A tale as old as time: criminals attempting to gain for themselves by preying on innocent individuals. Some of the oldest writings in history were the criminal codes of early civilizations, so it should come as no surprise that criminals have not gone away, they have gotten smarter. So how do you protect yourself and your loved ones in an increasingly tech-centric society?
To start, it is important to understand how criminals are going about their business these days. The majority of scams you will hear about involve phishing emails, calls, or text messages. Phishing is a type of cyberattack that involves sending a fraudulent message with a malicious link or with the hopes of getting the recipient to provide personal information that can be used. If you receive a phishing email and click a link they provide or open an attachment, the cyber criminals may then be able to access your computer, network, or other sensitive information. Sometimes they access your email in order to send further phishing attempts to your contacts. In other cases, they are hoping you will send them sensitive or personal information that can be used to steal your identity or guess your passwords. Phishing can be done via email, text message, or even phone call.
Speaking of phone calls, these are where tax scams often live. Picture this: a phone call comes through and the caller ID says "IRS". You answer and they tell you that you owe thousands in back taxes and if you do not pay up, a warrant will be issued for your arrest. You panic and they tell you that you can either provide your bank account information over the phone or you can pay in pre-paid debit cards that you can purchase at the store. STOP. If this sounds like a scam, it definitely is. Some important points about the IRS:
They will not generally call you unless you have asked them to. The IRS typically communicates through regular mail via the US Postal Service. Even if they do need to call you, it will be after you have received several notices in the mail first.
The IRS does not typically communicate via email, text message, or social media. Be aware that any communication initiated through these channels is likely fraudulent.
The IRS will not issue a warrant for your arrest due to a phone call. In actuality, very few people have ever been arrested for any sort of tax issue (comparatively, of course), and only after a lengthy legal process. The IRS does not have the authority to issue a warrant for your arrest.
IRS agents are civil enforcement officers with the main goal to collect debts owed. The IRS no longer engages in unannounced visits to taxpayers. However, you should know that revenue officers carry two forms of official identification, IRS-issued credentials (also called a pocket commission) and a HSPD-12 card. The HSPD-12 card is a governmentwide standard form of identification for federal employees. Both forms of identification have serial numbers and photos of the employee – and you can ask to see both.
If you receive a call that you think is suspicious, it is best to be cautious. Do not provide any personal or sensitive information on that call. Instead, ask for the revenue officer's credential information and name, and tell them you will hang up and call the official IRS line to follow-up.
In general, if you receive communication from an unknown sender or the communication seems unusual for that sender, use caution with any links, attachments, or action you take. Emails and phone numbers can be "spoofed" to appear as if they are from a trusted source, which is why using caution with content that seems odd is important.
If you are concerned that your identity has been compromised, we recommend that you apply for an IRS Identity Protection PIN. This is an added layer of security to ensure no one can file taxes on your behalf. More information here.
In our office, we comply with IRS guidelines regarding data security because it is important to us to keep your information secure.
For additional resources regarding phishing, known scams, and how to protect yourself, please take a look at the following resources:
Comments