{"id":67482,"date":"2025-10-29T08:00:00","date_gmt":"2025-10-29T13:00:00","guid":{"rendered":"https:\/\/taxprocenter.proconnect.intuit.com\/?p=67482"},"modified":"2025-10-23T15:13:38","modified_gmt":"2025-10-23T20:13:38","slug":"fortify-your-firm-data-security-and-lasting-trust","status":"publish","type":"post","link":"https:\/\/accountants.intuit.com\/taxprocenter\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/","title":{"rendered":"Fortify your firm: Data security and lasting trust"},"content":{"rendered":"\n<p>Data security is constantly evolving and presenting new challenges, especially for tax professionals and accountants who handle their clients\u2019 sensitive personal and financial data. Protecting your firm and maintaining client trust requires a proactive approach by focusing on the latest threats and implementing robust best practices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-x-large-font-size\"><strong>The current threat landscape<\/strong><\/h3>\n\n\n\n<p>Security breaches are a pervasive problem. According to <a href=\"https:\/\/www.breachsense.com\/breaches\/\" target=\"_blank\">BreachSense<\/a>, more than 4,100 publicly disclosed data breaches occurred in 2024; that\u2019s about 11 breaches per day based only on the publicly disclosed data.<\/p>\n\n\n\n<p>Looking closer at the causes of data breaches reveals some startling trends. About 60% involve the human element and 81% involve malicious actors. A growing driver of risk is <a href=\"https:\/\/taxprocenter.proconnect.intuit.com\/tag\/artificial-intelligence\/\">AI-powered<\/a> cybercrime, with ransomware, malware, and phishing frequently tied to data theft.<\/p>\n\n\n\n<p>This combination highlights a crucial point: In any security system, the human is often the weakest link, and attackers know to target this vulnerability.<\/p>\n\n\n\n<p>Here are several threats to watch out for.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-large-font-size\"><strong>Phishing in all its forms<\/strong><\/h4>\n\n\n\n<p>Phishing attacks have advanced far beyond the easily identifiable spam emails. The attacks now leverage new technologies and methods:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SMS <a href=\"https:\/\/taxprocenter.proconnect.intuit.com\/tax-law-and-news\/irs-dirty-dozen-phishing-smishing-and-more\/\">Phishing (Smishing)<\/a><\/strong>: Attackers exploit the high usage and lower scrutiny associated with text messages. They can spoof the sender ID to make a text appear to come from a trusted entity, such as a bank, making it harder to detect.<\/li>\n\n\n\n<li><strong>Voice Phishing (Vishing) and Video Phishing<\/strong>: With AI, criminals can clone a person&#8217;s voice using only 10 to 20 seconds of audio. This sophisticated tactic can be combined with deepfake video, making a direct call or video conference with an impersonator virtually indistinguishable from a real interaction.<\/li>\n\n\n\n<li><strong>Spear Phishing<\/strong>: Attackers use open-source intelligence; information gathered from a business&#8217;s public advertisements, websites, and contact info to target professionals specifically. For example, knowing someone does taxes and has client data makes them a prime target.<\/li>\n\n\n\n<li><strong>Business Email Compromise<\/strong>: Once a hacker compromises a business email, they can use it to target others within the firm or the firm\u2019s clients. This has led to massive financial fraud, as seen in a case where the <a href=\"https:\/\/www.terranovasecurity.com\/solutions\/security-awareness-training\/what-is-vishing\" target=\"_blank\">vishing technique<\/a> was used on a Zoom call to convince a CFO to wire a significant sum of money. The human element remains extremely susceptible to these varied phishing methods.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-large-font-size\"><strong>Remote access<\/strong><\/h4>\n\n\n\n<p>The ability to work remotely is a massive attack vector. Services such as Remote Desktop Protocol, Virtual Private Networks (VPNs), or other remote access methods are available through the public internet and potentially at risk, unless that access method has been securely configured.&nbsp; Tools are constantly scanning the internet for open ports and remote access points, easily identifying potential targets such as a tax firm\u2019s server.<\/p>\n\n\n\n<p>If remote access is necessary, it must be configured as securely as possible. This includes implementing <a href=\"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/two-factor-authentication-why-your-practice-needs-it\/\">two-factor authentication (2FA)<\/a>, and having a technically savvy person or a third-party firm review the setup. Using third-party remote desktop software companies is another way to ensure strong transport security&nbsp; protocols, and 2FA are implemented, as it is a giant attack vector when left unsecured.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-large-font-size\"><strong>Generative AI<\/strong><\/h4>\n\n\n\n<p>Generative AI is a double-edged sword, and while it offers many benefits, Gen AI significantly up-levels the capabilities of malicious actors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Perfect documentation<\/strong>: AI can create flawless phishing documents with correct spelling, grammar, tone, and tenure. This eliminates the visual clues that previously made spam emails easy to spot. Attackers can now type what they want; the AI will &#8220;create urgency&#8221; or &#8220;appear sincere,&#8221; making attacks much more difficult to discern.<\/li>\n\n\n\n<li><strong>Increased hacker capability<\/strong>: AI empowers less-skilled criminals (often called &#8220;script kiddies&#8221;) by allowing them to type what they want the code to do, and the model creates the malicious code for them. This massively increases the potential for damage from actors who don&#8217;t fully understand the underlying technology.<\/li>\n<\/ul>\n\n\n\n<p>When using AI tools for business, professionals must be aware of how their data is used and stored. Any data cut and pasted or uploaded into these models can potentially be stored, used to train the model, and possibly become discoverable in a jailbreak scenario. Data stewardship principles often caution against submitting sensitive, personally identifiable information to public models. Less than half of companies have a policy and structure for how they safely and securely use AI, highlighting an organizational security gap.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-x-large-font-size\"><strong>Simple fixes for big vulnerabilities<\/strong><\/h3>\n\n\n\n<p>Fortunately, many security vulnerabilities can be closed by adopting and adhering to a few fundamental practices:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Use 2FA<\/strong>: This is the single most effective tool that gives the biggest return for the buck. Whether it&#8217;s SMS codes, an authenticator app, or a physical token, 2FA prevents 99% of unauthorized access attempts from low-hanging fruit. It should be enabled on all accounts, especially those containing sensitive client data, like Intuit\u00ae accounts.<\/li>\n\n\n\n<li><strong>Patch systems and software<\/strong>: System alerts indicating a new update should be addressed as quickly as possible, ideally overnight or when you leave the office. Neglecting patches is a major cause of large-scale compromises.<\/li>\n\n\n\n<li><strong>Do not reuse passwords<\/strong>: Reusing <a href=\"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/help-your-clients-create-stronger-passwords\/\">passwords<\/a> across sensitive accounts means that if one site is compromised, all other accounts using that same password are now vulnerable. A password manager can help manage unique, complex passwords for different services.<\/li>\n\n\n\n<li><strong>Embrace a culture of security<\/strong>: This extends beyond digital practices to physical security. Simple locks on office doors and file cabinets are often the only things protecting paper copies of client tax returns, which contain the exact same sensitive data as your digital files.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading has-x-large-font-size\"><strong>Preparing for the inevitable<\/strong><\/h3>\n\n\n\n<p>A firm must assume that a breach is a possibility and prepare for it accordingly.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-large-font-size\"><strong>Cyber breach insurance<\/strong><\/h4>\n\n\n\n<p>Cyber breach insurance is not a preventative measure, but a recovery tool. Like health insurance, it won\u2019t stop a compromise, but it will help with the aftermath. Furthermore, insurance policies often have requirements\u2014such as using 2FA, patching, and encrypting data\u2014which force the firm to increase its security posture to qualify for coverage.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-large-font-size\"><strong>The stall method for phishing<\/strong><\/h4>\n\n\n\n<p>When receiving an unexpected communication, use the S.T.A.L.L. method to review it:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><span style=\"text-decoration: underline;\">S<\/span>ender<\/strong>: Do you know the sender, and is the email address what you expect?<\/li>\n\n\n\n<li><strong><span style=\"text-decoration: underline;\">T<\/span>one<\/strong>: Is the tone what you expect from this person?<\/li>\n\n\n\n<li><strong><span style=\"text-decoration: underline;\">A<\/span>ttachment<\/strong>: Is there an attachment? This is a red flag, especially from an unknown sender.<\/li>\n\n\n\n<li><strong><span style=\"text-decoration: underline;\">L<\/span>ink<\/strong>: Does the link go where you expect, or is the URL misspelled?<\/li>\n\n\n\n<li><strong><span style=\"text-decoration: underline;\">L<\/span>ogin<\/strong>: Is the communication asking you to log in?<\/li>\n<\/ul>\n\n\n\n<p>If in doubt, use an out-of-band channel\u2014a different method of communication, like a phone call to a known number or a new email to a known address\u2014to verify the sender&#8217;s identity.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-large-font-size\"><strong>Written Information Security Plan<\/strong><\/h4>\n\n\n\n<p>The <a href=\"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/how-to-create-a-written-information-security-plan-for-your-practice\/\">Written Information Security Plan<\/a> (WISP) is an IRS requirement for tax filers and a very good security guide. It simply documents the measures a firm takes to protect its systems and data, including physical security and staff training. Developing a WISP helps to surface unknown gaps in a firm\u2019s security practices.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-large-font-size\"><strong>The IRS Security Six<\/strong><\/h4>\n\n\n\n<p>The IRS recommends six core security practices for everyone in the tax ecosystem:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Use and enable antivirus software.<\/li>\n\n\n\n<li>Use a firewall.<\/li>\n\n\n\n<li>Use 2FA.<\/li>\n\n\n\n<li>Use backup software and services.<\/li>\n\n\n\n<li>Use drive encryption.<\/li>\n\n\n\n<li>Create and secure VPNs.<\/li>\n<\/ol>\n\n\n\n<p>These practices, if implemented correctly, will improve the overall security posture of the firm.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-x-large-font-size\"><strong>The cost of compromise<\/strong><\/h3>\n\n\n\n<p>When a compromise occurs, the speed of data exfiltration can be shockingly fast\u2014in some reported cases, it has taken less than a minute. Once an attacker has access, they can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install keyloggers and backdoors.<\/li>\n\n\n\n<li>Use the firm\u2019s trusted machine for fraudulent tax filings; the activity appears normal to monitoring systems.<\/li>\n\n\n\n<li>Hack from the firm&#8217;s network to attack others.<\/li>\n\n\n\n<li>Glean saved passwords from web browsers.<\/li>\n\n\n\n<li>Send phishing emails <em>from<\/em> the firm&#8217;s compromised account to clients and others.<\/li>\n<\/ul>\n\n\n\n<p>The ultimate goal for attackers is multifaceted: tax fraud, identity theft to apply for credit, and selling the &#8220;known good&#8221; client credentials on the dark web. This data can be used for years to propagate fraud against the firm\u2019s clients.<\/p>\n\n\n\n<p>By understanding the threats, implementing fundamental security measures like 2FA and patching, and preparing a security plan, firms can reduce their risk profile significantly and not be the easy target or the low hanging fruit that bad actors seek out.<\/p>\n\n\n\n<p class=\"has-x-large-font-size\"><strong>FAQs<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What are the current major threats to data security for professionals handling sensitive client data?<\/h3>\n\n\n\n<p>A significant and growing risk is AI-powered cybercrime, often involving ransomware, malware, and various forms of phishing (Smishing, Vishing, Spear Phishing, and Business Email Compromise).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How does Generative AI increase the capability of cybercriminals?<\/h3>\n\n\n\n<p>Generative AI significantly up-levels the capabilities of malicious actors by enabling the creation of flawless phishing documents with correct spelling, grammar, tone, and tenure, eliminating the visual clues that previously made spam easy to spot.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What are the most effective fundamental security practices a firm can implement?<\/h3>\n\n\n\n<p>One of the single most effective tools is Two-Factor Authentication (2FA), which prevents 99% of unauthorized access attempts and should be enabled on all sensitive accounts. Other fundamental practices include patching systems and software as quickly as possible, not reusing passwords across sensitive accounts (a password manager can help), and embracing a culture of security that extends to physical security like locking office doors and file cabinets.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What are the core security practices the IRS recommends for the tax ecosystem?<\/h3>\n\n\n\n<p>The IRS recommends &#8220;The Security Six&#8221; core practices for everyone in the tax ecosystem:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Use and enable antivirus software.<\/li>\n\n\n\n<li>Use a firewall.<\/li>\n\n\n\n<li>Use two-factor authentication.<\/li>\n\n\n\n<li>Use backup software and services.<\/li>\n\n\n\n<li>Use drive encryption.<\/li>\n\n\n\n<li>Create and secure virtual private networks (VPNs).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Protecting your firm and maintaining client trust requires a proactive approach by focusing on the latest threats and implementing robust best practices.<\/p>\n","protected":false},"author":127094453,"featured_media":67484,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rkv_browse_by_id":0,"rkv_cta_id":0,"rkv_optimize_for_pagespeed":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"useModifiedDate":false,"customPublishDate":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false},"categories":[116807],"tags":[130072316],"intuit_collection":[],"intuit_series":[],"coauthors":[582953250],"class_list":["post-67482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-practice-management","tag-fraud-and-security"],"header_image":"","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fortify your firm: Data security and lasting trust - Tax Pro Center | Intuit<\/title>\n<meta name=\"description\" content=\"Protecting your firm and maintaining client trust requires a proactive approach by focusing on the latest threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/accountants.intuit.com\/taxprocenter\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortify your firm: Data security and lasting trust - Tax Pro Center | Intuit\" \/>\n<meta property=\"og:description\" content=\"Protecting your firm and maintaining client trust requires a proactive approach by focusing on the latest threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Tax Pro Center | Intuit\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IntuitAccountants\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-29T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2025\/10\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Christopher Denton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntuitAccts\" \/>\n<meta name=\"twitter:site\" content=\"@IntuitAccts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christopher Denton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/\"},\"author\":{\"name\":\"Christopher Denton\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#\\\/schema\\\/person\\\/08f837375b20c03fd0d24c9b990fcef5\"},\"headline\":\"Fortify your firm: Data security and lasting trust\",\"datePublished\":\"2025-10-29T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/\"},\"wordCount\":1587,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg\",\"keywords\":[\"fraud and security\"],\"articleSection\":[\"Practice Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/\",\"url\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/\",\"name\":\"Fortify your firm: Data security and lasting trust - Tax Pro Center | Intuit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg\",\"datePublished\":\"2025-10-29T13:00:00+00:00\",\"description\":\"Protecting your firm and maintaining client trust requires a proactive approach by focusing on the latest threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg\",\"contentUrl\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg\",\"width\":1400,\"height\":600,\"caption\":\"Fortify your firm: Data security and lasting trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/practice-management\\\/fortify-your-firm-data-security-and-lasting-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fortify your firm: Data security and lasting trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#website\",\"url\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/\",\"name\":\"Tax Pro Center | Intuit\",\"description\":\"Tax Pro Center\",\"publisher\":{\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#organization\",\"name\":\"Tax Pro Center | Intuit\",\"url\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Tax_Pro_Center_Logo_Final_large.webp\",\"contentUrl\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Tax_Pro_Center_Logo_Final_large.webp\",\"width\":872,\"height\":160,\"caption\":\"Tax Pro Center | Intuit\"},\"image\":{\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/IntuitAccountants\",\"https:\\\/\\\/x.com\\\/IntuitAccts\",\"https:\\\/\\\/www.instagram.com\\\/intuitaccountants\\\/?hl=en\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/intuit-accountants\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#\\\/schema\\\/person\\\/08f837375b20c03fd0d24c9b990fcef5\",\"name\":\"Christopher Denton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85c220eeff63eac20b61d107eecaf874ec164df15587022fd213913c664797b0?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85c220eeff63eac20b61d107eecaf874ec164df15587022fd213913c664797b0?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85c220eeff63eac20b61d107eecaf874ec164df15587022fd213913c664797b0?s=96&d=identicon&r=g\",\"caption\":\"Christopher Denton\"},\"description\":\"Christopher Denton is a principal security engineer with Intuit\u00ae ProConnect\u2122. He has been involved in all aspects of security for the last 20 years, with subject matter expertise in the areas of application security, network security, forensics, incident response and threat modelling. Christopher loves to educate the industry about security issues. Chris leads the team to secure the products and e-file system for Intuit\u2019s tax professionals. He also contributes to the IRS Security Summit to better safeguard taxpayer data across our industry. Christopher lives in Little Elm, Texas, with his wife and two cats, where enjoys cycling, Denver Bronco football and obstacle course racing.\",\"url\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/author\\\/christopherdentontax\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fortify your firm: Data security and lasting trust - Tax Pro Center | Intuit","description":"Protecting your firm and maintaining client trust requires a proactive approach by focusing on the latest threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/accountants.intuit.com\/taxprocenter\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/","og_locale":"en_US","og_type":"article","og_title":"Fortify your firm: Data security and lasting trust - Tax Pro Center | Intuit","og_description":"Protecting your firm and maintaining client trust requires a proactive approach by focusing on the latest threats.","og_url":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/","og_site_name":"Tax Pro Center | Intuit","article_publisher":"https:\/\/www.facebook.com\/IntuitAccountants","article_published_time":"2025-10-29T13:00:00+00:00","og_image":[{"width":1400,"height":600,"url":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2025\/10\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg","type":"image\/jpeg"}],"author":"Christopher Denton","twitter_card":"summary_large_image","twitter_creator":"@IntuitAccts","twitter_site":"@IntuitAccts","twitter_misc":{"Written by":"Christopher Denton","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/#article","isPartOf":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/"},"author":{"name":"Christopher Denton","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#\/schema\/person\/08f837375b20c03fd0d24c9b990fcef5"},"headline":"Fortify your firm: Data security and lasting trust","datePublished":"2025-10-29T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/"},"wordCount":1587,"commentCount":0,"publisher":{"@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#organization"},"image":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2025\/10\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg","keywords":["fraud and security"],"articleSection":["Practice Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/","url":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/","name":"Fortify your firm: Data security and lasting trust - Tax Pro Center | Intuit","isPartOf":{"@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#website"},"primaryImageOfPage":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/#primaryimage"},"image":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2025\/10\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg","datePublished":"2025-10-29T13:00:00+00:00","description":"Protecting your firm and maintaining client trust requires a proactive approach by focusing on the latest threats.","breadcrumb":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/#primaryimage","url":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2025\/10\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg","contentUrl":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2025\/10\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg","width":1400,"height":600,"caption":"Fortify your firm: Data security and lasting trust"},{"@type":"BreadcrumbList","@id":"https:\/\/taxprocenter.proconnect.intuit.com\/practice-management\/fortify-your-firm-data-security-and-lasting-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/taxprocenter.proconnect.intuit.com\/"},{"@type":"ListItem","position":2,"name":"Fortify your firm: Data security and lasting trust"}]},{"@type":"WebSite","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#website","url":"https:\/\/accountants.intuit.com\/taxprocenter\/","name":"Tax Pro Center | Intuit","description":"Tax Pro Center","publisher":{"@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/accountants.intuit.com\/taxprocenter\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#organization","name":"Tax Pro Center | Intuit","url":"https:\/\/accountants.intuit.com\/taxprocenter\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#\/schema\/logo\/image\/","url":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2022\/10\/Tax_Pro_Center_Logo_Final_large.webp","contentUrl":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2022\/10\/Tax_Pro_Center_Logo_Final_large.webp","width":872,"height":160,"caption":"Tax Pro Center | Intuit"},"image":{"@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IntuitAccountants","https:\/\/x.com\/IntuitAccts","https:\/\/www.instagram.com\/intuitaccountants\/?hl=en","https:\/\/www.linkedin.com\/company\/intuit-accountants\/"]},{"@type":"Person","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#\/schema\/person\/08f837375b20c03fd0d24c9b990fcef5","name":"Christopher Denton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/85c220eeff63eac20b61d107eecaf874ec164df15587022fd213913c664797b0?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/85c220eeff63eac20b61d107eecaf874ec164df15587022fd213913c664797b0?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85c220eeff63eac20b61d107eecaf874ec164df15587022fd213913c664797b0?s=96&d=identicon&r=g","caption":"Christopher Denton"},"description":"Christopher Denton is a principal security engineer with Intuit\u00ae ProConnect\u2122. He has been involved in all aspects of security for the last 20 years, with subject matter expertise in the areas of application security, network security, forensics, incident response and threat modelling. Christopher loves to educate the industry about security issues. Chris leads the team to secure the products and e-file system for Intuit\u2019s tax professionals. He also contributes to the IRS Security Summit to better safeguard taxpayer data across our industry. Christopher lives in Little Elm, Texas, with his wife and two cats, where enjoys cycling, Denver Bronco football and obstacle course racing.","url":"https:\/\/accountants.intuit.com\/taxprocenter\/author\/christopherdentontax\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2025\/10\/Fortify-your-firm-Data-security-and-lasting-trust-copy.jpeg","jetpack_shortlink":"https:\/\/wp.me\/pazjGh-hyq","jetpack-related-posts":[{"id":36897,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/practice-management\/elements-in-your-written-info-security-plan-wisp\/","url_meta":{"origin":67482,"position":0},"title":"8 elements in your Written Info Security Plan (WISP)","author":"Astrid Daniela Galvez, EA","date":"January 2, 2024","format":false,"excerpt":"Discover the 8 elements of a Written Information Security Plan, and why your firm needs to maintain a current plan at all times. Astrid Daniela Galvez, EA, explains.","rel":"","context":"In &quot;Practice Management&quot;","block_context":{"text":"Practice Management","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/practice-management\/"},"img":{"alt_text":"Developing a cybersecurity framework for your firm","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2023\/12\/Developing-a-cybersecurity-framework-for-your-firm-copy.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2023\/12\/Developing-a-cybersecurity-framework-for-your-firm-copy.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2023\/12\/Developing-a-cybersecurity-framework-for-your-firm-copy.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2023\/12\/Developing-a-cybersecurity-framework-for-your-firm-copy.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17233,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/practice-management\/cybersecurity-a-critical-opportunity-for-advisory-services\/","url_meta":{"origin":67482,"position":1},"title":"Cybersecurity: A critical opportunity for advisory services","author":"Cassidy Jakovickas, CPA","date":"September 19, 2019","format":false,"excerpt":"Helping protect your clients' data and ensuring their information is safe is a key part of providing advisory services. Cassidy Jakovickas, CPA, provides helpful guidance.","rel":"","context":"In &quot;Advisory Services&quot;","block_context":{"text":"Advisory Services","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/advisory-services\/"},"img":{"alt_text":"Security for tax professionals","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":30578,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/practice-management\/act-fast-after-discovering-a-data-breach\/","url_meta":{"origin":67482,"position":2},"title":"Act fast after discovering a data breach","author":"Scott Cytron","date":"September 29, 2023","format":false,"excerpt":"Get a checklist of what you should do if a data breach occurs in your firm, including what you should do right away.","rel":"","context":"In &quot;Practice Management&quot;","block_context":{"text":"Practice Management","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/practice-management\/"},"img":{"alt_text":"Tax pros- Act fast after discovering a data breach","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2023\/09\/Tax-pros-Act-fast-after-discovering-a-data-breach-copy.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2023\/09\/Tax-pros-Act-fast-after-discovering-a-data-breach-copy.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2023\/09\/Tax-pros-Act-fast-after-discovering-a-data-breach-copy.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2023\/09\/Tax-pros-Act-fast-after-discovering-a-data-breach-copy.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1560,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/tax-law-and-news\/id-theft-protection-services-provided-after-a-data-breach-are-not-taxable\/","url_meta":{"origin":67482,"position":3},"title":"ID Theft Protection Services Provided After a Data Breach Are Not Taxable","author":"Sally P. Schreiber, J.D., Journal of Accountancy","date":"August 3, 2015","format":false,"excerpt":"When victims of data breaches receive free identity protection services from an organization that suffered a data breach, the IRS will not assert that the value of those identity protection services is includible in the victim\u2019s gross income, the Service announced on Thursday (Announcement 2015-22). The announcement applies to anyone\u2026","rel":"","context":"In &quot;Tax Law and News&quot;","block_context":{"text":"Tax Law and News","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/tax-law-and-news\/"},"img":{"alt_text":"identity theft and fraud","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/08\/identity-theft-fraud-e1535552551114.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/08\/identity-theft-fraud-e1535552551114.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/08\/identity-theft-fraud-e1535552551114.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":18731,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/practice-management\/5-best-practices-in-tax-firm-security\/","url_meta":{"origin":67482,"position":4},"title":"5 Best Practices in Tax Firm Security","author":"Cassidy Jakovickas, CPA","date":"March 10, 2020","format":false,"excerpt":"Security for your firm should be a top proiority; here are five recommendations from Cassidy Jakovickas, CPA.","rel":"","context":"In &quot;Practice Management&quot;","block_context":{"text":"Practice Management","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/practice-management\/"},"img":{"alt_text":"Security for tax professionals","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":51334,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/tax-law-and-news\/watch-out-for-new-client-email-scam\/","url_meta":{"origin":67482,"position":5},"title":"Watch out for \u201cnew client\u201d email scam","author":"Intuit Accountants Team","date":"March 7, 2024","format":false,"excerpt":"Tax professionals should watch out for a \u201cnew client\u201d scam\u2014an email scheme where cybercriminals pose as potential clients.","rel":"","context":"In &quot;Tax Law and News&quot;","block_context":{"text":"Tax Law and News","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/tax-law-and-news\/"},"img":{"alt_text":"Watch out for \u201cnew client\u201d email scam","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2024\/03\/Watch-out-for-new-client-email-scam-copy.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2024\/03\/Watch-out-for-new-client-email-scam-copy.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2024\/03\/Watch-out-for-new-client-email-scam-copy.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2024\/03\/Watch-out-for-new-client-email-scam-copy.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/posts\/67482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/users\/127094453"}],"replies":[{"embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/comments?post=67482"}],"version-history":[{"count":6,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/posts\/67482\/revisions"}],"predecessor-version":[{"id":67499,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/posts\/67482\/revisions\/67499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/media\/67484"}],"wp:attachment":[{"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/media?parent=67482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/categories?post=67482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/tags?post=67482"},{"taxonomy":"intuit_collection","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/intuit_collection?post=67482"},{"taxonomy":"intuit_series","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/intuit_series?post=67482"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/coauthors?post=67482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}