In IR-2018-150, as part of an ongoing effort to increase safety of computer data, the Service published the "Security Six." The publication provides six ways to protect your data. While
these six security measures are aimed toward tax professionals, everyone can benefit from the IRS computer security recommendations.
The "Security Six" measures include installing anti-virus software, consistent backups of data, two-factor authentication, data encryption, software firewalls and a data security
- Anti-virus Software - Everyone should have an anti-virus software program on all computers, laptops and tablets. The anti-virus software
can be set to automatically scan files or directories. Most anti-virus software can also be used for manual scans. It is especially important to scan email
attachments or web downloads. Your security software should protect you from viruses, malware and spyware. The IRS urges you to be cautious and not download
"free" software, not click on email links if you do not know the sender and to be careful of opening attachments from suspicious email addresses.
- Consistent Backups - You should back up your data regularly. This protects your data and, if your computer is infected with malware or
ransomware, allows you to restore the data after you have removed the software virus. Many users will find that a secure cloud storage service or an
external hard drive is appropriate for backups. The cloud storage service may come with software that will automate the backup process.
- Two-Factor Authentication - Another level of protection occurs with two-factor authentication. This is particularly useful for your bank
account, financial accounts or other accounts that hold financial data. With two-factor authentication, you normally log in with your password to your
financial account. The bank or financial company then sends a text message containing a six digit code to your phone. After you enter the six digit code, you will
have access to the account. The code is normally valid for a period of 10 minutes, so your financial account security is significantly enhanced.
- Encryption - It is possible to use security software to encrypt part or all of the data on your hard drive. If the data is encrypted,
then a hacker will normally not be able to access personal information that can be used for identity theft.
- Firewalls - While a firewall is quite often used with a network, even small office routers often have firewall features. The firewalls, along with other security measures, can block hacking attempts by scammers. If you use firewall software, be certain that it is from an established software vendor
or service provider.
- Data Security Plan - Tax professionals are required to have a written data security plan. The Federal Trade Commission establishes rules
for those plans. The plan will frequently include all five of the previous security steps. IRS Publication 5293, Data Security Resource Guide for Tax
Professionals, is a good security reference guide for both professionals and individuals. It is available on www.irs.gov.