Cybersecurity for CPAs and Tax Professionals: Why Your Firm Is a Prime Target

You hold the keys to your clients' financial lives. Attackers know it. Here's what every accounting firm needs to know — and do — before the next tax season.

Reading time: 12 minutes

A single CPA firm holds what identity thieves spend months piecing together: Social Security numbers, bank account details, employer records, investment portfolios, and complete tax returns — often for hundreds or thousands of clients. That concentration of sensitive data makes accounting firms one of the most targeted industries in cybersecurity. And most firms are dangerously underprepared.

The Numbers Don't Lie

Tax practitioners are now among the IRS's top concerns for data breaches. The IRS has reported a sharp increase in identity theft tax refund fraud originating from compromised tax professionals — not individual taxpayers. Attackers have figured out that breaching one CPA firm is more efficient than phishing a thousand individuals.

Why Attackers Target Tax Professionals

If you're a CPA, enrolled agent, or run a tax preparation firm, you need to understand why you're a higher-value target than most businesses your size:

You Hold the Jackpot Data

A typical retail breach exposes names and credit card numbers. A CPA firm breach exposes everything: full legal names, Social Security numbers, dates of birth, bank routing and account numbers, employer information, investment account details, prior-year tax returns, and sometimes even digital copies of driver's licenses. This is a complete identity theft kit — and it's sitting in your file server, your cloud portal, or your tax software database.

Tax Season Creates a Perfect Storm

From January through April, accounting firms operate under extreme pressure. Staff work long hours. Clients send sensitive documents via email. New client onboarding happens fast. Security shortcuts that would never fly in June become tempting in March. Attackers know this — phishing campaigns targeting tax professionals spike 400% during filing season. They time their attacks for when you're least likely to scrutinize an email.

Small Firms, Small Defenses

Most accounting firms are small businesses — 2 to 50 employees. They don't have a dedicated IT team, let alone a cybersecurity team. Security is often "the partner who's good with computers" or an MSP that set up a firewall three years ago. Attackers actively scan for small professional services firms because they know the defenses are thin and the data is rich.

73%
Of accounting firms have experienced a cyberattack or attempt
400%
Spike in phishing targeting tax pros during filing season
$150K+
Average cost of a data breach for a small professional services firm

How CPA Firms Get Breached: The Most Common Attack Patterns

Understanding the attacks you're most likely to face is the first step to defending against them. These are the scenarios we see repeatedly in accounting firms:

Phishing for Tax Software Credentials

The attacker sends an email that looks like it's from your tax software vendor, your e-file provider, or the IRS e-Services portal. It warns of a security update, a locked account, or a rejected filing. You click the link, enter your credentials, and the attacker now has access to your tax preparation software — and every client return in it. From there, they file fraudulent returns before your clients even know they've been compromised.

Business Email Compromise (BEC)

An attacker compromises or spoofs a partner's email address and sends a message to staff: "Can you send me the W-2 file for all our corporate clients? I need it for a meeting." Or they impersonate a client asking for their return to be sent to a "new email address." These attacks don't use malware — they exploit trust and authority. Staff comply because the request seems legitimate, especially during the chaos of tax season.

Ransomware During Peak Season

Attackers encrypt your files, your tax software database, and your backups — then demand payment. They know a CPA firm facing an April 15 deadline will pay faster than almost any other target. Firms have paid tens of thousands of dollars in ransom rather than miss filing deadlines, face IRS penalties, and lose client trust. Even with cyber insurance, the downtime and reputational damage are devastating.

Remote Access Exploitation

Many firms use remote desktop (RDP), VPN, or cloud portals so staff can work from home during busy season. If these aren't secured with multi-factor authentication and continuous monitoring, attackers can brute-force or credential-stuff their way in. Once inside, they have the same access as your staff — including every client file on the network.

It's Not Just Good Practice — It's the Law

If you handle taxpayer data, you're subject to specific cybersecurity requirements. Many firms don't realize how far these obligations go:

IRS Publication 4557: Safeguarding Taxpayer Data

The IRS requires all tax professionals to implement a Written Information Security Plan (WISP). This isn't optional — it's a condition of having a PTIN and handling taxpayer data. Publication 4557 outlines specific security controls including access management, monitoring for unauthorized activity, and incident response procedures. Having a WISP on paper is step one; actually monitoring your environment is step two — and it's where most firms fall short.

FTC Safeguards Rule

CPAs and tax preparers are classified as "financial institutions" under the Gramm-Leach-Bliley Act. The FTC Safeguards Rule (updated in 2023) requires you to:

  • Designate a qualified individual to oversee your information security program
  • Conduct regular risk assessments
  • Implement continuous monitoring or periodic penetration testing
  • Implement multi-factor authentication for accessing customer information
  • Develop an incident response plan
  • Maintain an audit trail of security events
  • Report to your board (or equivalent) on the status of your security program

The FTC has enforcement power and has taken action against firms that failed to protect consumer data. Non-compliance isn't a theoretical risk — it's a legal liability.

State Data Breach Notification Laws

All 50 states have breach notification laws. If client data is compromised, you're legally required to notify affected individuals — and in many states, the state attorney general. For a CPA firm, that means telling your clients that their Social Security numbers, tax returns, and bank accounts may have been exposed. The reputational damage alone can end a practice.

AICPA & State Board Requirements

Beyond federal mandates, AICPA professional standards and many state boards of accountancy require CPAs to maintain confidentiality of client information as a core ethical obligation. A data breach isn't just a security failure — it's a potential professional ethics violation that can result in license suspension or revocation.

What Tax Professionals Actually Need

You don't need to become a cybersecurity expert. You need the right layers of protection — and the right partner watching your back. Here's what a strong security posture looks like for a CPA firm:

Layer What It Does Why It Matters for CPAs
Multi-Factor Authentication Requires a second factor (app, key, or code) beyond passwords Stops stolen credential attacks — the #1 way CPA firms get breached
Endpoint Detection & Response (EDR) Monitors every workstation and server for malicious behavior Catches ransomware, data exfiltration, and unauthorized access in real time
24/7 Monitoring (MDR) Human analysts watching your environment around the clock Attackers strike at 2 AM and during weekends — you need eyes on it 24/7
Email Security Advanced filtering beyond basic spam protection Blocks phishing emails impersonating the IRS, clients, and tax software vendors
Encrypted Backups Isolated, tested backups of all critical data Ensures you can recover from ransomware without paying or missing deadlines
Security Awareness Training Regular training and phishing simulations for all staff Your team is your biggest vulnerability — and your best defense if trained properly
Written Information Security Plan Documented security policies, procedures, and incident response Required by the IRS (Pub 4557) and FTC Safeguards Rule — not optional

Why MDR Is the Missing Piece for Accounting Firms

Most CPA firms we talk to have some security in place — antivirus, a firewall, maybe even MFA. But almost none have anyone actively watching for threats. That's the gap that MDR fills.

You Can't Monitor What You Can't See

Your antivirus might block a known virus. Your firewall might block traffic from a blacklisted IP. But what about the attacker who logged in with stolen credentials at 11 PM, used legitimate tools to browse your file shares, and quietly exfiltrated 500 client tax returns over an encrypted connection? No firewall or antivirus catches that. MDR does — because it monitors behavior, not just signatures.

Tax Season Is When You're Most Vulnerable and Least Available

During busy season, your firm is heads-down on returns. No one is watching security dashboards. No one is investigating that weird email. No one notices that a workstation is connecting to an unusual server at midnight. An MDR provider doesn't take tax season off. They're watching your environment with the same intensity in April as in August — which is exactly when you need it most.

Compliance Requires Continuous Monitoring

The FTC Safeguards Rule specifically calls for continuous monitoring or regular penetration testing. Having an MDR provider gives you both: ongoing detection and a documented audit trail of security events. When your compliance assessor, cyber insurer, or the FTC asks for evidence of your monitoring program, you have it.

Your Clients Expect It

Clients — especially business clients — are increasingly asking about their vendors' cybersecurity posture. They want to know that the firm handling their financials takes data protection seriously. Having professional-grade security monitoring isn't just about defense — it's a competitive differentiator. It's the answer to "How do you protect our data?" that actually inspires confidence.

What a Breach Looks Like for a CPA Firm

Imagine this scenario: An attacker compromises one staff member's email credentials via phishing. Over two weeks, they silently forward copies of every incoming email — which during tax season includes W-2s, 1099s, bank statements, and signed engagement letters — to an external address. By the time you discover it, hundreds of clients' complete financial identities have been exfiltrated. Now you face: IRS notification requirements, state breach notifications to every affected client, potential FTC enforcement, malpractice liability, cyber insurance claims, and the phone calls from clients asking why their identity was stolen.

An MDR provider would have flagged the suspicious email forwarding rule within minutes of its creation.

A Tax Season Security Checklist

Whether or not you're ready for MDR today, here are the steps every tax professional should take immediately:

Before Tax Season

  • Enable MFA on everything — tax software, email, cloud storage, remote access, bank accounts
  • Update your Written Information Security Plan (WISP) and make sure all staff have read it
  • Run a phishing simulation to test staff awareness
  • Verify your backups work by performing a test restore
  • Review who has access to client data and remove access for anyone who doesn't need it
  • Ensure all workstations, servers, and software are fully patched

During Tax Season

  • Never send sensitive documents via unencrypted email — use a secure client portal
  • Verify any unusual requests by phone, even if they appear to come from a known client or partner
  • Watch for emails impersonating the IRS, state tax agencies, or your tax software provider
  • Report suspicious activity immediately — don't wait until "things slow down"
  • Monitor after-hours access to your systems for unusual activity

Year-Round

  • Maintain 24/7 security monitoring — attackers don't take vacation
  • Conduct quarterly security awareness training for all staff
  • Review and update your incident response plan annually
  • Keep cyber insurance current and understand what's covered
  • Stay informed on IRS Security Summit alerts and tax-related scams

The Cost of Doing Nothing

CPA firms sometimes tell us, "We're too small to be a target." The data says otherwise. Small professional services firms are the preferred target because they have rich data and minimal defenses. Here's what's at stake:

  • Client trust: Once breached, clients leave. Rebuilding a practice's reputation after a data breach takes years — if it's possible at all.
  • Legal liability: Clients can and do sue CPA firms for failing to protect their data. Malpractice insurance may not cover cyber incidents.
  • Regulatory action: The FTC, IRS, and state boards all have enforcement mechanisms. Penalties range from fines to loss of your PTIN or CPA license.
  • Financial impact: Breach costs, forensic investigation, legal counsel, client notification, credit monitoring services, and potential ransom payments add up fast — $150,000 to $500,000 or more for a small firm.
  • Operational disruption: Ransomware during tax season can halt your practice entirely. Missing filing deadlines creates cascading penalties for your clients.

The cost of professional cybersecurity monitoring is a fraction of any one of these consequences. For most CPA firms, it's less than the cost of a single employee.

Protect Your Practice and Your Clients

Babar Tech provides 24/7 MDR built for professional services firms. We understand the compliance requirements you face, the data you protect, and the threats targeting your industry. Get protected before the next tax season — onboarding takes days, not months.

Book a Free Consultation