If a cybercriminal locked you out of your tax and accounting systems tomorrow, how many days of client work could you afford to lose?
For most firms, especially during busy season, the honest answer is none.
Yet many small and mid-sized accounting practices still rely on a patchwork of basic antivirus, untested backups, and “good enough” IT support that was never designed to stop modern attacks before they start.
Accounting firms have become prime targets because they sit on a perfect mix of sensitive data and time pressure. Years of tax returns, payroll records, bank statements, and personally identifiable information are concentrated in a handful of systems that partners and staff need to access every single day.
That combination of high value data and zero tolerance for downtime makes ransomware, phishing, and account takeover attacks profitable for criminals who specialize in hacking into professional services and financial firms.
The problem is no longer just whether an attacker can get in. It is whether your firm has done enough to prevent simple mistakes from turning into business email compromise, data theft, or a full firm shutdown.
Regulators have noticed this gap. The updated FTC Safeguards Rule and IRS guidance such as Publication 4557 have raised the bar for how tax professionals protect client information, document their controls, and respond to incidents. For partners, this has shifted cybersecurity from an additional “nice to have” IT project to a core business risk and compliance issue.
The good news is you do not need an enterprise-sized security team to protect a 5, 20, or even 50 person firm. Most successful attacks on CPA and bookkeeping firms still start the same way: a weak login, an unprotected laptop, or client data stored in the wrong place. If you focus on a practical set of controls that secure how people log in, the devices they use, and where your data lives, you can prevent the vast majority of incidents that cripple accounting firms every year.
This article points to a prevention-first approach to cybersecurity for accounting firms. You will see how to build a program around three pillars:
- Identity and access
- Devices and endpoints
- Data, hosting, and backups that aligns with FTC and IRS expectations without overwhelming your team.
Along the way, we will look at why fragmented IT support creates hidden gaps, how unified hosting plus managed IT from a specialist provider like Verito can help close them, and what to do if your firm is ever caught in the middle of an incident.
If this is the only article you read on cybersecurity for accountants, it should give you the clarity to answer one question with confidence:
“Are we doing enough, today, to stop breaches before they start?”
Table of Contents Show
Why Cybersecurity is Non-negotiable for Accounting Firms in 2026
There is a lingering belief in some firms that cybercriminals focus on big banks, global corporations, or massive hospital systems. The reality in 2026 is very different.
Professional and technical services, a category that includes accounting and CPA firms, has become one of the most targeted sectors in the world for ransomware and data extortion because it combines high-value financial information with comparatively light security in many small practices.
Recent threat reports by QBE show that professional and technical services firms, including law and accounting practices, have overtaken manufacturing as the most targeted industry segment for ransomware in some quarters.
Attackers know accounting firms are rich targets. A single small firm might hold years of tax returns, W-2s, 1099s, payroll reports, bank statements, and scanned IDs for hundreds or thousands of clients.
Criminals do not need to break into a Fortune 500 network if they can instead compromise a much smaller environment that aggregates the same type of data with fewer technical defenses and less staff capacity to respond. Automated phishing kits, credential stuffing tools, and dark web password dumps make it trivial for them to go after dozens of firms at once.
The shift to remote work, client portals, and cloud accounting platforms has only increased this exposure. Staff now work from home, coffee shops, and multiple locations, often on a mix of firm-owned and personal devices. Every one of those devices, Wi-Fi networks, and remote access methods is a potential entry point. A security program that was acceptable when everyone sat behind the same office router is not enough when your firm operates across homes, offices, and travel.
What a Security Breach Really Costs an Accounting Firm
Many partners think about cyber risk mainly in terms of fines or one-time remediation costs.
In practice, the biggest damage usually comes from operational downtime in the middle of client work and the long tail of reputational harm. If ransomware locks your tax and accounting applications for three days in March, that is three days of missed deadlines, overtime to catch up, and written explanations to some of your best clients.
There are also direct financial impacts that go beyond any ransom demand. You may have to pay for:
- Forensic investigations
- Specialist incident response
- Legal counsel
- Mandatory notifications
- Credit monitoring
Cyber insurers increasingly expect you to have baseline controls in place before they approve or renew coverage, and they may still require a detailed post-incident review before paying a claim. Even if the immediate bill is manageable, you can lose clients who no longer feel comfortable trusting your firm with their data. The partners then face a multi-year revenue problem.
Finally, a serious incident often exposes process weaknesses that have been ignored for years. Incomplete offboarding, undocumented admin accounts, unknown backups, and outdated devices suddenly become urgent. It is much cheaper and less disruptive to fix those issues in advance than to discover them while your firm is down and regulators are asking questions about your controls.
Regulators Now Expect a Baseline Security Program From Every Firm
From a regulatory point of view, cybersecurity for tax and accounting firms is no longer optional.
The Federal Trade Commission’s Safeguards Rule requires covered financial institutions, including tax preparers and many accounting firms, to maintain a written information security program with appropriate administrative, technical, and physical safeguards.
The IRS, through Publication 4557 on Safeguarding Taxpayer Data, reinforces that expectation. It makes clear that protecting taxpayer data is a legal obligation, not simply a best practice, and explicitly points to the FTC Safeguards Rule as the standard for tax professionals. Firms are expected to restrict access to taxpayer data, preserve its integrity, and ensure availability through reliable backup and recovery arrangements, all captured inside a Written Information Security Plan, or WISP.
For partners, this means two things:
- There is no safe harbor in being small. A 10-person firm that handles sensitive financial information is treated as a financial institution for Safeguards Rule purposes.
- Regulators and auditors increasingly ask not only whether you have firewalls and antivirus, but whether you can show how your firm identifies risks, trains staff, manages vendors, and responds when something goes wrong.
A generic IT setup without clear ownership and documentation is unlikely to satisfy those questions.
Why “Good Enough IT” is Not Good Enough Security Anymore
Traditional small firm IT has been built around availability.
The goal was to keep servers running, printers working, and software updated often enough that staff could do their jobs.
Security controls were added on top: an antivirus license here, a firewall there, maybe file backups to a local appliance or a sync solution. That approach can keep day-to-day operations moving, but it does not necessarily prevent or contain modern attacks.
Cybersecurity for accountants now requires a different mindset. Attackers often enter through identity rather than infrastructure. They use stolen passwords instead of brute-forcing firewalls, and they exploit weak remote access, unmanaged laptops, or gaps in email authentication rather than hammering the edge of the network. If your IT model focuses only on servers and connectivity, it may leave identity, endpoints, and cloud applications under-protected.
There is also a structural issue. Many firms have one vendor for local network support, another for cloud hosting, and a third for backups or security tools. When everyone is partly responsible, nobody has complete visibility. This can result in:
- Unmonitored alerts
- Untested restores
- Unclear incident response plans
In contrast, regulators, insurers, and clients will ask a very simple question after an incident:
“Who owns your security program and how is it coordinated?”
Common Cyber Threats to Accounting Firms (And How They Start)
Cybersecurity for accounting firms is not just the idea of securing your firm from a list of abstract risks.
Attacks usually begin with a very ordinary workday action: an email that looks legitimate, a staff member working from home, a rushed click during tax season. IBM’s Cost of a Data Breach Study reports that since 2020, reported attacks on accounting practices have grown by roughly 300 percent, and the average cost of a financial sector breach is now above 6 million dollars when you factor in response and lost business.
Below are the threats that most often hit CPA and bookkeeping firms, and how they typically get their first foothold:
1. Phishing, IRS-themed Scams, and Business Email Compromise
For most firms, the front door is still the inbox. Attackers send highly targeted phishing emails that imitate:
- The IRS, state tax authorities, or e-file systems
- Software vendors like Intuit or Thomson Reuters
- Banks, payroll providers, or payment processors
- Internal messages that appear to come from partners or managers
The goal is usually to steal credentials or trick staff into sending money or data. Business email compromise (BEC) is particularly damaging. The FBI reports that BEC schemes have caused tens of billions of dollars in known losses globally between 2013 and 2023, and they continue to be one of the most expensive cybercrimes reported each year.
In an accounting context, this often looks like:
- An attacker gaining access to a partner’s mailbox, then quietly monitoring it.
- The attacker inserting themselves into client conversations about payments, payroll, or refunds.
- Clients receiving “updated wiring instructions” or “new refund deposit details” that route funds to criminal accounts.
Because the email thread and writing style look genuine, many clients follow the instructions. By the time anyone notices, money is gone and trust has taken a hit.
Technical controls like multi-factor authentication and strong email security are critical, but so is staff awareness.
Most firms that suffered from BECs had at least some security tools in place. The failure point was a single successful phish combined with reuse of passwords and no second factor on email or portals.
Ransomware remains one of the most disruptive threats for accounting and tax firms because it hits exactly where you are most vulnerable: access to client data during busy season.
In numerous industry surveys, a majority of organizations that experienced a ransomware incident reported paying at least one ransom, yet a significant share still did not fully recover their data.
In a typical firm-level incident, the path looks like this:
- A staff member opens a malicious attachment or visits a compromised website.
- Malware installs quietly and begins to move laterally through the network.
- Once it has enough access, the ransomware encrypts file servers, local machines, and sometimes even attached backups.
- The attackers then demand payment in cryptocurrency, threatening to leak sensitive financial records if you do not comply.
For an accounting firm, that can mean:
- No access to tax software on local servers
- QuickBooks and shared drives unavailable
- Staff unable to work on any returns, audits, or bookkeeping
- Client files potentially exfiltrated and exposed on data leak sites
The key mistake many firms make is relying on a single backup approach, such as local network attached storage or basic file sync, without tested, isolated backups. Ransomware operators now routinely target backups as part of their playbook. Without separate, immutable backup copies and regular restore testing, firms discover in the middle of a crisis that their “safety net” is unusable.
3. Insider and Access Misuse, Both Accidental and Malicious
Not every security incident is driven by sophisticated attackers. Some of the most damaging breaches in the accounting sector come from ordinary staff activity that exposes data in unintended ways.
Accidental insider incidents include:
- Sending tax returns or workpapers to the wrong email address.
- Uploading sensitive client files to personal cloud storage so work can continue from home.
- Copying data to unencrypted USB drives or personal devices.
- Sharing credentials to “get something done” when systems feel slow or access is restricted.
There is also the risk of deliberate insider misuse. A disgruntled employee or contractor with access to client records can exfiltrate data, redirect funds, or retain access after leaving the firm if offboarding is sloppy.
Research on professional and business services firms shows that ransomware, data theft, and insider-driven incidents have been rising together, as attackers and insiders both target the same sensitive information.
In both cases, the root problem is inadequate access control and monitoring. If your firm lacks clear role-based access, has shared admin accounts, or cannot easily see who accessed what data and when, you are relying on trust instead of verifiable controls. Regulators and insurers increasingly expect to see a documented approach to user provisioning, offboarding, and access reviews, not just a list of people who “should” have access.
4. Weak Remote Access and Unmanaged Home Devices
Remote and hybrid work are now normal in the accounting profession. Many firms have staff working from home several days a week, or permanently, and some rely on offshore or remote teams for seasonal support.
Industry research suggests that more than one third of finance professionals now work remotely, which significantly increases the attack surface for firms that have not fully secured remote access.
Typical weaknesses include:
- Staff connecting to firm resources over open Wi-Fi or personal hotspots without a secure tunnel.
- Remote desktop exposed directly to the internet with weak credentials.
- Personal laptops used for client work without full disk encryption, endpoint protection, or patch management.
- Home routers with default passwords and no firmware updates.
For attackers, this is a “back door” into your environment. Compromising a home device that regularly connects to firm systems can be easier than attacking those systems directly. Once they control that endpoint, they can harvest credentials, monitor activity, and pivot into your hosted applications, file systems, and email.
A secure remote model for accounting firms usually involves a managed endpoint on each device used for work, enforced VPN or secure remote access, and clear separation between personal and firm data. Anything less turns every home office into a potential entry point.
Accounting firms run on vendors. Cloud accounting platforms, tax software, practice management tools, client portals, file sharing providers, local IT contractors, and hosting partners all touch client data in some way. Each one represents both an operational dependency and a security risk.
The risk shows up in several ways:
- A vendor suffers a breach that exposes your client data, even though your internal systems were never directly compromised.
- Your firm assumes a vendor is handling backups, monitoring, or incident response when the contract only covers uptime.
- Different vendors implement inconsistent MFA, logging, and access controls, leaving gaps between systems.
Financial sector guidance consistently highlights third-party risk as a major concern. Common cyber risk analyses for banks and financial services firms list phishing, ransomware, data breaches, and third-party vulnerabilities together as key threats that must be handled as part of one program, not as isolated issues.
For smaller CPA firms, the practical problem is ownership. If you have one company hosting your tax and accounting software, another managing your local network, and a third supplying “security tools,” it can be unclear who is responsible for hardening remote access, checking logs, or updating your WISP. When an incident occurs, that ambiguity turns into delay, finger pointing, and in some cases, higher regulatory and insurance scrutiny.
The Three Pillars of Cybersecurity for Accounting Firms
Most successful attacks on accounting firms still start in one of three places:
- A weak or stolen login
- An unprotected device
- Or client data stored in the wrong place
If you build your security program around those three points of failure, you can stop a large percentage of real-world threats before they turn into a breach.
These three pillars are:
- Identity and access: How people log in
- Devices and endpoints: The laptops and desktops staff use
- Data, hosting, and backups: Where client information actually lives
When these pillars are handled consistently, you are not only reducing risk, you are also moving much closer to what the FTC Safeguards Rule and IRS Publication 4557 expect from a tax and accounting firm.
Pillar 1: Identity and Access: How People Log-in
For most firms, identity is now the real parameter. Staff use email, tax software, bookkeeping platforms, client portals, and banking tools from multiple locations. If an attacker gets hold of a working username and password for any of those, they often do not need to “hack” anything else.
A practical identity and access approach for accounting firms should include:
- Strong, unique passwords for every system
- Firm-wide use of a password manager, not individual spreadsheets or browser saves
- Multifactor authentication (MFA) on email, remote access, tax applications, and portals
- Role-based access and least privilege for staff and contractors
- Fast, complete offboarding when someone leaves
MFA is especially important. Many incident response studies show that simple credential theft is involved in a large share of breaches, and that enforcing MFA across core systems drastically reduces the success rate of those attacks compared to passwords alone. Even if a staff member is phished, the attacker still needs the second factor to get in.
For CPA firms, identity controls are not just a “nice to have” feature. They directly support FTC and IRS expectations around limiting access to taxpayer data, detecting unauthorized use, and responding quickly when suspicious logins occur. That is why insurers and auditors now routinely ask whether you have MFA on email, admin accounts, and remote access as a minimum baseline.
Pillar 2: Devices and Endpoints: The Laptops and Desktops Staff Use
Every device that touches client data is part of your security program, whether it sits in your main office, a home office, or a hotel during a conference. Unmanaged endpoints are one of the most common weak links in small and mid-sized firms.
A secure endpoint strategy for accountants typically includes:
- Centralized endpoint protection with modern EDR (endpoint detection and response)
- Full disk encryption on all firm-owned laptops and desktops
- Regular, automated patching of operating systems and applications
- Clear rules for personal devices, including whether they are allowed to access firm systems at all.
- Screen lock, inactivity timeouts, and secure configuration baselines
- Remote wipe or disable options for lost or stolen devices
Remote and hybrid work have made this non-negotiable. A staff member using a personal, unpatched laptop on home Wi-Fi to access your hosted tax software creates an easy path for malware or keyloggers to harvest credentials. Once that device is compromised, attackers can often bypass whatever security you have in the cloud by acting through the user’s session.
Managed endpoints also give you better proof that your controls are not just written in a policy but actually enforced. When you can show that every device is encrypted, monitored, and patched to a defined standard, it becomes much easier to defend your posture during cyber insurance renewals or regulatory inquiries.
Pillar 3: Data, Hosting, and Backups: Where Client Data Actually Lives
The third pillar is where most of your risk ultimately sits: in the systems that store and process client data. For an accounting firm, that usually includes:
- Tax software (desktop and cloud-hosted versions)
- Accounting and bookkeeping applications such as QuickBooks
- File servers and document management systems
- Email and collaboration tools
- Client portals and file sharing solutions
A solid data, hosting, and backup approach should cover:
- Encryption in transit and at rest for sensitive data
- Strict access control for admin functions and database access
- Separation of environments so that one compromised account does not expose every client and every application.
- Regular, tested backups stored in isolated locations, with versioning and protection against ransomware tampering.
- Documented recovery time and recovery point objectives that match your business tolerance for downtime, especially during tax season.
This is where your choice of hosting model matters. Dedicated private servers for tax and accounting applications, managed by a provider that understands your software stack, can reduce “noisy neighbor” risks and give you tighter control over access, monitoring, and backups compared to generic shared environments.
Verito, for example, designs its VeritSpace dedicated servers specifically around accounting and tax workloads, with managed backups and security controls aligned to how firms actually work, rather than treating them as just another workload in a generic data center.
When your hosting, backups, and endpoint management are coordinated under a single program, you get a clear answer to the question “who owns data protection in this firm?” That clarity is exactly what regulators and insurers look for when assessing whether you have reasonable safeguards in place.
Bringing the Three Pillars Together
On paper, it is easy to treat identity, endpoints, and data as separate topics. In real incidents, they are tightly connected.
A phished password (identity) on an unmanaged laptop (endpoint) used to access a poorly segmented file system (data and hosting) is how many real breaches progress in small and mid sized firms.
The practical goal for a partner is not to chase every possible threat, but to make sure these three pillars are covered with concrete controls, assigned owners, and basic documentation inside your Written Information Security Plan. Once those foundations are in place, you can layer on more advanced capabilities such as centralized logging, continuous monitoring, and regular security testing.
Get a Practical Cybersecurity Audit for Your Firm
If you are not sure how well your firm currently performs across these three pillars, this is the point to find out, not after an incident. Verito offers a focused cybersecurity audit for tax and accounting firms that reviews how your staff log in, how devices are managed, and how your data and backups are protected, then maps those findings against FTC Safeguards and IRS Publication 4557 expectations.
A short assessment can give you a prioritized, non-technical roadmap that shows exactly which controls to tackle first and where your current IT or hosting setup is leaving gaps.
Cybersecurity Checklist For Small Accounting Firms
A cybersecurity checklist only helps if it matches how a real accounting firm works. The items below are organized by effort and impact so a 5 to 50-person practice can move methodically instead of trying to fix everything at once.
Think of this section as a practical roadmap that turns the three pillars into specific actions.
Quick Wins You can Implement This Month
These are controls most firms can put in place in 30 days with minimal disruption. They dramatically reduce the chance that a simple mistake turns into a breach.
1. Turn on multifactor authentication everywhere you can
Start with:
- Firm email accounts
- Remote access tools and VPN
- Client portals and document sharing tools
- Cloud versions of tax, accounting, and payroll systems
If a system does not support MFA, treat it as high risk until it does. For many accounting firms, this single step closes the door on a large share of phishing and credential stuffing attacks that rely on password reuse.
2. Enforce a password manager and basic password hygiene
- Require staff to use an approved password manager for all work accounts.
- Prohibit spreadsheets, notes, or browser-only saved passwords for firm systems.
- Update your policies so shared passwords are replaced by individual accounts wherever possible.
For partners who worry about complexity, the reality is that password managers usually reduce support tickets and login friction after a short adjustment period.
3. Clean up user accounts and access
- Generate a current list of users across your core systems.
- Remove or disable accounts for former employees, interns, and contractors.
- Identify shared admin accounts and plan to phase them out.
- Confirm that staff only have access to clients and systems they actually need.
This is one of the simplest ways to cut your attack surface. Stale accounts and shared logins are a common factor in small firm incidents.
4. Validate that backups exist and can be restored
- Confirm what is being backed up: servers, hosted applications, file shares, configuration.
- Ask when the last restore test was performed and what it covered.
- Document who is responsible for backup success: your internal IT, a local vendor, or a hosting provider.
If you cannot point to a recent, successful restore test for your tax and accounting systems, treat that as a red flag. A backup you have never tested is a risk, not a guarantee.
5. Tighten Remote Access and Wi-Fi Basics
- Require staff to use secure remote access or VPN for firm systems.
- Instruct staff to avoid public Wi-Fi for client work unless protected by a VPN.
- Enable WPA2 or WPA3 on office and home routers and change default passwords.
You do not need an exhaustive remote work policy on day one, but you do need to stop the most obvious weak points.
Foundational Controls for the Next 3 to 6 Months
Once quick wins are in place, the next step is to build repeatable, auditable processes that regulators, insurers, and clients will expect to see.
1. Move all firm devices into centralized management
- Enroll laptops and desktops into a managed endpoint platform.
- Standardize full disk encryption, endpoint protection, and patching.
- Define a minimum configuration baseline for any device that handles client data.
This is where many firms decide to partner with a specialist like Verito so that endpoint management, hosting, and backups are coordinated, not handled as separate projects.
2. Write and maintain a simple Written Information Security Plan (WISP)
Your first WISP does not need to be complex. It should clearly describe:
- What systems hold taxpayer and financial data.
- Who is responsible for security and IT decisions.
- How you handle access control, training, backups, and incident response.
- How you review third-party vendors that touch client data.
Treat the WISP as a living document. Update it when you add or change systems, move hosting providers, or change your remote work model.
3. Standardize secure onboarding and offboarding
- Create a checklist that IT and HR follow whenever someone joins or leaves.
- Include account creation, MFA setup, access assignment, and required training on day one.
- Include account disablement, device return, and removal from shared resources on the last day.
Regulators want to see that access is tied to roles and that former staff cannot quietly retain access to taxpayer data.
4. Formalize secure client data workflows
- Decide which channels are allowed for client document exchange.
- Configure client portals or secure file sharing for sending returns and receiving source documents.
- Discourage or block ad-hoc methods such as personal email, unencrypted file sharing, or USB drives.
This is also a good point to review your website contact forms and general email addresses to ensure they do not encourage clients to send sensitive data in clear text.
5. Launch recurring security awareness training
- Focus on phishing recognition, safe remote work, and reporting suspicious activity.
- Train at least annually, with shorter refreshers before tax season.
- Track completion and keep records, since insurers and regulators increasingly ask to see proof.
Even basic, recurring training significantly lowers click rates in phishing simulations for professional services firms, which translates into fewer real incidents.
Advanced Controls as Your Firm Matures
Once the foundations are in place, you can add controls that improve detection, shorten response times, and demonstrate a mature security posture.
1. Centralize logging, alerting, and incident handling
- Aggregate logs from critical systems such as email, firewalls, servers, and identity providers.
- Define what constitutes a security incident and who must be notified.
- Ensure someone is responsible for acting on alerts, not just receiving them.
Many firms choose managed detection and response services at this stage so that a specialist team monitors for threats and coordinates response rather than expecting partners or office managers to interpret alerts.
2. Conduct regular internal risk assessments
- Identify new systems, integrations, or vendors added since the last review.
- Reevaluate your controls against FTC Safeguards and IRS Publication 4557 guidance.
- Update your WISP to reflect changes and document remediation plans.
A simple annual risk assessment, backed by notes on what you changed as a result, goes a long way toward showing that cybersecurity is an ongoing program, not a one-time project.
3. Implement phishing simulations and targeted training
- Run simulated phishing campaigns a few times per year.
- Provide just-in-time training to staff who click test emails.
- Measure improvement over time and adjust content to focus on the most successful lures.
For accounting firms, tailoring simulations around tax refund scams, payroll changes, and invoice updates makes them more realistic and more effective.
4. Deepen third-party and vendor risk management
- Maintain a list of all vendors that process or store client data.
- Request and review security and compliance information where appropriate, such as SOC reports or security summaries.
- Ensure contracts identify who is responsible for backup, monitoring, and incident notification.
This is especially important if you rely on a mix of local IT vendors, generic cloud hosts, and SaaS applications. The more fragmented your vendor base, the more explicit your oversight needs to be.
One-page Annual Checklist for Firm Owners
Partners do not need to manage every control personally, but they should have a clear, high-level view of whether the firm is keeping up. An annual owner review can be as simple as confirming the status of a few key items.
You can use a table like this during your yearly planning meeting with your IT team or managed provider:
| Control area | Pillar covered | Status this year (Yes or No) | Owner | Notes or follow up |
|---|---|---|---|---|
| MFA on email, remote access, portals | Identity and access | IT / Managed provider | ||
| Password manager in firm wide use | Identity and access | Operations / IT | ||
| All devices encrypted and managed | Devices and endpoints | IT / Managed provider | ||
| Recent, tested backup for core apps | Data, hosting and backups | Hosting / Managed provider | ||
| WISP updated in the last 12 months | All three pillars | Managing partner / Compliance | ||
| Staff completed training this year | Identity and access | HR / Training lead | ||
| Vendor list and contracts reviewed | Data and third parties | Managing partner / IT |
The goal is not to tick every box perfectly on day one, but to avoid surprises. If you see multiple “No” answers in the same column for two years running, that is a signal to adjust budgets or seek outside help.
This owner-level checklist also supports strategic planning. When you look at your controls and realize that different vendors own pieces of identity, devices, and hosting, it becomes easier to see the risk of a fragmented model.
Firms that move toward a unified approach with a specialist partner can often reduce complexity and gain a clearer story for regulators and insurers about how they protect client data. That is where working with a provider like Verito, whose entire platform is built for accounting and tax workloads, becomes a way to future proof your firm against both downtime and compliance gaps, especially as requirements evolve.
Linking Your Cybersecurity Controls to FTC Safeguards and IRS 4557
Regulators do not care which antivirus you use or which server vendor you prefer. They care whether your firm has a coherent information security program that protects taxpayer data in line with federal rules. For CPA and tax firms, that mainly means the FTC Safeguards Rule and IRS guidance built around Publication 4557 and the newer WISP template.
The good news is that the three pillars you have already seen: identity and access, devices and endpoints, and data, hosting and backups, line up very closely with what these rules expect in practice.
What the FTC Safeguards Rule Expects From a Tax and Accounting Firm
The FTC Safeguards Rule sits under the Gramm Leach Bliley Act and applies to a wide range of non-bank financial institutions, including many tax return preparers, bookkeeping firms, and CPA practices that handle non-public client information. It requires each covered firm to develop, implement, and maintain a written information security program with appropriate administrative, technical, and physical safeguards for customer data.
In plain English, a compliant program has to include at least:
- A risk assessment that identifies reasonably foreseeable internal and external threats to customer information
- Access controls and authentication to limit who can see or use that information
- Encryption or equivalent protections for sensitive data in transit and at rest where feasible
- Secure development, change management, and information disposal procedures where relevant
- Regular testing or monitoring of the effectiveness of your safeguards
- Security awareness training for staff
- Oversight of service providers that handle customer data on your behalf
- A written incident response plan that defines roles, communication, and recovery steps
Recent commentary and checklists built for small financial institutions emphasize that compliance is not just box-ticking. You are expected to show that your safeguards fit your size, complexity, and the sensitivity of the data you hold, and that you review and update them regularly.
For tax preparers and CPA firms, the FTC has been clear that a Written Information Security Plan is part of that obligation, not an optional extra. Industry guidance now routinely states that a WISP is required for all PTIN holders, including solo practitioners, as part of Safeguards Rule compliance.
Failure to comply is not just a theoretical problem. The FTC (Federal Trade Commission) can seek civil penalties of up to 50,120 dollars per violation of an FTC rule, with fines potentially accruing per day for continuing violations, along with injunctions and mandated corrective actions.
How IRS Publication 4557 and the WISP Template Fit in
For tax and accounting firms, IRS Publication 4557 is the plain language manual that explains what safeguarding taxpayer data looks like under these rules. The IRS describes Publication 4557 as the document it points to when it wants to show tax professionals, CPA firms, and EROs what an information security program should look like in practice.
Publication 4557 focuses on three core outcomes for taxpayer data:
- Confidentiality, by restricting access and disclosure
- Integrity, by preventing improper modification or destruction
- Availability, by providing reliable access and data recovery
It provides checklists to help firms create and maintain a security plan that covers both office and digital environments.
In recent years, the IRS Security Summit has also released Publication 5708, a Written Information Security Plan template specifically for tax and accounting practices. The IRS and its partners repeatedly remind tax professionals that they must establish and maintain an up to date WISP and that Publication 5708 is there to help them do it in a structured way.
Taken together, these documents are not casual guidance. They are the IRS roadmap for how you satisfy your legal duty to protect taxpayer data under the Safeguards Rule. Industry sources now state openly that a WISP is not optional for tax practices that handle sensitive taxpayer information.
For a 5 to 50-person firm, this means you need two things in place:
- Actual controls that reduce risk in day-to-day operations.
- A written plan that describes those controls clearly and shows that you maintain and review them.
The three-pillar model you are building in this guide gives you the controls. Your WISP is where you document them in a way that aligns with FTC and IRS expectations.
Mapping the Three Pillars to FTC and IRS Requirements
If you break down Safeguards Rule and Publication 4557 expectations, they largely fall into the same categories you are already using to structure your program.
1. Identity and Access
- Safeguards Rule and IRS guidance require you to control who can access customer and taxpayer data, authenticate users, and monitor for unauthorized access.
- In practice, that maps directly to your policies on unique accounts, strong passwords, multi-factor authentication, role-based access, and prompt offboarding.
- When you can show that all staff and contractors use MFA on email, tax applications, portals, and remote access, and that you regularly review user lists, you are addressing core expectations around access control and authentication.
2. Devices and Endpoints
- Both frameworks expect you to protect customer information against unauthorized access, change, and destruction. That includes the devices where that data is processed or stored, not just servers in a data center.
- Managed endpoint protection, full disk encryption, regular patching, and secure configuration are how you show that laptops and desktops are not weak points in your program.
- IRS materials now explicitly highlight remote access and remote work risks, which means your WISP should describe how you secure home offices, remote staff, and any personal devices that touch firm systems.
3. Data, Hosting and Backups
- The rules require you to maintain the security, confidentiality, and integrity of customer information and to ensure it remains available through appropriate backup and recovery arrangements.
- Encryption, segmented hosting environments, carefully controlled admin access, and tested, isolated backups are the concrete safeguards that satisfy those expectations.
- Publication 4557 explicitly references the need for secure backups, disaster recovery planning, and reliable network security. A strong hosting and backup strategy is how you address those expectations for your tax and accounting applications.
Governance, Training, Monitoring, and Vendors
The three pillars focus on where attacks start, but the rules also expect program-level activities:
- Regular risk assessments, documented in your WISP and updated at least annually.
- Ongoing security awareness training for staff, including phishing, password hygiene, and incident reporting.
- Oversight of service providers, including ensuring that your hosting, IT, and software vendors have safeguards in place and notify you of incidents. The Safeguards Rule is explicit that covered institutions remain responsible for taking steps to ensure their service providers safeguard customer information.
These activities tie the three pillars together into a single program. Identity, endpoints, and data controls are the pieces on the ground. Governance and vendor oversight are how you show regulators that you manage those pieces in an organized way.
Turning Controls Into a WISP Your Firm Can Actually Use
For many firms, the hardest part is not implementing basic controls, it is capturing them in a Written Information Security Plan that does not sit ignored on a shelf. A useful WISP for a CPA firm does three things:
- Describes reality: It lists your systems, vendors, and controls as they actually exist, not as you hope they might look someday.
- Shows ownership: It identifies a qualified individual, usually a partner or designated security lead, and clarifies where you rely on external providers such as hosting or managed IT.
- Supports improvement: It includes a risk assessment summary, planned remediation items, and a simple review cycle, so you can demonstrate that your program evolves as threats and technology change.
The IRS WISP template and related guidance can help you structure that document, but most small firms do not want to build it from scratch. Platforms and services tailored to accounting firms, such as WISP tools designed around IRS Publication 4557 and FTC Safeguards Rule requirements, exist for exactly this reason. They take the three pillar controls you are putting in place and organize them into a defensible, exam-ready plan, with the flexibility to reflect your specific size and workflow.
Verito’s role in this context is to reduce the gap between operations and documentation. When the same specialist team that manages your hosting, backups, and endpoints also helps you maintain a WISP aligned with IRS and FTC guidance, it becomes easier to prove that your safeguards are not theoretical. They are designed, implemented, monitored, and reviewed as a single, coherent program.
Why Fragmented IT Creates Cybersecurity Gaps in Accounting Firms
From the outside, a firm that uses several vendors can look well-covered thanks to diversification. There is a local IT provider for office devices, a separate hosting company for tax and accounting software, a third-party for backups, and a few SaaS tools that handle portals and file sharing. On paper, that sounds redundant and resilient. In practice, it often produces the opposite result: blind spots that no one owns.
Fragmented IT is one of the most common reasons firms with decent individual tools still end up with preventable breaches or compliance gaps.
What Fragmented IT Looks Like in a CPA Firm
In a typical 10 to 25-person CPA firm, fragmentation might look like this:
- A local MSP that sets up office networks, printers, and user accounts.
- A generic cloud provider hosting QuickBooks and tax software.
- A separate backup vendor that installed an appliance years ago.
- Multiple SaaS tools for portals, e-signatures, project management, and file sharing.
- An outsourced web agency that manages email and DNS.
Each piece works within its own narrow scope. The hosting provider ensures your server is up and reachable. The local IT vendor resets passwords and troubleshoots devices. The backup vendor confirms that the appliance is running. None of them are hired, contractually, to build and maintain a coherent cybersecurity program tuned to FTC Safeguards, IRS 4557, and your WISP.
That gap between responsibilities is where attackers operate. Identity, endpoints, and data span all of these providers, so any control that depends on coordination tends to be weaker than it appears on paper.
Where the Security Gaps Appear Between Vendors
When you spread responsibility for systems across several companies, certain high-risk activities fall between the cracks. Common examples include:
1. MFA that is not enforced everywhere
Your hosting partner may support MFA on the remote desktop gateway. Your email provider has its own MFA settings. Client portals use yet another identity system. Unless someone is accountable for checking that every user actually has MFA turned on for every critical system, you will end up with gaps.
2. Patch management that is inconsistent
The local IT vendor may patch office PCs. The hosting provider patches servers, but only on a schedule that suits their wider customer base. Staff laptops taken offsite for long periods may drift out-of-date entirely. No one has a firm-wide view of which machines are behind.
3. Backups that do not align end-to-end
Your backup appliance covers on-premises file shares. The hosting provider snapshots servers on its schedule. Individual SaaS tools have their own retention policies. Nobody has tested what it takes to restore an entire workflow, from client documents through tax software and email, after a major incident.
4. Logging and monitoring that stop at vendor boundaries
Each provider may collect logs for their part of the environment, but no one correlates activity across email, endpoints, servers, and cloud applications. Suspicious behavior that spans systems is easy to miss without a central view.
5. Incident response that is undefined
If an account is compromised or ransomware appears, who leads the response? Does the hosting provider take charge, or the local IT vendor, or the backup company? Do they all know your regulatory obligations, insurance requirements, and client communication plan? In many fragmented setups, the answer is effectively no.
On their own, none of these gaps are unusual. Taken together, they mean that your security posture is only as strong as the least coordinated control across all providers.
Red Flags That Your Current Setup is Exposing You
Partners do not need to be security experts to detect warning signs. If you see any of the following patterns, you are likely dealing with a fragmented model that is increasing, not reducing, your risk:
- When something goes wrong, vendors blame each other instead of collaborating on the root cause.
- You have different answers from different providers when you ask who is responsible for backups, MFA, or endpoint security.
- No one can produce a current, complete list of systems that hold client data and which vendor manages each one.
- Your WISP, if it exists, does not clearly reflect what each provider is actually doing today.
- Changes to systems or vendors are made without updating documentation, access controls, or training.
Another practical red flag is time. If it takes days of emails to coordinate a response to a relatively minor security alert, that is a strong indicator that your program will not cope well with a serious incident.
Why Regulators and Insurers Expect an Integrated Story
Regulators and cyber insurers rarely ask about individual tools in isolation. They want to understand whether your firm has a coordinated information security program with defined responsibilities and oversight of service providers. In other words, they are less interested in which vendor runs your servers and more interested in how your controls fit together.
A fragmented setup makes that story harder to tell. You may need to:
- Request logs and evidence from three or four separate companies to reconstruct an incident.
- Prove that each critical system has appropriate access control, encryption, and monitoring, even though those features were configured by different teams.
- Explain how your risk assessments and WISP cover environments that sit outside any one vendor’s contract.
If you cannot answer basic questions about who is responsible for what, how changes are coordinated, and how you validate that controls remain effective, you are at a disadvantage in any examination or claim review.
In contrast, a unified hosting and managed IT model gives you a single accountable provider that designs, implements, and monitors controls across identity, devices, and data as one program. For many small and mid-sized firms, working with a specialist like Verito, rather than juggling generic providers, is the most straightforward way to close these coordination gaps and present a clear, defensible security posture to clients, regulators, and insurers.
How Unified Hosting Plus Managed IT Helps You Prevent Breaches
Once you see how many gaps come from handoffs between vendors, the logic of a unified model becomes obvious. The core idea is simple:
One specialist provider is responsible for your hosting, backups, endpoints, and day-to-day IT, all designed around CPA firm cybersecurity and compliance from the start.
Instead of asking three or four vendors to coordinate controls across identity, devices, and data, you give one team clear accountability for the entire chain. That structure makes it much harder for attackers to exploit the “no one owns this” gaps that exist in fragmented setups.
What a Unified Hosting and IT Model Looks Like in Practice
In a unified model, you still have multiple tools and platforms under the hood, but they are selected and operated as part of one program, not as disconnected projects. In practical terms, that usually means:
- Your tax and accounting software runs on dedicated private servers in a secure data center, not on generic shared infrastructure.
- The same provider manages your backups, verifies restores, and documents recovery times in line with your tolerance for downtime.
- Firm laptops and desktops are enrolled in centrally managed endpoint security, patching, and encryption.
- Identity controls such as MFA, conditional access, and role-based permissions are configured consistently across email, remote access, and hosted applications.
- Security monitoring and incident response are handled by a team that has visibility across all layers, not just one system.
When something suspicious happens, you are not opening three tickets and hoping vendors talk to each other. You have one security and IT partner who can trace activity from a user account, to a device, to a server or application, then take action and document what happened.
For a busy managing partner, the benefit is simplicity. There is a single accountable provider to call, a single security roadmap to review, and one coordinated story for regulators, insurers, and clients.
If you already suspect your current environment is too fragmented, it is worth taking a structured look. This is where it makes sense to compare your current setup with Verito’s VeritComplete unified hosting, IT, and cybersecurity and see how a unified approach would change your risk profile and day-to-day operations.
Why This Model Works Well for Busy CPA and Tax Firms
Accounting and tax workloads have some specific characteristics that generic IT providers do not always optimize for. Peak season usage can spike several times above normal. Staff log in from home, satellite offices, and client sites. Legacy desktop applications often sit at the centre of the workflow. The risk tolerance for downtime is extremely low.
A unified provider that specialises in this environment can design controls and capacity around those realities. Verito, for example, focuses on performance-first cloud hosting and managed IT for tax and accounting professionals, backed by SOC 2 Type II-certified infrastructure and completely isolated customer environments.
That combination of security and isolation directly supports accounting firm data security and FTC Safeguards expectations.
Other advantages of a unified, specialist model include:
- Consistent enforcement of MFA and access policies across all critical systems, instead of per vendor toggles.
- Coordinated patching and endpoint management so that office and remote devices meet the same standard.
- Attack-resistant backups and disaster recovery that are planned end-to-end, not per system.
- Documented controls that feed naturally into your WISP, since one team understands everything from hosting to endpoints.
The result is not just fewer tickets. It is a cybersecurity program that can be explained, examined, and improved in a structured way, which is exactly what regulators and insurers now look for.
How Verito Applies the Unified Model for Accounting Firms
Verito’s platform is built around four core services that map directly to the three pillars you have seen.
- VeritSpace provides lightning fast dedicated private servers for accounting and tax software. This means your QuickBooks Desktop, Lacerte, Drake Tax, CCH Axcess, UltraTax, and other core applications run in isolated environments with 100 percent uptime and resources that scale when tax season usage jumps three to five times.
- VeritGuard delivers 24/7 managed IT services with robust security. Devices are monitored, patched, and protected continuously, with engineers who understand accounting software handling endpoint and network issues before they become outages.
- VeritComplete combines hosting and IT management into a single solution so that one team is responsible for identity, endpoints, hosting, and backups.
- VeritShield WISP turns that operational reality into a customized Written Information Security Plan aligned with FTC Safeguards Rule and IRS Publication 4557 requirements, so you are not left trying to document controls alone.
All of this sits on top of a SOC 2 Type II certified infrastructure with enterprise-grade encryption and completely isolated customer environments, which gives firms bank-level security and regulatory alignment out of the box. Verito backs this with 24/7 Pro Help Desk support, a VeritCertified internal training program for engineers, and metrics such as sub one minute average response times and very high first-touch resolution.
For a managing partner, that combination translates into one outcome that matters more than any specific technical feature. Systems stay fast and available, even during peak filing deadlines, while security controls and compliance obligations are handled by a team that lives in this world every day.
Turn Cybersecurity Into A Competitive Advantage
Cybersecurity is no longer a side topic for accounting firms. If you handle taxpayer data, payroll records, and financial statements, you must assume attackers are interested in your systems and regulators are watching how you protect them.
The three pillars in this guide: identity and access, devices and endpoints, and data, hosting and backups, give you a clear structure to reduce that risk instead of reacting to it.
Tight controls on logins with MFA and password management, managed and encrypted devices for office and remote work, and secure, tested hosting and backups shut down the most common attack paths that disrupt firms your size every year.
When those controls are documented in a current WISP and reviewed regularly, you are not only better protected, you are also closer to what the FTC Safeguards Rule and IRS Publication 4557 already expect.
The harder problem for most firms is ownership, not technology. A fragmented mix of local IT, generic hosting, separate backup vendors, and unmanaged SaaS tools almost always leaves gaps that no one fully owns. Regulators, insurers, and increasingly your clients do not want a list of products, they want a coherent program with clear responsibility and evidence that you improve it over time.
Verito’s unified model is built to answer that question directly. Dedicated private servers for tax and accounting software, managed endpoints, 24×7 support, and WISP assistance are run by one team that understands your workloads and compliance requirements. That lets you present cybersecurity as part of your reliability story, not as an unresolved risk sitting in the background.
tl;dr
- Accounting firms are prime targets because they hold years of sensitive financial and taxpayer data and cannot tolerate downtime during busy season.
- The highest risk paths into most firms are weak logins, unmanaged devices, and poorly protected data and backups, not exotic zero day exploits.
- A practical cybersecurity program for accountants rests on three pillars: identity and access, devices and endpoints, and data, hosting, and backups.
- Quick wins like universal MFA, password managers, account cleanup, and tested backups can be implemented in 30 days and eliminate many common attacks.
- Over 3 to 6 months, firms should centralize device management, formalize onboarding and offboarding, standardize client data workflows, and maintain a living WISP.
- FTC Safeguards Rule and IRS Publication 4557 effectively require every tax and accounting firm, including small practices, to maintain documented safeguards and a Written Information Security Plan.
- Fragmented IT with multiple vendors often creates gaps in MFA enforcement, patching, backups, logging, and incident response that no one fully owns.
- A unified hosting plus managed IT model with a specialist like Verito gives you one accountable provider for identity, endpoints, hosting, backups, and WISP alignment.
- If an incident occurs, firms should follow a clear playbook: contain, involve IT and legal, coordinate with insurance, restore safely from clean backups, and update their WISP and controls.
- A focused cybersecurity audit from Verito turns this guidance into a specific, prioritized roadmap for your firm, so you can move from theoretical best practices to concrete, scheduled improvements.
FAQs:
1. Why is cybersecurity so important for accounting firms?
Cybersecurity is critical for accounting firms because you handle large volumes of highly sensitive client information, including taxpayer data, payroll records, and banking details, and any breach can result in regulatory penalties, lawsuits, client churn, and extended downtime during busy season. Regulators like the FTC and IRS now expect even small firms to maintain defined safeguards and a Written Information Security Plan, so treating security as an informal IT issue is no longer viable.
2. What are the most common cyber threats to CPA and tax firms today?
The most common cyber threats to CPA and tax firms are phishing and business email compromise, ransomware that encrypts tax and accounting systems, account takeover through stolen passwords, misuse of access by insiders or ex employees, and weaknesses in remote access or third party vendors. Most of these attacks start with ordinary activities such as opening an email, reusing passwords, or working from an unmanaged home device, which is why identity, endpoints, and data hosting all need structured protection.
3. What is a WISP and do small accounting firms really need one?
A Written Information Security Plan, or WISP, is a document that describes how your firm protects client and taxpayer data across people, processes, and technology, including your risk assessment, access controls, training, vendor oversight, and incident response steps. Under the FTC Safeguards Rule and IRS guidance, a WISP is now expected for tax and accounting practices of all sizes, including solo preparers, so a small firm that handles sensitive financial information is not exempt from having a documented plan.
4. What is the minimum cybersecurity baseline for a 5 to 10 person firm?
At a minimum, a 5 to 10 person accounting firm should have multifactor authentication on email, remote access, and key applications, a firm wide password manager, centrally managed and encrypted devices, tested backups for critical systems, phishing aware staff, and a simple but current WISP that explains who is responsible for security. That baseline does not make you immune to attacks, but it moves you well above the firms that still rely on single factor passwords, ad hoc backups, and undocumented processes, which are the ones criminals and insurers tend to treat as easy targets.
5. How much does cybersecurity typically cost for a small accounting firm?
Cybersecurity cost varies by size and complexity, but for many small firms it works out to a predictable per user or per server fee when bundled into managed IT and hosting rather than a series of one off purchases. When you compare that cost to the potential impact of even a single serious incident, such as several days of lost billable work in tax season, incident response, legal advice, and client loss, a structured program with a specialist provider like Verito is usually far less expensive than recovering from a breach with scattered vendors.
6. Should we outsource cybersecurity or keep it in-house?
Most small and mid sized accounting firms benefit from outsourcing a large part of cybersecurity to a specialist provider because they do not have the headcount or expertise to run a 24 by 7 security operation, manage complex hosting, and keep up with FTC and IRS guidance internally. You can still retain internal oversight through a partner or designated security lead, but relying on a unified provider such as Verito for hosting, managed IT, and WISP support gives you both day to day execution and a clearer compliance story than trying to coordinate several generic vendors yourself.
7. What are the best cybersecurity practices for remote accounting teams?
For remote accounting teams, best practices include using firm managed and encrypted devices, enforcing VPN or secure remote access for all connections, turning on multifactor authentication for every critical system, and separating personal and work data on home networks. You should also have clear written rules about where client files can be stored, how staff handle printing and disposal in home offices, and how lost or stolen devices are reported and remotely wiped, so that remote work does not quietly undermine your safeguards and WISP.
8. How do we secure QuickBooks and tax software in the cloud?
Securing QuickBooks and tax software in the cloud means choosing a hosting model where your applications run on dedicated private servers, access is controlled with MFA and strong identity policies, and backups are isolated and regularly tested. Providers like Verito design their VeritSpace environments specifically for accounting and tax workloads, combining performance, encryption, and segregation from other tenants so that your core applications sit inside an environment that is easier to defend and easier to document for regulators than generic shared hosting.
9. What should we do immediately if we suspect we have been hacked?
If you suspect a hack, you should immediately isolate affected systems by disconnecting compromised devices from the network, disable or lock accounts that show unusual activity, force password resets with MFA, and contact your IT or managed security provider with a clear incident summary. At the same time, start an incident log, notify your cyber insurer if you have a policy, and involve legal counsel to help determine whether client and regulator notifications are required, rather than wiping systems or communicating with clients before you understand the scope.
10. What should we look for in an IT and cybersecurity provider for our firm?
When choosing an IT and cybersecurity provider, look for deep experience with accounting and tax software, the ability to provide unified hosting plus managed IT rather than isolated services, strong references in your peer group, and clear alignment with FTC Safeguards and IRS Publication 4557. A provider like Verito that offers dedicated private servers, managed endpoints, 24 by 7 support, and WISP assistance gives you one accountable partner for identity, devices, data, and documentation, which is far easier to explain to clients, regulators, and insurers than a patchwork of vendors.
