It\u2019s tax time again and an opportunity for cybercriminals to take advantage of unknowing consumers and businesses. While many of us are aware of this con impacting consumers, the simple truth is that this scam (and the underlying social engineering beneath it) is a huge danger to businesses and municipalities.Big bets on businessAs recently as this January, the United States Internal Revenue Service issued a new alert about a surge in income tax cyberscams. Part of the alert focused on the targeting of businesses. The government agency suggested that criminals were making serious attempts to pose as company executives or human resource and payroll officials to abscond with employee W-2 forms. With those forms in hand, the criminal gangs can file fraudulent returns and effectively have the government cut them a check for their wayward efforts.Tax professionals, accountants and accounting firms are also a significant target for the same reason \u2013 data. If the criminals get hold of the E-File account number of the provider, or the CAF number (a unique\u00a0nine-digit identification number and is assigned the first-time third-party authorization is filed with IRS), the scammers can redirect every income tax return to their own banking accounts. This is such a concern to the IRS that it has partnered with state tax agencies and the private-sector tax industry to form the Security Summit \u2013 a unique partnership formed to fight the crime and the potential financial fallout that can occur from this type of fraud.The risksBut are they making a difference? While an informed populace is in less risk, the mitigation efforts can only go so far. There are too many people unaware of the issue and too many organizations that believe they are immune or that your business won\u2019t be a target. That belief is human \u2013 and that is the very problem. The actual crime (such as the release of information or the transfer of funds) occurs within the authority of the scammed user and outside of the organizations\u2019 security grid. Here\u2019s what the typical crime looks like:Stage 1: Assume an identity of authorityWhat is important to note about all these scams, regardless of the target, is that, at their core, the criminal must convince the victim that they are someone authorized to receive the information.\u00a0Stage 2: Gain the informationAfter they have convinced the target of an identity, they then must convince that victim to willingly hand the information over. Often, the bad guys position the transfer of information in a way that makes the victim feel like they are actually solving a problem or doing a favor for someone in a bind.And that is how the scammers often approach it. Sure, you will see phishing samples of bullying or threatening. But the best ones, the lures that aren\u2019t caught until after the money or data is gone, are the ones that are business as usual, or where the victim has felt that they have acted accordingly \u2013 perhaps even helping someone in a bind.Effective, well-crafted social engineering lures are at the core of the Tax Scam problem \u2013 and also at another rising threat to businesses and governments: money and wire transfer fraud. City governments are seeing a tremendous increase in this type of crime. In fact, they may be most at risk because the infrastructure and security systems may not be cutting edge due to budgets. It is unlikely that a city with a population of 30,000 will have a fine-tuned DLP system installed and fully operational. Intrusion detection may be a wish in the city IT admin's list, but far from a deployment. And then, even with these installed, if a person routinely makes wire transfers as part of their job, will their security systems (or their financial institutions\u2019) note a transfer?A recently published account of such an attack on Yarrow Point, a city just outside of Seattle, shows just how routine this type of fraud can seem \u2013 until after the money or data is gone.\u00a0 This story not only shared the account of a city with an annual budget of two million dollars that was scammed out of more than $60,000, it also lists other, bigger attacks.How to stay safeWith scores to be made from these tax and wire scams on individuals and business, the landscape becomes harsher. However, there are resources available to protect yourself and your business from these threats.While solid security systems and endpoint protection are necessary elements of your security posture, you must remember that many of these scams are a human problem. It takes human intelligence, in conjunction with security tools to battle this menace. In addition to the Security Summit noted earlier, CIS (Center for Internet Security, Inc.) is a non-profit entity that creates a global IT community network to share best practices and information that may help keep your organization secure.There are organizations that can help train your employees on how to recognize and report social engineering attempts. You should ensure that whichever security awareness materials you choose will suit your company culture.\u00a0 While these materials can be effective countermeasures, don\u2019t underestimate your own ability to inform and to make change happen. Discuss this issue with your peers and coworkers. Very few people have ever been criticized for raising awareness of security issues.