: | 3.00 |
Delivery Method: | QAS Self Study |
Level of Knowledge: | Overview |
Prerequisites: | None |
Advanced Preparation: | None |
Recommended Field of Study: | Information Technology
|
|
|
|
Learning Objectives
- Identify the source of the most frequent type of malicious access to a firm’s taxpayer information.
- List the most common types of cyber attack.
- Describe how a denial-of-service attack operates to impede business operations.
- Recognize the dangers of Trojan horses.
- List the principal federal laws and regulations governing the security of taxpayer information.
- Understand the objectives and requirements of the Safeguards Rule.
- Identify the notification requirements imposed by the Financial Privacy Rule.
- Distinguish between a customer and a consumer under FTC regulations.
- List the principal causes of a data breach involving customer records.
- Identify the investigation and remediation activities normally undertaken by an organization following a data breach involving customer information.
- Recognize the average costs of a data breach in the United States.
- Understand the probability of a business experiencing a data breach within the next 24 months.
- Recognize the function of a firm’s Information Security Plan.
- List the principal sections of an Information Security Plan.
- Identify the role of an Information Security Plan’s physical security procedures.
- Describe the elements comprising a firm’s information and computer system.
- List the data use and retention areas generally vulnerable to unauthorized access of taxpayer information.
- Identify best practices for securing taxpayer information.
- Identify the steps that should be taken by a business to stop or limit additional data loss if a data breach has occurred involving its clients.
- Recognize the need for a comprehensive communications plan.
- List the entities that should be notified in the event of a data breach.
- Identify the additional protections that may be recommended if a data breach involves the compromise of clients’ Social Security numbers.