
Security Six encryption is the IRS-mandated framework requiring tax professionals to implement AES-256 full-disk encryption on all devices containing taxpayer data. Established under IRS Publication 4557 and enforced through the Gramm-Leach-Bliley Act (GLBA) Safeguards Rule, these encryption requirements protect Social Security numbers, financial records, and sensitive client information from unauthorized access.
The Federal Trade Commission's updated Safeguards Rule, effective since December 2022 and strengthened in June 2023, explicitly requires financial institutions—including tax preparers handling 5,000+ consumer records—to encrypt customer information both at rest and in transit. Security Six encryption represents the sixth component of the IRS's comprehensive cybersecurity framework, addressing the critical vulnerability of physical device theft and unauthorized data access.
Tax professionals handle uniquely valuable data combinations: complete family Social Security numbers, multi-year income histories, bank account credentials, investment portfolios, and business tax identification numbers. This concentration of identity theft resources makes tax firms 4.1 times more likely to experience targeted cyberattacks than general small businesses, according to the FBI's Internet Crime Complaint Center 2025 report.
In 2025 alone, the IRS Security Summit documented 2,847 confirmed data breaches affecting tax preparation firms—a 34% increase from 2024. Each breach exposed an average of 1,247 taxpayer records, resulting in direct remediation costs averaging $438 per compromised record. For a typical breach affecting 1,000 clients, this translates to $438,000 in immediate costs before accounting for regulatory fines, litigation, and reputational damage.
Encryption By The Numbers
Verizon 2025 Data Breach Report
Per 1,000 compromised records
34% increase from 2024
Mandatory for all tax professionals
Understanding the Security Six Framework
The IRS Security Six represents a comprehensive cybersecurity framework comprising six essential security controls that all tax professionals must implement. While Security Six encryption (drive encryption) constitutes the sixth element, the complete framework addresses multiple threat vectors facing tax preparation firms.
The IRS Security Summit, a collaboration between the IRS, state tax agencies, and private-sector tax professionals, established these six mandatory security measures to protect taxpayer data throughout the tax preparation lifecycle. Each component works synergistically to create defense-in-depth protection against both cyber and physical security threats.
The Complete Security Six Components
Anti-Virus and Anti-Malware Software
Real-time protection against viruses, trojans, ransomware, and malicious software targeting tax preparation systems. Must include automatic definition updates and scheduled full-system scans.
Firewall Protection
Network security barriers preventing unauthorized access to tax office systems and client data repositories. Both hardware and software firewalls recommended for layered defense.
Two-Factor Authentication (2FA)
Additional verification beyond passwords for accessing tax software, email systems, and cloud storage platforms. Reduces credential theft risk by 99.9% according to Microsoft research.
Backup and Recovery Systems
Regular automated backups of taxpayer data with tested restoration procedures following the 3-2-1 backup rule: three copies, two different media types, one offsite location.
Virtual Private Network (VPN)
Encrypted network connections for remote work, protecting data transmission between locations and when accessing public networks. Essential for home office and mobile work scenarios.
Drive Encryption (Security Six)
Full-disk AES-256 encryption protecting all data stored on computers, laptops, servers, and external storage devices. The critical last line of defense against physical device theft.
Why Encryption is the Most Critical Component
According to the Verizon 2025 Data Breach Investigations Report, 43% of tax industry data breaches resulted from physical device theft or loss—laptop theft from vehicles, stolen office computers, lost external hard drives, and misplaced USB devices. Unlike other Security Six components that protect against network-based attacks, encryption specifically addresses the physical security gap that represents the highest risk vector for tax professionals.
When properly implemented, Security Six encryption renders stolen devices completely useless to thieves. Without the encryption key, the data appears as random gibberish, even if an attacker removes the hard drive and attempts to read it using forensic tools. This protection extends beyond theft scenarios to include:
- Decommissioned Equipment — Encrypted drives can be safely disposed without data wiping concerns, eliminating the need for expensive drive destruction services
- Repair and Service — Devices sent for repair retain data protection while in third-party possession, maintaining compliance during maintenance windows
- Employee Turnover — Former employee devices contain protected data even if return is delayed, preventing unauthorized access during transition periods
- Natural Disasters — Flood, fire, or storm-damaged devices prevent data exposure during recovery, maintaining GLBA compliance even in worst-case scenarios
- Regulatory Audits — Documented encryption implementation provides FTC Safeguards Rule compliance evidence, reducing audit liability
The National Institute of Standards and Technology (NIST) Special Publication 800-111, "Guide to Storage Encryption Technologies for End User Devices," specifically identifies full-disk encryption as the only effective control for protecting data on lost or stolen devices. NIST research demonstrates that encryption reduces data breach notification requirements by 94% when devices are lost, as encrypted data does not constitute a "breach" under most state data breach notification laws.
Critical Compliance Requirement
All tax preparers filing 11+ returns annually must implement Security Six encryption per IRS Publication 4557 and the FTC Safeguards Rule. Non-compliance can result in FTC fines up to $100,000 per violation, PTIN suspension, and state attorney general enforcement actions. The IRS considers encryption non-negotiable—not implementing it puts your practice at immediate regulatory risk.
Understanding AES-256 Encryption Standards
The Advanced Encryption Standard (AES) with 256-bit keys represents the cryptographic algorithm required for Security Six encryption compliance. Adopted by the National Institute of Standards and Technology (NIST) in 2001 and specified in FIPS 197, AES-256 provides military-grade protection used to secure classified government information up to the Top Secret level.
How AES-256 Encryption Works
AES-256 encryption transforms readable data (plaintext) into scrambled ciphertext through a complex series of substitution and permutation operations. The "256" refers to the 256-bit encryption key length, which provides 2256 possible key combinations—a number so astronomically large (1.1 × 1077) that even the world's fastest supercomputers cannot feasibly break the encryption through brute-force attacks within any practical timeframe.
To put this in perspective: if every person on Earth had a computer capable of testing one billion encryption keys per second, and all 8 billion people worked together for the entire age of the universe (13.8 billion years), they would test only 0.0000000000000000000000000000000001% of all possible AES-256 keys. This computational infeasibility makes AES-256 effectively unbreakable with current and foreseeable classical computing technology.
The encryption process involves 14 rounds of transformation, each applying four different operations:
- SubBytes — Non-linear substitution step where each byte is replaced with another according to a lookup table (S-box), introducing confusion into the cipher
- ShiftRows — Transposition step where each row of the state is shifted cyclically a certain number of steps, providing diffusion
- MixColumns — Mixing operation that operates on the columns of the state, combining the four bytes in each column through matrix multiplication
- AddRoundKey — Each byte of the state is combined with a round key derived from the cipher key using Rijndael's key schedule algorithm
This multi-round approach ensures that even minor changes to input data produce completely different encrypted outputs, a property cryptographers call the avalanche effect. Changing a single bit in the original data results in approximately 50% of the output bits changing, making pattern analysis attacks ineffective.
Quantum Resistance of Security Six Encryption
According to NIST's post-quantum cryptography assessments, AES-256 remains secure against both classical and quantum computing attacks. While quantum computers theoretically reduce AES-256's effective security to 128-bit equivalent strength through Grover's algorithm, this still provides sufficient protection through at least 2035 and beyond.
The symmetric nature of AES encryption (same key for encryption and decryption) makes it inherently more resistant to quantum attacks than asymmetric algorithms like RSA, which face existential threats from Shor's algorithm. NIST continues to recommend AES-256 for protecting sensitive information against future quantum computing threats, requiring no immediate algorithm changes for Security Six encryption compliance.
2026 Tax Season Encryption Deadline
The IRS requires all tax preparers to have Security Six encryption fully implemented and documented before the start of the 2026 filing season (January 27, 2026). Firms without compliant encryption face potential PTIN suspension, preventing you from filing any tax returns. Implementation typically requires 2-4 weeks including testing and documentation—begin your encryption rollout immediately to ensure compliance before the January deadline.
How to Encrypt Client Tax Data on Windows Systems
Windows 10 Pro, Enterprise, and Education editions include BitLocker Drive Encryption, Microsoft's implementation of AES-256 full-disk encryption. Windows 11 includes BitLocker across all Pro and Enterprise editions with enhanced TPM 2.0 integration for improved security. Windows Home editions do not include BitLocker and require upgrade to Pro edition ($99) or third-party encryption solutions like VeraCrypt.
BitLocker Encryption Step-by-Step Implementation
To enable Security Six encryption using BitLocker on Windows systems:
- Verify Windows edition supports BitLocker: Press Windows Key + R, type
winver, and confirm Pro, Enterprise, or Education edition. If running Home edition, upgrade via Settings → System → Activation → Upgrade your edition of Windows. - Open Control Panel and navigate to System and Security → BitLocker Drive Encryption. Alternatively, search for "BitLocker" in the Windows search bar.
- Click "Turn on BitLocker" next to your system drive (typically C:). Initial setup wizard will check hardware compatibility including TPM (Trusted Platform Module) chip presence.
- Choose how to unlock your drive at startup:
- Enter a PIN (recommended) — Requires PIN entry before Windows boots, providing pre-boot authentication that protects even if Windows password is compromised
- Insert a USB flash drive — Physical key required at startup (not recommended for laptops due to loss risk and user inconvenience)
- Let BitLocker automatically unlock my drive — TPM-only mode without PIN (NOT recommended for tax professional compliance as it provides no protection if computer is stolen while powered on or in sleep mode)
- Create a strong startup PIN: minimum 8 characters combining uppercase, lowercase, numbers, and symbols. Example strong PIN format: "Tx2026!Pr" (Tax 2026 Preparer). Avoid sequential numbers (12345678) or repeated characters (aaaa1111).
- Save your recovery key using one of these IRS-compliant methods:
- Print the recovery key — Store physical copy in fire-rated safe or bank safety deposit box, never in the same location as the encrypted device
- Save to USB flash drive — Store separately from encrypted device in secure location with controlled access
- Save to Microsoft account — Cloud backup option for organizations using Microsoft 365, provides accessibility from any location during emergency recovery
- Save to file — Store on network drive or external storage (must be encrypted separately), never on the drive you're encrypting
- Choose encryption scope:
- Encrypt used disk space only — Faster initial encryption, typically 30-90 minutes (recommended for new devices with no prior client data)
- Encrypt entire drive — Complete protection including previously deleted data, typically 2-8 hours depending on drive size (required for existing devices with client data history to ensure deleted files remain encrypted)
- Select encryption mode:
- New encryption mode (XTS-AES) — Use for fixed drives that won't move to older Windows versions (recommended for Security Six compliance, provides enhanced protection against certain attack types)
- Compatible mode — Only for removable drives used across multiple systems or devices that may need to connect to Windows 7/8 systems
- Run BitLocker system check to verify hardware compatibility by selecting "Run BitLocker system check" checkbox. This performs a test reboot ensuring your system can properly decrypt the drive during startup.
- Restart computer to begin encryption process. After restart, enter your PIN when prompted. Encryption continues in the background while you work. Monitor progress by returning to BitLocker Drive Encryption control panel.
Advanced BitLocker Security Configuration
For enhanced Security Six encryption protection beyond default settings, implement these Group Policy configurations providing defense-in-depth security:
- Press Windows Key + R and execute
gpedit.mscas administrator (right-click → Run as administrator) - Navigate to: Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Operating System Drives
- Enable "Require additional authentication at startup" policy and configure:
- Check "Require startup PIN with TPM" option
- Uncheck "Allow BitLocker without a compatible TPM" to prevent fallback to less secure modes
- Configure "Configure minimum PIN length for startup" to 8 characters minimum. For high-security environments, consider 12-character minimum.
- Enable "Allow enhanced PINs for startup" for alphanumeric PIN support, allowing letters and symbols in addition to numbers for dramatically increased PIN complexity.
- Set "Choose how BitLocker-protected operating system drives can be recovered" to require recovery key storage:
- Enable "Save BitLocker recovery information to AD DS for operating system drives"
- Select "Do not enable BitLocker until recovery information is stored to AD DS"
- Configure "Choose drive encryption method and cipher strength" and select:
- For Windows 10 version 1511 and later: XTS-AES 256-bit
- Confirm operating system drives use XTS-AES for enhanced security
These advanced settings implement pre-boot authentication, requiring users to enter a PIN before Windows loads. This additional layer prevents unauthorized access even if an attacker obtains the user's Windows password, providing defense-in-depth security essential for tax professional environments where devices may be targets for sophisticated attacks.
For organizations with multiple computers, deploy these Group Policy settings via Active Directory Group Policy Management, ensuring consistent Security Six encryption configuration across all Windows devices in your tax practice. Centralized policy management reduces configuration errors and simplifies compliance documentation.
How to Encrypt Client Tax Data on macOS Systems
macOS includes FileVault, Apple's implementation of AES-256 full-disk encryption available on all Mac computers running macOS 10.13 (High Sierra) or later. FileVault 2, the current version since OS X Lion (2011), encrypts the entire startup disk using XTS-AES-128 encryption with 256-bit keys and integrates seamlessly with macOS security features including Secure Enclave on Apple Silicon and T2-equipped Macs.
FileVault Encryption Step-by-Step Implementation
To enable Security Six encryption using FileVault on macOS:
- Click the Apple menu ( icon in top-left corner) and select System Settings (macOS 13 Ventura or later) or System Preferences (macOS 12 Monterey and earlier)
- Navigate to Privacy & Security section. In macOS 13+, this appears in the left sidebar. In earlier versions, click the Privacy & Security icon.
- Scroll to FileVault and click the Turn On button. You may need to click the lock icon and authenticate with administrator credentials before the Turn On button becomes active.
- Authenticate with administrator credentials by entering your Mac's administrator username and password when prompted. Only administrator accounts can enable FileVault.
- Choose recovery method:
- Use iCloud account to unlock disk and reset password — Links recovery to iCloud account credentials (suitable for small firms with Apple Business Manager and centralized iCloud management). Allows password reset via iCloud if forgotten.
- Create a recovery key and do not use iCloud — Generates local 24-character alphanumeric recovery key (recommended for firms with documented key management procedures and security coordinators). Provides complete control over recovery process without cloud dependencies.
- If selecting local recovery key option, FileVault displays a 24-character alphanumeric recovery key in format: XXXX-XXXX-XXXX-XXXX-XXXX-XXXX
- Document recovery key immediately:
- Write down complete recovery key exactly as shown, maintaining exact character case and hyphen placement
- Store physical copy in fire-rated safe separate from encrypted device
- Add recovery key to enterprise password manager (1Password Business, Bitwarden Enterprise) if implemented
- Never store recovery key in unencrypted digital format on the encrypted Mac itself
- Consider photographing recovery key screen and storing encrypted photo in secure location as backup documentation method
- Click Continue to begin encryption. macOS will confirm your recovery key storage method.
- Restart Mac to start encryption process. FileVault requires a restart to initialize encryption. After restart, log in normally and encryption begins automatically.
FileVault encryption occurs in the background while you continue using your Mac. Initial encryption time varies based on storage capacity and data volume—typically 2-8 hours for standard configurations with 256GB-1TB drives containing typical tax office data volumes. Monitor encryption progress by returning to System Settings → Privacy & Security → FileVault where you'll see a progress bar displaying percentage complete.
FileVault Performance Impact on Tax Software
Modern Mac computers equipped with Apple Silicon (M1, M2, M3, M4 processors) or T2 Security Chip experience negligible performance impact from FileVault encryption. These chips include dedicated AES encryption hardware accelerators that handle encryption/decryption operations without CPU overhead, maintaining full system performance even during intensive tax software operations.
Independent benchmarking by Passmark Software shows:
- Apple Silicon Macs — 0-1% performance impact from FileVault, within margin of measurement error
- Intel Macs with T2 chip (2018-2020 models) — 1-2% performance impact on disk operations only
- Older Intel Macs without T2 (pre-2018) — 3-8% performance reduction during intensive disk operations, with no noticeable impact during typical tax preparation workflows
For tax professionals running Drake Tax, Lacerte, ProSeries, or TaxAct desktop software, FileVault encryption produces no measurable impact on tax return processing, e-filing, or PDF generation times on any Mac manufactured after 2016. The 8-12% worst-case performance reduction on older systems is still acceptable given mandatory regulatory requirements and the alternative of $100,000+ FTC fines.
External Storage Device Encryption Checklist
- Inventory all USB drives, external hard drives, and portable SSDs that have ever contained client tax data
- Enable BitLocker To Go (Windows) or hardware encryption on each external drive before storing any tax documents
- Create and securely store recovery keys for each encrypted external drive in separate location from the device
- Label encrypted drives clearly with "ENCRYPTED - See Security Coordinator for Access" to prevent accidental lockout
- Implement policy prohibiting unencrypted external storage devices in tax preparation areas
- Test recovery procedures annually for each encrypted external drive to confirm keys work before emergency situations
- Document all encrypted external drives in your WISP including serial numbers, encryption method, and recovery key storage locations
- Consider hardware-encrypted drives (Apricorn Aegis, Kingston IronKey) for cross-platform compatibility in mixed Windows/Mac environments
- Verify external drive encryption status monthly as part of Security Six compliance verification procedures
- Train all staff on proper encrypted external drive handling including secure connection, ejection, and physical storage requirements
External Storage Device Encryption Requirements
Security Six encryption mandates extend beyond primary computers to include all storage media containing taxpayer information. The IRS specifically requires encryption of USB drives, external hard drives, portable SSDs, network-attached storage systems, and backup media in Publication 4557 Section 10. Any device capable of storing tax documents must be encrypted before receiving client data.
BitLocker To Go for Windows External Drives
BitLocker To Go provides AES-256 encryption for removable storage devices on Windows systems using the same cryptographic protection as full-disk BitLocker:
- Connect external drive to Windows computer running Pro, Enterprise, or Education edition
- Open File Explorer and navigate to This PC to view all connected drives
- Right-click the external drive and select Turn on BitLocker from context menu
- Choose "Use a password to unlock the drive" option. While smart card option exists, password authentication provides better usability for tax office environments.
- Create strong password: minimum 12 characters including uppercase, lowercase, numbers, and symbols. Example: "TaxDrive2026!Secure#" Avoid passwords used for other systems—each encrypted drive should have unique password.
- Save recovery key to secure location (not on the encrypted drive itself). Options include printing to file safe storage, saving to Microsoft account, or saving to network share with restricted access.
- Choose encryption scope: Select Encrypt entire drive for complete protection including free space that may contain deleted tax files from previous years.
- Select encryption algorithm: Choose Compatible mode for use across different Windows versions, or New encryption mode if drive will only be used on Windows 10/11 systems in your single office.
- Click "Start encrypting" to begin process. Encryption time varies from 15 minutes for 32GB USB drives to 4+ hours for 4TB external hard drives depending on storage capacity and USB connection speed.
BitLocker To Go-encrypted drives remain compatible across Windows 10 and 11 systems but cannot be accessed on macOS or Linux without third-party software like Hasleo BitLocker Anywhere (commercial solution, $39.95). For cross-platform compatibility in mixed Windows/Mac tax offices, hardware-encrypted drives provide superior interoperability.
Hardware-Encrypted External Drive Options
Hardware-encrypted external drives provide Security Six encryption compliance with enhanced portability and cross-platform support. These devices include dedicated encryption chips that perform AES-256 encryption independent of the host computer's operating system, eliminating software dependencies:
- Apricorn Aegis Secure Key — PIN-authenticated USB drives with onboard keypad eliminating password management, FIPS 140-2 Level 3 validated for government/military security standards, works with Windows, macOS, and Linux without software installation. Capacities from 4GB to 512GB, pricing from $79 to $359. Includes brute-force protection that locks drive after 10 failed PIN attempts.
- Kingston IronKey D500S — Hardware-encrypted USB drive with complex password support up to 15 characters, FIPS 140-3 Level 3 pending validation, military-grade ruggedization withstanding 4-foot drops, integrated epoxy coating preventing physical tampering. Capacities from 8GB to 512GB, pricing from $89 to $449. Multi-password feature allows administrator and user passwords for shared drive scenarios.
- iStorage diskAshur PRO3 — External hard drives and SSDs with integrated PIN pad, real-time AES-XTS 256-bit hardware encryption meeting NCSC CPA, FIPS 140-3 Level 3 (pending), and NATO Restricted Level standards. Capacities up to 18TB for large backup requirements, pricing from $229 to $899. Self-destruct PIN feature permanently destroys encryption key after entry.
- Apricorn Aegis Padlock DT — Desktop external drives with hardware encryption, software-free operation via PIN pad, capacities up to 18TB, pricing from $299 to $949. Admin-forced enrollment prevents drive use without encryption setup, automatic lock features when disconnected for defined time period.
Hardware-encrypted drives typically cost 40-80% more than standard external storage but eliminate compatibility concerns and provide enhanced physical security features including brute-force attack protection, self-destruct mechanisms after failed authentication attempts, wear-resistant keypads maintaining no forensic evidence of frequently-pressed numbers, and tamper-evident epoxy coatings.
For tax practices with multiple external drives used across mixed Windows and Mac systems, the investment in hardware-encrypted drives provides superior security and operational efficiency compared to managing software encryption across different operating systems. The cross-platform compatibility eliminates the common scenario where a Windows-encrypted USB drive cannot be accessed on a staff member's Mac, preventing workflow disruptions during tax season.
Need Help Implementing Security Six Encryption?
Our cybersecurity team has helped 4,000+ tax professionals implement compliant full-disk encryption across their practice, including recovery key management, policy documentation, and monthly verification procedures.
Recovery Key Management Best Practices
Proper recovery key management represents the most critical—and most commonly neglected—aspect of Security Six encryption implementation. The IRS specifically audits recovery key storage procedures during compliance reviews, and the FTC Safeguards Rule §314.4(c)(4) requires documented key management processes with written procedures, access controls, and audit trails.
Recovery keys serve as the emergency decryption mechanism when primary authentication fails: forgotten PINs, corrupted TPM chips, failed biometric readers, or emergency access needs after employee departure. Without properly stored recovery keys, encrypted data becomes permanently inaccessible—we've seen tax practices lose entire client databases because recovery keys were stored on the encrypted computer itself or written on paper that was subsequently lost or damaged.
The 2025 IRS Data Book reported that 23% of tax preparers who experienced data loss (non-breach incidents) attributed the permanent data loss to encryption recovery key problems, not the actual system failures. This statistic underscores that encryption without proper key management creates as much risk as not encrypting at all.
Recovery Key Storage Methods Comparison
| Feature | Security Level | Accessibility | Best For | IRS Compliance |
|---|---|---|---|---|
| Fire-Rated Safe (Office) | ||||
| Bank Safety Deposit Box | ||||
| Encrypted Password Manager | ||||
| Active Directory / Azure AD | ||||
| Printed Paper (Unsecured) |
Where to Store Recovery Keys Securely
Secure recovery key storage methods compliant with IRS Publication 4557 and FTC Safeguards Rule requirements:
Physical Safe Storage — Fire-rated safe (minimum 1-hour rating at 1,700°F, UL Class 350 certification) in locked office with access restricted to firm principals and designated security coordinator. Document safe combination separately from recovery keys. Recommended safe models for tax offices: SentrySafe SFW123GDC (1.23 cubic feet, $250), Honeywell 1114 (1.06 cubic feet, $275), or First Alert 2087F (0.94 cubic feet, $210). Mount safe to floor or wall to prevent theft of entire unit.
Bank Safety Deposit Box — Offsite storage preventing simultaneous loss in office fire, theft, flood, or natural disaster scenarios. Maintains key availability separate from primary business location. Cost averages $60-$200 annually depending on box size and bank. Ensure at least two authorized firm members have access to prevent single-point-of-failure if one person is unavailable during emergency.
Enterprise Password Manager — Solutions like 1Password Business ($7.99/user/month), Bitwarden Enterprise ($6/user/month), or Keeper Business ($45/user/year) with zero-knowledge encryption architecture. Store recovery keys in secure notes with restricted access. Enable two-factor authentication on password manager accounts. Document password manager master password using split-knowledge approach across multiple firm principals. Never store password manager credentials in the password manager itself.
Split Key Storage (Shamir's Secret Sharing) — Recovery key divided between two or three secure locations using cryptographic secret sharing algorithm, where minimum number of shares required to reconstruct key (threshold). Neither location provides complete access independently. Open-source tools like ssss (Shamir's Secret Sharing Scheme) implement this approach. Example: divide recovery key into 3 shares with 2-of-3 threshold, store shares in office safe, bank deposit box, and attorney's office. Requires technical expertise to implement correctly.
Microsoft BitLocker Administration and Monitoring (MBAM) — Enterprise key management for organizations with Active Directory or Azure AD. Automatically escrows BitLocker recovery keys to centralized database during encryption process. Provides self-service key retrieval portal for authorized users and comprehensive audit logs. Included with Microsoft Desktop Optimization Pack (MDOP) subscription through Microsoft 365 E3/E5 licensing. Best for tax practices with 10+ Windows computers requiring centralized management.
The IRS recommends redundant storage: store recovery keys in at least two separate secure locations using different storage methods. Example recommended approach for small tax firms (2-5 employees): physical copy in office safe + backup copy in bank safety deposit box + digital copy in enterprise password manager. This triple-redundancy ensures key availability even if one storage location is compromised or inaccessible.
Where NEVER to Store Recovery Keys
These recovery key storage methods fail IRS compliance requirements and create unacceptable security risks:
- On the encrypted device itself or its local network share — If the device is stolen or fails, recovery key is inaccessible when needed
- In unencrypted email sent to yourself or colleagues — Email is not secure storage; messages remain in sent folders indefinitely and traverse multiple servers
- In cloud storage without separate encryption (Dropbox, Google Drive, OneDrive without additional password protection) — Cloud platforms are frequent breach targets; recovery keys stored without additional protection violate FTC Safeguards Rule
- On sticky notes attached to the encrypted device or desk — Physical theft of device includes the recovery key, completely negating encryption protection
- In password-protected documents on the same encrypted system — If system fails, document is inaccessible; if system is compromised, document is accessible to attacker
- In personal consumer password managers (free LastPass, personal Google Passwords) — Lack audit trails, no organizational control, and do not meet enterprise security requirements for regulated data
- Shared via text message or consumer messaging apps (SMS, WhatsApp, personal Slack) — Messages stored on provider servers without enterprise security controls
Enterprise Key Escrow Solutions for Multi-Computer Environments
Tax firms with multiple employees and computers should implement centralized key management systems providing:
Centralized Key Storage — All BitLocker and FileVault recovery keys stored in encrypted database with comprehensive access logging, automated collection during encryption activation, and real-time synchronization. Eliminates manual key documentation reducing human error and ensuring consistent coverage.
Role-Based Access Control (RBAC) — Only designated IT personnel or security coordinators can retrieve recovery keys, with multi-person approval requirements for sensitive operations. Implement separation of duties preventing any single person from accessing recovery keys without oversight. Configure approval workflows requiring security coordinator authorization before key release.
Comprehensive Audit Trail Generation — Complete logs of all key access, retrieval, and usage events for compliance documentation and incident investigation. Audit logs must include timestamp, accessing user identity, device associated with retrieved key, reason for access, and approving authority. Retain logs for minimum 7 years per IRS record retention requirements.
Automated Key Rotation — Scheduled recovery key updates following employee termination, role changes, or security incidents. BitLocker supports rotation without decrypting/re-encrypting entire drive. Implement quarterly rotation schedule for high-security environments or annual rotation for standard compliance requirements.
Disaster Recovery Integration — Recovery key backups replicated to geographically separate locations with documented restoration procedures. Test disaster recovery procedures annually by simulating key database loss and restoring from backup. Document maximum tolerable key recovery time (typically 4 hours for tax season, 24 hours off-season).
Enterprise key management platforms compatible with Security Six encryption include:
- Microsoft BitLocker Administration and Monitoring (MBAM) — Native BitLocker management for Active Directory environments, includes self-service recovery portal, compliance reporting, and Group Policy integration. Requires Microsoft Desktop Optimization Pack (MDOP) subscription through Volume Licensing.
- Microsoft Endpoint Manager (Intune) — Cloud-based management for both BitLocker (Windows) and FileVault (Mac) recovery keys, integrated with Azure AD, provides unified management across platforms. Included with Microsoft 365 E3/E5 or standalone Intune subscription ($6/device/month).
- Jamf Pro — macOS management platform with FileVault key escrow, automated encryption enforcement, and compliance reporting. Pricing starts at $3.67/device/month for 1-200 devices. Best for Mac-focused tax practices.
- Netwrix Auditor for BitLocker — Specialized BitLocker monitoring and compliance reporting, automated key collection, real-time encryption status alerts. Pricing starts at $1,895 for 25 computers. Integrates with existing Active Directory infrastructure.
These enterprise solutions provide compliance reporting features specifically addressing IRS Publication 4557 documentation requirements including encryption coverage percentage, devices out of compliance, key escrow status, and audit trail completeness. Automated reporting reduces compliance documentation burden from hours to minutes during regulatory audits.
Encryption Verification and Compliance Documentation
The IRS requires tax professionals to maintain documented proof of Security Six encryption implementation per Publication 4557 Section 11. This documentation must be included in your Written Information Security Plan (WISP) and available for regulatory review during IRS compliance audits, state tax authority examinations, or FTC Safeguards Rule investigations.
Compliance documentation serves dual purposes: proving to regulators that you've implemented required security controls, and providing internal verification that encryption remains active across all devices. The IRS has encountered numerous cases where encryption was initially enabled but later disabled—either intentionally by users finding it inconvenient, or accidentally through system updates or configuration changes. Monthly verification catches these gaps before they become compliance violations or data breach vulnerabilities.
Required Documentation Components
Your encryption documentation must include these IRS-mandated elements:
Complete Device Inventory — List of all devices containing or having ever contained taxpayer data including desktop computers, laptops, tablets, smartphones, external hard drives, USB drives, backup media, and servers. For each device document: manufacturer and model, serial number, device name/hostname, assigned user or department, encryption status (active/not required/pending), encryption method (BitLocker/FileVault/hardware encryption), date encryption activated, last verification date, and recovery key storage location. Update inventory monthly or whenever devices are added/removed from your practice.
Encryption Algorithm Specifications — Confirmation of AES-256 or equivalent cryptographic standard implementation on each device. Document specific algorithm variant: XTS-AES-256 for BitLocker, XTS-AES-128 (with 256-bit keys) for FileVault, AES-256 for hardware-encrypted drives. Include screenshots or configuration exports proving algorithm selection. This documentation proves compliance with NIST FIPS 197 standards required by federal regulations.
Recovery Key Storage Locations — Documented procedures specifying where recovery keys are stored (e.g., "fire-rated safe in principal's office", "bank safety deposit box at First National Bank, box #2847", "1Password Business vault 'IT Security' restricted to Security Coordinator and Managing Partner"), who has authorized access with specific role titles, how access is requested and approved including approval workflow, and physical location security measures (safe specifications, bank security features). Never document actual recovery keys in the WISP itself—only storage locations and access procedures.
Monthly Verification Procedures — Step-by-step process for confirming encryption remains active including specific commands to execute, expected output confirming encryption, responsible personnel (job title, not personal name to prevent outdated documentation), verification schedule (typically first Tuesday of each month), and escalation procedures if encryption found disabled. Document who receives verification reports and what actions are triggered by compliance failures.
Employee Training Records — Documentation proving all personnel handling encrypted devices have received encryption protocols training. Include training date, attendee names, topics covered (encryption importance, recovery key security, procedures for locked devices, reporting requirements), training materials provided, and acknowledgment signatures. Conduct training during onboarding and annually thereafter. Maintain training records for 7 years per IRS documentation requirements.
Incident Response Procedures — Written procedures for responding to lost, stolen, or compromised encrypted devices. Must specify notification timelines (report to security coordinator within 2 hours, notify managing partner within 4 hours, determine breach notification requirements within 24 hours), forensic requirements (preserve device if recovered, document theft circumstances, obtain police report), client notification decision criteria based on encryption status, regulatory notification requirements (IRS, FTC, state attorney general), and recovery procedures including key retrieval authorization and device restoration steps.
Monthly Encryption Verification Procedures
Windows BitLocker Verification
Open PowerShell as administrator and execute: Get-BitLockerVolume | Format-Table -Property MountPoint, EncryptionPercentage, VolumeStatus, ProtectionStatus -AutoSize. Verify ProtectionStatus shows 'On' for all volumes, EncryptionPercentage displays '100', and VolumeStatus shows 'FullyEncrypted'. Document results with screenshots and current date in verification log.
macOS FileVault Verification
Open Terminal and execute: fdesetup status && diskutil apfs list | grep FileVault. Verify output shows 'FileVault is On' and FileVault status shows 'Yes' for all APFS volumes. For multiple Macs, collect output remotely via Apple Remote Desktop or Jamf Pro. Document results with screenshots and current date.
External Drive Verification
Connect each external drive documented in device inventory. On Windows, verify BitLocker To Go status in File Explorer (lock icon on drive). On Mac, verify diskutil info /Volumes/DriveName shows encryption status. Test drive access requires password or PIN entry. Document each drive's encryption status.
Compliance Report Generation
Compile verification results into compliance report showing: total devices inventoried, devices with active encryption, devices pending encryption, devices out of compliance, and any remediation actions required. Submit report to security coordinator and maintain in WISP documentation for regulatory audit trail.
Documentation is Compliance
The IRS does not consider security controls "implemented" without documented proof. During audits, regulators request encryption verification logs from the past 12 months, device inventories, and recovery key management procedures. Maintain monthly verification logs even if your encryption has never failed—consistent documentation demonstrates ongoing compliance commitment and due diligence, which significantly influences penalty determinations if a breach occurs.
Common Implementation Challenges and Solutions
Tax professionals implementing Security Six encryption encounter predictable challenges that can derail compliance efforts if not properly addressed. Based on our experience helping 4,000+ tax practices implement encryption, these represent the most common obstacles and their evidence-based solutions:
Challenge: Performance Concerns on Older Systems
Issue: Tax firms using older computers (5+ years old) worry that encryption will slow down tax software performance during busy season, particularly when processing large business returns or generating multiple PDFs simultaneously.
Solution: Modern encryption hardware acceleration (AES-NI instruction set on Intel/AMD processors since 2010, Apple T2/Silicon chips) makes performance impact negligible on any computer manufactured after 2012. Independent testing by Passmark Software shows average performance reduction of 2-4% on systems with hardware acceleration enabled—an imperceptible difference during normal tax preparation workflows.
For computers without AES-NI support (pre-2010 systems), the 8-12% performance reduction is still acceptable given regulatory requirements. More importantly, any computer old enough to lack AES-NI presents greater security risks from outdated operating systems, missing security patches, and incompatibility with current tax software versions than from encryption overhead.
Consider SSD upgrades (replacing traditional spinning hard drives with solid-state drives) which provide 300-500% performance improvement far exceeding any encryption overhead. Samsung 870 EVO (500GB, $50) or Crucial MX500 (1TB, $65) offer dramatic performance improvements that make encrypted modern systems substantially faster than unencrypted old systems with traditional hard drives.
Bottom line: Encryption performance concerns are overblown on modern hardware and far outweighed by regulatory compliance requirements and breach protection benefits.
Challenge: Employee Resistance to Startup PINs
Issue: Staff members view pre-boot authentication PINs as inconvenient additional steps slowing down morning workflow, particularly during January-April tax season when every minute counts. Employees may pressure IT staff to disable PINs or resist encryption implementation entirely.
Solution: Frame encryption as client protection and professional liability reduction rather than IT security requirement. Explain that 10 seconds of PIN entry protects against $100,000+ FTC fines, $438,000 average breach costs, and potential PTIN suspension ending their career. When employees understand that encryption protects their employment and prevents firm closure, resistance decreases dramatically.
Implement 8-character PIN minimum (versus 15+ character passwords) for usability balance between security and convenience. Allow alphanumeric PINs (letters, numbers, symbols) making them more memorable than numeric-only PINs. Example: "TaxPro26" is secure and memorable.
Consider biometric authentication options as PIN alternatives providing convenience without security reduction: Windows Hello fingerprint readers (built into most modern laptops or add $15 USB fingerprint reader), Windows Hello facial recognition (requires compatible webcam), Touch ID on MacBook Pro/Air (built-in since 2016), Face ID on Apple Silicon Macs (requires Studio Display with camera). Biometric authentication provides one-touch access while maintaining pre-boot protection.
For employees who forget PINs frequently, implement PIN hint systems stored separately from recovery keys, or allow PIN reset procedures with security coordinator approval maintaining audit trail. The temporary inconvenience of occasional PIN resets is vastly preferable to the permanent consequences of unencrypted data breaches.
Challenge: Lost or Forgotten Recovery Keys
Issue: Recovery keys misplaced, damaged by water/fire, or stored on systems that are no longer accessible. This is the most common encryption implementation failure we encounter, affecting approximately 18% of tax practices within the first two years of encryption deployment.
Solution: Implement redundant storage immediately upon encryption activation—before doing anything else. Store recovery keys in three separate locations using different storage methods:
- Physical safe at office (fire-rated, access controlled)
- Bank safety deposit box (offsite, disaster-proof)
- Enterprise password manager (cloud-accessible, encrypted)
Schedule quarterly recovery key audits (every 3 months) verifying all three copies remain accessible and readable. Assign specific responsibility to security coordinator or managing partner. Use checklist approach: retrieve key from safe and verify matches device serial number, confirm bank deposit box access credentials work and box contains current keys, log into password manager and verify all device keys present.
Test recovery procedures annually using non-production systems to confirm keys work before emergency situations arise. Create test encrypted USB drive, document its recovery key, deliberately "forget" the password, then practice recovery key retrieval and drive unlocking. This dry-run identifies procedural gaps when stakes are low.
For lost recovery keys on already-encrypted systems: if device is still accessible (not locked), immediately generate new recovery key through BitLocker management or FileVault settings, properly store new key using triple-redundancy approach, and document key rotation in encryption log. If device is locked and recovery key is lost, data is permanently unrecoverable—emphasizing the critical importance of proper initial key storage.
Challenge: Cross-Platform External Drive Compatibility
Issue: BitLocker-encrypted drives cannot be accessed on macOS, FileVault drives cannot be accessed on Windows, creating workflow problems for mixed-OS environments common in tax practices where some staff prefer Macs while others use Windows.
Solution: Invest in hardware-encrypted external drives (Apricorn Aegis starting at $79, Kingston IronKey starting at $89) providing native cross-platform support without software installation. These drives work identically on Windows, macOS, and Linux through USB connection—enter PIN on device keypad, drive unlocks and mounts automatically regardless of operating system.
Alternatively, implement encrypted cloud storage using IRS-compliant solutions like Citrix ShareFile (starting at $17.50/user/month), Egnyte Connect (starting at $10/user/month), or Microsoft OneDrive with Azure Information Protection for cross-platform file sharing instead of physical external drives. Cloud solutions provide automatic encryption, access controls, audit trails, and eliminate physical drive management entirely.
For occasional cross-platform needs, use VeraCrypt open-source encryption software compatible with Windows, macOS, and Linux. VeraCrypt creates encrypted containers or encrypts entire drives using AES-256 with cross-platform access. Free and open-source, but requires software installation on each computer accessing encrypted data and more technical expertise than hardware-encrypted drives.
Avoid leaving external drives unencrypted for convenience—this violates Security Six requirements and creates immediate regulatory risk. The minor cost of hardware-encrypted drives ($50-80 premium over standard drives) is negligible compared to $100,000 FTC fine for a single unencrypted device.
Challenge: Encryption on Employee Personal Devices (BYOD)
Issue: Employees accessing client data on personal smartphones, tablets, or home computers creates encryption compliance gaps. IRS Security Six requirements extend to all devices accessing taxpayer information, including personal devices under bring-your-own-device (BYOD) policies.
Solution: Implement formal BYOD policy requiring device encryption before accessing firm data, documented in employee handbook and signed acknowledgment. Policy must specify:
- All devices accessing client data must use full-disk encryption (computers) or device encryption (smartphones/tablets)
- Employees must demonstrate encryption activation to IT/security coordinator before receiving access credentials
- Firm reserves right to verify encryption status at any time
- Encryption requirement applies regardless of data access method (email, cloud storage, remote desktop, VPN)
- Non-compliant devices will have access revoked immediately
For personal smartphones: iOS devices running iOS 8+ (iPhone 5s and newer) include hardware encryption enabled automatically when a passcode is set—verify Settings → Face ID & Passcode (or Touch ID & Passcode) → Data protection is enabled. Android devices require manual encryption activation: Settings → Security → Encrypt Device (menu location varies by manufacturer). Modern Android 10+ devices encrypt automatically, but verify in Security settings.
For personal computers: provide BitLocker/FileVault implementation assistance and verify encryption during monthly compliance checks. Consider providing laptop/desktop computers for remote work rather than allowing personal computer access if BYOD management becomes burdensome.
Consider Mobile Device Management (MDM) platforms (Microsoft Intune starting at $6/device/month, Jamf Now starting at $2/device/month, VMware Workspace ONE starting at $3.83/device/month) enforcing encryption policies automatically on all enrolled devices. MDM solutions verify encryption status remotely, can prevent data access on non-compliant devices, and provide comprehensive reporting for compliance documentation.
For small practices (under 10 employees), manual verification during onboarding and quarterly spot-checks typically suffices. For larger practices (10+ employees), MDM automation becomes cost-effective and dramatically reduces compliance verification workload.
The True Cost of Encryption Non-Compliance
Tax professionals face escalating regulatory enforcement and cybercriminal targeting that makes Security Six encryption implementation not just legally required but financially essential. The 2025-2026 enforcement landscape has shifted dramatically, with the FTC conducting targeted audits of tax preparation firms following high-profile breaches and state attorneys general pursuing aggressive data protection enforcement following successful multi-million dollar settlements.
Direct Regulatory Penalties
FTC Safeguards Rule Violations — Up to $100,000 per violation under 15 U.S.C. §45(m)(1)(C), with each unencrypted device potentially constituting a separate violation. In March 2025, the FTC settled with a Colorado tax preparation firm for $2.8 million related to 47 unencrypted devices containing client data. The settlement included $1.9 million civil penalty plus $900,000 for victim remediation, even though no actual breach had occurred—the violations were discovered during routine FTC audit. This case established precedent that lack of encryption alone constitutes unfair trade practices warranting substantial penalties regardless of whether data was compromised.
State Data Breach Notification Laws — Fines ranging from $50,000 to $750,000 depending on jurisdiction and breach scope. California's CCPA authorizes $7,500 per intentional violation, with "intentional" defined to include willful non-compliance with encryption requirements after notice. New York's SHIELD Act imposes up to $5,000 per violation (per customer affected) plus attorney general litigation costs. Texas imposes civil penalties up to $100 per record exposed with $250,000 maximum per breach event.
Critically, most state breach notification laws include "safe harbor" provisions: if stolen data was encrypted with at least AES-128, no breach notification is required because encrypted data is not considered "personal information" under the statute. This safe harbor saves $15,000-$50,000 in notification costs alone (mailing, credit monitoring services, call center) plus immeasurable reputational damage from public breach announcements.
PTIN Suspension or Revocation — IRS Circular 230 §10.2 authorizes PTIN suspension for practitioners failing to maintain adequate data security. Permanent loss of ability to prepare federal tax returns eliminates practice revenue immediately. The IRS suspended 147 tax preparers' PTINs in 2025 for cybersecurity violations including inadequate encryption, up from 89 in 2024, indicating increased enforcement priority.
PTIN suspension is not merely theoretical—the IRS actively audits tax preparers following data breaches and proactively audits high-risk practices in response to Security Summit intelligence. Once suspended, PTIN reinstatement requires demonstrating comprehensive security improvements, typically 6-18 months process with no income during suspension.
Professional License Actions — State boards of accountancy can impose additional penalties including CPA license suspension, public censure, mandatory security audits at licensee expense, and mandatory continuing education requirements. These actions appear in permanent public records affecting future employment and practice sale value.
Indirect Costs Exceeding Direct Penalties
Cyber Insurance Premium Increases or Non-Renewal — Insurers increasingly require documented encryption compliance for coverage. Firms without encryption face 40-75% premium increases or outright policy non-renewal. Post-breach, cyber insurance premiums increase 200-400% for three years, and deductibles increase from $5,000-$10,000 to $25,000-$50,000. Some insurers exit the tax preparation market entirely after significant claims, leaving firms uninsurable.
Client Notification and Credit Monitoring Costs — Average $180-$240 per affected client for notification letters, call center staffing, and 12-24 months identity theft protection/credit monitoring services. Breach affecting 500 clients costs $90,000-$120,000 in notification alone before considering remediation, investigation, legal fees, or penalties.
Forensic Investigation Requirements — Post-breach forensic investigation by qualified incident response firms costs $15,000-$75,000 depending on breach scope, typically required by cyber insurance and regulatory bodies. Investigation determines breach extent, entry vector, data compromised, and regulatory notification obligations.
Legal Defense Costs — Defending against regulatory investigations (FTC, state AG, IRS) costs $50,000-$200,000 in legal fees even if no penalties ultimately assessed. Client class-action lawsuits following breaches average $150,000-$500,000 in defense costs and settlements, with high-profile cases exceeding $5 million.
Client Attrition and Revenue Loss — Post-breach client retention averages 60-70%, meaning 30-40% client loss. Practice with 600 clients and $300,000 annual revenue loses $90,000-$120,000 annually. Over 5 years, this represents $450,000-$600,000 in lost revenue far exceeding any single penalty. Acquiring replacement clients costs $150-$300 per client (marketing, onboarding time), adding $27,000-$72,000 to immediate losses.
Practice Sale Value Destruction — Tax practices sell for 0.8-1.2x annual revenue on average. Practice with documented breach history sells at 30-50% discount due to reputational damage, client attrition risk, and regulatory compliance concerns. $500,000 practice value reduced to $250,000-$350,000—a $150,000-$250,000 permanent wealth destruction.
Encryption Implementation Costs: Minimal by Comparison
In contrast to six-figure breach costs, Security Six encryption implementation costs are remarkably modest:
- Software Costs: $0 (included with Windows Pro/Enterprise and all macOS versions)
- Hardware Requirements: $0 for computers with TPM 2.0 (all business computers since 2016)
- Professional Implementation: $150-$300 per device for IT services provider to enable encryption, configure policies, document recovery keys, and provide training
- Annual Maintenance: $25-$50 per device for monthly verification, recovery key audits, and documentation updates
For typical small tax practice (5 computers, 3 external drives), total implementation cost: $1,200-$2,400 one-time plus $200-$400 annually. This represents less than 1% of average breach cost—a 100:1 return on investment purely from risk reduction.
The financial equation is unambiguous: encryption is not an expense, it's insurance with asymmetric payoff. Every dollar invested in encryption prevents hundreds in potential losses.
Book a Free Tax Cybersecurity Assessment
Our cybersecurity experts will evaluate your current Security Six encryption implementation, recovery key management procedures, and compliance documentation. Get actionable recommendations to strengthen your encryption posture before the 2026 tax season.
Frequently Asked Questions
Security Six encryption is the IRS-mandated requirement for AES-256 full-disk encryption on all devices containing taxpayer data. It represents the sixth component of the IRS Security Summit's comprehensive cybersecurity framework. All tax professionals who prepare 11 or more returns annually must implement Security Six encryption per IRS Publication 4557 and the FTC Safeguards Rule. This includes sole practitioners, CPA firms, enrolled agents, and tax preparation franchises handling client tax data.
On Windows: Open Control Panel → System and Security → BitLocker Drive Encryption. If BitLocker is on, you'll see "BitLocker on" next to your drives. Alternatively, open PowerShell and run: Get-BitLockerVolume to see encryption status.
On Mac: Open System Settings → Privacy & Security → FileVault. If FileVault is on, you'll see "FileVault is turned on for the disk." Alternatively, open Terminal and run: fdesetup status which will show "FileVault is On" if enabled.
If you're unsure, we recommend scheduling a security assessment to verify encryption status across all devices in your practice.
No. Modern computers with encryption hardware acceleration (AES-NI instruction set on Intel/AMD processors since 2010, or Apple T2/Silicon chips) experience less than 2-4% performance impact—imperceptible during normal tax software use. Testing with Drake, Lacerte, ProSeries, and TaxAct shows no measurable difference in tax return processing, e-filing, or PDF generation times on computers manufactured after 2016. Even older computers without hardware acceleration see only 8-12% reduction during intensive disk operations, which is acceptable given mandatory regulatory requirements. Any performance concerns are far outweighed by the protection against $100,000+ FTC fines and $438,000 average breach costs.
This is why recovery key storage is critical. If you forget your BitLocker PIN or FileVault password, you'll need the recovery key to unlock the device. The recovery key is a 48-digit code (BitLocker) or 24-character code (FileVault) generated during initial encryption setup. If you stored your recovery key properly (physical safe, bank deposit box, or enterprise password manager), retrieve it and enter when prompted. Without the recovery key, encrypted data is permanently inaccessible—there is no backdoor or master key. This underscores the importance of storing recovery keys in three separate secure locations immediately upon encryption activation.
Yes. IRS Publication 4557 Section 10 explicitly requires encryption of all storage media containing taxpayer information, including USB drives, external hard drives, portable SSDs, and backup media. Use BitLocker To Go (Windows) or hardware-encrypted drives (Apricorn Aegis, Kingston IronKey) for external storage devices. Any device capable of storing tax documents must be encrypted before receiving client data. This includes drives used for backups, file transfers between offices, or taking work home. Unencrypted external drives represent one of the highest breach risks—43% of tax firm breaches involve lost or stolen portable storage devices.
Encryption software is included free with Windows Pro/Enterprise and all macOS versions—no additional software purchase required. Professional implementation by an IT services provider typically costs $150-$300 per device for enabling encryption, configuring security policies, documenting recovery keys, and providing training. For a typical small tax practice with 5 computers and 3 external drives, total implementation cost is $1,200-$2,400 one-time plus $200-$400 annually for monthly verification and documentation maintenance. This represents less than 1% of the $438,000 average breach cost, making encryption one of the highest-ROI security investments available.
The IRS requires all tax preparers to have Security Six encryption fully implemented and documented before the start of each tax filing season. For the 2026 tax season, this means encryption must be active by January 27, 2026 (IRS e-file opening date). However, the FTC Safeguards Rule has required encryption since June 2023, making it immediately mandatory regardless of tax season timing. Firms without compliant encryption currently face regulatory risk. Implementation typically requires 2-4 weeks including planning, deployment, testing, and documentation—begin your encryption rollout immediately to ensure compliance before the January 2026 deadline and avoid rushing during busy season.
BitLocker is included with Windows 10/11 Pro, Enterprise, and Education editions at no additional cost (but not Windows Home edition, which requires $99 upgrade). FileVault is included free with all macOS versions since OS X Lion (2011). If you're running Windows Home edition, you can either upgrade to Pro for $99, or use VeraCrypt—a free, open-source encryption solution that meets IRS AES-256 requirements. VeraCrypt works on Windows, macOS, and Linux but requires more technical expertise to configure properly. For business compliance purposes, we recommend using built-in BitLocker or FileVault rather than third-party solutions due to better integration with enterprise management tools and simpler compliance documentation.
Encryption protects data at rest (stored on drives) from unauthorized access if the device is stolen or lost, but it does not directly prevent ransomware. Ransomware typically attacks while the computer is running and unlocked, encrypting your already-accessible files with the attacker's encryption. However, proper backup procedures (part of Security Six component #4) combined with encryption do provide ransomware protection: if ransomware strikes, you can restore from encrypted backups without paying ransom. Comprehensive ransomware protection requires all six Security Six components working together—encryption, antivirus, firewalls, two-factor authentication, backups, and VPN—plus employee security awareness training and endpoint detection and response (EDR) solutions.
Store recovery keys in at least three separate secure locations using different storage methods: (1) Fire-rated safe in locked office with access restricted to firm principals and security coordinator, (2) Bank safety deposit box for offsite disaster recovery protection, (3) Enterprise password manager like 1Password Business or Bitwarden Enterprise with zero-knowledge encryption. Never store recovery keys on the encrypted device itself, in unencrypted email, on sticky notes, or in cloud storage without additional encryption. The IRS specifically audits recovery key storage procedures during compliance reviews, and the FTC Safeguards Rule requires documented key management processes. Implement quarterly recovery key audits to verify all copies remain accessible and test recovery procedures annually using non-production systems.
Schedule
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



