Skip to main content

The IRS Recommends the “Security Six” Steps to Protect Clients’ Data

By March 22, 2021Security
IRS recommends Security Six Steps

Does your organization handle sensitive financial information for clients?

If so, you’re probably required to create and maintain a security plan to protect client data, per the Financial Services Modernization Act of 1999 (also known as the Gramm-Leach-Bliley Act).

Where do you get started with securing taxpayer information though? The IRS recommends the “Security Six” steps:

  1. Install anti-virus software.
  2. Install a firewall.
  3. Turn on two-factor authentication.
  4. Use backup software or services.
  5. Use drive encryption software.
  6. Establish a virtual private network (VPN).

These six steps are crucial to securing data and protecting devices.

If you’re looking for security options to meet these recommendations and other compliance requirements, OXEN Technology has you covered. We can recommend endpoint detection & response, a security operation center service, and managed IT services for constant monitoring, maintenance, and security vigilance. We have decades of experience with the best next-generation firewalls and backup solutions.

And if you need advice on how to implement features like two-factor authentication (or MFA), VPNs, and encryption, our IT leadership experts can help you!

Today’s cybersecurity isn’t a one-time project. It’s an ongoing process of analysis, research, and improvement, which goes beyond just technology. We’re here to help you navigate it.

Contact us to schedule a time to discuss your options with a member of OXEN’s team!

social engineering tactics

How Hackers Use Social Engineering Tactics in Phishing Scams

| Business Productivity, Security | No Comments
Social engineering is quite a buzzword these days in the world of cybersecurity. But what is it, and why are businesses so afraid of it? It is a form of hacking that uses deception and manipulation to get victims to divulge information. Companies have reason to be fearful because social engineering tactics have led to a lot of destruction and millions of dollars in losses for businesses worldwide. Phishing is one of the most rampant types of attacks these days. It has been highly successful because it uses tried-and-tested social engineering techniques to hoodwink potential victims. What are these Social…
spot social engineering

Training Employees to Spot Social Engineering

| Security, Tech Tip | No Comments
Social engineering is one of the newest methods hackers use to access sensitive information. Rather than attacking a system directly, this technique relies on human psychology to gain information. This method is brilliant when you think about it because it does not have to deal with going past ironclad network security. If hackers can manipulate even a single employee, they might hand over sensitive information on a silver platter, and the hackers can take control of the organization’s entire system. This is why its important for your employees to learn how to spot social engineering. Companies must understand that if…
Phishing Scam Tactics

Top 8 Phishing Scam Tactics and How to Identify Them

| Business Productivity, Security, Tech Tip | No Comments
Phishing has been a common hacking method for over two decades now. You would think that everyone would already know how it works and how to avoid becoming a victim, right? Sadly, that is not the case for these Phishing Scam Tactics. There are more victims now than ever. In 2022, there were more than 300,000 victims in the US alone, with damages amounting to over $52 million! The thing is that phishing scams have evolved over the years. Hackers are now more adept at hoodwinking unsuspecting victims, and they also have easy access to modern technology that helps elevate…