The tax software manufacturer, Tax Act, has just informed some of its customers that an unauthorized third party accessed their TaxAct account in late 2015.

In a letter sent to their customers January 11, 2016, TaxAct stated an unauthorized third party accessed TaxAct accounts between November 10 and December 4, 2015. TaxAct believes the third party obtained usernames and passwords from sources outside of their own system and have disabled those impacted customers’ accounts temporarily.  

After working alongside the IRS, state regulators, and other tax software providers, TaxAct also found that customers’ tax return forms stored in their accounts may have been opened or printed. These documents contain confidential information such as customer name and social security number, and could possibly have customers’ addresses, driver’s license numbers, and even bank account information.

TaxAct has claimed that fighting tax-related identity theft is of top priority and that those affected by this breach will be provided with a year of free credit monitoring, a $1 million insurance reimbursement policy and will have access to ID protection experts to assist them during this difficult time.

In a statement to SC Magazine, Tax Act wrote, “We recently suspended a small number of accounts – less than .25 percent- after identifying instances of suspicious activity. As a result of our existing processes, we identified the issue early and prevented any further data from being compromised.”

The information obtained during this breach is more than enough to easily perpetrate identity theft, potentially causing years of disruption and inconvenience to those affected. As identity theft continues to cost consumers billions of dollars every year, it’s important that companies organizations handling personal information for customers need to assume that they will be subject to a cyber-attack and to plan accordingly.

Defending against cyber-attacks requires organizations to implement a multi-layered approach with as much emphasis on breach detection as defense. By having Change Tracker Gen7 deployed in your organization's IT environment, breach prevention & detection has never been easier or more affordable! NNT’s Change Tracker Gen7 provides you with real-time File Integrity Monitoring, System Hardening, Change & Configuration Management & Compliance Management to help keep your IT environment as compliant & secure as possible.

 

Read the Notification by TaxAct here

Read the article on SC Magazine here

 

 

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.