
Best Antivirus for Tax Professionals: IRS Security Six Requirements (2026)
If you hold a Preparer Tax Identification Number (PTIN), federal law requires more than just having antivirus software installed — it requires that your endpoint protection actually works against the threats targeting tax firms right now. IRS Publication 4557 and the FTC Safeguards Rule (16 CFR § 314.4) together mandate that covered financial institutions, including tax preparation practices of every size, deploy continuously updated malware protection across every device accessing, storing, or transmitting Federal Tax Information (FTI) and personally identifiable information (PII).
What most practitioners don't realize is that the antivirus software they installed years ago — or the free tool bundled with Windows — may satisfy the letter of the regulation while leaving their practice dangerously exposed. The surge in cyberattacks targeting tax firms has outpaced the detection capabilities of traditional, signature-based antivirus tools. Understanding the difference between what the IRS requires and what actually protects your clients is the first step toward real compliance.
This guide walks through the IRS Security Six antivirus requirements, explains why legacy tools fail against current threats, and gives you a practical framework for selecting antivirus for tax professionals that satisfies both the regulatory standard and your actual security needs.
Tax Firm Cybersecurity: The Numbers
IBM Cost of a Data Breach Report 2024
WatchGuard Threat Lab Research
NIST National Vulnerability Database
What the IRS Security Six Actually Requires
The IRS Security Six is a baseline cybersecurity framework embedded in IRS Publication 4557 that all tax professionals must implement to satisfy federal data protection obligations. Antivirus protection is the first and most foundational element within this six-component architecture — the others being firewalls, data encryption, access controls, security planning, and employee training.
Publication 4557 (Rev. 10-2024) specifies that Security Six antivirus must be "installed, active, and regularly updated on all devices that access, store, or transmit taxpayer information." This scope covers desktop computers, laptops, mobile devices, servers, and any network-connected endpoint touching FTI or PII. The IRS does not mandate specific vendors, but it does establish functional requirements that compliant solutions must satisfy.
Minimum Technical Requirements for IRS-Compliant Antivirus
- Real-time scanning of file operations, downloads, email attachments, and removable media with immediate threat quarantine
- Automatic signature updates daily — without manual intervention by practice staff
- Scheduled full system scans weekly, covering all hard drives, mapped network shares, and cloud-synchronized folders
- Centralized management console providing visibility into protection status and detections across all endpoints
- Quarantine and remediation with automatic threat isolation and documented removal procedures
- Audit-ready logging with documented scan results, threat detections, and update timestamps for compliance verification
Failure to meet these requirements isn't just a technical shortcoming. Under the Gramm-Leach-Bliley Act (GLBA) and the FTC Safeguards Rule, inadequate antivirus protection constitutes a federal compliance violation. Penalties can reach $100,000 per infraction, with additional civil liability for compromised client data. The FTC updated its enforcement guidance in June 2023 to explicitly require "continuous monitoring and response capabilities" that extend well beyond signature-based detection.
The Written Information Security Plan (WISP) requirement that accompanies these controls is equally binding. Your WISP must document your antivirus deployment specifically enough that an IRS examiner can verify it matches what's actually running in your environment — a detail that generic downloaded templates consistently fail to address. More on WISP documentation requirements for antivirus compliance appears later in this guide.
2026 IRS Compliance Requirement
All tax preparers holding a PTIN must maintain a compliant Written Information Security Plan that specifically documents their antivirus deployment, update procedures, and incident response protocols. Practices without a current, practice-specific WISP — or those relying on outdated antivirus that cannot satisfy the FTC's "continuous monitoring" standard — face potential penalties up to $100,000 per violation under GLBA enforcement. Review your PTIN compliance requirements before the 2026 filing season begins.
Why Traditional Antivirus Fails Modern Tax Practice Threats
Signature-based antivirus software works by comparing files against a database of known malware patterns. When a match occurs, the software quarantines or removes the threat. This approach proved effective through the early 2010s, when threat actors reused code and malware distribution followed predictable patterns. That era is over.
The attack methodologies now targeting tax professionals are specifically engineered to evade signature-based detection. Ransomware operators know exactly how traditional antivirus works — and they build around it. Tax practices running legacy antivirus are not protected; they are simply unaware of the intrusions already present in their environments.
Four Attack Vectors Traditional Antivirus Cannot Stop
Polymorphic malware automatically rewrites its own code with each infection, generating unique signatures that no existing antivirus database can match. The LockBit 3.0 variant documented in CISA Alert AA23-075A employs 47 different encryption routines that rotate hourly, rendering signature-based detection useless against it.
Encrypted payloads deliver malicious code inside password-protected archives or encrypted network connections that antivirus cannot inspect without breaking encryption — which would conflict with taxpayer privilege protections. Attackers exploit this gap to deliver malware through seemingly legitimate channels.
Time-delayed execution keeps malware dormant for weeks or months after initial infection, activating precisely during tax season when discovery causes maximum disruption. The Emotet banking trojan used 30–90 day activation delays to establish persistent access long before revealing its presence — by which point data exfiltration was already complete.
Supply chain compromises weaponize legitimate software update mechanisms. The CCleaner supply chain attack delivered ransomware through digitally-signed software updates that traditional antivirus explicitly trusted, bypassing all signature-based protections entirely.
Zero-Day Vulnerabilities: The Signature-Based Blind Spot
Zero-day vulnerabilities — security flaws exploited before vendors develop patches or detection signatures — represent the most dangerous gap in traditional antivirus protection. The NIST National Vulnerability Database documented a 67% increase in zero-day exploits during 2024, with financial services applications disproportionately targeted.
When attackers exploit zero-day vulnerabilities in tax software or document management systems, the malicious code has no existing signature. Traditional antivirus cannot detect what it has never seen. By the time security vendors analyze the threat, develop signatures, and distribute updates — a process requiring 3 to 72 hours minimum — thousands of organizations may already be compromised. The 2024 MOVEit Transfer zero-day (CVE-2024-5806) demonstrated this exactly: an SQL injection flaw in file transfer software used by thousands of accounting firms provided zero protection from traditional antivirus because the attack used legitimate software functions in unintended ways, with no malicious files to scan.
Fileless Malware: Operating Below Antivirus Radar
Fileless attack techniques represent perhaps the most significant evolution in malware methodology. Rather than dropping executable files onto hard drives where antivirus can scan them, fileless malware operates entirely in system memory — using legitimate Windows tools like PowerShell, Windows Management Instrumentation (WMI), and .NET Framework components. According to WatchGuard Threat Lab research, fileless attacks increased 892% between 2020 and 2024.
These attacks use "living off the land" techniques, abusing trusted system processes that antivirus software explicitly whitelists to avoid false positives. The APT29 (Cozy Bear) threat group deployed fileless malware against U.S. accounting firms throughout 2023–2024 using PowerShell Empire frameworks that never touched disk storage. Traditional antivirus detected zero intrusions. Only behavioral monitoring platforms identified the compromises — typically 47 to 93 days after initial penetration. Understanding how attackers evade even advanced tools is covered in our analysis of EDR evasion techniques.
Bottom Line
Traditional signature-based antivirus cannot detect polymorphic malware, fileless attacks, or zero-day exploits — the three primary threat vectors currently targeting tax professionals. Meeting the IRS Security Six minimum technically doesn't mean your practice is actually protected. The antivirus for tax professionals that satisfies compliance and provides real security is behavioral, not signature-based.
The Three Generations of Endpoint Protection: NGAV, EDR, and MDR
Understanding the evolution from traditional antivirus to modern endpoint protection is essential for selecting antivirus for tax professionals that satisfies both IRS compliance obligations and actual security needs. Each generation addresses specific limitations of its predecessor.
Next-Generation Antivirus (NGAV): Machine Learning Detection
Next-Generation Antivirus (NGAV) is the first step beyond signature-based protection. NGAV solutions use machine learning algorithms trained on millions of malware samples to identify suspicious characteristics even in previously unknown files. Rather than matching exact signatures, NGAV analyzes static file properties — entropy, packer signatures, code obfuscation — alongside behavioral indicators like registry modifications, network connection patterns, and process injection attempts. It also evaluates contextual factors such as file origin, download source reputation, execution timing, and relationship mapping between parent and child processes.
According to independent testing by AV-Comparatives, NGAV achieves approximately 60–70% detection rates for zero-day threats, compared to 15–25% for signature-based systems. That's a meaningful improvement, but NGAV still operates primarily as a prevention tool — blocking threats at the perimeter rather than detecting compromises already present within the environment.
Endpoint Detection and Response (EDR): Visibility Over Prevention
Endpoint Detection and Response (EDR) platforms represent a shift from prevention-focused antivirus to visibility and response capabilities. EDR assumes that some threats will bypass prevention controls, focusing instead on rapid detection, investigation, and remediation.
EDR solutions continuously collect telemetry from every endpoint: process execution, network connections, file modifications, registry changes, authentication events, driver loads, and PowerShell command execution. This telemetry enables detection of attack patterns that traditional antivirus misses entirely. When tax software suddenly begins encrypting thousands of files at unusual hours, EDR recognizes the anomalous behavior even if the ransomware uses zero-day exploits with no existing signatures. When PowerShell executes base64-encoded commands attempting to disable security tools, EDR flags the behavior even though no malicious file exists to scan.
Leading EDR platforms include CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne Singularity, and VMware Carbon Black. These solutions provide investigation tools allowing security teams to reconstruct complete attack timelines, identify initial compromise vectors, trace lateral movement across networks, and determine data exfiltration scope. For tax practices evaluating these options, our ransomware protection guide provides additional context on how EDR fits into a layered defense strategy.
Managed Detection and Response (MDR): Expert-Augmented Protection
Managed Detection and Response (MDR) services combine EDR technology with 24/7 monitoring by cybersecurity analysts who investigate alerts, hunt for hidden threats, and coordinate incident response. For tax practices lacking dedicated IT security staff, MDR delivers enterprise-grade protection without requiring internal expertise.
This human layer addresses EDR's primary operational limitation: security tools generate enormous volumes of alerts that require specialized knowledge to interpret. A typical 15-person tax practice deploying EDR without expert support receives 300–800 security alerts monthly. Determining which represent genuine threats versus false positives requires cybersecurity expertise most practices don't maintain in-house. MDR services achieve 95%+ detection rates for advanced threats while keeping false positive rates low enough that small practice staff can meaningfully act on them.
Security Operations Center (SOC) analysts also perform proactive threat hunting using the MITRE ATT&CK framework, searching for indicators of compromise associated with ransomware campaigns actively targeting tax professionals. When incidents occur, MDR teams coordinate containment, forensic investigation, malware removal, and recovery verification — reducing mean time to containment from days or weeks to hours.
Selecting the Right Solution for Your Practice Size and Risk Profile
Tax practices vary enormously in size, risk exposure, and technical sophistication. A solo practitioner's security requirements differ substantially from a 50-person CPA firm's needs. The right antivirus for tax professionals depends on an honest assessment of four factors: how much FTI and PII your practice handles, whether you have in-house IT resources, your existing technology stack, and your regulatory obligations beyond IRS Publication 4557.
Practices serving business clients with payroll and entity tax work carry higher risk profiles than those handling only individual returns — not because the data is more sensitive, but because the volume and variety of system access points is greater. Similarly, firms using cloud-based tax software accessed by remote employees face different threat vectors than those operating entirely on-premises.
Solo and Small Practices (1–5 Preparers)
For solo practitioners and very small practices, a well-configured NGAV solution can satisfy IRS Publication 4557 requirements at reasonable cost. The key requirements are daily automatic signature updates, real-time scanning, and centralized logging you can export for compliance documentation. Windows Defender, properly configured and centrally managed through Microsoft Intune or a similar tool, meets the minimum technical bar — but its detection rates against advanced threats are materially lower than commercial NGAV solutions.
The more relevant question for small practices is whether you have the time and expertise to monitor alerts, investigate detections, and respond to incidents. If the answer is no — which it is for most solo practitioners — an MDR service that handles monitoring and response on your behalf provides far more actual protection than a DIY EDR deployment that generates unreviewed alerts. Review the cybersecurity requirements for CPAs and accounting firms to understand how these obligations scale with practice size.
Mid-Size and Regional Firms (6–50 Staff)
Firms in this range typically have enough complexity to justify EDR or MDR but not enough internal security staff to manage it without support. The cost-benefit calculation strongly favors MDR: the average ransomware recovery cost for a small accounting firm exceeds $250,000 when you factor in forensic investigation, system restoration, client notification, regulatory response, and reputational damage. MDR services for a 20-person practice typically run $2,000–$4,000 per month — a fraction of one incident's recovery cost.
This size range also needs to consider employee security awareness training as a complement to technical controls. EDR and MDR detect and contain threats, but phishing attacks that trick employees into entering credentials bypass endpoint protection entirely. Technical and human controls work together — not as substitutes for each other. Firms in this tier should also reference the WISP checklist for CPA firms to ensure their security plan documentation keeps pace with their technical controls.
How to Deploy Antivirus for Tax Professionals: Implementation Steps
Conduct an Endpoint Inventory
Document every device accessing taxpayer data: workstations, laptops, servers, mobile devices, and remote access systems. Many practices discover unprotected endpoints here — personal laptops used to access cloud portals, shared servers with expired licenses, or tablets used for client meetings.
Evaluate Compatibility with Existing Tools
Many EDR solutions require uninstalling legacy antivirus to prevent conflicts. Schedule uninstall-and-replace during low-activity periods — between filing seasons or over a weekend — to avoid temporary vulnerability windows during tax season.
Select and Deploy Your Solution
Match the solution tier (NGAV, EDR, or MDR) to your practice size and in-house IT capabilities. Solo and small practices often benefit most from MDR's managed monitoring. Mid-size firms gain significant value from EDR with SOC support.
Configure Policies to Fit Tax Software
Overly aggressive default settings generate false positives against legitimate tax software operations. Work with your security vendor to establish baseline policies tailored to the specific applications your practice uses — Drake, Lacerte, ProSeries, UltraTax, etc.
Document Everything in Your WISP
Your Written Information Security Plan must name the specific vendor, product version, deployment scope, and responsible individuals. Generic templates fail regulatory examination. Update your WISP documentation to reflect the deployed technology and procedures.
Train Staff on Incident Reporting
Technical controls work only when staff recognize and report anomalies. At minimum, train all employees to report unusual system behavior, unexpected login prompts, or ransomware-style file renaming immediately — before attempting to "fix" the problem themselves.
Schedule Quarterly Reviews
Verify that all endpoints are receiving updates, review detection logs for patterns, and test backup restoration procedures. IRS Publication 4557 requires antivirus be 'active and regularly updated' — quarterly verification provides audit documentation.
Does Windows Defender Satisfy IRS Requirements?
Microsoft Defender Antivirus, when properly configured and centrally managed, technically meets the minimum functional requirements of IRS Publication 4557: real-time scanning, automatic updates, scheduled scans, and logging. However, "meets minimum requirements" is not the same as "provides adequate protection."
Defender's detection rates against advanced threats, fileless malware, and zero-day exploits are materially lower than commercial EDR platforms — particularly when not actively managed by security professionals. For practices that process hundreds of returns annually, the risk exposure from relying solely on Defender warrants serious consideration. The IRS's own cybersecurity guidance, and the FTC Safeguards Rule's language around "continuous monitoring," implicitly pushes toward more capable solutions even if Defender technically clears the compliance threshold.
The question to ask is not "does this satisfy the regulation?" but rather "does this actually protect my clients' data?" For tax professionals handling sensitive FTI and PII at scale, those two questions have different answers when applied to basic, unmanaged Defender deployments.
WISP Documentation Requirements for Antivirus Compliance
Your Written Information Security Plan must document your antivirus deployment in enough detail to survive an IRS audit or regulatory examination following a breach. Generic WISP templates downloaded from the internet fail this scrutiny — examiners look for practice-specific details about actual deployed technologies and named responsible individuals, not boilerplate language.
At minimum, your WISP must document the specific endpoint protection vendor, product version, and deployment scope: which devices, which users, which locations. For practices using EDR or MDR, the WISP should document technical capabilities including behavioral analysis, threat hunting, and incident response services.
Update procedures must define signature update frequency (daily minimum per IRS requirements), verification methods for confirming endpoints receive updates, and remediation procedures for endpoints that fail to receive updates. Gaps in update coverage are a common finding in post-breach investigations and a straightforward compliance failure to document proactively.
Monitoring responsibilities should designate specific individuals by name and role — responsible for reviewing security alerts, investigating detections, and coordinating incident response. For MDR deployments, this section documents the division of responsibilities between internal staff and the external SOC. Incident response procedures must include isolation, eradication, recovery, and post-incident review as distinct phases.
Practices using the WISP template for tax preparers receive pre-populated antivirus documentation requirements customizable for their specific deployed technologies — including sections designed for EDR and MDR deployments that go beyond what generic templates cover. The IRS Publication 5708 sample WISP provides additional context on what federal examiners expect to see.
Antivirus Compliance Checklist for Tax Professionals
- Inventory all devices that access, store, or transmit Federal Tax Information (FTI) or PII
- Confirm antivirus is installed, active, and auto-updating daily on every device in scope
- Verify centralized management console shows protection status across all endpoints
- Schedule weekly full system scans including mapped network shares and cloud-synced folders
- Confirm quarantine procedures are documented and tested — not just configured
- Export and retain scan logs and detection records for compliance audit documentation
- Document the specific vendor, product version, and deployment scope in your WISP
- Designate a named individual responsible for monitoring alerts and coordinating response
- Ensure remote employees' devices are enrolled in the firm's endpoint protection system
- Review and update your WISP antivirus documentation at least annually or after any change
Remote Employees and Cloud-Based Tax Software: Extended Security Considerations
The shift to remote and hybrid work models has expanded the endpoint perimeter for most tax practices. A remote employee accessing Drake Tax or Lacerte from a home workstation over a personal internet connection represents an endpoint that must be protected under IRS Publication 4557 — regardless of whether the firm owns that device.
Bring-your-own-device (BYOD) arrangements create particular compliance challenges. The IRS requirement covers "all devices that access, store, or transmit taxpayer information" — which includes personal devices used for work. Practices must either mandate enrollment of personal devices in the firm's endpoint protection management system or prohibit personal devices from accessing client data entirely. Neither approach is costless, but the compliance obligation is clear.
For remote employees, a properly configured firewall and VPN with split-tunneling disabled provide network-layer controls that complement endpoint protection. These controls ensure that traffic from remote endpoints passes through centrally managed security infrastructure rather than connecting directly to tax software over unmonitored internet connections.
Cloud-based tax software accessed through a browser does not eliminate the need for endpoint protection on the accessing device. Keyloggers, credential-stealing malware, and session hijacking tools operate on the endpoint — not the server — and intercept credentials before they ever reach the cloud application's authentication layer. The question of whether your tax preparation software is secure for client data is inseparable from whether the devices accessing it are protected. Endpoint protection remains essential regardless of where the tax software itself runs.
Multi-factor authentication (MFA) on all tax software access points is another layer that works alongside antivirus for tax professionals, not instead of it. MFA limits the damage from stolen credentials, but it doesn't stop malware already resident on an endpoint from capturing session tokens or intercepting data after authentication. Both controls are necessary.
Need Help Choosing the Right Endpoint Protection?
Our security team helps tax professionals select and implement IRS-compliant antivirus and EDR solutions — and documents everything in a WISP that survives regulatory examination.
Understanding the Total Cost of Inadequate Protection
Tax practices often evaluate antivirus for tax professionals primarily on licensing cost per endpoint. That framing misses the actual financial exposure. A single ransomware incident at a 10-person accounting firm — not an unusual target given the value of FTI and PII on their systems — typically costs $150,000 to $350,000 in recovery expenses before factoring in regulatory penalties, client notification obligations, and reputational damage.
The FTC Safeguards Rule's penalty structure makes the math even clearer. Under GLBA, the FTC can impose civil penalties of up to $100,000 per violation — and each client record compromised through inadequate endpoint protection can constitute a separate violation. A breach exposing 500 client records isn't one $100,000 penalty; it's a potential exposure that regulators have used to impose seven-figure settlements against firms that demonstrably failed to meet the "continuous monitoring" standard.
That standard matters specifically for antivirus selection. The FTC has explicitly stated in enforcement guidance that point-in-time scanning without continuous behavioral monitoring does not satisfy the Safeguards Rule for financial institutions handling consumer data. Traditional antivirus, by design, is a point-in-time tool — it scans what it can see, when it runs. Continuous behavioral monitoring is an EDR and MDR capability, not an antivirus one.
For a full picture of how these requirements intersect with your practice obligations, the FTC Safeguards Rule guide for tax preparers and the PTIN WISP requirements cover the regulatory framework in detail. The all-in-one compliance package combines endpoint protection, WISP documentation, and security awareness training for practices that need to address all three obligations at once.
Book a Free Tax Cybersecurity Assessment
Our experts evaluate your current endpoint protection, identify compliance gaps against IRS Publication 4557 and the FTC Safeguards Rule, and provide actionable recommendations — including WISP documentation for any solution you deploy.
Frequently Asked Questions
The IRS does not mandate a specific antivirus vendor. IRS Publication 4557 requires that antivirus for tax professionals be "installed, active, and regularly updated" on all devices that access, store, or transmit Federal Tax Information (FTI) or PII. The solution must provide real-time scanning, daily automatic signature updates, scheduled full system scans, centralized management, and audit-ready logging. Any solution — commercial or built-in like Windows Defender — that meets these functional requirements satisfies the minimum standard, though advanced solutions like EDR and MDR provide substantially better actual protection.
Windows Defender Antivirus, when properly configured and centrally managed through Microsoft Intune, technically meets the minimum requirements of IRS Publication 4557. However, its detection rates against zero-day exploits, fileless malware, and polymorphic ransomware are materially lower than commercial EDR platforms. The FTC Safeguards Rule also requires "continuous monitoring" capabilities that Defender alone does not provide without additional tooling. For practices processing significant volumes of returns, Defender as a standalone solution represents a compliance minimum, not a security best practice.
Next-Generation Antivirus (NGAV) uses machine learning to detect threats beyond known signatures, achieving 60–70% detection rates on zero-day threats versus 15–25% for traditional antivirus. Endpoint Detection and Response (EDR) adds continuous behavioral monitoring and investigation tools, detecting attacks that bypass prevention entirely. Managed Detection and Response (MDR) combines EDR technology with 24/7 expert monitoring by a Security Operations Center (SOC), providing 95%+ detection rates and active incident response without requiring internal cybersecurity staff. For most tax practices without dedicated IT security personnel, MDR delivers the strongest protection-to-cost ratio.
Yes. IRS Publication 4557 covers "all devices that access, store, or transmit taxpayer information" — which includes personal devices used by remote employees to access firm systems, cloud-based tax software, or client data. Bring-your-own-device arrangements require that personal devices either be enrolled in the firm's endpoint protection management system or be prohibited from accessing taxpayer data entirely. The compliance obligation applies regardless of device ownership.
Your Written Information Security Plan (WISP) must document your antivirus deployment specifically: the vendor, product version, covered devices, update frequency, monitoring responsibilities (named individuals), and incident response procedures. Generic WISP templates rarely include the level of detail that IRS examiners and FTC investigators look for following a breach. Your WISP documentation should be specific enough that an examiner can verify it matches the technology actually running in your environment. For EDR and MDR deployments, the WISP should document the division of responsibilities between internal staff and any external SOC provider.
No. Cloud-based tax software shifts data storage and processing to the vendor's servers, but it does not eliminate the need for endpoint protection on the devices accessing that software. Keyloggers, credential-stealing malware, and session hijacking tools operate on the endpoint — intercepting credentials and session tokens before or after authentication, regardless of where the software runs. Antivirus for tax professionals is required on every device accessing taxpayer data, including those using browser-based cloud applications.
Inadequate antivirus protection for tax professionals creates both regulatory and financial exposure. Under GLBA and the FTC Safeguards Rule, failing to maintain continuous monitoring capabilities can result in civil penalties up to $100,000 per violation, with each compromised client record potentially constituting a separate violation. IRS Publication 4557 non-compliance can affect PTIN status. Beyond regulatory penalties, the average ransomware recovery cost for a small accounting firm exceeds $250,000 when factoring in forensic investigation, system restoration, client notification, and regulatory response.
IRS Publication 4557 requires daily automatic signature updates as a minimum. Updates should occur without requiring manual intervention by practice staff. Your WISP must document the update frequency, the method for verifying that endpoints receive updates, and the remediation procedure for endpoints that miss updates — for example, devices that were powered off or offline during the scheduled update window. Quarterly verification of update logs provides audit documentation that satisfies both IRS and FTC examination standards.
The IRS Security Six is a baseline cybersecurity framework within IRS Publication 4557 that all tax professionals must implement. The six components are: (1) antivirus protection, (2) firewall deployment, (3) data encryption, (4) access controls including multi-factor authentication, (5) a Written Information Security Plan (WISP), and (6) employee security awareness training. Antivirus is the first and most foundational component — but it operates as part of a layered security architecture, not as a standalone solution. All six components are required; none substitute for the others.
Schedule
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.


