Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Know Who’s Looking Forward to Tax Season? Identity Thieves

You Know Who’s Looking Forward to Tax Season? Identity Thieves

One of the most high-profile hacking attacks in the United States struck last year when the Internal Revenue Service (IRS) was breached. 464,000 Social Security numbers were swiped; enough to file 101,000 tax returns using false personal identification numbers. Every organization can learn how to better protect themselves during tax return season, especially since you have so much on the line every year.

In response to the aforementioned threat, the IRS has made several improvements that allow the organization to (hopefully) better protect taxpayers as they perform their financial obligations. Specifically, these improvements are effective “before, during, and after a tax return is filed.” On the IRS’s official website, “This is highlighted by the number of new people reporting stolen identities on federal tax returns falling by more than 50 percent, with nearly 275,000 fewer victims compared to a year ago.”

One of the best tools that the IRS has used to cut down on these concerning identity theft numbers is an annual security summit. In part, the following results have been attributed to the summit:

  • Fraudulent returns are being stopped more frequently before processing: The IRS accounted for almost 50 percent fewer fraudulent returns, which amounts to about 787,000 identity theft returns from January 2016 to September 2016. These returns would have totaled well over $4 billion.
  • A significant decrease in fraudulent refunds: 106 new institutions became bank partners since 2015, and this played a role in cutting fraudulent refunds. The number of refunds that seemed questionable and were stopped by banks increased by more than 50 percent, and these suspect refunds were brought back to the IRS for further examination.
  • A sharp decrease in identity theft affidavits: Throughout the first nine months of 2016, the number of identity theft affidavits was cut in half.
  • New data on tax returns: With more data required to properly fill out a tax return, the IRS has managed to keep over 74,000 suspicious returns from processing, which in turn kept $372 million out of the pockets of identity thieves.
  • Shared information stopped false returns: The sharing of data was instrumental in preventing 57,000 fraudulent tax returns, and it wouldn’t have been possible without the cooperation of various industry and state partners.

While these improvements are quite a start, any business owner who is also a taxpayer will want to know that the IRS still needs to improve the way that they handle sensitive data. This is only one reason why you need to take the matters of your own identity security into your own hands. For your review, the IRS has created a list of steps that should be taken in order to protect your organization and all of those that your business engages with from identity theft. You can find a list of these steps on the IRS’s website.

To learn more about how you can keep better track of sensitive information, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Upgrade Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Avoiding Downtime Conferencing Marketing Access Control Office 365 HIPAA How To BDR Applications Computing Hacker Information Technology Website Healthcare Health Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router 2FA Operating System Help Desk Computers Virtual Private Network Risk Management Printer Remote Workers Paperless Office Infrastructure Telephone Firewall Document Management Cooperation Free Resource Project Management Windows 7 Microsoft 365 The Internet of Things Scam Data loss Solutions Social Going Green Patch Management Save Money Remote Monitoring Windows 11 End of Support Vulnerability Vendor Management Monitoring Customer Service Cybercrime Excel Physical Security Display Computer Repair Managed IT Service Virtual Desktop LiFi Downloads Data storage iPhone Licensing Word Outlook Entertainment Vulnerabilities Machine Learning Money Data Privacy Humor Images 101 Safety Multi-Factor Authentication Maintenance Mobility Telephone System Cost Management Antivirus Sports Mouse Administration Employees Integration Modem User Tip Robot Processor Mobile Security Customer Relationship Management Holidays Settings Wireless Printing Content Filtering Data Storage Hacking IT Management Smart Technology Supply Chain Video Conferencing Presentation VPN YouTube Meetings Managed Services Provider Saving Time Virtual Machines Cryptocurrency Professional Services Wireless Technology Identity Unified Communications Evernote Paperless Experience Regulations Compliance IP Address Google Docs Bookmark Smart Tech Memes Bitcoin Network Management Co-managed IT Running Cable Tech Support Monitors Download Net Neutrality Google Wallet Alerts SQL Server Technology Care History Recovery Business Communications Financial Data Browsers Smartwatch Connectivity IT Hard Drives Windows 8 Break Fix Scams Laptop Websites Upload Procurement Domains Drones Azure Hybrid Work SharePoint Cyber security Multi-Factor Security Tech Human Resources Electronic Medical Records Social Network Telework CES IoT Communitications Refrigeration Dark Web Cables Halloween Writing Trends Supply Chain Management Public Speaking Lenovo Lithium-ion battery Regulations Google Calendar Term Google Apps Virtual Reality Customer Resource management FinTech Data Analysis Star Wars IT Assessment Hacks Server Management Microsoft Excel IT Maintenance Entrepreneur Scary Stories Private Cloud Identity Theft Fun Gamification Flexibility Superfish Staff Value Business Intelligence Social Networking Deep Learning Legislation Shortcuts Twitter Organization Fileless Malware Digital Security Cameras Smart Devices Undo Ransmoware Error Education Social Engineering Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Remote Computing Health IT Directions Videos Assessment Electronic Health Records Mobile Computing Permissions Workforce Tablet Search Wasting Time Threats Trend Micro Application Best Practice Specifications Security Cameras Workplace Strategies Alert Dark Data Microchip Internet Exlporer Software as a Service Managed IT Fraud Meta Buisness File Sharing IT solutions How To Username IBM Legal Managing Costs Amazon eCommerce Business Growth Black Friday SSID Notifications Database Surveillance Virtual Assistant Outsource IT Travel Google Maps Media Cortana Techology IT Technicians Virtual Machine Environment Cookies Alt Codes Cyber Monday Medical IT Proxy Server Reviews Tactics Development Competition Hotspot Transportation Small Businesses Downtime Unified Threat Management Hosted Solution Unified Threat Management Mirgation Hypervisor Displays Nanotechnology Optimization Typing PowerPoint Shopping Network Congestion Addiction Language Employer/Employee Relationships Outsourcing User Navigation Knowledge Management PCI DSS Google Drive User Error Chatbots Gig Economy Screen Reader Distributed Denial of Service Workplace 5G Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Point of Sale

Blog Archive