February Newsletter:
Protect Your Business
and Personal Data
This Tax Season

As we wrap up February and head into the final stretch of the first quarter, it’s not just about closing deals and hitting quarterly goals—it’s also tax season. Unfortunately, while you're focused on filing paperwork and organizing financials, cybercriminals are equally busy crafting scams designed to steal personal and business information.

This month’s newsletter focuses on practical IT solutions to keep your data safe and your business running smoothly. From tax-season phishing scams to human-centered defenses, here’s what you need to know:

February-2025-Newsletter

Make Tax Season A Little Less Miserable

A-stressed-business-owner-at-a-desk_-surrounded-by-tax-documents-and-a-laptop_

As we wrap up February and head into the final stretch of the first quarter, it’s time to tackle one of the season’s least-loved tasks: tax filing. While you’re focused on getting everything in order, scammers are equally busy—only their goal is to steal your personal and financial information. According to the IRS, tax scams peak between January and April, with cybercriminals exploiting the rush and confusion of filing season. (Source: IRS.gov)

Why It Matters:

Tax scams don’t just target individuals—they hit businesses hard, too.
In 2024, the IRS reported a significant increase in Employee Retention Credit (ERC) scams, where fraudsters charged hefty fees for filing ERC claims, even for businesses that didn’t qualify. The problem became so widespread that the IRS launched an ERC withdrawal program to help victims undo fraudulent claims. (Source: IRS ERC Update)

Common Tax-Time Scams and How to Stay Safe:


Phishing and Smishing Scams

  • What it looks like: Scammers impersonate the IRS through fake emails (phishing) or text messages (smishing), claiming you owe taxes or are due a refund. These messages often include urgent language to create panic and push you to act quickly.

  • Example: You receive an email that says, "Final notice: Your IRS refund of $1,500 is pending. Click here to claim now!" The link leads to a fraudulent site designed to steal your personal details.

  • How to prevent it:
    • Never click on links in unsolicited messages claiming to be from the IRS. Instead, report suspicious emails to phishing@irs.gov.
    • Verify any IRS communication by visiting IRS.gov and logging into your account directly.
    • Use spam filters in your email and consider cybersecurity tools that detect phishing attempts.

Online Account “Help” Scams

  • What it looks like: Scammers offer to assist with setting up your IRS online account, claiming it's complicated or urgent. They collect your personal information under the guise of "helping" and use it to file fake tax returns under your name.

  • Example: A caller pretends to be an IRS representative, offering to walk you through account setup. They ask for your Social Security number, birth date, and tax filing details.

Online Account Help Scams

  • How to prevent it:
    • Set up your IRS account directly through IRS.gov without third-party assistance.
    • If someone offers unsolicited help, hang up or ignore the message.
    • Enable multi-factor authentication (MFA) on your IRS account for added security.

Fuel Tax Credit Scams

  • What it looks like: This credit is only for off-highway business or farming use, but scammers convince taxpayers they qualify, often charging fees while exposing them to IRS penalties.

  • Example: A tax preparer claims they can "unlock" a special refund for your business by filing for the Fuel Tax Credit, even though your business doesn’t use off-highway vehicles.

  • How to prevent it:
    • Verify eligibility with a qualified tax professional before claiming any credits.
    • Keep detailed records of any fuel purchases used for eligible business activities.
    • Be wary of preparers who promise unusually large refunds.

If It Sounds Too Good To Be True, It Probably Is

Many tax scams promise easy refunds or massive savings, but they often lead to audits, penalties, or even criminal charges. Stick to legitimate filing methods and consult trusted tax professionals to avoid falling victim.

too good 2 be true

Practical Tips for Safer Tax Filing:

  1. File Early: The earlier you file, the less time scammers have to submit a fraudulent return in your name.
  2. Use Secure Networks: Avoid filing taxes over public Wi-Fi. Use a VPN if you need to access sensitive information remotely.
  3. Monitor Your Credit: Set up fraud alerts and regularly check your credit report for any suspicious activity.
  4. Choose a Reputable Tax Preparer: Work with licensed tax professionals and verify their credentials through the IRS directory.
  5. Educate Your Team: If you run a business, provide cybersecurity training to staff, especially those handling financial data.

💡Want to ensure your business is protected from tax-season scams?

📅 Book a chat with one of our experts.

Return to Topics

6 Most Dangerous Types of Phishing Scams to Watch Out For

Phishing-email_1

Phishing scams continue to evolve, posing significant threats to individuals and businesses alike. In 2024, phishing attacks surged by 58.2% compared to the previous year, reflecting how cybercriminals exploit increasingly sophisticated methods to steal personal and financial information. (Source: Zscaler 2024 Phishing Report)

Understanding the most dangerous types of phishing scams can help you stay vigilant and protect your sensitive data. Here’s a breakdown of the six most dangerous types of phishing scams and how to defend against them.


Deceptive Phishing

Deceptive phishing is the most common type of phishing scam, where attackers impersonate reputable organizations to steal personal information or spread malware. These emails often convey a sense of urgency to trick victims into acting quickly.

Example: In December 2024, an ongoing phishing scam abused Google Calendar invites and Google Drawings pages to bypass spam filters and steal user credentials.

How to Protect Yourself:

  • Verify Sender Information: Always check the sender's email address for inconsistencies.
  • Avoid Clicking Suspicious Links: Hover over links to preview the URL before clicking.
  • Look for Red Flags: Poor grammar, generic greetings, and unexpected attachments often signal phishing.

Spear Phishing

Unlike broad phishing attacks, spear phishing targets specific individuals by using personal information to craft convincing emails. Cybercriminals often gather details from social media platforms like LinkedIn to personalize their attacks.

Example: In January 2025, a phishing campaign targeted manufacturing companies by abusing HubSpot to steal Microsoft Azure credentials.

How to Protect Yourself:

  • Limit Personal Information Online: Be mindful of the details you share publicly.
  • Enable Multi-Factor Authentication (MFA): Adding an extra layer of security can block unauthorized access.
  • Educate Employees: Conduct regular training on recognizing phishing attempts.

CEO Fraud (Business Email Compromise)

CEO fraud, also known as business email compromise (BEC), involves attackers impersonating high-level executives to trick employees into making unauthorized wire transfers or sharing sensitive data.

Example: In 2024, U.S. businesses lost $2.9 billion to scams where attackers used AI-generated voices and emails to impersonate corporate leaders.

How to Protect Your Organization:

  • Establish Verification Protocols: Require multiple confirmations for financial transactions.
  • Use Secure Communication Channels: Implement encrypted email systems for sensitive discussions.
  • Conduct Regular Security Audits: Identify and patch potential vulnerabilities.

Vishing (Voice Phishing)

vishing

Vishing (voice phishing) involves scammers calling victims while impersonating banks, government agencies, or tech support. These calls often request personal information under the guise of account verification.

Example: In February 2025, the Connecticut Better Business Bureau warned about a vishing scam involving fake loan processors named "Jessica" asking victims to confirm loan details.

How to Protect Yourself:

  • Verify Caller Identity: Independently contact the organization using official contact information.
  • Never Share Personal Information Over the Phone: Especially if you didn't initiate the call.
  • Register for the Do Not Call List: This reduces unsolicited calls. (Source: National Do Not Call Registry)

Smishing (SMS Phishing)

Smishing involves text messages that trick victims into clicking malicious links or sharing personal information. These messages often claim to be from banks, delivery services, or government agencies.

Example: In January 2025, the Federal Trade Commission warned about a smishing scam where texts falsely claimed recipients had unpaid toll road fines and directed them to a fake payment link.

How to Protect Yourself:

  • Ignore Unsolicited Texts: Be skeptical of messages asking for personal details.
  • Do Not Click Unknown Links: Instead, visit official websites directly.
  • Report Suspicious Messages: Forward phishing texts to 7726 (SPAM) for investigation.

Pharming

Pharming is a more sophisticated form of phishing where users are redirected from legitimate websites to fraudulent ones without their knowledge. This often involves DNS hijacking.

Example: In 2024, Microsoft reported an increase in DNS-based phishing attacks, where hackers compromised routers and redirected users to fake login pages.

How to Protect Yourself:

  • Use Secure Connections: Ensure websites use HTTPS for secure browsing.
  • Keep Software Updated: Regular updates patch vulnerabilities that attackers exploit.
  • Install Anti-Malware: Strong security software can detect unauthorized redirections.


Final Thoughts: Stay Alert and Stay Safe

Phishing scams remain one of the most effective tools for cybercriminals. From emails and texts to phone calls and website redirects, attackers use various methods to trick victims into revealing sensitive information. Staying informed and implementing robust cybersecurity practices can significantly reduce the risk of falling victim to these scams.

💡Need expert guidance to protect your business from phishing threats?

📅 Book a chat with one of our cybersecurity specialists today.

Return to Topics

Using Human Checks to Stop
Phishing Attacks

alert-about-a-potential-scam_1

In today's digital landscape, phishing attacks have become increasingly sophisticated, posing significant threats to both individuals and organizations. In 2024 alone, phishing attacks surged by 58.2% compared to the previous year, highlighting the growing reach of cybercriminals. (Source: Zscaler 2024 Phishing Report)

One prevalent tactic is Business Email Compromise (BEC), where attackers impersonate trusted contacts to deceive employees into transferring funds or revealing sensitive information. In 2024, 64% of businesses reported facing BEC attacks, with an average financial loss of $150,000 per incident. (Source: Hoxhunt Phishing Trends Report 2024)


Real-World Scenario: How It Happens

Consider a recent incident where a company's finance department received an email appearing to be from a known vendor, requesting an urgent payment to a new bank account. The email was convincing, complete with official logos and signatures. Without verbal confirmation, the payment was processed, only to later discover it was a fraudulent request. (Source: FBI IC3 Report 2024)

This type of attack demonstrates why technology alone can't protect against phishing—human verification is the missing link.


The Human Element in Prevention:

While technological defenses are essential, human verification remains a critical line of defense against such attacks.

Here's how incorporating human checks can thwart phishing attempts:

  • Verbal Confirmation: Before processing significant transactions or sharing sensitive information, employees should verify requests through a phone call or face-to-face conversation using known contact information.

verify

  • Awareness Training: Regular training sessions can help employees recognize phishing indicators, such as unexpected requests, unfamiliar email addresses, or urgent demands. (Source: CISA Phishing Guidance)

  • Establishing Protocols: Implement clear procedures that require multiple forms of verification for financial transactions or data access requests.

Practical Steps to Implement Human Verification:


Cross-Verification

If an email requests a financial transaction, cross-verify by calling the requester using a trusted phone number.

In-Person Discussions

For internal requests involving sensitive data, discuss in person or via a secure communication channel.

Use Established Contact Methods

Avoid using contact information provided within the suspicious email; instead, use previously known contacts.


How to Prevent Phishing Attacks
in Your Organization

Protecting your organization from phishing requires a multi-layered approach.

Here’s how to start:

  • Implement Security Awareness Training: Educating your team is one of the most effective defenses. Regular phishing simulations and training sessions can teach employees how to recognize suspicious emails, questionable links, and fake login pages. (Source: CISA Phishing Guidance)

Key Tips:

  • Look for typos, inconsistent branding, and generic greetings.
  • Hover over links to preview the URL before clicking.
  • Report suspicious emails to your IT team immediately.

company communication practices

  • Establish Consistent Company Communication Practices: Hackers exploit inconsistency in internal communications. If company-wide emails are sent at random times by different people, employees are more likely to trust phishing attempts.

To reduce this risk:

  • Send company emails from a single, verified account.
  • Schedule regular updates on the same day and time each week.
  • Avoid sending unexpected attachments or link-heavy messages.

 

  • Use Cloud Collaboration Tools: Relying solely on email for file sharing increases exposure to phishing. Cloud platforms like Microsoft OneDrive and Google Drive allow secure file collaboration without needing email attachments. These platforms also offer built-in malware scanning and link-sharing controls. (Source: Google Workspace Security Whitepaper)

 

  • Promote a Culture of Transparency: Mistakes happen, but covering them up can turn a minor slip into a major breach. Encourage employees to report suspicious emails, even if they accidentally clicked a link. Quick reporting allows IT teams to contain threats before they escalate.


Best Practices to Avoid Phishing Scams

  • Inspect Email Addresses: A single letter change (e.g., john@yourbank.com vs. john@yourbnnk.com) can indicate a phishing attempt.
  • Avoid Clicking Unverified Links: Type the website directly into your browser instead of following email links.
  • Update Devices Regularly: Security patches protect against known vulnerabilities.
  • Be Wary of Attachments: If you weren’t expecting a file, don’t open it—especially from unknown senders.
  • Enable Multi-Factor Authentication (MFA): Even if passwords are compromised, MFA adds an extra layer of security.

 


Conclusion:

In an era where phishing attacks are increasingly sophisticated, blending technological defenses with human verification processes is vital. Encouraging a culture of vigilance and verification can significantly reduce the risk of falling victim to these schemes.

For comprehensive protection, consider partnering with cybersecurity experts who can provide tailored solutions and training to safeguard your organization against evolving threats.

💡 Need help strengthening your defenses?

📅 Book a chat with one of our cybersecurity specialists today.

7 Steps to Build a Safe Online Culture for Your Business

Let’s get this out of the way: the latest and most advanced cybersecurity technologies alone aren’t enough to protect your business. That’s because even enterprise-grade security systems can sometimes be undermined by a single uninformed person within your organization.

Thankfully, there is a way to address that and keep your business safe.

The real secret to staying secure lies in the people within your organization. Building a positive online security culture transforms your workforce from a passive target into an active defense system. It turns cybersecurity into a shared responsibility rather than just an IT task.

Intelligent Technical Solutions (ITS) is a cybersecurity services provider with years of experience helping hundreds of businesses foster a culture of security awareness for their organizations. In this article, we’ll explore the importance of building a positive online security culture as well as the steps to make it happen for your business.

Colleagues collaborating around a computer, discussing ideas on how to build a safe online culture for your business.

Building a Culture of Security Awareness 

Cyber threats are as common as email. That's why fostering a positive online security culture is no longer optional—it’s essential. For businesses, especially small to midsize enterprises (SMEs), the consequences of a security breach can be catastrophic. It can range from financial losses and operational disruptions to reputational damage and legal liabilities.

According to IBM’s Cost of a Data Breach Report, the average cost of a data breach for small and medium-sized businesses is $4.88 million, including lost revenue and recovery expenses. Investing in security culture significantly reduces this risk.

Building a culture of online security awareness ensures that every employee understands the importance of protecting sensitive data. In turn, that could influence them into taking active measures to safeguard it. This culture shifts cybersecurity from being an IT responsibility to a shared organizational priority. Here's why cultivating this mindset is critical:

  • Reduces Human Error: Most breaches stem from human error, such as using weak passwords or clicking on phishing links. A strong security culture minimizes these risks. 
  • Enhances Trust: Clients and partners are more likely to work with businesses that prioritize cybersecurity. 
  • Supports Compliance: A security-conscious culture helps meet industry regulations, avoiding fines and penalties. 
  • Mitigates Financial Risks: The cost of a breach far exceeds the investment in fostering a security-first mindset. 

7 Steps to Build a Positive Online Security Culture 

Now that we know why it’s important, let’s explore how businesses can build a robust online security culture.

1. Set a Good Example

Leadership plays a critical role in setting organizational priorities. If business owners and executives dismiss or ignore cybersecurity, employees will likely do the same. On the other hand, a proactive and engaged leadership team signals that online security is a shared responsibility.

When leaders set a good example–by using secure practices themselves and openly supporting security initiatives–it reinforces the message that online security is non-negotiable. In turn, employees will view cybersecurity as essential to their daily responsibilities when they see leadership prioritizing it. 

How to Implement: 

  • Lead by Example: Use secure passwords, enable MFA, and follow organizational security protocols consistently. 
  • Communicate Regularly: Share updates on security initiatives in team meetings or newsletters to emphasize their importance. 
  • Participate in Training: Join employees in security workshops to demonstrate your commitment. 
  • Set Expectations: Clearly communicate that cybersecurity is a priority for everyone, including leadership. 

2. Conduct Regular Security Awareness Training

Your employees are your first line of defense against cyber threats. With that in mind, you can’t expect them to succeed without providing the necessary training. Conducting regular security awareness training ensures they can recognize and respond to threats like phishing emails, ransomware, and social engineering attacks.

How to Implement: 

  • Frequency Matters: Schedule quarterly or bi-annual training sessions to keep employees updated on evolving threats. 
  • Interactive Learning: Use tools like phishing simulations, quizzes, and gamified training modules to make learning engaging. 
  • Role-Specific Training: Tailor sessions based on employees’ roles—for instance, train HR on safeguarding sensitive employee data and finance teams on protecting payment information. 
  • Feedback Loops: Collect feedback to refine future training and address gaps in understanding. 

3. Create Clear and Enforceable Policies

Ambiguity breeds inconsistency. Clear policies provide employees with concrete guidelines on acceptable behavior. That ensures everyone across your organization is on the same page about their responsibilities. Having clear policies in place will effectively reduce the risk of security breaches caused by uninformed or negligent behavior. Not to mention, they can serve as a reference point in case of security incidents. 

How to Implement: 

  • Document Policies: Include guidelines on password creation, acceptable use of company devices, data sharing, and remote work security. 
  • Accessible and Understandable: Make policies easily accessible and avoid overly technical jargon. 
  • Regular Updates: Revise policies to adapt to new threats, compliance requirements, or organizational changes. 
  • Enforcement: Implement consequences for non-compliance to reinforce the importance of adherence. 

4. Foster a Culture of Accountability and Recognition

When members of your team understand their role in maintaining security and are recognized for secure behaviors, they’re more likely to adopt and adhere to best practices. It creates a culture of accountability that turns cybersecurity into a collective goal.  

How to Implement: 

  • Recognition Programs: Publicly acknowledge employees who excel in security practices during meetings or through internal communications. 
  • Gamify Security: Create challenges, such as recognizing phishing emails, with incentives for participation. 
  • Accountability: Set clear expectations for employees’ roles in security and address non-compliance with constructive feedback. 

5. Integrate Security into Daily Operations

When security is woven into daily workflows, it becomes second nature. This reduces the likelihood of employees treating cybersecurity as an afterthought. It allows your team to naturally adopt secure practices, reducing vulnerabilities caused by oversight or complacency. 

How to Implement: 

  • Security Checklists: Require teams to review security checklists when onboarding new projects or vendors. 
  • Automate Tasks: Use tools to automate software updates, backups, and compliance checks. 
  • Security Metrics: Incorporate security-related KPIs into performance reviews to emphasize its importance.

6. Conduct Regular Security Audits

Routine audits identify weaknesses in your systems, policies, and employee compliance, allowing you to address vulnerabilities proactively. They provide actionable insights to strengthen your organization’s security posture. In other words, they ensure your security measures stay effective and adapt to evolving threats. 

How to Implement: 

  • Third-Party Audits: Engage cybersecurity experts or MSSPs for unbiased evaluations. 
  • Comprehensive Assessments: Review employee behavior, device security, third-party access, and network vulnerabilities. 
  • Action Plans: Create a clear roadmap to address audit findings and share progress with your team to maintain transparency. 

7. Partner with Cybersecurity Experts

Cybersecurity requires specialized expertise that might be beyond your in-house team’s expertise. Working with a managed security services provider (MSSP) ensures your organization stays ahead of threats with advanced tools and strategies. It will strengthen your organization’s defenses, enabling your team to focus on core business operations.

How to Implement: 

  • Engage MSSPs: Partner with providers for 24/7 monitoring, threat detection, and incident response. 
  • Strategic Guidance: Work with experts to develop and refine your security framework. 
  • Tailored Services: Leverage expert insights to address your organization’s unique risks and compliance requirements. 

A diverse team of professionals standing confidently, symbolizing strategies to build a safe online culture for your business

Ready to Build a Positive Online Security Culture? 

It can be costly, but building a positive online security culture is an investment in your organization’s longevity and success. If you successfully foster leadership-driven initiatives, empower employees, and leverage expert support, your organization can create an environment where cybersecurity is everyone’s responsibility. 

Need help taking your security culture to the next level? ITS has over two decades of experience fostering a security-first mindset. Schedule a free consultation with one of our experts. Or you can check out the following resources for more information on how to improve your cybersecurity efforts: 

Return to Topics

CMMC 2.0: The Final Rule and What It Means for Your Business

February 27, 2025, Thursday, 11:00 AM PT | 2:00 PM ET

The final CMMC 2.0 rule is here—don’t risk falling behind.
If your business works with the Department of Defense, updated cybersecurity requirements are now mandatory.
Avoid potential contract loss and penalties by understanding what’s changed and how to stay compliant.

Register for the webinar

Webinar banner for 'CMMC: The Final Rule, and What It Means for Your Business,' with speakers Rob Schenk, Matt Lewis, and Sean Harris. Event on February 27, 2025, at 11:00 AM PT / 2:00 PM ET. Includes 'Register Now' button and partnership logos for ITS and Field Effect.

Cybersecurity & AI Insights at
Golden Steer, Las Vegas

March 11, 2025, Tuesday, 5:00 PM – 8:00 PM PT
Golden Steer Steakhouse, Western Lounge Room

Want to strengthen your business’s cybersecurity while exploring how AI can drive smarter decisions?
Join industry leaders for an exclusive evening covering practical strategies to protect your business and leverage AI-driven innovations.
Network with peers, enjoy fine dining, and receive a complimentary professional headshot to update your profile.

Secure your spotemail events@itsasap.com with "Golden Steer Registration" in the subject line.

Email Us to join

Exclusive-Event-Protect-and-Innovate-in-Las-Vegas-March-11_-2025

Cybersecurity & AI Insights at
The Stockyards, Phoenix

March 13, 2025, Thursday, 5:00 PM – 8:00 PM MT
The Stockyards Steakhouse, Rose Room

Is your business equipped to handle evolving cyber threats?
Discover how modern cybersecurity strategies can fortify your defenses and how AI-driven solutions are transforming business operations.
Connect with industry experts, enjoy a relaxed evening, and get a complimentary professional headshot while you're there.

Reserve your seat—email events@itsasap.com with "Stockyards Registration" in the subject line.

Email us to join

Exclusive-Event-Protect-and-Innovate-in-Phoenix-March-13_-2025

Bourbon, Breaches & Best Practices: A Virtual Cocktail Experience

March 20, 2025, Thursday, 4:00 PM - 6:00 PM ET

Bourbon and cybersecurity? Now that’s a pairing worth toasting!
Join us for an exclusive virtual experience where cybersecurity experts will share practical strategies to protect your business—while you enjoy a guided bourbon tasting from the comfort of your home.
Sip, learn, and walk away with actionable tips to strengthen your defenses and enjoy a smoother path to cybersecurity success.

Reserve your spot and claim your complimentary cocktail kit!
(If you're on the East Coast, register by March 1st to ensure timely delivery)email events@itsasap.com with "Virtual Cocktail Experience" in the subject line.

Bourbon_-Breaches-_-Best-Practices-–-A-Virtual-Cocktail-Experience-1