
Best Cloud Services for Tax Professionals: IRS-Compliant Platforms for 2026
The best cloud services for tax professionals are secure, IRS-compliant platforms that enable tax practitioners to prepare returns, manage client data, and execute workflows through remote servers while meeting federal regulations — including IRS Publication 4557, IRS Publication 5293, the FTC Safeguards Rule, and IRS Publication 1075 security standards governing Federal Tax Information (FTI).
Selecting the right cloud service requires evaluating security architecture, compliance certifications, data residency guarantees, and vendor stability. Non-compliance exposes firms to IRS sanctions including Electronic Filing Identification Number (EFIN) suspension, FTC penalties up to $46,517 per violation, and data breach costs averaging $4.88 million per incident according to IBM Security's 2024 Cost of a Data Breach Report.
As of the 2026 tax season, the IRS has intensified scrutiny of cloud-based tax systems following a series of credential compromise incidents that resulted in fraudulent return filings. Tax professionals must verify that their cloud providers maintain SOC 2 Type II attestations, implement multi-factor authentication (MFA) across all access points, and provide audit logs sufficient to demonstrate compliance during IRS examinations. The shift from optional best practice to mandatory compliance requirement makes choosing the best cloud services for tax professionals a business-essential decision that directly impacts your ability to maintain your EFIN and serve clients.
For guidance on protecting your e-filing privileges, review our EFIN protection guide.
Cloud Security for Tax Professionals: By the Numbers
IBM Cost of Data Breach Report 2024
FTC Safeguards Rule enforcement
AICPA Technology Survey, firms with 10+ staff
Understanding Cloud Services for Tax Professionals
The best cloud services for tax professionals encompass three primary deployment models, each with distinct operational characteristics and security implications. Understanding these models enables tax practitioners to select solutions that balance accessibility, control, and compliance requirements specific to handling Federal Tax Information.
Software as a Service (SaaS) Solutions
Software as a Service (SaaS) solutions provide complete tax preparation applications accessed through web browsers without requiring local software installation. Leading platforms include cloud-native applications designed specifically for tax preparation, practice management, and client collaboration. SaaS offerings eliminate server maintenance burdens and provide automatic updates, but require careful vendor evaluation to ensure IRS Publication 1075 compliance and data sovereignty guarantees.
Infrastructure as a Service (IaaS) for Desktop Software
Infrastructure as a Service (IaaS) enables firms to host traditional desktop software — such as Intuit ProSeries, CCH ProSystem fx, and Thomson Reuters UltraTax — on virtual servers managed by specialized hosting providers. This model preserves familiar desktop workflows while delivering cloud accessibility through Virtual Desktop Infrastructure (VDI) or Remote Desktop Services (RDS). IaaS solutions appeal to firms with significant investments in desktop software licensing and staff training.
Platform as a Service (PaaS) for Custom Solutions
Platform as a Service (PaaS) environments offer customizable development platforms for firms building proprietary tax solutions or integrating multiple applications into unified workflows. While less common for small and mid-sized practices, PaaS models support enterprise firms requiring custom integrations between tax, accounting, audit, and practice management systems.
The IRS has established specific guidelines for cloud computing environments handling Federal Tax Information under IRS Publication 1075. These standards mandate physical and logical security controls equivalent to those required for on-premises systems. Regardless of deployment model, the best cloud services for tax professionals must include data residency guarantees ensuring information remains within United States boundaries — offshore storage of FTI violates federal regulations and can trigger immediate suspension of e-filing privileges.
Bottom Line
All three cloud deployment models — SaaS, IaaS, and PaaS — can be used compliantly by tax professionals, provided the selected platform meets IRS Publication 1075 physical and logical security controls, stores data within the United States, and maintains a current SOC 2 Type II attestation. The deployment model matters less than the security architecture underneath it.
Public, Private, and Hybrid Cloud Architectures
Public cloud services offer cost efficiency and scalability but require rigorous vendor selection to ensure regulatory compliance. Major public cloud infrastructure providers — including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform — offer FedRAMP-certified environments suitable for tax data, though tax-specific applications built on these platforms must independently verify IRS Publication 1075 compliance. FedRAMP authorization alone does not guarantee that a specific application meets all IRS requirements for FTI handling.
Private cloud deployments provide enhanced control and customization but demand greater technical resources and higher costs. Firms choosing private cloud architectures typically maintain dedicated infrastructure either on-premises or through hosting providers offering single-tenant environments. This approach appeals to practices with specialized security requirements, legacy system dependencies, or client mandates prohibiting multi-tenant cloud services.
Hybrid approaches combine on-premises systems for highly sensitive operations with cloud services for collaboration and remote access. According to the 2025 AICPA Technology Survey, 71% of firms with 10 or more staff use hybrid cloud architectures, maintaining tax data on private servers while using public cloud platforms for client portals, document exchange, and collaboration tools. This approach balances security requirements with operational flexibility, though it introduces complexity in managing multiple environments and enforcing consistent security policies across all platforms.
Selecting among these deployment models requires assessing your firm's technical capabilities, budget constraints, regulatory obligations, and workflow requirements. Additional guidance on cloud security frameworks is available from NIST's Cloud Computing Program. For a deeper dive into your firm's overall security obligations, see our guide on FTC Safeguards Rule requirements for tax preparers.
Cloud Provider Evaluation Checklist
- Verify SOC 2 Type II attestation report covering security, availability, and confidentiality
- Confirm U.S.-based data residency with contractual guarantees prohibiting offshore storage
- Validate IRS Publication 1075 compliance through security questionnaire or third-party assessment
- Ensure AES-256 encryption for data at rest and TLS 1.2+ for data in transit
- Require multi-factor authentication enforcement for all user accounts without exception
- Review incident response procedures and breach notification timelines
- Confirm 99.9%+ uptime SLA with financial remedies for service failures
- Verify automated backup retention of at least 30 days with point-in-time recovery
- Obtain evidence of annual penetration testing and vulnerability assessments
- Review vendor financial stability and business continuity planning
IRS Compliance Requirements for Cloud Services
The IRS imposes stringent requirements on cloud services handling Federal Tax Information under IRS Publication 1075, "Tax Information Security Guidelines for Federal, State and Local Agencies." While primarily directed at government agencies, these standards establish baseline security expectations for all systems processing FTI, including commercial cloud platforms used by tax practitioners.
Cloud providers must implement physical security controls including restricted access to data centers with biometric authentication, 24/7 video surveillance with 90-day retention, visitor escort policies, and environmental controls protecting against fire, flood, and power disruptions. Logical access controls require unique user identification, role-based access restrictions, session timeouts after 30 minutes of inactivity, and thorough audit logging of all access to Federal Tax Information.
Encryption and Network Security Standards
The IRS mandates encryption for FTI both at rest and in transit using FIPS 140-2 validated cryptographic modules. Cloud services must employ AES-256 encryption for stored data and TLS 1.2 or higher for network transmissions. Encryption key management must include documented procedures for key generation, distribution, storage, rotation, and destruction, with cryptographic keys maintained separately from encrypted data.
Network security requirements include boundary protection through firewalls and intrusion detection systems, network segmentation isolating FTI from other data, and monitoring of all network traffic accessing tax information. The best cloud services for tax professionals implement defense-in-depth architectures where multiple security layers provide redundant protection. The NIST SP 800-57 guidance on key management provides the technical foundation for these requirements.
The IRS requires that any changes to cloud infrastructure supporting tax operations be reported within 45 days. This includes modifications to data center locations, security architectures, or service provider ownership. Failure to maintain continuous compliance can result in suspension of e-filing privileges. For thorough implementation guidance, review our IRS cybersecurity requirements guide.
2026 Compliance Requirement
The IRS requires all tax professionals to have an updated Written Information Security Plan (WISP) that specifically addresses cloud services used in their practice. Cloud infrastructure changes must be reported within 45 days. Firms operating cloud-based tax systems without documented security controls face potential EFIN suspension and FTC penalties up to $46,517 per violation.
Essential Security Features in the Best Cloud Services for Tax Professionals
Beyond baseline compliance requirements, the best cloud services for tax professionals incorporate multiple layers of defense-in-depth security controls. The Cybersecurity and Infrastructure Security Agency (CISA) recommends security architectures that address threats at the application, data, network, and identity layers simultaneously.
Encryption Implementation Standards
Encryption forms the foundation of secure cloud services for tax professionals. Both the IRS and FTC require encryption of sensitive data, with specific implementation standards determining actual protection levels. Industry best practices include AES-256 encryption for data at rest — ideally using hardware security modules (HSMs) or cloud provider key management services with customer-managed encryption keys. All connections should use TLS 1.3 where supported, with TLS 1.2 as the minimum acceptable standard; legacy SSL protocols must be disabled entirely.
Application-layer encryption should protect particularly sensitive data elements such as Social Security numbers, bank account numbers, and authentication credentials. Encryption keys must be rotated on defined schedules — typically every 90 to 365 days depending on data sensitivity — and stored and managed independently from the encrypted data they protect. For a primer on how encryption works at the technical level, see our guide on hashing vs. encryption.
Multi-Factor Authentication Requirements
Multi-factor authentication has moved from optional best practice to mandatory control. Both IRS Publication 5293 and the FTC Safeguards Rule explicitly require MFA for accessing systems containing taxpayer or customer financial information. Effective MFA combines something you know (password or PIN), something you have (hardware token, mobile authenticator app, or smart card), and optionally something you are (biometric verification such as fingerprint or facial recognition).
The best cloud services for tax professionals support phishing-resistant authentication methods such as FIDO2/WebAuthn hardware security keys or certificate-based authentication — methods that cannot be compromised through phishing attacks, unlike SMS-based codes which remain vulnerable to SIM-swapping. Conditional access policies should implement risk-based authentication requiring additional verification when unusual access patterns are detected: new device registration, unfamiliar geographic location, off-hours access attempts, or requests from known malicious IP addresses. MFA enforcement must extend to all systems accessing tax data, including primary tax software, document management systems, email platforms, client portals, and administrative interfaces. Learn more about securing tax preparation software.
Cloud Service Implementation Steps for Tax Practices
Inventory All Systems Handling Tax Data
Document every application, storage location, and third-party integration that touches Federal Tax Information — including email, document management, and client portals.
Evaluate Vendors Against IRS Publication 1075
Request SOC 2 Type II reports, data residency confirmations, and security questionnaire responses from all candidate providers before signing contracts.
Configure Role-Based Access Controls
Map job functions to permission sets. Ensure preparers, reviewers, administrative staff, and IT administrators each have only the access their role requires.
Enforce Multi-Factor Authentication Firm-Wide
Enable MFA on all accounts accessing tax systems. Prioritize phishing-resistant methods (FIDO2/WebAuthn) over SMS-based codes for highest-risk roles.
Document Cloud Services in Your WISP
Update your Written Information Security Plan to reflect all cloud services in use, data flows, vendor security responsibilities, and incident response contacts.
Test Backup and Recovery Procedures
Verify that backup retention meets the IRS-recommended 30-day minimum, and conduct a test restoration to confirm data integrity before relying on backups.
Schedule Annual Vendor Security Reviews
Re-evaluate cloud providers annually or after any significant infrastructure change. Confirm continued SOC 2 compliance and review any new security incidents reported by the vendor.
Desktop Tax Software Hosting Solutions
For firms preferring traditional desktop tax applications like Intuit ProSeries, CCH Axcess Tax, Drake Tax, or Thomson Reuters UltraTax, specialized hosting providers enable cloud access while maintaining familiar workflows. Leading providers — including Rightworks, Ace Cloud Hosting, Summit Hosting, and Verito — offer Virtual Desktop Infrastructure (VDI) where each user receives a dedicated or shared virtual machine running the full desktop tax application.
These specialized hosting providers offer distinct advantages for tax practices committed to desktop software ecosystems. SOC 2 Type II certified data centers provide physical access controls including biometric authentication, 24/7 video surveillance, environmental monitoring, and redundant infrastructure protecting against power failures and natural disasters. Managed services handle server maintenance, operating system updates, software patching, backup management, and security monitoring, eliminating the need for in-house IT infrastructure. Application compatibility ensures desktop tax software runs identically to on-premises installations, including support for third-party integrations such as document scanning, document management systems, electronic signature platforms, and tax research tools.
Hosting providers typically guarantee 99.9% to 99.99% uptime — equivalent to 8.76 to 0.876 hours of annual downtime — backed by service level agreements with financial remedies for failures. Ace Cloud Hosting provides 45-day incremental backups with multiple recovery points, exceeding the IRS-recommended 30-day retention minimum. Summit Hosting offers customizable backup retention extending to 90 days for firms with enhanced business continuity requirements.
Remote access flexibility enables tax professionals to work from any location using Windows, macOS, Linux, iOS, or Android devices through web browsers or dedicated remote desktop clients. This accessibility proved essential during the COVID-19 pandemic and continues supporting hybrid work arrangements and seasonal staff working remotely during peak filing periods. For guidance on securing remote access to tax systems, see our VPN selection guide and firewall setup guide for tax offices.
Client Portals and Collaboration Features
The best cloud services for tax professionals extend beyond internal operations to client-facing capabilities that enhance service delivery while maintaining IRS and FTC compliance. Secure client portals have become essential differentiators enabling practices to compete effectively against larger firms while eliminating the security risks of emailing sensitive documents.
Modern client portals provide encrypted document exchange replacing insecure email attachments. Clients upload W-2s, 1099s, mortgage interest statements, and other source documents directly to secure storage. End-to-end encryption protects documents from upload through processing to final deletion, with access controls ensuring only authorized staff and the specific client can view uploaded materials.
E-signature integration enables clients to review and approve tax returns remotely without printing, signing, and scanning documents. Leading platforms integrate with DocuSign, Adobe Sign, or proprietary e-signature solutions meeting IRS requirements for electronic signatures on Forms 8879 (IRS e-file Signature Authorization). This capability accelerates return approval cycles and reduces administrative burden during peak filing season.
Secure messaging features provide encrypted communication channels between tax professionals and clients, replacing insecure email for discussing sensitive tax matters. Message encryption, audit trails, and retention policies ensure communications meet the same security standards as tax returns themselves. Some platforms offer mobile apps enabling clients to communicate with preparers, upload documents via smartphone cameras, and receive notifications about return status — a meaningful differentiator for practices competing for younger, mobile-first clients.
Multi-State and Real-Time Collaboration Capabilities
Multi-state return capabilities within cloud platforms enable firms serving clients across multiple jurisdictions to efficiently prepare state returns with automatic data flow from federal returns. This functionality particularly benefits practices serving remote workers, retirees with multiple residences, or clients with multi-state income sources.
Real-time collaboration features enable multiple team members to work on complex returns simultaneously, with version control preventing conflicts and tracking all changes for quality control purposes. Partner review workflows route completed returns through approval processes before e-filing, maintaining quality standards while accelerating throughput during busy periods. For more on protecting client data throughout these workflows, see our article on cyberattacks targeting tax firms.
Data Retention and Privacy Management
Managing data lifecycle within cloud services requires balancing regulatory retention requirements with privacy principles of data minimization. IRS guidelines require retaining tax returns and supporting documents for at least three years from filing, with longer periods recommended in certain situations: six years for substantial underreporting situations, and indefinitely for fraud investigations or unfiled returns.
Cloud services should provide automated retention policies enabling administrators to define retention periods by document type, with automatic deletion when retention periods expire. This automation reduces manual effort while ensuring consistent policy application across all client data. Legal hold capabilities must override automated deletion when litigation, investigations, or disputes require preserving specific records beyond standard retention periods.
Data portability features enable practices to export client data in standard formats when transitioning to different cloud services. The best cloud services for tax professionals provide export capabilities for returns in PDF format, source documents in original file formats, and structured data in CSV or XML formats compatible with alternative systems.
Privacy impact assessments should evaluate how cloud services collect, use, store, and delete personal information, particularly given increasing state privacy laws including the California Consumer Privacy Act (CCPA) and similar legislation in Virginia, Colorado, and Connecticut. Tax professionals must understand what client data is processed by cloud providers and ensure vendor contracts include appropriate data processing agreements addressing privacy obligations. For thorough privacy guidance, review our WISP creation guide and WISP template for tax preparers.
Implementing Role-Based Access Controls
Role-Based Access Control (RBAC) ensures users can access only information necessary for their specific job functions. Properly configured RBAC reduces insider threat risks, limits damage from compromised credentials, and demonstrates compliance with the principle of least privilege required by IRS Publication 1075 and the FTC Safeguards Rule.
Standard Role Configurations
Tax preparers typically receive permissions to create and edit returns, access client documents, communicate through secure portals, and e-file completed returns — but cannot delete historical returns, modify system security settings, or access clients outside their assigned caseload.
Reviewers and partners receive all preparer rights plus the ability to approve returns before filing, view firm-wide productivity reports, and access all client records for quality control purposes, but cannot manage user accounts or modify security configurations unless specifically authorized.
Administrative staff receive permissions for client communication, appointment scheduling, document upload assistance, and billing functions, but cannot access complete tax returns, view detailed financial data, or modify client tax information. This segregation protects sensitive data while enabling administrative staff to support client service.
IT administrators manage user accounts, security configurations, backup procedures, and system monitoring but should not access client tax data unless operationally necessary for troubleshooting specific technical issues. When IT access to tax data is required, access should be logged, time-limited, and reviewed by practice leadership.
The best cloud services for tax professionals provide granular permission controls enabling practices to customize roles beyond standard templates, implement segregation of duties preventing any single user from completing high-risk transactions independently, and maintain audit logs of all access to sensitive data for compliance verification and incident investigation. Our article on ransomware protection for tax practices covers how RBAC limits the blast radius of a successful attack.
Incident Response Planning for Cloud Environments
Despite thorough security measures, cloud environments may experience security incidents requiring rapid, coordinated response. A documented incident response plan specific to your cloud environment ensures your practice can detect, contain, investigate, and recover from security events while maintaining IRS and FTC compliance obligations.
Your cloud-specific incident response plan must address detection and alerting mechanisms — including cloud provider security notifications, automated monitoring alerts, unusual access pattern detection, and staff reporting procedures for suspicious activity. Immediate containment procedures must cover revoking compromised credentials, isolating affected systems, disabling compromised user accounts, and implementing temporary access restrictions to prevent lateral movement.
Vendor coordination protocols should define how to engage your cloud provider's security team, what information to request, escalation procedures for high-severity incidents, and service level expectations for provider response. Data breach notification requirements vary by state — typically 30 to 90 days — and must also include IRS notification procedures for Federal Tax Information breaches, FTC reporting obligations under the Safeguards Rule, and state attorney general notifications where required.
Forensic investigation procedures should cover preserving evidence, analyzing access logs, determining breach scope, identifying compromised data elements, and documenting a timeline of events for regulatory reporting. Recovery and restoration processes must address restoring from clean backups, rebuilding compromised systems, implementing additional controls to prevent recurrence, and resuming normal operations with enhanced monitoring.
Regular testing through tabletop exercises simulating cloud security incidents ensures your team understands roles, responsibilities, and procedures before actual events occur. Annual incident response plan reviews should incorporate lessons learned from previous incidents, changes to cloud infrastructure, regulatory updates, and emerging threat patterns. For detailed implementation guidance, review our phishing attack response guide and CPA cybersecurity resources.
Need Help Building Your WISP?
Our security team has helped thousands of tax professionals create compliant Written Information Security Plans that address cloud services, endpoint security, and IRS Publication 1075 requirements.
Integrating Cloud Security into Your Written Information Security Plan
Every cloud service your practice uses must be documented in your Written Information Security Plan (WISP). The IRS requires that your WISP reflect your actual operating environment — including all cloud platforms, hosting providers, client portals, and third-party integrations. A WISP that describes only on-premises infrastructure when your firm actually operates in the cloud creates a compliance gap that can surface during an IRS examination or FTC investigation.
Your WISP cloud services section should document the name and function of each cloud service, the vendor's security certifications and compliance posture, data flows showing what information enters and exits each platform, the firm's contractual data processing agreements with each vendor, and the designated staff member responsible for each vendor relationship.
The WISP must also describe how your firm monitors vendor compliance over time — not just at initial onboarding. Annual vendor reviews, review of SOC 2 Type II reports, and documentation of any security incidents reported by vendors demonstrate the ongoing due diligence the IRS and FTC expect. For a complete framework, see our WISP checklist for CPA firms, our IRS Publication 5708 sample WISP guide, and the Bellator WISP template for tax preparers.
Staff training is the final layer. Your team must understand how to use cloud services securely — recognizing phishing attempts targeting cloud credentials, following MFA procedures, reporting suspicious activity, and understanding what data they are and are not authorized to access. Our security awareness training guide for tax firms covers how to build a training program that satisfies both IRS and FTC requirements.
Book a Free Cloud Security Assessment
Our cybersecurity experts will evaluate your cloud provider's security posture, verify IRS Publication 1075 compliance, and provide actionable recommendations to protect your EFIN and client data.
Frequently Asked Questions
An IRS-compliant cloud service for tax professionals must meet the security standards established in IRS Publication 1075. Key requirements include U.S.-based data storage with contractual residency guarantees, AES-256 encryption for data at rest and TLS 1.2+ for data in transit, multi-factor authentication enforcement for all user accounts, role-based access controls, comprehensive audit logging, and a current SOC 2 Type II attestation. The vendor must also have documented incident response procedures and breach notification timelines that satisfy FTC Safeguards Rule requirements.
The right choice depends on your firm's existing software investments and workflow preferences. If your staff is trained on desktop applications like ProSeries, UltraTax, or Drake Tax and you have multi-year licensing, a specialized hosting provider (Rightworks, Ace Cloud Hosting, Summit Hosting) lets you maintain familiar workflows while gaining cloud accessibility. If you're building out a new practice or are open to retraining staff, cloud-native SaaS platforms offer lower maintenance overhead and are often easier to keep compliant with automatic updates. Both approaches can meet IRS requirements when properly configured — the hosting provider's security posture matters more than the deployment model itself.
IRS guidelines require retaining tax returns and supporting documents for a minimum of three years from the filing date for most situations. The retention period extends to six years when a return substantially understates income (by more than 25%), and records should be kept indefinitely for unfiled returns or fraud investigations. Your cloud service should support automated retention policies by document type and legal hold capabilities that override automatic deletion when litigation or regulatory investigations require it. Some state tax agencies have their own retention requirements that may exceed the federal minimums.
If your cloud provider experiences a data breach affecting client Federal Tax Information, you have notification obligations under multiple frameworks. State breach notification laws typically require notifying affected clients within 30 to 90 days depending on the state. The FTC Safeguards Rule requires notifying the FTC within 30 days of discovering a breach affecting 500 or more customers. The IRS has its own reporting procedures for FTI breaches. Your vendor contract should specify exactly what breach notification your provider owes you and within what timeframe. Review your incident response plan now — before a breach occurs — so your team knows the exact steps to take.
Yes. MFA is explicitly required by both IRS Publication 5293 and the FTC Safeguards Rule for systems accessing taxpayer and customer financial information. This requirement applies to all cloud tax platforms — there are no size-based exemptions for small or solo practices. The IRS has cited inadequate MFA as a contributing factor in numerous credential compromise incidents leading to fraudulent return filings. At minimum, use an authenticator app rather than SMS-based codes; for highest security, deploy FIDO2/WebAuthn hardware security keys that are phishing-resistant.
No. Storing Federal Tax Information outside the United States violates IRS Publication 1075 requirements and can result in immediate suspension of your EFIN. When evaluating cloud providers, obtain a written, contractual guarantee of U.S.-based data residency — verbal assurances or marketing language are insufficient. This requirement applies to primary storage, backup storage, and any disaster recovery replication sites. Verify that your vendor's subprocessors (the third parties your cloud provider uses) also store data within U.S. boundaries.
The IRS recommends a minimum of 30 days of backup retention for tax records in process. However, most security frameworks and business continuity best practices suggest requiring at least 45 to 90 days of incremental backup retention. Verify that your provider performs point-in-time recovery (not just full daily backups), stores backups in a geographically separate location from primary data, encrypts backup data with the same standards applied to live data, and can demonstrate successful test restorations. Annual backup recovery tests should be documented in your WISP.
Yes — and this is one of the most common WISP deficiencies found during IRS examinations. Your WISP must reflect your actual operating environment, which means documenting every cloud platform, hosting provider, client portal, and third-party integration that touches taxpayer data. For each service, document the vendor name and function, their security certifications, the data flows involved, your contractual data processing agreement, and the staff member responsible for the vendor relationship. A WISP that describes only on-premises infrastructure when your firm operates in the cloud creates a compliance gap. See our guide on how to create a WISP for a complete framework.
Phishing attacks targeting cloud tax systems typically attempt to steal login credentials through fake login pages mimicking tax software portals, cloud hosting dashboards, or IRS e-services portals. Attackers also use business email compromise (BEC) to impersonate partners or IT staff requesting credential resets or MFA bypass. Once attackers gain cloud access, they can exfiltrate client data, file fraudulent returns using stolen taxpayer information, or deploy ransomware across the firm's virtual desktop environment. MFA enforcement and staff training are the most effective defenses. See our detailed guide on phishing attacks targeting tax professionals.
The FTC Safeguards Rule requires tax preparers — as financial institutions under the Gramm-Leach-Bliley Act — to implement a formal information security program covering all systems that handle customer financial data, including cloud services. Specific requirements include encryption of data at rest and in transit, MFA for all systems accessing customer information, access controls based on the principle of least privilege, continuous monitoring, annual penetration testing, vendor oversight procedures, and a written incident response plan. Non-compliance can result in penalties up to $46,517 per violation. For a full breakdown, see our FTC Safeguards Rule guide for tax preparers.
Schedule
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



