Cetrom Support fixed all of my problems, their engineers are very professional, courteous, friendly and very efficient. If all customer service out there was like this, it would be a better world...
- Mid-sized
Blog
Top Cyber Threats That Target CPA Firms
At Cetrom, we’re 100% focused on protecting CPA firms. All of our cybersecurity and cloud services are specifically designed to protect and cater to CPA firms. Our strength is understanding CPAs unique business needs as well as the top cyberthreats that they face. Due to their role in hosting important financial data, hackers are increasingly targeting CPA firms.
The cost of data breaches can be enormous. Between compromised financial data, shutting down business, legal repercussions, and loss of client trust, cyber hacks are one of the biggest risks most CPA firms face today. Look out for these top cyberthreats and be sure to take proper security measures to stop them.
Types of Cyber Threats Targeting CPA Firms
There are a wide range of cyberthreats that target CPA firms. They vary in how they attack and their ultimate goal. Some seek to steal unprotected data, others aim to shut down your systems, and others pretend to be a trusted source. The attacks commonly want money or information or power that can be turned into financial compensation.
While a few threats are sophisticated enough to sneak through security defenses, research shows that up to 90% of all breaches are caused by user error. For CPA firms, these attacks focus on social security numbers, financial information, passwords, and increasingly, tax returns. Even more concerning is the fact that many of these attacks target small to medium sized firms that may not have the same level of cyber security, training, or data protection. The following are some of the top threats to CPA firms.
Malware: This is a broad term to describe a number of harmful types of software that can infect a computer and network. It’s one of the most common types of attacks, and usually implants due to a user opening a harmful link. Of particular concern for CPA is the fact that there are several types of malware programs that target banking information and indications are that these types of attacks are increasing in prevalence. Depending on the type, malware can cause havoc in a number of different ways including stealing information, shutting down access to parts of the system, installing additional software, and even shutting down the whole system.
Phishing: Phishing attacks steal sensitive information through the use of fake communications that may appear real – like in emails, phone calls, texts, or websites. They can steal important data or use their access to install harmful malware software. Phishing attacks rely on users believing the communication is real and often play into human emotions like fear, greed, and urgency to force action. There are ways to recognize and avoid phishing scams, and most precautions urge users to double-check the veracity of a communication and to take time before clicking links or disclosing information.
Today, the most common types of attacks fall into a variety of phishing and malware scams. However, there are other less common but equally harmful threats facing CPA firms.
Denial of service: This attack, called DoS, overwhelms a system with traffic and effectively shuts down that firm’s ability to do business. Similar to a ransom, the attackers will ask for information, money, or something else in order for the attack to stop. These attacks can also be done as a disguise for another type of attack that occurs simultaneously.
Watering hole: This attack doesn’t target the firm specifically, but does an end around through other, less secure websites used often by employees. They then infect that site with malware which then attacks the firm’s system after an employee visits that site. Watering hole attacks are challenging because they often use websites that may in fact be legitimate.
SIM Card swapping: SIM Card swapping is another tactic hackers use that is on the rise. Even more so overseas but we’re also seeing in the US.
Cetrom recommends using authenticator apps as the most secure method of 2FA. Most apps for personal social and banking have 2FA options (e.g., DUO, Google Authenticator). SMS or phone authentication is not recommended as hackers are tricking carriers into porting phone numbers to new devices in a move called "SIM swap".
Other, technical attacks: While the majority of attacks rely on mistakes to gain access to a system, some attacks simply sneak through or overpower cybersecurity protections. Some use artificial intelligence and machine learning to get in. The structured query language (SQL) injection uses sophisticated coding to gain access. Still other attacks include crypto jacking, zero day exploits, and DNS tunneling to disrupt your system and steal money and information.
Are these attacks preventable?
The wide variety of attacks is concerning, especially for smaller CPA firms. While phishing and malware are the most common types of attacks there are still several varieties and methods that CPA firms need to protect themselves from. The good news is that through proper security measures, user training, and best practices, many of these attacks can be avoided and the damage minimized if they manage to get through.
Conduct company cybersecurity training: this isn’t the most glamorous or technologically advanced prevention system, but it still might be the most effective. Even the best walls aren’t effective if the enemy is let in through the gates. Training employees and creating a culture where security is valued can go a long way toward preventing successful cyber-attacks. Of special importance for CPA firms is multiple layers of confirmation for money transfers, password protection of all client data and files, email security and discerning emails that shouldn’t be opened, and recognizing the signs of phishing scams. Other best practices include exercising skepticism for all unknown communications, inspecting emails and attachments, looking for hacked accounts that may appear legitimate but behave unnaturally, and taking extra precautions when working remotely.
Protect and backup data: To a hacker, a CPA firm’s data is one of the most valuable and sought-after assets. That’s why protecting all data through layers of encryption and passwords is a best practice. And make a policy of only providing access to data on a limited basis to ensure that if one user is compromised the negative impact can be contained. Firms should also get in the habit of keeping as little data as necessary and deleting past client data and other aged files.
Run risk assessments and tests: This task can be done by your security team behind the scenes but can also be done more openly toward front-line employees. Sending mock phishing emails or other communications to see how many people fall for them is one good example. You can also hire contractors who will look objectively at your system and expose known weak points. This prevention method can also include creating SOPs and procedures for data protection and phishing and malware prevention. The process looks like 1) plan for security protections, 2) implement the safeguards, 3) test the effectiveness, 4) repeat step one correcting for potential weaknesses.
Invest in premier cybersecurity: given that using multiple AI security technologies detect different types of threats be sure that your cybersecurity package uses both AI and machine learning. AI in combination with security experts available around-the-clock ensures that potential attacks are thwarted early, and any successful attacks are stopped before they can cause serious damage. The best security firms will protect you from attacks, are available when needed, and look at security on an organization-wide level and not just the technical side.
Bottom Line
Even small and medium-sized less profitable and less technologically advanced CPA firms are at risk for cyberattacks. Phishing and malware attacks are the most common and rely on users making errors that allow the attack to succeed. Given the valuable information that CPA firms hold, they should be especially proactive in preventing attacks.
In addition to powerful cyber security technology, they can protect data, implement strong cybersecurity training and security best practices for employees, and periodically test the system for weaknesses. Even though the risk is real, with precautions CPA firms can continue to do what they do best while knowing they’re protecting themselves from cyber-attacks.
Reach out to us. We’d love to learn more about your IT needs and challenges. Your security is Cetrom’s #1 priority.
Why CPA Firms Need Secure IT Support for AI Tools
One of the things we appreciate wholeheartedly about working with Cetrom is how great the people in the service area are and the high-level of responsiveness we have received. I’ve been very pleased..
- Mid-sized
Cetrom’s services and support really stood out against the other cloud vendors. We thought their Citrix delivery platform would have a higher level of adoption because our employees would have the..
- Mid-sized
Our accounting services users working in the field have greatly benefited from our migration to the cloud. They’re now able to be much more efficient while working in a client’s office because they..
- Mid-sized
The decision to migrate to the cloud was one of the best business decisions Rub & Brillhart has made. It required an investment, but we have determined that our year two IT costs will be reduced by..
- Midwest
Our migration process with Cetrom was very smooth and we had an excellent experience with their support during the demo process. We have 24/7 monitoring on our onsite equipment and they have the..
- Small
We are extremely happy with the service and support we receive from Cetrom. Our staff is more efficient overall in our day-to-day activities and we don’t have any downtime. It’s a good feeling..
- Mid-sized
Cetrom is an extremely cost-effective option for IT services. Not only do we receive significantly improved customer service, but we were also able to add a new VoIP system, better internet service,..
- Mid-sized
Because we use specialized software for CPAs, we were concerned about the migration process. Cetrom’s CEO reassured us that there’s no concern because they understand how the software operates in the..
- Mid-sized
We use two programs that often posed a challenge for our previous IT providers. Cetrom handled the situation professionally, coordinated with the software vendors, did all the backend testing, and..
- Mid-sized
After interviewing and reviewing the proposals from various IT providers, it was really a night and day comparison about price, service, and performance—Cetrom was just outshining the others on every..
- Mid-sized
I just want to drop you a line and let you know how pleased we are with our move to Cetrom. Your people knocked it out of the park for us and are doing a great job getting us up and working. On our..
- Small-sized
Because we use specialized software for CPAs, we were concerned about the migration process. Cetrom’s CEO reassured us that there’s no concern because they understand how the software operates in the..
- 97%
Cetrom’s Cloud Computing offers a high-quality, reliable and secure alternative to traditional IT management and provides immediate access to all my IT resources whether I’m in the office, at home or..
- High-quality,
blog Archives
- April 2019 (12)
- May 2012 (6)
- October 2012 (6)
- March 2012 (5)
- August 2012 (5)
- November 2012 (5)
- May 2013 (5)
- August 2013 (5)
- October 2013 (5)
- February 2020 (5)
- February 2012 (4)
- April 2012 (4)
- June 2012 (4)
- January 2013 (4)
- February 2013 (4)
- March 2013 (4)
- June 2013 (4)
- July 2013 (4)
- September 2013 (4)
- September 2022 (4)
- August 2023 (4)
- March 2024 (4)
- July 2012 (3)
- September 2012 (3)
- December 2012 (3)
- April 2013 (3)
- November 2013 (3)
- December 2013 (3)
- October 2017 (3)
- January 2018 (3)
- July 2018 (3)
- March 2020 (3)
- May 2020 (3)
- June 2020 (3)
- July 2020 (3)
- February 2021 (3)
- June 2021 (3)
- December 2022 (3)
- July 2024 (3)
- April 2025 (3)
- November 2011 (2)
- January 2012 (2)
- January 2014 (2)
- March 2015 (2)
- September 2016 (2)
- October 2016 (2)
- November 2016 (2)
- January 2017 (2)
- March 2017 (2)
- April 2017 (2)
- June 2017 (2)
- August 2017 (2)
- September 2017 (2)
- February 2018 (2)
- May 2018 (2)
- October 2018 (2)
- September 2019 (2)
- October 2019 (2)
- September 2020 (2)
- November 2020 (2)
- December 2020 (2)
- March 2021 (2)
- April 2021 (2)
- August 2021 (2)
- September 2021 (2)
- October 2021 (2)
- November 2021 (2)
- December 2021 (2)
- January 2022 (2)
- February 2022 (2)
- March 2022 (2)
- April 2022 (2)
- June 2022 (2)
- October 2022 (2)
- January 2023 (2)
- February 2023 (2)
- March 2023 (2)
- April 2023 (2)
- June 2023 (2)
- October 2023 (2)
- November 2023 (2)
- December 2023 (2)
- February 2024 (2)
- November 2024 (2)
- December 2024 (2)
- March 2025 (2)
- August 2025 (2)
- September 2011 (1)
- October 2011 (1)
- December 2011 (1)
- March 2014 (1)
- April 2014 (1)
- May 2014 (1)
- June 2014 (1)
- July 2014 (1)
- September 2014 (1)
- November 2014 (1)
- May 2015 (1)
- June 2015 (1)
- July 2015 (1)
- August 2015 (1)
- September 2015 (1)
- November 2015 (1)
- December 2015 (1)
- March 2016 (1)
- April 2016 (1)
- May 2016 (1)
- June 2016 (1)
- July 2016 (1)
- August 2016 (1)
- December 2016 (1)
- February 2017 (1)
- May 2017 (1)
- November 2017 (1)
- December 2017 (1)
- March 2018 (1)
- April 2018 (1)
- August 2018 (1)
- December 2018 (1)
- March 2019 (1)
- July 2019 (1)
- August 2019 (1)
- November 2019 (1)
- December 2019 (1)
- January 2020 (1)
- April 2020 (1)
- August 2020 (1)
- October 2020 (1)
- January 2021 (1)
- May 2021 (1)
- July 2021 (1)
- May 2022 (1)
- August 2022 (1)
- November 2022 (1)
- May 2023 (1)
- July 2023 (1)
- September 2023 (1)
- January 2024 (1)
- April 2024 (1)
- May 2024 (1)
- June 2024 (1)
- August 2024 (1)
- September 2024 (1)
- October 2024 (1)
- January 2025 (1)
- February 2025 (1)
- May 2025 (1)
- July 2025 (1)
- September 2025 (1)
Why CPA Firms Need Secure IT Support for AI Tools
Cetrom Support fixed all of my problems, their engineers are very professional, courteous, friendly and very efficient. If all customer service out there was like...
- Mid-sized
Blog Archives
- April 2019 (12)
- May 2012 (6)
- October 2012 (6)
- March 2012 (5)
- August 2012 (5)
- November 2012 (5)
- May 2013 (5)
- August 2013 (5)
- October 2013 (5)
- February 2020 (5)
- February 2012 (4)
- April 2012 (4)
- June 2012 (4)
- January 2013 (4)
- February 2013 (4)
- March 2013 (4)
- June 2013 (4)
- July 2013 (4)
- September 2013 (4)
- September 2022 (4)
- August 2023 (4)
- March 2024 (4)
- July 2012 (3)
- September 2012 (3)
- December 2012 (3)
- April 2013 (3)
- November 2013 (3)
- December 2013 (3)
- October 2017 (3)
- January 2018 (3)
- July 2018 (3)
- March 2020 (3)
- May 2020 (3)
- June 2020 (3)
- July 2020 (3)
- February 2021 (3)
- June 2021 (3)
- December 2022 (3)
- July 2024 (3)
- April 2025 (3)
- November 2011 (2)
- January 2012 (2)
- January 2014 (2)
- March 2015 (2)
- September 2016 (2)
- October 2016 (2)
- November 2016 (2)
- January 2017 (2)
- March 2017 (2)
- April 2017 (2)
- June 2017 (2)
- August 2017 (2)
- September 2017 (2)
- February 2018 (2)
- May 2018 (2)
- October 2018 (2)
- September 2019 (2)
- October 2019 (2)
- September 2020 (2)
- November 2020 (2)
- December 2020 (2)
- March 2021 (2)
- April 2021 (2)
- August 2021 (2)
- September 2021 (2)
- October 2021 (2)
- November 2021 (2)
- December 2021 (2)
- January 2022 (2)
- February 2022 (2)
- March 2022 (2)
- April 2022 (2)
- June 2022 (2)
- October 2022 (2)
- January 2023 (2)
- February 2023 (2)
- March 2023 (2)
- April 2023 (2)
- June 2023 (2)
- October 2023 (2)
- November 2023 (2)
- December 2023 (2)
- February 2024 (2)
- November 2024 (2)
- December 2024 (2)
- March 2025 (2)
- August 2025 (2)
- September 2011 (1)
- October 2011 (1)
- December 2011 (1)
- March 2014 (1)
- April 2014 (1)
- May 2014 (1)
- June 2014 (1)
- July 2014 (1)
- September 2014 (1)
- November 2014 (1)
- May 2015 (1)
- June 2015 (1)
- July 2015 (1)
- August 2015 (1)
- September 2015 (1)
- November 2015 (1)
- December 2015 (1)
- March 2016 (1)
- April 2016 (1)
- May 2016 (1)
- June 2016 (1)
- July 2016 (1)
- August 2016 (1)
- December 2016 (1)
- February 2017 (1)
- May 2017 (1)
- November 2017 (1)
- December 2017 (1)
- March 2018 (1)
- April 2018 (1)
- August 2018 (1)
- December 2018 (1)
- March 2019 (1)
- July 2019 (1)
- August 2019 (1)
- November 2019 (1)
- December 2019 (1)
- January 2020 (1)
- April 2020 (1)
- August 2020 (1)
- October 2020 (1)
- January 2021 (1)
- May 2021 (1)
- July 2021 (1)
- May 2022 (1)
- August 2022 (1)
- November 2022 (1)
- May 2023 (1)
- July 2023 (1)
- September 2023 (1)
- January 2024 (1)
- April 2024 (1)
- May 2024 (1)
- June 2024 (1)
- August 2024 (1)
- September 2024 (1)
- October 2024 (1)
- January 2025 (1)
- February 2025 (1)
- May 2025 (1)
- July 2025 (1)
- September 2025 (1)
