Industry Guides

Tax Season Document Security for CPAs: Protecting Client Data Under Pressure

By DeadVault Team
Tax Season Document Security for CPAs: Protecting Client Data Under Pressure

Tax season is a perfect storm for data security risks. CPAs and tax preparers handle enormous volumes of the most sensitive personal information — Social Security numbers, income details, bank account numbers, and investment records — under intense time pressure. The urgency to meet filing deadlines leads to shortcuts: documents emailed without encryption, files stored on unsecured personal devices, and passwords shared among staff to speed up workflows.

Criminals know this. Tax-related identity theft and phishing attacks spike dramatically during tax season. The IRS has repeatedly warned tax professionals that they are high-value targets, and recent enforcement actions have held tax preparers liable for failing to protect client data.

The Threat Landscape During Tax Season

Phishing Attacks Targeting Tax Professionals

Tax professionals receive a surge of phishing emails during tax season, many impersonating the IRS, state tax agencies, or tax software providers. These emails often request login credentials, prompt downloads of malicious software, or direct victims to fake login pages. A single successful phishing attack can compromise every client's data in your system.

Client Email Compromise

Clients send their most sensitive documents — W-2s, 1099s, bank statements — via email, often without being asked to do so. Even if your firm has secure upload procedures, clients may default to email out of habit or convenience. Every document sitting in your email inbox is a liability.

Data Theft by Insiders

Tax season often means hiring temporary staff or working with seasonal contractors. These individuals may have access to client data but may not have the same commitment to security as permanent employees. Insider theft of tax data is a real and growing problem.

Essential Security Measures for Tax Season

1. Secure Document Collection

The single most impactful security improvement a CPA can make is eliminating email as a document collection method. Instead of asking clients to email their W-2s and bank statements, provide them with a secure upload link.

DeadVault makes this straightforward: create a vault for each client, share the secure link, and they upload their documents through an encrypted connection. No documents in email, no unencrypted attachments, and the vault expires automatically after you have completed the return.

2. Secure Document Delivery

Completed tax returns should never be emailed to clients. A tax return contains the client's name, address, Social Security number, income, and often bank account information for direct deposit. Share completed returns through the same encrypted channels you use for collection.

3. Multi-Factor Authentication Everywhere

Enable MFA on every system that touches client data:

  • Tax preparation software (Lacerte, ProConnect, Drake, UltraTax)
  • Email accounts (the highest-priority item)
  • Cloud storage services
  • Client portals
  • Practice management software

MFA prevents the vast majority of account compromise attacks, even when passwords are stolen through phishing.

4. Separate Networks and Devices

If possible, use dedicated devices for tax preparation work. Do not process client tax data on the same computer used for general web browsing and email. If dedicated devices are not feasible, use separate user accounts with different privilege levels.

5. Encrypt All Devices

Every device that stores or accesses client data should have full-disk encryption enabled. If a laptop is stolen from your car or office, encryption prevents the thief from accessing the data. Enable BitLocker on Windows devices and FileVault on Macs.

6. Vet Temporary Staff

Seasonal hires should undergo background checks and sign confidentiality agreements before accessing client data. Limit their access to only the systems and data they need for their specific role. When their contract ends, revoke all access immediately.

IRS Requirements for Tax Preparers

The IRS requires all tax return preparers to create and implement a written information security plan. This is not optional — it is a legal requirement under the Gramm-Leach-Bliley Act, which applies to tax preparers as financial institutions. Your plan must address:

  • Employee management and training
  • Information systems, including network and software design, information processing, storage, transmission, and disposal
  • Detecting and managing system failures

The IRS Publication 4557, "Safeguarding Taxpayer Data," provides detailed guidance. If you do not have a written security plan, creating one should be your top priority before the next tax season.

When Things Go Wrong: Incident Response

If you discover a data breach or suspect your systems have been compromised:

  1. Contain the breach — Disconnect affected systems from the network
  2. Contact the IRS — Report the breach to your local IRS Stakeholder Liaison
  3. Notify affected clients — Clients need to take protective action (filing IRS Form 14039, placing credit freezes)
  4. Report to law enforcement — File a report with local police and the FBI's IC3
  5. Comply with state notification laws — Most states require breach notification within specific timeframes
  6. Document everything — Record all actions taken for regulatory and legal purposes

Building Security Into Your Tax Season Workflow

Security does not have to slow you down during tax season. The key is building secure practices into your standard workflow so they become automatic. Use DeadVault for all document collection and delivery. Enable MFA on all accounts before the season starts. Encrypt all devices. Brief your team on phishing awareness. These measures take minimal time to implement but provide substantial protection when you are handling hundreds of clients' most sensitive data under deadline pressure.

Share documents securely with DeadVault

Encrypted vaults with automatic expiration. No more risky email attachments.

Get Started
← Back to all posts