Tax season, in particular, has become peak hunting season for cybercriminals, with attacks on accounting firms surging as workloads increase and vigilance drops.
The Top Cybersecurity Risks in Tax Technology
Cybercriminals are sophisticated, targeting both large and small firms with a variety of attack vectors. Here are the most prominent risks your firm must actively defend against:-
Phishing and Social Engineering
- Clicking on malicious links that download malware or ransomware.
- Revealing login credentials or two-factor authentication codes.
-
Ransomware and Malware
-
Third-Party and Cloud Vulnerabilities
-
Insider Threats
-
Outdated Software and Weak Access Controls
Read more: Cybersecurity as a Boardroom Priority: Moving from IT to Strategic Risk
How Firms Can Stay Protected: Best Practices
Protecting client data requires a multi-layered, proactive security strategy. A single firewall or antivirus won't cut it.-
Establish an Unbreakable Digital Foundation
- Mandatory Multi-Factor Authentication (MFA): This is the single most effective defense against unauthorized access. Make MFA mandatory for all systems email, tax software, client portals, and VPNs. It requires users to verify their identity using a second factor (like a mobile code or authenticator app) in addition to a password.
- Encrypt Everything: Ensure all sensitive data is encrypted at rest (on your servers or cloud storage) and in transit (when being sent to a client or vendor).
- Strong Password Protocols: Enforce the use of complex, unique passwords (at least 12 characters with a mix of types) and require the use of a secure password manager for all staff.
-
Prioritize Data and System Resilience
- Keep 3 copies of your data (the primary and two backups).
- Store them on 2 different types of media (e.g., local server and cloud).
- Ensure 1 copy is kept off-site or offline (air-gapped).
-
Invest in People and Processes
-
Maintain Compliance and Oversight
- Security Audits and Penetration Testing: Hire third-party experts to conduct annual security audits, vulnerability scans, and simulated attacks (penetration tests) to identify and address weaknesses before criminals exploit them.
- Formal Written Information Security Plan (WISP): Create a formal document outlining all security policies and procedures, as this is often required for compliance with industry regulations and standards.
Read more: One Law, Two Scripts: Navigating the Material Discrepancies in the Nigeria Tax Act 2025 - Eben Joels