Computer do’s and don’ts at tax time
DON’T BE IN SUCH A RUSH TO GET YOUR REFUND THAT YOU FAIL TO LOCK DOWN YOUR DATA
Tax season can be frustrating enough. But it’s also peak season for identity theft.
So before you whip out that W-2, take a second to consider security.
“The key to protecting yourself from any type of fraud is to be aware and engaged,” says Rod Griffin, director of public education at Experian, a financial information company. “If you’re going to be providing personally identifying information, make sure that you research that tax-preparation service, whether it’s online or in person.”
Online security is particularly important, and many people take unnecessary risks. Griffin pointed out that 7% of people do their taxes on public, unsecured networks, which are “notorious for allowing the theft of personal and financial information.”
Malware and phishing attacks are often used for identity theft and tax fraud. The best way to defend your computer is to use Internet security software before you start your taxes, says Brett Schetzsle, consumer security specialist at Kaspersky Lab, a computer security company.
“Most Internet security sweeps offer a very high detection rate of malware,” Schetzsle says, which is important so that any malware already on the computer can be deleted.
Still, awareness and attention are the most important weapons. If a tax-prep site redirects you to another site with a different domain, Schetzsle says, watch out.
With many tax-preparation services now offering mobile apps, Schetzsle notes, “mobile device protection is now also very important.”
Convenience often comes with a risk. While some apps offer the ability to take a picture of your W-2 and have the software input the information for you, this is risky because the photo could be seen by someone with access to your phone, or stolen via malware. “Familial fraud is a very common source of identity theft,” Griffin says. So, if uploading a W-2 this way, be sure to delete the photo immediately.
“More and more, cybercriminals are depending on users to make a mistake,” Schetzsle says.