Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Know Who’s Looking Forward to Tax Season? Identity Thieves

You Know Who’s Looking Forward to Tax Season? Identity Thieves

One of the most high-profile hacking attacks in the United States struck last year when the Internal Revenue Service (IRS) was breached. 464,000 Social Security numbers were swiped; enough to file 101,000 tax returns using false personal identification numbers. Every organization can learn how to better protect themselves during tax return season, especially since you have so much on the line every year.

In response to the aforementioned threat, the IRS has made several improvements that allow the organization to (hopefully) better protect taxpayers as they perform their financial obligations. Specifically, these improvements are effective “before, during, and after a tax return is filed.” On the IRS’s official website, “This is highlighted by the number of new people reporting stolen identities on federal tax returns falling by more than 50 percent, with nearly 275,000 fewer victims compared to a year ago.”

One of the best tools that the IRS has used to cut down on these concerning identity theft numbers is an annual security summit. In part, the following results have been attributed to the summit:

  • Fraudulent returns are being stopped more frequently before processing: The IRS accounted for almost 50 percent fewer fraudulent returns, which amounts to about 787,000 identity theft returns from January 2016 to September 2016. These returns would have totaled well over $4 billion.
  • A significant decrease in fraudulent refunds: 106 new institutions became bank partners since 2015, and this played a role in cutting fraudulent refunds. The number of refunds that seemed questionable and were stopped by banks increased by more than 50 percent, and these suspect refunds were brought back to the IRS for further examination.
  • A sharp decrease in identity theft affidavits: Throughout the first nine months of 2016, the number of identity theft affidavits was cut in half.
  • New data on tax returns: With more data required to properly fill out a tax return, the IRS has managed to keep over 74,000 suspicious returns from processing, which in turn kept $372 million out of the pockets of identity thieves.
  • Shared information stopped false returns: The sharing of data was instrumental in preventing 57,000 fraudulent tax returns, and it wouldn’t have been possible without the cooperation of various industry and state partners.

While these improvements are quite a start, any business owner who is also a taxpayer will want to know that the IRS still needs to improve the way that they handle sensitive data. This is only one reason why you need to take the matters of your own identity security into your own hands. For your review, the IRS has created a list of steps that should be taken in order to protect your organization and all of those that your business engages with from identity theft. You can find a list of these steps on the IRS’s website.

To learn more about how you can keep better track of sensitive information, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Compliance Cloud Computing Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Managed Services Data Security Employer-Employee Relationship Tip of the week Voice over Internet Protocol Mobile Device Management Chrome Gmail Networking Budget WiFi Apple App BYOD Physical Security Applications Computing Hacker Access Control Information Technology Avoiding Downtime Marketing Conferencing Office 365 Managed IT Services How To BDR HIPAA Router 2FA Virtual Private Network Operating System Computers Health Risk Management Help Desk Website Retail Analytics Office Tips Healthcare Augmented Reality Storage Password Bring Your Own Device Big Data Windows 11 Going Green Display Customer Service Printer Excel Cybercrime Paperless Office Infrastructure Monitoring Document Management Remote Workers Managed IT Service Telephone Scam Firewall Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring Social End of Support Vulnerability Vendor Management Solutions Meetings VPN Employees Customer Relationship Management Integration Settings Modem Wireless Supply Chain Printing User Tip Processor Content Filtering Computer Repair Mobile Security Hacking YouTube Holidays Presentation Cryptocurrency Data Storage Smart Technology Wireless Technology Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Desktop Virtual Machines Professional Services Data storage LiFi Word Outlook Maintenance Data Privacy Downloads Antivirus iPhone Money Humor Licensing Entertainment Vulnerabilities Safety Sports Images 101 Mouse Multi-Factor Authentication Robot Mobility Telephone System Administration Cost Management IT Management Trend Micro Network Congestion Specifications Security Cameras User Error Microchip Internet Exlporer Software as a Service Cortana Fraud Small Businesses Alt Codes Username Managing Costs Displays Downtime Point of Sale eCommerce Black Friday SSID Competition Hosted Solution Database Surveillance Virtual Assistant Outsourcing Typing Network Management Tech Support IT Technicians Virtual Machine Cookies Monitors Cyber Monday Medical IT Workplace Proxy Server Reviews Google Drive User Tactics Development Knowledge Hotspot Transportation Hiring/Firing Paperless Websites Mirgation Hypervisor Nanotechnology Optimization 5G PowerPoint Co-managed IT Shopping IP Address Google Docs SharePoint Unified Communications Addiction Experience Electronic Medical Records Language Employer/Employee Relationships Technology Care Navigation Business Communications Bitcoin Management PCI DSS Running Cable Chatbots Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Scams Google Wallet Recovery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hybrid Work Private Cloud Identity Evernote Human Resources Hard Drives Windows 8 Server Management Regulations Compliance Laptop Superfish Bookmark Identity Theft Smart Tech Memes Cables Domains Drones Download Net Neutrality Twitter Alerts SQL Server Error History Google Apps Refrigeration Financial Data Halloween Browsers Smartwatch Connectivity IT Social Engineering Break Fix IT Maintenance Public Speaking Lithium-ion battery Upload Procurement Remote Computing Azure Business Intelligence Cyber security Multi-Factor Security Tech Shortcuts Hacks Social Network Telework Entrepreneur Scary Stories CES Tablet IoT Communitications Fun Dark Web Ransmoware Deep Learning Trends Supply Chain Management Alert Vendors File Sharing Regulations Dark Data Google Calendar Term Be Proactive Undo Managed IT Customer Resource management FinTech Data Analysis Education Star Wars IT Assessment How To Microsoft Excel Workforce Gamification Flexibility Notifications Staff Value Threats Travel Social Networking Legislation Workplace Strategies Mobile Computing Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Search Meta Application Best Practice Content Remote Working Wearable Technology Memory Amazon Unified Threat Management Motherboard Data Breach Comparison Google Play Health IT Buisness IBM Legal Unified Threat Management Directions Videos IT solutions Assessment Electronic Health Records Permissions Outsource IT Media Business Growth Wasting Time Environment

Blog Archive