There are too many people unaware of the issue and too many organizations that believe they are immune or that your business won’t be a target. Credit: Getty Images/DNY59 It’s tax time again and an opportunity for cybercriminals to take advantage of unknowing consumers and businesses. While many of us are aware of this con impacting consumers, the simple truth is that this scam (and the underlying social engineering beneath it) is a huge danger to businesses and municipalities.Big bets on businessAs recently as this January, the United States Internal Revenue Service issued a new alert about a surge in income tax cyberscams. Part of the alert focused on the targeting of businesses. The government agency suggested that criminals were making serious attempts to pose as company executives or human resource and payroll officials to abscond with employee W-2 forms. With those forms in hand, the criminal gangs can file fraudulent returns and effectively have the government cut them a check for their wayward efforts.Tax professionals, accountants and accounting firms are also a significant target for the same reason – data. If the criminals get hold of the E-File account number of the provider, or the CAF number (a unique nine-digit identification number and is assigned the first-time third-party authorization is filed with IRS), the scammers can redirect every income tax return to their own banking accounts. This is such a concern to the IRS that it has partnered with state tax agencies and the private-sector tax industry to form the Security Summit – a unique partnership formed to fight the crime and the potential financial fallout that can occur from this type of fraud.The risksBut are they making a difference? While an informed populace is in less risk, the mitigation efforts can only go so far. There are too many people unaware of the issue and too many organizations that believe they are immune or that your business won’t be a target. That belief is human – and that is the very problem. The actual crime (such as the release of information or the transfer of funds) occurs within the authority of the scammed user and outside of the organizations’ security grid. Here’s what the typical crime looks like: Stage 1: Assume an identity of authorityWhat is important to note about all these scams, regardless of the target, is that, at their core, the criminal must convince the victim that they are someone authorized to receive the information. Stage 2: Gain the informationAfter they have convinced the target of an identity, they then must convince that victim to willingly hand the information over. Often, the bad guys position the transfer of information in a way that makes the victim feel like they are actually solving a problem or doing a favor for someone in a bind. And that is how the scammers often approach it. Sure, you will see phishing samples of bullying or threatening. But the best ones, the lures that aren’t caught until after the money or data is gone, are the ones that are business as usual, or where the victim has felt that they have acted accordingly – perhaps even helping someone in a bind.Effective, well-crafted social engineering lures are at the core of the Tax Scam problem – and also at another rising threat to businesses and governments: money and wire transfer fraud. City governments are seeing a tremendous increase in this type of crime. In fact, they may be most at risk because the infrastructure and security systems may not be cutting edge due to budgets. It is unlikely that a city with a population of 30,000 will have a fine-tuned DLP system installed and fully operational. Intrusion detection may be a wish in the city IT admin’s list, but far from a deployment. And then, even with these installed, if a person routinely makes wire transfers as part of their job, will their security systems (or their financial institutions’) note a transfer?A recently published account of such an attack on Yarrow Point, a city just outside of Seattle, shows just how routine this type of fraud can seem – until after the money or data is gone. This story not only shared the account of a city with an annual budget of two million dollars that was scammed out of more than $60,000, it also lists other, bigger attacks.How to stay safeWith scores to be made from these tax and wire scams on individuals and business, the landscape becomes harsher. However, there are resources available to protect yourself and your business from these threats.While solid security systems and endpoint protection are necessary elements of your security posture, you must remember that many of these scams are a human problem. It takes human intelligence, in conjunction with security tools to battle this menace. In addition to the Security Summit noted earlier, CIS (Center for Internet Security, Inc.) is a non-profit entity that creates a global IT community network to share best practices and information that may help keep your organization secure.There are organizations that can help train your employees on how to recognize and report social engineering attempts. You should ensure that whichever security awareness materials you choose will suit your company culture. While these materials can be effective countermeasures, don’t underestimate your own ability to inform and to make change happen. Discuss this issue with your peers and coworkers. Very few people have ever been criticized for raising awareness of security issues. Related content opinion How GDPR will affect small and midsized businesses GDPR went into effect May 25th and many small- to medium-sized businesses will be impacted whether they realize it or not. Although daunting, here are a few steps your company can take to be better prepared. By Justin Dolly May 29, 2018 5 mins Small and Medium Business Regulation Government opinion A first quarter look at cybercrime What did we learn about cybercrime in the first quarter of 2018? Malicious cryptomining has taken over and it’s leaving all other malware families behind. By Justin Dolly Apr 30, 2018 4 mins Cybercrime Security opinion 7 ways to stay safe online on Valentine’s Day Looking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet. By Justin Dolly Feb 12, 2018 6 mins Technology Industry Data and Information Security Physical Security opinion Why you should never, ever connect to public Wi-Fi There may come a time when your only option is an unsecured, free, public Wi-Fi hotspot, and your work simply cannot wait. If that’s the case, understanding the risks of public Wi-Fi may prevent you from falling victim to an attack. By Justin Dolly Jan 09, 2018 5 mins Technology Industry Windows Security Wi-Fi Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe