{"id":6551,"date":"2026-05-04T14:41:52","date_gmt":"2026-05-04T18:41:52","guid":{"rendered":"https:\/\/verito.com\/blog\/?p=6551"},"modified":"2026-05-11T14:35:41","modified_gmt":"2026-05-11T18:35:41","slug":"cloud-security-tips-cpa-firms","status":"publish","type":"post","link":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/","title":{"rendered":"12 Cloud Security Tips for CPA Firms to Lock Down Client Data"},"content":{"rendered":"<p><!-- author: Camren Majors (ID 12) --><br \/>\n<!--\nfocus_keyphrase: cloud security tips\nseo_title: 12 Cloud Security Tips for CPA Firms to Lock Down Client Data\nmeta_description: Cloud security tips built for CPA firms. 12 practices mapped to FTC Safeguards, IRS Pub 4557, and tax-season uptime, with the regulatory citation on each.\nslug: cloud-security-tips-cpa-firms\n--><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-cloud-security-tips-for-cpa-firms-twelve-practices-with-the-rule-attached\"><span id=\"cloud-security-tips-for-cpa-firms-twelve-practices-with-the-rule-attached\"><strong>Cloud Security Tips for CPA Firms: Twelve Practices With the Rule Attached<\/strong><\/span><\/h2>\n<p>Cloud security tips for CPA firms are not the same advice you would give a random small business. A tax or accounting practice handles SSNs, EFIN credentials, payroll data, and bank routing numbers, all of it covered by federal law. The FTC Safeguards Rule has required tax preparers to run a written information security program, enforce multi-factor authentication, encrypt customer data, and designate a qualified individual since the <a href=\"https:\/\/www.ftc.gov\/business-guidance\/blog\/2022\/11\/compliance-deadline-certain-revised-ftc-safeguards-rule-provisions-extended-june-2023\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">June 9, 2023 compliance deadline<\/a>. Most small firms still treat these as optional. They are not.<\/p>\n<p>This guide is twelve practices, each one mapped to the rule that requires it, the way Verizon&#8217;s data on actual breaches says it should be implemented, and the practical step a 1 to 50 person firm can take this quarter. No fluff. No throat-clearing intros. Just the work.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1429\" src=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1.jpg\" alt=\"Cinematic teal-green photograph of a small CPA firm office at dawn, server rack faintly visible through a glass partition, file folders and a closed laptop on a wooden desk in foreground, deep shallow depth of field, fine film grain, no text or logos\" class=\"wp-image-6569\" srcset=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1.jpg 2560w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-300x167.jpg 300w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-1024x572.jpg 1024w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-768x429.jpg 768w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-1536x857.jpg 1536w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-2048x1143.jpg 2048w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-380x212.jpg 380w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-800x447.jpg 800w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-1160x648.jpg 1160w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled-1-150x84.jpg 150w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n<h2 id=\"h-why-cloud-security-for-cpas-is-different\" class=\"wp-block-heading\"><span id=\"why-cloud-security-for-cpas-is-different\"><strong>Why Cloud Security for CPAs Is Different<\/strong><\/span><\/h2>\n<p>A CPA firm sits under a stack of overlapping mandates that most generic IT advice ignores. The FTC Safeguards Rule treats your firm as a financial institution under the Gramm-Leach-Bliley Act. IRS Publication 4557 requires every PTIN holder to maintain a Written Information Security Plan, and Line 11 of <a href=\"https:\/\/www.aicpa-cima.com\/resources\/article\/wisp-required-by-federal-law-for-tax-practitioners\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">PTIN renewal Form W-12<\/a> asks you to certify that you have one. State data-protection laws, AICPA professional standards, and your cyber insurance carrier all stack on top.<\/p>\n<p>Then there is tax season. From late January through April, your firm runs at workload levels a normal SMB never sees. Your software stack, your bandwidth, your support response time, and your endpoint posture all face their hardest test in the same eight-week window. A cloud security plan that ignores tax-season behavior is a plan that fails in March.<\/p>\n<p>The threat landscape is matched to the workload. The <a href=\"https:\/\/www.ic3.gov\/CSA\/2024\/241120.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FBI and CISA joint advisory on BianLian ransomware<\/a> calls out professional services, including accounting and law firms, as a primary target. Verizon&#8217;s 2025 Data Breach Investigations Report found that <a href=\"https:\/\/www.verizon.com\/business\/resources\/T16f\/reports\/2025-dbir-data-breach-investigations-report.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">22% of breaches start with stolen credentials and 60% involve a human element<\/a>. Both numbers describe a CPA firm employee being phished during peak season more accurately than any abstract threat model.<\/p>\n<p>The twelve practices below are organized so you can read top to bottom or jump to the rule you are trying to satisfy. Each section opens with a passage-independent statement, followed by the regulatory grounding, the how-to, and the Verito angle if it applies.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div class=\"wp-block-spacer\" style=\"height: 20px;\">\u00a0<\/div>\n<h2 id=\"h-1-move-to-dedicated-not-shared-infrastructure\" class=\"wp-block-heading\"><span id=\"1-move-to-dedicated-not-shared-infrastructure\"><strong>1. Move to Dedicated, Not Shared, Infrastructure<\/strong><\/span><\/h2>\n<p>Dedicated cloud infrastructure means your firm&#8217;s tax and accounting applications run in an environment that no other tenant shares. Shared hosting splits compute, memory, and sometimes storage across many customers on the same server. For a firm preparing returns, the difference shows up in three places: tax-season performance, isolation during a security incident, and audit defensibility.<\/p>\n<p>The FTC Safeguards Rule, codified at 16 CFR Part 314, requires firms to take reasonable steps to vet service providers and to oversee them throughout the relationship. A dedicated environment makes that oversight much easier to evidence. You can point to the rack, the SOC 2 Type II report, the patch schedule, and the access logs that apply to your firm specifically, not a multi-tenant abstraction.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Ask any current or prospective host whether your environment is dedicated or shared. Get the answer in writing.<\/li>\n\n\n\n<li>Request a SOC 2 Type II report and confirm it is current within the last twelve months.<\/li>\n\n\n\n<li>Confirm where your data sits, who can access it, and how access is logged.<\/li>\n\n\n\n<li>Test peak-season performance before the cutover. Run a one-week pilot in late January or early February with a real workload.<\/li>\n<\/ul>\n\n\n<p>Verito&#8217;s <a href=\"https:\/\/verito.com\/quickbooks-hosting\" target=\"_blank\" rel=\"dofollow\" >VeritSpace dedicated hosting<\/a> runs your tax suite, QuickBooks, Drake, Lacerte, ProSeries, and UltraTax on private environments built specifically for accounting firms. SOC 2 Type II audited annually. <a href=\"https:\/\/verito.com\/blog\/100-uptime-for-cpa-firms\" target=\"_blank\" rel=\"dofollow\" >100% uptime since 2016<\/a>. The performance you see on March 14 matches what you saw on January 14, because no other firm&#8217;s workload is sharing your compute.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div class=\"wp-block-spacer\" style=\"height: 20px;\">\u00a0<\/div>\n<h2 id=\"h-2-multi-factor-authentication-everywhere\" class=\"wp-block-heading\"><span id=\"2-multi-factor-authentication-everywhere\"><strong>2. Multi-Factor Authentication Everywhere<\/strong><\/span><\/h2>\n<p>Multi-factor authentication is the single highest-impact cloud security control a CPA firm can deploy. Microsoft&#8217;s research on account compromise shows that <a href=\"https:\/\/learn.microsoft.com\/en-us\/partner-center\/security\/security-at-your-organization\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MFA blocks 99.2% of automated account-takeover attacks, and 99.9% of compromised accounts had no MFA enabled at all<\/a>. The Verizon DBIR 2025 puts stolen credentials at 22% of all breaches, the largest single initial-access vector.<\/p>\n<p>The FTC Safeguards Rule mandates MFA at 16 CFR 314.4(c)(5). The mandate covers any individual accessing customer information. That includes you, your staff, your seasonal preparers, your bookkeeper, and any contractor with credentials. The IRS reinforces it in <a href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p4557.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Publication 4557<\/a>, naming MFA as a required safeguard for taxpayer data.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Turn on MFA for email, hosting, tax software, banking, and your client portal. No exceptions for the partner.<\/li>\n\n\n\n<li>Use an authenticator app or hardware key. SMS codes are better than nothing but vulnerable to SIM-swap attacks.<\/li>\n\n\n\n<li>Disable legacy authentication protocols on Microsoft 365 and Google Workspace. They bypass MFA entirely.<\/li>\n\n\n\n<li>Run a quarterly check that confirms every active account in every system has MFA enforced, not just available.<\/li>\n<\/ul>\n\n\n<p><a href=\"https:\/\/verito.com\/managed-it\" target=\"_blank\" rel=\"dofollow\" >VeritGuard managed IT<\/a> enforces MFA across every account that touches client data, ties enforcement to your identity provider, and produces the documentation your insurance carrier asks for at renewal.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-3-encryption-at-rest-and-in-transit\"><span id=\"3-encryption-at-rest-and-in-transit\"><strong>3. Encryption at Rest and in Transit<\/strong><\/span><\/h2>\n<p>Encryption protects client data when an attacker bypasses other controls. The FTC Safeguards Rule at 16 CFR 314.4(c)(3) requires encryption of customer information both at rest and in transit, with a written justification if you elect a compensating control instead. There is no realistic compensating control for an accounting firm. Implement encryption.<\/p>\n<p>The federal breach notification deadline that follows from this matters. Under the Safeguards Rule&#8217;s 2024 amendment, a firm must notify the FTC within 30 days of a security event involving the unencrypted information of 500 or more consumers. Encrypted data, properly keyed and stored, generally does not trigger that notification. Encryption changes the math during a breach.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Confirm your hosting provider encrypts storage volumes at rest, ideally with AES-256, and uses TLS 1.2 or higher in transit.<\/li>\n\n\n\n<li>Encrypt local laptop and desktop drives. BitLocker on Windows, FileVault on Mac. Centrally managed, not user-toggled.<\/li>\n\n\n\n<li>Email containing client data goes through encrypted email or secure file transfer. Plain SMTP is not enough.<\/li>\n\n\n\n<li>Document key management. Who holds the keys, where they are stored, and the rotation schedule.<\/li>\n<\/ul>\n\n\n<p><a href=\"https:\/\/verito.com\/quickbooks-hosting\" target=\"_blank\" rel=\"dofollow\" >VeritSpace<\/a> encrypts data at rest with AES-256 and uses TLS 1.2 or higher for every connection. Documentation is part of the SOC 2 package, which means you can hand it to your insurance carrier without a fire drill.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1429\" src=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1.jpg\" alt=\"Cinematic teal-green photograph of a hardware security key sitting on a printed compliance checklist next to a pen, soft window light, shallow depth of field, fine film grain, no text or logos\" class=\"wp-image-6566\" srcset=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1.jpg 2560w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-300x167.jpg 300w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-1024x572.jpg 1024w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-768x429.jpg 768w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-1536x857.jpg 1536w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-2048x1143.jpg 2048w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-380x212.jpg 380w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-800x447.jpg 800w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-1160x648.jpg 1160w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-mfa-encryption-scaled-1-150x84.jpg 150w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-4-3-2-1-backups-with-tested-recovery\"><span id=\"4-3-2-1-backups-with-tested-recovery\"><strong>4. 3-2-1 Backups With Tested Recovery<\/strong><\/span><\/h2>\n<p>Backups are the only control that recovers a firm from ransomware without paying the ransom. The 3-2-1 rule is the floor: three copies of your data, on two different media types, with one copy stored off-site. CISA publishes <a href=\"https:\/\/www.cisa.gov\/audiences\/small-and-medium-businesses\/secure-your-business\/back-up-business-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">3-2-1 backup guidance for small and medium businesses<\/a>, and the rule is referenced in IRS Publication 4557 as standard practice for tax data.<\/p>\n<p>Untested backups are not backups. Plenty of firms learn during a ransomware event that the nightly job has been failing for six weeks, that the off-site copy has not been validated, or that restoration takes 72 hours when the firm has 8. The control is recovery, not the backup itself.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Three copies: the production data, a local backup, and an off-site or cloud backup. Two different media types.<\/li>\n\n\n\n<li>One copy must be air-gapped or immutable. Ransomware cannot encrypt what it cannot reach or modify.<\/li>\n\n\n\n<li>Test a full restore at least once a quarter. Document the time it took, the data restored, and any gaps.<\/li>\n\n\n\n<li>Set Recovery Point Objective and Recovery Time Objective targets that match tax-season tolerance, not the off-season.<\/li>\n<\/ul>\n\n\n<p>For a deeper walkthrough of how the backup tiers stack against each other, our guide to <a href=\"https:\/\/verito.com\/managed-backup-services\" target=\"_blank\" rel=\"dofollow\" >managed backup services for accounting firms<\/a> covers BaaS versus DRaaS economics. Verito&#8217;s managed backup includes immutable copies, quarterly recovery tests, and the documentation a <a class=\"wpil_keyword_link\" href=\"http:\/\/verito.com\/written-information-security-plan\" target=\"_blank\"  rel=\"dofollow noopener\" title=\"WISP\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"1201\">WISP<\/a> requires.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div class=\"wp-block-spacer\" style=\"height: 20px;\">\u00a0<\/div>\n<h2 id=\"h-5-patch-and-vulnerability-management\" class=\"wp-block-heading\"><span id=\"5-patch-and-vulnerability-management\"><strong>5. Patch and Vulnerability Management<\/strong><\/span><\/h2>\n<p>Patching is the unglamorous work that prevents most opportunistic intrusions. The FTC Safeguards Rule requires periodic vulnerability assessments at 16 CFR 314.4(d)(2), and IRS Publication 4557 names timely patching as a baseline safeguard for taxpayer data.<\/p>\n<p>Most CPA firms patch their own laptops and forget the rest. The rest is where attackers live. Routers and firewalls have firmware. Hosted servers have OS and database patches. Tax software releases monthly fixes during the season, and the patch cadence accelerates between January and April. A firm with strong patching practice in October falls behind by March without a written process.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Inventory every device, server, and network appliance that touches client data. You cannot patch what you do not know exists.<\/li>\n\n\n\n<li>Set patch windows. Critical CVEs within 7 days, high within 30, others on a monthly cycle. Document exceptions.<\/li>\n\n\n\n<li>Reboot scheduling matters. Tax-season reboots are scheduled for off-hours, not 9 a.m. on March 12.<\/li>\n\n\n\n<li>Review the vulnerability scan output monthly with a named owner. A scan that nobody reads is theatre.<\/li>\n<\/ul>\n\n\n<p>VeritGuard handles patching for the workstations and servers it manages, on a tax-season aware schedule that does not collide with peak filing days. Patch reports map directly to FTC Safeguards 314.4(d)(2) and the related IRS Publication 4557 controls.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-6-annual-and-ongoing-employee-security-training\"><span id=\"6-annual-and-ongoing-employee-security-training\"><strong>6. Annual and Ongoing Employee Security Training<\/strong><\/span><\/h2>\n<p>Most breaches involve a person, not a zero-day. Verizon&#8217;s 2025 DBIR puts the human element at 60% of breaches, with stolen credentials and phishing leading the access vectors. Training is the only control that addresses the human element directly.<\/p>\n<p>The FTC Safeguards Rule requires security awareness training at 16 CFR 314.4(e). The rule does not specify a format or vendor, only that training is provided to all personnel and is updated to reflect risk-assessment results. IRS Publication 4557 reinforces this for any practice that holds a PTIN.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Annual security awareness training for every staff member, including partners and contractors with credential access.<\/li>\n\n\n\n<li>Quarterly phishing simulations. Track click rates by individual, not just firm-wide. Use the data to coach, not to punish.<\/li>\n\n\n\n<li>Tax-season specific refresher in early January covering wire fraud, fake IRS lookalike domains, and client impersonation.<\/li>\n\n\n\n<li>Document attendance and completion. Your insurance carrier asks for this. Your WISP requires it.<\/li>\n<\/ul>\n\n\n<p>For more on the controls a firm trains its team to operate, our overview of <a href=\"https:\/\/verito.com\/blog\/cybersecurity-for-accounting-firms\" target=\"_blank\" rel=\"dofollow\" >cybersecurity for accounting firms<\/a> walks through the underlying stack, and our piece on <a href=\"https:\/\/verito.com\/blog\/managed-it-for-accounting-firms-it-guy-quits\" target=\"_blank\" rel=\"dofollow\" >what happens when your only IT person leaves<\/a> covers the operational fragility that training alone cannot fix.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div class=\"wp-block-spacer\" style=\"height: 20px;\">\u00a0<\/div>\n<h2 id=\"h-7-phishing-prevention-and-email-security\" class=\"wp-block-heading\"><span id=\"7-phishing-prevention-and-email-security\"><strong>7. Phishing Prevention and Email Security<\/strong><\/span><\/h2>\n<p>Phishing is the single most common initial-access vector for CPA firm breaches. Verizon&#8217;s 2025 DBIR ranks phishing at 16% of initial access events overall, and higher in professional services. A wire fraud incident often starts with a single compromised mailbox that an attacker reads quietly for days before launching the actual fraud.<\/p>\n<p>The FTC Safeguards Rule requires monitoring and detection at 16 CFR 314.4(d), and email security is a primary place that monitoring lives in practice. Tax season makes the problem worse. Lookalike IRS domains, fake e-file confirmations, and impersonated clients all spike between February and April.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Deploy DMARC, SPF, and DKIM on your domain. This is the foundation that lets receiving servers spot a forged Verito-looking email.<\/li>\n\n\n\n<li>Use an email security gateway with link-rewriting and attachment sandboxing. Native Microsoft 365 and Google Workspace filtering catches less than the marketing claims.<\/li>\n\n\n\n<li>Out-of-band confirmation for every wire instruction or banking change. A phone call to a known number, not a number in the email.<\/li>\n\n\n\n<li>Quarterly review of email forwarding rules. Attackers commonly create hidden rules to exfiltrate inbound mail.<\/li>\n<\/ul>\n\n\n<p>VeritGuard managed IT layers a tax-firm tuned email security gateway in front of Microsoft 365 or Google Workspace, with attachment sandboxing, link rewriting, and the alerts piped to a 24&#215;7 SOC.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1429\" src=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1.jpg\" alt=\"Cinematic teal-green photograph of a laptop screen showing a faintly readable suspicious email at dusk, a cup of coffee gone cold beside it, shallow depth of field, fine film grain, no text or logos\" class=\"wp-image-6567\" srcset=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1.jpg 2560w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-300x167.jpg 300w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-1024x572.jpg 1024w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-768x429.jpg 768w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-1536x857.jpg 1536w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-2048x1143.jpg 2048w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-380x212.jpg 380w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-800x447.jpg 800w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-1160x648.jpg 1160w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-phishing-scaled-1-150x84.jpg 150w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-8-least-privilege-access-controls\"><span id=\"8-least-privilege-access-controls\"><strong>8. Least-Privilege Access Controls<\/strong><\/span><\/h2>\n<p>Least privilege means each person and system gets only the access required to do the job, and no more. The FTC Safeguards Rule mandates access controls at 16 CFR 314.4(c)(1), specifically requiring authentication and access controls limited to authorized users.<\/p>\n<p>The two failure modes are identical across CPA firms. The first is leftover access. Seasonal staff who finished in April still hold credentials in October. The second is privilege creep. A staff member promoted from preparer to manager added permissions and never removed the old ones, ending up with broad domain rights that nobody intended.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Role-based access. Define roles (preparer, reviewer, partner, admin) and map system permissions to roles, not to individual users.<\/li>\n\n\n\n<li>Quarterly access review. Walk through every active account in every system. Disable anyone who left or changed roles.<\/li>\n\n\n\n<li>Separate admin accounts from daily-use accounts. The owner who answers email should not be using a domain admin account to do it.<\/li>\n\n\n\n<li>Document the offboarding checklist. Same-day disablement on the last working day for departing staff.<\/li>\n<\/ul>\n\n\n<p>VeritGuard ties access controls to your identity provider, automates quarterly review reports, and gives you the audit trail an FTC investigator or insurance carrier asks about first.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-9-network-segmentation-and-zero-trust\"><span id=\"9-network-segmentation-and-zero-trust-architecture\"><span id=\"9-network-segmentation-and-zero-trust\"><strong>9. Network Segmentation and Zero Trust Architecture<\/strong><\/span><\/span><\/h2>\n<p>Zero trust replaces the old castle-and-moat network model with a simple rule: never trust, always verify. <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/NIST.SP.800-207.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NIST SP 800-207<\/a>, published August 11, 2020, is the canonical reference architecture for zero trust. It does not require an enterprise budget. The principles apply at any firm size.<\/p>\n<p>For a CPA firm, the practical version is segmentation. Your tax software and client data sit on a different network segment than your guest Wi-Fi. Your accounting workstations cannot freely reach your IoT printers. Your Drake or Lacerte server is not pingable from a coffee-shop laptop just because the user logged into the VPN.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Separate guest Wi-Fi from the firm network. Guest devices should not see anything internal.<\/li>\n\n\n\n<li>Microsegment the production network. Tax software servers, accounting workstations, and admin systems live in distinct VLANs.<\/li>\n\n\n\n<li>Verify every access request. Identity, device posture, and context, not just an IP address inside the perimeter.<\/li>\n\n\n\n<li>Replace the always-on VPN with conditional access. Access depends on who you are, where you are, and the health of your device.<\/li>\n<\/ul>\n\n\n<p>Verito&#8217;s <a href=\"https:\/\/verito.com\/managed-it\" target=\"_blank\" rel=\"dofollow\" >VeritGuard managed IT<\/a> implements zero-trust principles tuned to firm size. Conditional access, device posture, and microsegmentation mapped to NIST SP 800-207, without enterprise pricing.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-10-vendor-and-cloud-provider-vetting\"><span id=\"10-vendor-and-cloud-provider-vetting\"><strong>10. Vendor and Cloud Provider Vetting<\/strong><\/span><\/h2>\n<p>The FTC Safeguards Rule requires vendor oversight at 16 CFR 314.4(f). The rule does not let you outsource the obligation. Choosing a hosting provider, a backup vendor, or a payroll processor does not remove your responsibility to evidence that they implement appropriate safeguards. The rule names this explicitly.<\/p>\n<p>The standard for cloud providers is SOC 2 Type II. Type I checks that controls exist on a single date. Type II checks that controls operated effectively over a period of at least six months. <a href=\"https:\/\/www.aicpa-cima.com\/resources\/landing\/system-and-organization-controls-soc-suite-of-services\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">AICPA&#8217;s SOC 2 framework<\/a> defines the Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy) that the audit covers.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>For every cloud vendor with access to client data, request the SOC 2 Type II report. If they cannot produce one, that is a finding.<\/li>\n\n\n\n<li>Read the Complementary User Entity Controls (CUECs). These are the things the vendor expects YOU to do for the report to apply to your firm.<\/li>\n\n\n\n<li>Maintain a vendor inventory. Name, data types accessed, last review date, contract terms covering breach notification and data return on termination.<\/li>\n\n\n\n<li>Review annually, not quarterly. Vendors change. Acquisitions and ownership changes are the most common surprise.<\/li>\n<\/ul>\n\n\n<p>Verito provides SOC 2 Type II audit reports to firms on request, with the CUECs called out so your <a href=\"https:\/\/verito.com\/wisp\" target=\"_blank\" rel=\"dofollow\" >WISP<\/a> picks them up correctly. The first ask in any vendor evaluation should be the SOC 2 report. The second should be a customer reference at a similar-size firm.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-11-written-incident-response-plan\"><span id=\"11-written-incident-response-plan\"><strong>11. Written Incident Response Plan<\/strong><\/span><\/h2>\n<p>An incident response plan is the document that turns a breach from an existential crisis into a defined process. The FTC Safeguards Rule requires a written incident response plan at 16 CFR 314.4(h), with specific elements: goals, roles, the events that trigger the plan, communications and information sharing, evaluation, and reporting.<\/p>\n<p>Ransomware is the dominant scenario. The <a href=\"https:\/\/www.ic3.gov\/CSA\/2024\/241120.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FBI and CISA BianLian advisory<\/a> describes a group that has specifically targeted professional services firms, including accounting, with double-extortion ransomware that both encrypts data and threatens to release it. The IBM 2025 Cost of a Data Breach Report puts the <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">global average breach cost at $4.44 million, the U.S. average at $10.22 million, and financial services at $5.56 million<\/a>. A small firm hit during tax season faces both the technical loss and the seasonal revenue collapse.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Write the plan. Six pages, not sixty. Cover detection, containment, eradication, recovery, notification, and lessons learned.<\/li>\n\n\n\n<li>Name the qualified individual who runs the response. Name an alternate. Both have personal phone numbers in the document.<\/li>\n\n\n\n<li>Pre-position your incident response retainer with a forensics firm and your breach counsel. The first call is the lawyer. Privilege matters.<\/li>\n\n\n\n<li>Tabletop exercise once a year. Walk a fake ransomware scenario through the plan. Time the steps. Document the gaps.<\/li>\n<\/ul>\n\n\n<p>For a deeper read on the regulatory framing your incident response plan documents, our coverage of <a href=\"https:\/\/verito.com\/ftc-safeguards-rule\" target=\"_blank\" rel=\"dofollow\" >the FTC Safeguards Rule<\/a> walks through what an investigator looks for when an incident is reported.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1429\" src=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1.jpg\" alt=\"Cinematic teal-green photograph of a printed incident response plan binder open on a conference table next to a phone, soft overhead lighting, shallow depth of field, fine film grain, no text or logos\" class=\"wp-image-6568\" srcset=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1.jpg 2560w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-300x167.jpg 300w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-1024x572.jpg 1024w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-768x429.jpg 768w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-1536x857.jpg 1536w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-2048x1143.jpg 2048w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-380x212.jpg 380w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-800x447.jpg 800w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-1160x648.jpg 1160w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-incident-scaled-1-150x84.jpg 150w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-12-wisp-and-ongoing-risk-assessments\"><span id=\"12-wisp-and-ongoing-risk-assessments\"><strong>12. WISP and Ongoing Risk Assessments<\/strong><\/span><\/h2>\n<p>The <a href=\"https:\/\/verito.com\/blog\/wisp-templates-security-plans-accounting-firms\/\" target=\"_blank\" rel=\"dofollow noopener\"  data-wpil-monitor-id=\"1235\">Written Information Security Plan<\/a> is the single document that ties every other practice on this list together. The FTC Safeguards Rule requires a written plan at 16 CFR 314.3, and IRS Publication 4557 requires every PTIN holder to maintain one. <a href=\"https:\/\/www.aicpa-cima.com\/resources\/article\/wisp-required-by-federal-law-for-tax-practitioners\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">PTIN renewal Form W-12 Line 11<\/a> asks you to certify that you have a WISP, signed under penalty of perjury.<\/p>\n<p>The risk assessment is the input that drives the plan. It identifies the data your firm holds, where it lives, who can reach it, the threats most likely to compromise it, and the controls in place to manage that risk. The Safeguards Rule requires a written risk assessment, periodically refreshed.<\/p>\n<p>How to put this into practice:<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Use the IRS Publication 5708 template as a starting point if you do not have a WISP. It is free and credible.<\/li>\n\n\n\n<li>Run a written risk assessment annually. List your data, your systems, your vendors, and the threats you actually face.<\/li>\n\n\n\n<li>Tie every section of the WISP back to a control on this list. Section by section, the plan documents the work.<\/li>\n\n\n\n<li>Review the plan annually with the qualified individual. Update after any incident, vendor change, or new system.<\/li>\n<\/ul>\n\n\n<p>Our deep dive on the FTC Safeguards Rule for bookkeepers and tax preparers walks through the nine WISP sections and the law underneath them. VeritShield WISP is a turnkey product for firms that want a compliant, audit-ready plan in 5 business days, customized to your systems and vendors.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-the-twelve-practices-mapped-to-the-rule\"><span id=\"the-twelve-practices-mapped-to-the-rule\"><strong>The Twelve Practices Mapped to the Rule<\/strong><\/span><\/h2>\n<p>If your firm is preparing for an insurance renewal, an FTC inquiry, or a client request for evidence, this is the table that consolidates the citation for each practice on this list.<\/p>\n<figure class=\"wp-block-table has-fixed-layout\">\n<table>\n<thead>\n<tr>\n<th><strong>Practice<\/strong><\/th>\n<th><strong>Primary Regulatory Citation<\/strong><\/th>\n<th><strong>Verito product or page<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1. Dedicated infrastructure<\/td>\n<td>16 CFR 314.4(f) (vendor oversight); SOC 2 Type II<\/td>\n<td><a class=\"wpil_keyword_link\" href=\"http:\/\/verito.com\/veritspace\" target=\"_blank\"  rel=\"dofollow noopener\" title=\"VeritSpace\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"1200\">VeritSpace<\/a><\/td>\n<\/tr>\n<tr>\n<td>2. MFA everywhere<\/td>\n<td>16 CFR 314.4(c)(5); IRS Pub 4557<\/td>\n<td>VeritGuard<\/td>\n<\/tr>\n<tr>\n<td>3. Encryption at rest and in transit<\/td>\n<td>16 CFR 314.4(c)(3)<\/td>\n<td>VeritSpace<\/td>\n<\/tr>\n<tr>\n<td>4. 3-2-1 backups, tested recovery<\/td>\n<td>16 CFR 314.4(c)(4); CISA SMB guidance<\/td>\n<td>Managed backup services<\/td>\n<\/tr>\n<tr>\n<td>5. Patch and vulnerability management<\/td>\n<td>16 CFR 314.4(d)(2); IRS Pub 4557<\/td>\n<td>VeritGuard<\/td>\n<\/tr>\n<tr>\n<td>6. Annual employee training<\/td>\n<td>16 CFR 314.4(e)<\/td>\n<td>VeritGuard<\/td>\n<\/tr>\n<tr>\n<td>7. Phishing prevention and email security<\/td>\n<td>16 CFR 314.4(d)<\/td>\n<td>VeritGuard<\/td>\n<\/tr>\n<tr>\n<td>8. Least-privilege access controls<\/td>\n<td>16 CFR 314.4(c)(1)<\/td>\n<td>VeritGuard<\/td>\n<\/tr>\n<tr>\n<td>9. Network segmentation, zero trust<\/td>\n<td>NIST SP 800-207; 16 CFR 314.4(c)<\/td>\n<td>VeritGuard<\/td>\n<\/tr>\n<tr>\n<td>10. Vendor and cloud provider vetting<\/td>\n<td>16 CFR 314.4(f); AICPA SOC 2<\/td>\n<td>SOC 2 reports on request<\/td>\n<\/tr>\n<tr>\n<td>11. Written incident response plan<\/td>\n<td>16 CFR 314.4(h)<\/td>\n<td>VeritGuard, VeritShield WISP<\/td>\n<\/tr>\n<tr>\n<td>12. WISP and risk assessments<\/td>\n<td>16 CFR 314.3, 314.4(b); IRS Pub 4557; PTIN W-12 Line 11<\/td>\n<td>VeritShield WISP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-where-most-cpa-firms-actually-stand\"><span id=\"where-most-cpa-firms-actually-stand\"><strong>Where Most CPA Firms Actually Stand<\/strong><\/span><\/h2>\n<p>Most small firms hit four or five of the twelve practices well, three or four partially, and the rest not at all. The pattern is familiar. MFA is on for email but not the tax software. Backups run nightly but nobody has tested a restore in eighteen months. The WISP is a 2019 PDF saved to a partner&#8217;s desktop.<\/p>\n<p>The gap between hitting six and hitting twelve is not budget. It is process. A 5-person CPA firm running on Verito&#8217;s stack covers most of the technical controls without needing in-house IT, and the WISP, training, and incident response plan close the rest with a few weekends of focused work.<\/p>\n<p>If you want a starting point that surfaces the gaps that matter most before they become incidents, <a href=\"https:\/\/verito.com\/security-assessment\" target=\"_blank\" rel=\"dofollow\" >a free security assessment<\/a> is a 30-minute scoping conversation. The output is a written summary of where your firm sits against the twelve practices, what to fix first, and what is fine to leave alone.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-frequently-asked-questions\"><span id=\"frequently-asked-questions\"><strong>Frequently Asked Questions<\/strong><\/span><\/h2>\n<h3 class=\"wp-block-heading\" id=\"h-faq-1-is-the-ftc-safeguards-rule-mandatory-for-solo-tax-preparers\"><span id=\"is-the-ftc-safeguards-rule-mandatory-for-solo-tax-preparers\"><span id=\"faq-1-is-the-ftc-safeguards-rule-mandatory-for-solo-tax-preparers\"><strong>Is the FTC Safeguards Rule mandatory for solo tax preparers?<\/strong><\/span><\/span><\/h3>\n<p>Yes. The FTC explicitly rejected size-based exemptions in the 2021 rulemaking. A solo preparer holding a PTIN is a financial institution under the rule and is required to maintain a written information security program, enforce MFA, encrypt customer data, and oversee any service providers handling client information. The plan can be scaled to firm size, but the obligation is universal.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-2-does-quickbooks-online-count-as-a-secure-cloud\"><span id=\"does-quickbooks-online-count-as-a-secure-cloud-for-client-data\"><span id=\"faq-2-does-quickbooks-online-count-as-a-secure-cloud\"><strong>Does QuickBooks Online count as a secure cloud for client data?<\/strong><\/span><\/span><\/h3>\n<p>QuickBooks Online is a SaaS application with its own infrastructure security, run by Intuit. It does not satisfy your obligation under the FTC Safeguards Rule. Your firm is still the financial institution under the rule. You still need a WISP, MFA, encryption on the devices that connect to QuickBooks Online, vendor oversight documentation, and an incident response plan. The platform handles its layer. Your firm handles yours.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-3-what-is-the-minimum-security-stack-for-a-5-person-cpa-firm\"><span id=\"what-is-the-minimum-security-stack-for-a-5-person-cpa-firm\"><span id=\"faq-3-what-is-the-minimum-security-stack-for-a-5-person-cpa-firm\"><strong>What is the minimum security stack for a 5-person CPA firm?<\/strong><\/span><\/span><\/h3>\n<p>MFA on every account that touches client data, full-disk encryption on every endpoint, a managed backup with quarterly restore testing, an email security gateway, endpoint detection and response on every workstation, a written WISP and risk assessment, an incident response plan with a named qualified individual, and annual training with quarterly phishing simulations. That is the floor. Everything else on the twelve-practice list refines those controls.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-4-do-cpa-firms-need-a-ciso-to-comply-with-ftc-safeguards\"><span id=\"do-cpa-firms-need-a-ciso-to-comply-with-ftc-safeguards\"><span id=\"faq-4-do-cpa-firms-need-a-ciso-to-comply-with-ftc-safeguards\"><strong>Do CPA firms need a CISO to comply with FTC Safeguards?<\/strong><\/span><\/span><\/h3>\n<p>No. The rule requires a designated qualified individual, not a CISO. The qualified individual can be an internal staff member, a partner, or an outsourced provider. For most small firms, the practical answer is a managed IT and compliance partner who serves as the qualified individual on paper and runs the program in practice.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-5-how-is-a-wisp-different-from-a-security-policy\"><span id=\"how-is-a-wisp-different-from-a-security-policy\"><span id=\"faq-5-how-is-a-wisp-different-from-a-security-policy\"><strong>How is a WISP different from a security policy?<\/strong><\/span><\/span><\/h3>\n<p>A WISP is the full written plan required by the FTC Safeguards Rule and IRS Publication 4557. It covers risk assessment, administrative and technical safeguards, employee training, vendor management, incident response, and annual review. A security policy is usually a single-topic document (acceptable use, password policy, BYOD). A WISP is the umbrella under which those policies sit. Tax preparers and bookkeepers need the WISP, not just a policy or two.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-6-what-happens-if-a-cpa-firm-is-breached-during-tax-season\"><span id=\"what-happens-if-a-cpa-firm-is-breached-during-tax-season\"><span id=\"faq-6-what-happens-if-a-cpa-firm-is-breached-during-tax-season\"><strong>What happens if a CPA firm is breached during tax season?<\/strong><\/span><\/span><\/h3>\n<p>The technical containment, breach counsel engagement, FTC notification window (30 days for unencrypted data of 500+ consumers), state breach notification laws, and client notifications all run on the same clock as your filing deadlines. Firms with a written incident response plan, a pre-positioned forensics retainer, and a backup that has been tested recover faster. Firms without those things lose the season as well as the data.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-7-is-mfa-enough-or-do-we-need-passkeys\"><span id=\"is-mfa-enough-or-do-we-need-passkeys\"><span id=\"faq-7-is-mfa-enough-or-do-we-need-passkeys\"><strong>Is MFA enough or do we need passkeys?<\/strong><\/span><\/span><\/h3>\n<p>MFA is the floor required by the rule. Passkeys are stronger because they are phishing-resistant by design, where a TOTP code or SMS code can still be relayed to an attacker. For high-privilege accounts (firm administrator, banking, the partner&#8217;s own email) move to hardware security keys or platform passkeys. For staff accounts, an authenticator app is acceptable. Avoid SMS for anything sensitive.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-8-should-cpa-firms-use-shared-cloud-hosting-or-dedicated\"><span id=\"should-cpa-firms-use-shared-cloud-hosting-or-dedicated\"><span id=\"faq-8-should-cpa-firms-use-shared-cloud-hosting-or-dedicated\"><strong>Should CPA firms use shared cloud hosting or dedicated?<\/strong><\/span><\/span><\/h3>\n<p>Dedicated. Shared hosting puts your firm&#8217;s tax suite on the same physical resources as other tenants. Tax-season performance, isolation during a security incident, and audit defensibility all favor a dedicated environment. The cost difference is small at firm scale and the operational difference shows up in March.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-9-how-often-should-we-test-our-backups\"><span id=\"how-often-should-we-test-our-backups\"><span id=\"faq-9-how-often-should-we-test-our-backups\"><strong>How often should we test our backups?<\/strong><\/span><\/span><\/h3>\n<p>Quarterly at minimum, with a documented restore time and a written record of what was restored. Annual testing is too little for a tax firm. Untested backups are not backups. Plenty of firms learn during a ransomware event that the nightly job has been failing for weeks, that the off-site copy is corrupt, or that restoration takes 72 hours when the firm has 8.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-faq-10-what-does-soc-2-type-ii-actually-prove\"><span id=\"what-does-soc-2-type-ii-actually-prove\"><span id=\"faq-10-what-does-soc-2-type-ii-actually-prove\"><strong>What does SOC 2 Type II actually prove?<\/strong><\/span><\/span><\/h3>\n<p>SOC 2 Type II is an attestation from an independent auditor that a service organization&#8217;s controls met the AICPA Trust Services Criteria over a defined period (typically six to twelve months). Type I checks the controls on a single date. Type II checks they operated effectively across the period. For a CPA firm, a vendor&#8217;s SOC 2 Type II report is the document you point to when an FTC investigator or insurance carrier asks how you vetted the provider.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<div style=\"height:20px\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-final-thoughts\"><span id=\"final-thoughts\"><strong>Final Thoughts<\/strong><\/span><\/h2>\n<p>Cloud security tips for CPA firms are not a generic SMB list with the word &#8220;accountant&#8221; pasted on top. The FTC Safeguards Rule, IRS Publication 4557, and the cyber insurance market have made the work specific. Twelve practices, each tied to a citation, each with a clear next step.<\/p>\n<p>The firms that recover from incidents do not have bigger security budgets. They have a written plan, tested controls, and a partner who runs the program with them. The firms that lose tax season to a breach almost always knew, on some level, that the plan they had was not the plan they needed.<\/p>\n<p>If your firm is somewhere in the middle, on six of twelve, partial on three more, and nothing on the rest, that is the typical starting point. Start with practices 2, 4, 11, and 12. MFA, tested backups, the incident response plan, and the WISP. Those four close 70% of the gap. The remaining eight refine the rest.<\/p>\n<p><em>This article is provided for educational purposes. It is not legal advice. For guidance specific to your practice, consult a qualified attorney familiar with the FTC Safeguards Rule.<\/em><\/p>\n<p><strong>Sources:<\/strong> 16 CFR Part 314 (FTC Safeguards Rule) \u00b7 IRS Publication 4557 \u00b7 NIST SP 800-207 \u00b7 CISA SMB backup guidance \u00b7 AICPA SOC 2 Trust Services Criteria \u00b7 Verizon 2025 Data Breach Investigations Report \u00b7 Microsoft Security at Your Organization \u00b7 FBI\/CISA BianLian advisory (November 2024) \u00b7 IBM 2025 Cost of a Data Breach Report<\/p>\n<p><script type=\"application\/ld+json\"><br \/>\n{<br \/>\n  \"@context\": \"https:\/\/schema.org\",<br \/>\n  \"@graph\": [<br \/>\n    {<br \/>\n      \"@type\": \"Article\",<br \/>\n      \"headline\": \"12 Cloud Security Tips for CPA Firms to Lock Down Client Data\",<br \/>\n      \"description\": \"Cloud security tips built for CPA firms. 12 practices mapped to FTC Safeguards, IRS Pub 4557, and tax-season uptime, with the regulatory citation on each.\",<br \/>\n      \"author\": {<br \/>\n        \"@type\": \"Person\",<br \/>\n        \"name\": \"Camren Majors\"<br \/>\n      },<br \/>\n      \"publisher\": {<br \/>\n        \"@type\": \"Organization\",<br \/>\n        \"name\": \"Verito Technologies\",<br \/>\n        \"logo\": {<br \/>\n          \"@type\": \"ImageObject\",<br \/>\n          \"url\": \"https:\/\/verito.com\/wp-content\/uploads\/2024\/05\/verito-logo.png\"<br \/>\n        }<br \/>\n      },<br \/>\n      \"mainEntityOfPage\": {<br \/>\n        \"@type\": \"WebPage\",<br \/>\n        \"@id\": \"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/\"<br \/>\n      },<br \/>\n      \"datePublished\": \"2026-05-04\",<br \/>\n      \"dateModified\": \"2026-05-04\",<br \/>\n      \"articleSection\": \"Cybersecurity\",<br \/>\n      \"keywords\": \"cloud security tips, cloud security tips for CPA firms, FTC Safeguards Rule, WISP, tax firm cybersecurity, accounting firm cloud security\"<br \/>\n    },<br \/>\n    {<br \/>\n      \"@type\": \"FAQPage\",<br \/>\n      \"mainEntity\": [<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"Is the FTC Safeguards Rule mandatory for solo tax preparers?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"Yes. The FTC explicitly rejected size-based exemptions in the 2021 rulemaking. A solo preparer holding a PTIN is a financial institution under the rule and is required to maintain a written information security program, enforce MFA, encrypt customer data, and oversee any service providers handling client information.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"Does QuickBooks Online count as a secure cloud for client data?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"QuickBooks Online is a SaaS application with its own infrastructure security run by Intuit. It does not satisfy your obligation under the FTC Safeguards Rule. Your firm is still the financial institution under the rule and still needs a WISP, MFA, encryption, vendor oversight documentation, and an incident response plan.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"What is the minimum security stack for a 5-person CPA firm?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"MFA on every account that touches client data, full-disk encryption on every endpoint, a managed backup with quarterly restore testing, an email security gateway, endpoint detection and response on every workstation, a written WISP and risk assessment, an incident response plan with a named qualified individual, and annual training with quarterly phishing simulations.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"Do CPA firms need a CISO to comply with FTC Safeguards?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"No. The rule requires a designated qualified individual, not a CISO. The qualified individual can be an internal staff member, a partner, or an outsourced provider. For most small firms, the practical answer is a managed IT and compliance partner who serves as the qualified individual on paper and runs the program in practice.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"How is a WISP different from a security policy?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"A WISP is the full written plan required by the FTC Safeguards Rule and IRS Publication 4557. It covers risk assessment, administrative and technical safeguards, employee training, vendor management, incident response, and annual review. A security policy is usually a single-topic document. A WISP is the umbrella under which those policies sit.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"What happens if a CPA firm is breached during tax season?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"Technical containment, breach counsel engagement, FTC notification (30 days for unencrypted data of 500+ consumers), state breach notification laws, and client notifications run on the same clock as your filing deadlines. Firms with a written incident response plan, a pre-positioned forensics retainer, and a tested backup recover faster.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"Is MFA enough or do we need passkeys?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"MFA is the floor required by the rule. Passkeys are stronger because they are phishing-resistant by design. For high-privilege accounts move to hardware security keys or platform passkeys. For staff accounts, an authenticator app is acceptable. Avoid SMS for anything sensitive.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"Should CPA firms use shared cloud hosting or dedicated?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"Dedicated. Shared hosting puts your firm's tax suite on the same physical resources as other tenants. Tax-season performance, isolation during a security incident, and audit defensibility all favor a dedicated environment.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"How often should we test our backups?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"Quarterly at minimum, with a documented restore time and a written record of what was restored. Annual testing is too little for a tax firm. Untested backups are not backups.\"<br \/>\n          }<br \/>\n        },<br \/>\n        {<br \/>\n          \"@type\": \"Question\",<br \/>\n          \"name\": \"What does SOC 2 Type II actually prove?\",<br \/>\n          \"acceptedAnswer\": {<br \/>\n            \"@type\": \"Answer\",<br \/>\n            \"text\": \"SOC 2 Type II is an attestation from an independent auditor that a service organization's controls met the AICPA Trust Services Criteria over a defined period. Type I checks controls on a single date. Type II checks they operated effectively across the period (typically six to twelve months).\"<br \/>\n          }<br \/>\n        }<br \/>\n      ]\n    }<br \/>\n  ]\n}<br \/>\n<\/script><\/p>","protected":false},"excerpt":{"rendered":"Cloud security tips built for CPA firms. 12 practices mapped to FTC Safeguards, IRS Pub 4557, and tax-season uptime, with the regulatory citation on each.\n","protected":false},"author":12,"featured_media":6562,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,104],"tags":[],"class_list":{"0":"post-6551","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud-hosting","8":"category-managed-it-services"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>12 Cloud Security Tips for CPA Firms to Lock Down Client Data - Verito Technologies | Blog<\/title>\n<meta name=\"description\" content=\"Twelve cloud security practices for CPA firms, each mapped to the relevant FTC or IRS rule. Plain-English compliance guidance from Verito.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Cloud Security Tips for CPA Firms to Lock Down Client Data\" \/>\n<meta property=\"og:description\" content=\"Cloud security tips built for CPA firms. 12 practices mapped to FTC Safeguards, IRS Pub 4557, and tax-season uptime, with the regulatory citation on each.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/\" \/>\n<meta property=\"og:site_name\" content=\"Verito Technologies | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-04T18:41:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-11T18:35:41+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1429\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Camren Majors\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camren Majors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"21 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"12 Cloud Security Tips for CPA Firms to Lock Down Client Data - Verito Technologies | Blog","description":"Twelve cloud security practices for CPA firms, each mapped to the relevant FTC or IRS rule. Plain-English compliance guidance from Verito.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/","og_locale":"en_US","og_type":"article","og_title":"12 Cloud Security Tips for CPA Firms to Lock Down Client Data","og_description":"Cloud security tips built for CPA firms. 12 practices mapped to FTC Safeguards, IRS Pub 4557, and tax-season uptime, with the regulatory citation on each.","og_url":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/","og_site_name":"Verito Technologies | Blog","article_published_time":"2026-05-04T18:41:52+00:00","article_modified_time":"2026-05-11T18:35:41+00:00","og_image":[{"width":2560,"height":1429,"url":"http:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled.jpg","type":"image\/jpeg"}],"author":"Camren Majors","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camren Majors","Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/#article","isPartOf":{"@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/"},"author":{"name":"Camren Majors","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/865ad0905f2ef35c7587605a88ab6c1e"},"headline":"12 Cloud Security Tips for CPA Firms to Lock Down Client Data","datePublished":"2026-05-04T18:41:52+00:00","dateModified":"2026-05-11T18:35:41+00:00","mainEntityOfPage":{"@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/"},"wordCount":4368,"publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"image":{"@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled.jpg","articleSection":["Cloud Hosting","Managed IT Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/","url":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/","name":"12 Cloud Security Tips for CPA Firms to Lock Down Client Data - Verito Technologies | Blog","isPartOf":{"@id":"https:\/\/verito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/#primaryimage"},"image":{"@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled.jpg","datePublished":"2026-05-04T18:41:52+00:00","dateModified":"2026-05-11T18:35:41+00:00","description":"Twelve cloud security practices for CPA firms, each mapped to the relevant FTC or IRS rule. Plain-English compliance guidance from Verito.","breadcrumb":{"@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/#primaryimage","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled.jpg","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2026\/05\/cloud-security-tips-cpa-firms-hero-scaled.jpg","width":2560,"height":1429,"caption":"Cinematic teal-green photograph of a small CPA firm office at dawn, server rack faintly visible through a glass partition, file folders and a closed laptop on a wooden desk in foreground, deep shallow depth of field, fine film grain, no text or logos"},{"@type":"BreadcrumbList","@id":"https:\/\/verito.com\/blog\/cloud-security-tips-cpa-firms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/verito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Hosting","item":"https:\/\/verito.com\/blog\/category\/cloud-hosting\/"},{"@type":"ListItem","position":3,"name":"12 Cloud Security Tips for CPA Firms to Lock Down Client Data"}]},{"@type":"WebSite","@id":"https:\/\/verito.com\/blog\/#website","url":"https:\/\/verito.com\/blog\/","name":"Verito Technologies | Blog","description":"Verito Technologies Blog","publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/verito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/verito.com\/blog\/#organization","name":"Verito Technologies","url":"https:\/\/verito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","width":625,"height":208,"caption":"Verito Technologies"},"image":{"@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/865ad0905f2ef35c7587605a88ab6c1e","name":"Camren Majors","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/77bfceda618286bd3464259eedc244dda94e71f2d7782a878cb75fd25c966426?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/77bfceda618286bd3464259eedc244dda94e71f2d7782a878cb75fd25c966426?s=96&d=mm&r=g","caption":"Camren Majors"},"description":"Camren Majors is co-founder and Chief Revenue Officer of Verito Technologies, a cloud hosting and managed IT company built exclusively for tax and accounting firms. He is the co-author of Beyond Best Practices: Modernizing the Successful Accounting Firm (2026). His work has been featured in NATP TAXPRO Magazine and he has presented for NATP, NAEA, and NSA."}]}},"_links":{"self":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/6551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/comments?post=6551"}],"version-history":[{"count":6,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/6551\/revisions"}],"predecessor-version":[{"id":6633,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/6551\/revisions\/6633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media\/6562"}],"wp:attachment":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media?parent=6551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/categories?post=6551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/tags?post=6551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}