The tax software manufacturer, Tax Act, has just informed some of its customers that an unauthorized third party accessed their TaxAct account in late 2015.

In a letter sent to their customers January 11, 2016, TaxAct stated an unauthorized third party accessed TaxAct accounts between November 10 and December 4, 2015. TaxAct believes the third party obtained usernames and passwords from sources outside of their own system and have disabled those impacted customers’ accounts temporarily.  

After working alongside the IRS, state regulators, and other tax software providers, TaxAct also found that customers’ tax return forms stored in their accounts may have been opened or printed. These documents contain confidential information such as customer name and social security number, and could possibly have customers’ addresses, driver’s license numbers, and even bank account information.

TaxAct has claimed that fighting tax-related identity theft is of top priority and that those affected by this breach will be provided with a year of free credit monitoring, a $1 million insurance reimbursement policy and will have access to ID protection experts to assist them during this difficult time.

In a statement to SC Magazine, Tax Act wrote, “We recently suspended a small number of accounts – less than .25 percent- after identifying instances of suspicious activity. As a result of our existing processes, we identified the issue early and prevented any further data from being compromised.”

The information obtained during this breach is more than enough to easily perpetrate identity theft, potentially causing years of disruption and inconvenience to those affected. As identity theft continues to cost consumers billions of dollars every year, it’s important that companies organizations handling personal information for customers need to assume that they will be subject to a cyber-attack and to plan accordingly.

Defending against cyber-attacks requires organizations to implement a multi-layered approach with as much emphasis on breach detection as defense. By having Change Tracker Gen7 deployed in your organization's IT environment, breach prevention & detection has never been easier or more affordable! NNT’s Change Tracker Gen7 provides you with real-time File Integrity Monitoring, System Hardening, Change & Configuration Management & Compliance Management to help keep your IT environment as compliant & secure as possible.

 

Read the Notification by TaxAct here

Read the article on SC Magazine here

 

 

 

 

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.