Data protection is important to consider when transmitting PII data through any electronic channels, especially on the internet. These communications can include, but are not limited to:
Below are target areas for hackers trying to steal PII data.
Email Encryption and Data Interception. Unencrypted emails are extremely vulnerable. When you send an unencrypted email, especially with attachments, there is a risk that malicious actors could intercept and access your sensitive information.
Encryption is crucial! It transforms your data into a code that can be deciphered only by the intended recipient, thereby protecting it from unauthorized access. At Walker & Armstrong, we utilize platforms and best practices to protect our clients’ PII data.
All of these platforms allow you to send and receive data securely, safeguard your information, and maintain data integrity, ensuring that your documents are accessible only to authorized individuals within Walker & Armstrong.
Safe Email Practices. It’s imperative to adopt safe email practices within your personal inbox to avoid falling victim to a cyber security threat. You can do that by:
Finally, always evaluate before sending an email that contains personal information. Ask yourself, “What am I sending?” and “Who am I sending this to?” If you are unable to answer any of these questions with certainty, it is best practice to not send the email, to avoid sending sensitive information to the wrong person.
Dealing with Suspicious Communications. If you receive an email from a sender claiming to be a government tax authority, it is crucial to verify the authenticity of the communication. Rather than responding directly, contact your tax provider or the relevant authority to confirm the legitimacy of the request. By utilizing your subject matter experts, they can provide you with the necessary guidance on how to protect your data as well as verify if the communications are legitimate.
If you receive an email claiming to be sent by the IRS, you can assume that it is a fraudulent communication. According to the IRS website, the IRS “doesn't initiate contact with taxpayers by email, text messages or social media channels to request personal or financial information. This includes requests for PIN numbers, passwords or similar access information for credit cards, banks or other financial accounts.”
Protecting Your Personal Devices
Beyond email security, ensuring that your personal computer is protected is just as vital. Confirm that you have updated virus protection and anti-hacking software installed. Avoid connecting to unprotected or unsecured Wi-Fi networks in public places (e.g., coffee shops, airports, hotels, etc.). By connecting to these networks, it can expose your device to malicious attacks. Using secure networks or a hotspot is a much better way to secure your computer while browsing the internet.
Conclusion
Safeguarding your data through encrypted communications, secure portals, diligent email practices, and general cybersecurity measures is vital to protecting your information. By implementing these strategies, you can significantly reduce the risk of data breaches and ensure that your sensitive information remains protected.
Try to stay informed about the latest security practices and consult with experts when necessary to maintain the highest level of data security.
| Walker & Armstrong, LLP
Privacy Policy | Peer Review | Client Portal
Any articles, discussion, commentary, forms and sample documentation contained in this website are offered as general guidance only and are not to be relied upon as specific tax, financial or other professional advice.