CTSFW shallow


A charitable bequest is one of the easiest ways you can leave a lasting impact on Concordia Theological Seminary.

Thank you for your support of Concordia Theological Seminary and our mission to form servants in Jesus Christ who teach the faithful, reach the lost, and care for all. Unless you indicate otherwise, your gift will automatically be used wherever it's most needed to help train pastors and deaconesses for service in Christ's Church. You may designate your gift to student financial aid or to a specific area of interest by selecting "Other Gift" and providing a description of the area to which you would like your gift directed.

Text Resize
Subsribe to RSS Feed

Friday July 19, 2019

Washington News

Washington Hotline

IRS Promotes "Security Six" Computer Safeguards

In IR-2018-150, as part of an ongoing effort to increase safety of computer data, the Service published the "Security Six." The publication provides six ways to protect your data. While these six security measures are aimed toward tax professionals, everyone can benefit from the IRS computer security recommendations.

The "Security Six" measures include installing anti-virus software, consistent backups of data, two-factor authentication, data encryption, software firewalls and a data security plan.
  1. Anti-virus Software - Everyone should have an anti-virus software program on all computers, laptops and tablets. The anti-virus software can be set to automatically scan files or directories. Most anti-virus software can also be used for manual scans. It is especially important to scan email attachments or web downloads. Your security software should protect you from viruses, malware and spyware. The IRS urges you to be cautious and not download "free" software, not click on email links if you do not know the sender and to be careful of opening attachments from suspicious email addresses.
  2. Consistent Backups - You should back up your data regularly. This protects your data and, if your computer is infected with malware or ransomware, allows you to restore the data after you have removed the software virus. Many users will find that a secure cloud storage service or an external hard drive is appropriate for backups. The cloud storage service may come with software that will automate the backup process.
  3. Two-Factor Authentication - Another level of protection occurs with two-factor authentication. This is particularly useful for your bank account, financial accounts or other accounts that hold financial data. With two-factor authentication, you normally log in with your password to your financial account. The bank or financial company then sends a text message containing a six digit code to your phone. After you enter the six digit code, you will have access to the account. The code is normally valid for a period of 10 minutes, so your financial account security is significantly enhanced.
  4. Encryption - It is possible to use security software to encrypt part or all of the data on your hard drive. If the data is encrypted, then a hacker will normally not be able to access personal information that can be used for identity theft.
  5. Firewalls - While a firewall is quite often used with a network, even small office routers often have firewall features. The firewalls, along with other security measures, can block hacking attempts by scammers. If you use firewall software, be certain that it is from an established software vendor or service provider.
  6. Data Security Plan - Tax professionals are required to have a written data security plan. The Federal Trade Commission establishes rules for those plans. The plan will frequently include all five of the previous security steps. IRS Publication 5293, Data Security Resource Guide for Tax Professionals, is a good security reference guide for both professionals and individuals. It is available on www.irs.gov.

Published July 20, 2018
Subsribe to RSS Feed

Previous Articles

IRS Summertime Tax Tips

"Almost a Postcard" Tax Return