
IRS Publication 4557: What Every Tax Professional Must Know in 2026
IRS Publication 4557 is the federal government's definitive cybersecurity compliance guide for every tax professional in the United States who handles taxpayer data. Developed through the IRS Security Summit initiative and updated for 2026, this publication mandates specific technical safeguards, administrative controls, and documented security programs that apply equally to solo practitioners, seasonal preparers, and large accounting firms.
Tax preparation databases represent one of the most concentrated repositories of personally identifiable information (PII) in any industry — containing Social Security numbers, dates of birth, employer identification numbers, bank routing information, investment account details, and comprehensive income documentation for hundreds or thousands of clients per practice. Non-compliance with IRS Publication 4557 requirements exposes tax professionals to Federal Trade Commission (FTC) enforcement actions under the Gramm-Leach-Bliley Act (GLBA), potential Electronic Filing Identification Number (EFIN) suspension or revocation, state-level data breach notification penalties averaging $150 per compromised record, and civil litigation from affected clients seeking damages for identity theft and financial fraud.
This guide walks through every requirement — from the Security Six technical controls to Written Information Security Plan (WISP) obligations, state-specific mandates, and emerging threats that will shape compliance in the years ahead.
Tax Industry Cybersecurity By The Numbers
IBM Cost of a Data Breach Report 2024
Verizon 2025 Data Breach Investigations Report
FTC Safeguards Rule enforcement, no total cap
What Is IRS Publication 4557 and Why Does It Exist?
IRS Publication 4557, officially titled Safeguarding Taxpayer Data: A Guide for Your Business, is a federal compliance document that establishes mandatory cybersecurity standards for all professionals who prepare, process, or transmit tax returns for compensation. First released as part of the Security Summit initiative in 2015 and updated annually, the publication translates complex federal cybersecurity regulations into specific, actionable requirements tailored to the tax preparation industry. The 2026 version incorporates lessons from escalating ransomware attacks targeting tax practices and strengthened FTC enforcement priorities.
The publication exists because tax professionals occupy a unique position in the data security environment. Unlike most businesses that collect limited customer information, a single tax preparation engagement requires clients to disclose virtually every piece of sensitive financial and personal data they possess. This concentration of high-value PII makes tax practices extraordinarily attractive targets for cybercriminal organizations, which have industrialized their attacks using sophisticated phishing campaigns, ransomware deployments, and credential-theft operations. Learn more about the full scope of cyberattacks targeting tax firms and the tactics adversaries use.
The Legal Foundation: Gramm-Leach-Bliley Act (GLBA)
IRS Publication 4557 requirements derive their legal authority from the Gramm-Leach-Bliley Act (15 U.S.C. §§ 6801–6809), which classifies tax preparation services as "financial institutions" subject to federal information security mandates. The GLBA requires financial institutions to implement information security programs protecting the security, confidentiality, and integrity of customer information.
The FTC enforces GLBA compliance through its Standards for Safeguarding Customer Information rule (16 CFR Part 314), commonly called the FTC Safeguards Rule. Violations carry civil penalties up to $46,517 per violation per day, with no maximum cap on total penalties. The FTC has demonstrated increasing enforcement appetite, issuing multiple complaints against tax preparation firms in recent years for inadequate data security practices. For a deeper look at how this rule intersects with your obligations, see our guide on the FTC Safeguards Rule for tax preparers.
2026 Tax Season Compliance Deadline
The IRS requires all tax preparers to have an updated Written Information Security Plan (WISP) and fully implemented Security Six controls in place before the start of the 2026 filing season. Firms without a compliant plan face potential PTIN suspension, EFIN revocation, and FTC enforcement referrals. There is no minimum client threshold — a preparer filing 11 returns annually faces identical obligations as a firm processing 10,000.
Who Must Comply With IRS Publication 4557 Requirements?
IRS Publication 4557 compliance obligations extend to every individual and organization that prepares federal or state tax returns for compensation, regardless of practice size, business structure, or preparation volume. The compliance obligation begins the moment a tax professional collects the first piece of client information and continues indefinitely — even after a preparer retires or closes their practice — because historical client data retention requirements persist under IRC §6107 (minimum three years from return due date or filing date, whichever is later).
Covered parties include:
- Certified Public Accountants (CPAs) and enrolled agents operating solo practices or multi-partner firms
- Seasonal tax preparers working during filing season only, including those working from home offices
- Tax preparation franchises and their individual franchise locations
- Accounting firms offering tax services as part of broader financial service portfolios
- Volunteer tax preparation programs like VITA and TCE sites handling taxpayer data
- Tax software developers and hosting providers processing returns on behalf of preparers
There is no minimum client threshold that exempts smaller practices. Review our detailed breakdown of PTIN requirements and compliance obligations to understand exactly how these rules apply to your practice structure. Our post on PTIN and WISP requirements for tax preparers covers the intersection of preparer registration and security obligations.
Bottom Line
Every tax preparer who files returns for compensation must comply with IRS Publication 4557 — regardless of firm size, client volume, or whether they work from home. The IRS draws no distinction between a solo seasonal preparer and a 50-person CPA firm when it comes to taxpayer data protection obligations.
The Security Six: Core Technical Requirements
IRS Publication 4557 organizes its technical requirements around six foundational security controls collectively known as the "Security Six." These controls represent the minimum baseline security posture required for all tax preparation practices in 2026. Implementation must be documented in your WISP and subject to regular effectiveness testing. The Security Six framework aligns with NIST Cybersecurity Framework 2.0 core functions (Identify, Protect, Detect, Respond, Recover) and incorporates specific technical standards from NIST Special Publication 800-171 regarding protection of controlled unclassified information.
1. Antivirus and Anti-Malware Software
Modern malware campaigns specifically target tax preparation software to steal client databases, harvest EFIN credentials, and deploy ransomware during peak filing season. IRS Publication 4557 requires enterprise-grade endpoint protection that substantially exceeds basic consumer antivirus capabilities. Required features include real-time protection scanning files as they are accessed, behavioral analysis detecting zero-day threats that signature-based detection misses, automatic updates receiving threat definition updates multiple times daily, centralized management for multi-device practices, and ransomware protection with rollback capabilities.
The Cybersecurity and Infrastructure Security Agency (CISA) recommends Endpoint Detection and Response (EDR) solutions that provide forensic capabilities for investigating security incidents. Independent testing laboratories consistently show that traditional signature-based antivirus detects only 20–30% of modern threats, making next-generation behavioral detection essential for IRS Publication 4557 compliance. Free consumer antivirus products do not satisfy requirements because they lack centralized management, enterprise support, and advanced threat detection capabilities. See our guide on antivirus for tax professionals for solution comparisons.
2. Hardware and Software Firewalls
Firewalls create defensive perimeters that prevent unauthorized network access and monitor traffic for malicious activity. IRS Publication 4557 requires both hardware firewalls protecting the network edge and software firewalls on individual devices, creating a defense-in-depth architecture. Professional implementations must include next-generation firewall appliances with intrusion prevention systems (IPS) and application-layer filtering, stateful inspection tracking connection state, geographic blocking for high-risk regions, VPN termination for secure remote access, and comprehensive logging of all blocked connection attempts.
Small practices often rely on residential-grade routers with basic firewall capabilities — a configuration that fails IRS Publication 4557 standards. These devices lack advanced threat intelligence, granular policy controls, and the logging required for professional business network security. Our firewall setup guide for tax offices walks through compliant configurations step by step.
3. Full-Disk Encryption
Full-disk encryption protects data if devices are lost, stolen, or improperly disposed of by rendering stored information unreadable without proper authentication credentials. IRS Publication 4557 mandates encryption for all devices containing or that have ever contained taxpayer information — workstations, servers, laptops, tablets, external drives, mobile devices, and backup media.
Encryption implementation must meet federal standards: FIPS 140-2 validated cryptographic modules at minimum (FIPS 140-3 preferred for 2026), AES-256 encryption for data at rest, TLS 1.3 for data in transit (deprecating TLS 1.0/1.1/1.2), centralized key management with recovery mechanisms, and pre-boot authentication requiring credentials before the operating system loads. Many tax professionals mistakenly believe that password-protecting Microsoft Office files or PDFs provides adequate encryption — it does not. Standard password protection uses weak algorithms easily defeated by widely available password-cracking tools and does not meet IRS encryption requirements. For background on how encryption actually works, see our explainer on hashing vs. encryption.
4. Multi-Factor Authentication (MFA)
Password compromises account for 81% of data breaches according to the Verizon 2025 Data Breach Investigations Report. IRS Publication 4557 requires multi-factor authentication (MFA) for all systems and applications accessing taxpayer data, eliminating passwords as a single point of failure. MFA must cover tax software access, all business email systems receiving client communications, cloud storage syncing tax documents, remote access tools including RDP and VPN, and all administrative accounts with elevated privileges.
The NIST Digital Identity Guidelines (SP 800-63B) recommend phishing-resistant MFA using FIDO2/WebAuthn security keys rather than SMS codes, which criminals can intercept through SIM swapping attacks. As of 2026, hardware security keys represent the gold standard for MFA in tax practices handling high-value PII. Many tax software vendors now require two-factor authentication as a condition of EFIN authorization, making this both a compliance requirement and a practical necessity for e-filing capabilities.
5. Data Backup and Disaster Recovery
Ransomware attacks continue to escalate against small businesses. IRS Publication 4557 requires backup and disaster recovery strategies following the 3-2-1 rule: three copies total, two different storage types, and one offsite copy. Advanced requirements for 2026 compliance include immutable backups preventing ransomware from encrypting or deleting backup data, regular restoration testing with documented results and recovery time objectives (RTOs) not exceeding 24 hours for tax systems, encrypted backup storage meeting FIPS 140-2 standards, and version retention maintaining multiple backup generations.
Industry data shows that untested backups fail 58% of the time during actual recovery attempts — making documented testing a compliance necessity. For a full implementation guide, see our post on ransomware protection for tax practices.
6. Virtual Private Networks (VPNs)
Remote work arrangements and mobile access expose taxpayer data to interception on unsecured networks. IRS Publication 4557 mandates VPN usage for all remote connections to systems containing or processing tax data. Professional VPN implementations require enterprise solutions with centralized management and per-user access controls, strong encryption protocols including IKEv2/IPsec or OpenVPN with AES-256-GCM, split-tunneling prohibition forcing all traffic through the VPN tunnel, kill switch functionality terminating connections if VPN encryption fails, and certificate-based authentication combined with MFA.
Tax professionals frequently ask whether their tax software vendor's cloud hosting eliminates VPN requirements. It does not — while cloud hosting may reduce on-premises infrastructure, any remote access to practice systems, client portals, or administrative interfaces still requires VPN protection under IRS Publication 4557 standards. Our guide on how to choose a VPN covers what to look for in enterprise-grade solutions.
Security Six Implementation Roadmap
Deploy Enterprise EDR on All Devices
Install Endpoint Detection and Response (EDR) software on every workstation, laptop, and server that accesses taxpayer data. Configure centralized management, automatic updates, and ransomware rollback capabilities.
Configure Next-Generation Firewall
Replace residential-grade routers with a business firewall appliance featuring IPS, application-layer filtering, and geographic blocking. Enable comprehensive logging for all blocked connection attempts.
Enable Full-Disk Encryption
Activate BitLocker (Windows) or FileVault (Mac) on all devices. Implement centralized key management and pre-boot authentication. Document encryption status for each device in your WISP.
Enforce Multi-Factor Authentication
Enable phishing-resistant MFA (FIDO2/WebAuthn preferred) on tax software, email, cloud storage, remote access tools, and all administrative accounts. Eliminate SMS-only MFA where possible.
Implement 3-2-1 Backup Strategy
Configure three backup copies across two storage types with one offsite or immutable copy. Schedule and document weekly restoration tests. Set recovery time objectives not exceeding 24 hours.
Deploy Enterprise VPN
Install and configure a business VPN solution with kill switch functionality and certificate-based authentication. Prohibit split-tunneling and require VPN for all remote access to practice systems.
Document Everything in Your WISP
Record all implemented controls, configurations, responsible parties, and testing results in your Written Information Security Plan. Update the WISP whenever configurations change.
Security Six Quick Compliance Checklist
- Deploy enterprise EDR solution on all devices accessing taxpayer data
- Configure next-generation firewall with IPS and enable automatic threat intelligence updates
- Enable BitLocker (Windows) or FileVault (Mac) full-disk encryption on all devices
- Enforce multi-factor authentication on tax software, email, and remote access
- Implement 3-2-1 backup strategy with weekly documented restoration testing
- Deploy enterprise VPN with kill switch for all remote connections
- Document all security implementations in your WISP
- Schedule quarterly security control effectiveness reviews
Written Information Security Plan (WISP) Requirements
Beyond the technical Security Six controls, IRS Publication 4557 requires all tax professionals to create, maintain, and regularly update a Written Information Security Plan (WISP) — a formal document describing how your practice protects taxpayer information across administrative, technical, and physical security domains. The WISP serves multiple functions: demonstrating due diligence in the event of a data breach or regulatory investigation, providing operational guidance ensuring consistent security practices across all personnel, satisfying FTC Safeguards Rule documentation requirements under 16 CFR § 314.4, and creating accountability by designating specific individuals responsible for security program oversight.
A compliant WISP must address these mandatory components:
- Security program coordinator designation — A specific individual (may be the owner or principal) responsible for developing, implementing, and maintaining the security program
- Risk assessment methodology — Documented process for identifying reasonably foreseeable internal and external risks to taxpayer information security, confidentiality, and integrity
- Safeguard selection and implementation — Detailed description of administrative, technical, and physical controls selected based on risk assessment results
- Service provider oversight — Procedures for evaluating and monitoring third-party vendors who receive access to taxpayer information, including contractual security requirements
- Security program testing and monitoring — Regular evaluation procedures assessing safeguard effectiveness and compliance with the plan
- Personnel security and training — Employee background check policies, security awareness training programs, and acceptable use policies
- Incident response procedures — Step-by-step protocols for detecting, responding to, and recovering from security incidents or data breaches
- Program adjustment process — Procedures for updating the WISP based on test results, security incidents, or changes in business operations
The IRS provides a free WISP template through IRS Publication 5708 designed specifically for tax professionals, but many practices benefit from professional assistance ensuring their plan thoroughly addresses their specific risk profile and technology environment. Our detailed guide on how to create a WISP walks through the complete development process with industry-specific examples. You can also access our free WISP template for 2026 to get started immediately.
For CPA firms specifically, our WISP checklist for CPA firms provides a structured approach to verifying your plan covers every required element. And if you want to see what a finished plan looks like, review our IRS WISP example with annotated sections.
Need a Compliant WISP Fast?
Our security team has helped thousands of tax professionals create IRS-compliant Written Information Security Plans. Get a professionally developed WISP tailored to your practice size and technology environment.
State-Specific Data Security Requirements Beyond Federal Mandates
While IRS Publication 4557 establishes the federal compliance baseline, many states enforce additional data protection regulations that affect tax professionals — particularly those serving clients across state lines. Multi-jurisdictional compliance obligations require careful attention to prevent costly violations and ensure complete data protection coverage.
Massachusetts 201 CMR 17.00
Widely considered the strictest state data security regulation in the United States, Massachusetts law requires encryption of all portable device data and all records transmitted wirelessly or across public networks, written information security programs with technical requirements that exceed basic WISP standards, annual employee training documentation with evidence of completion and comprehension assessment, and vendor security contract provisions mandating equivalent protections in all third-party agreements. Massachusetts imposes penalties up to $5,000 per record compromised in a breach resulting from non-compliance, with no maximum cap. Tax professionals serving any Massachusetts residents must comply regardless of where the practice is physically located.
New York SHIELD Act
Effective since March 2020 and actively enforced by the New York Attorney General, the Stop Hacks and Improve Electronic Data Security (SHIELD) Act requires reasonable administrative, technical, and physical safeguards proportionate to data sensitivity and breach risk, documented risk assessments, employee training programs, and vendor management procedures. The Act mandates 72-hour breach notification to the state attorney general after discovery of unauthorized acquisition of private information, with penalties up to $5,000 per violation plus mandatory notification costs that can exceed $200 per affected New York resident.
California CCPA and CPRA
California's privacy framework grants consumers extensive rights over their personal information, including the right to access all personal information collected about them, the right to delete personal information upon request (subject to limited exceptions including tax records retention requirements), and the right to opt out of personal information sales and sharing. The California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA) create a private right of action for data breaches ranging from $100 to $750 per consumer per incident, with administrative fines up to $7,500 per intentional violation enforced by the California Privacy Protection Agency.
The National Conference of State Legislatures maintains a database of all state breach notification laws. Multi-state practices should review this resource annually to ensure compliance with every jurisdiction where they serve clients.
Advanced Security Measures for Enhanced Protection
The Security Six represent minimum baseline requirements. Sophisticated tax practices in 2026 are implementing advanced security architectures providing defense-in-depth protection against evolving threats.
Zero Trust Architecture
Traditional security models trust all users and devices inside the network perimeter. Zero Trust Architecture eliminates this implicit trust, requiring continuous verification for every access request regardless of network location. For tax practices, implementation involves micro-segmentation — isolating tax software, client data, and administrative systems into separate network segments with strict inter-segment access controls — alongside least-privilege access granting users minimum permissions required for their specific job functions, continuous authentication using behavioral analytics to detect anomalous access patterns, and device compliance verification allowing access only from devices meeting security standards.
Security Information and Event Management (SIEM)
SIEM platforms aggregate security logs from firewalls, endpoints, servers, and cloud services into a unified platform enabling advanced threat detection through behavioral analytics, correlation rules detecting multi-stage attack patterns, automated incident response workflows, and compliance reporting dashboards documenting security posture for IRS Publication 4557 audits. Modern managed detection and response (MDR) services combine advanced EDR with 24/7 security operations center monitoring at a fraction of the cost of building internal SOC capabilities — a practical option for practices handling substantial taxpayer data volumes.
Security Awareness Training and Phishing Simulation
Human factors remain the weakest link in cybersecurity. Baseline training covering password security, phishing recognition, physical security, and data handling should be supplemented with role-based specialized training, simulated phishing campaigns testing employee vigilance, immediate remedial training for employees who click simulated phishing links, and quarterly refresher training addressing emerging threats. NIST SP 800-50 provides guidance on building information security awareness programs. Phishing simulation baseline failure rates typically range from 15–30% before training and drop to 3–8% with consistent reinforcement. Our guide on security awareness training for tax firms covers program design in detail. For a deeper look at the threat itself, see our explainer on what is phishing and our guide to social engineering tactics adversaries use against tax professionals.
Preparing for Emerging Regulatory and Threat Changes
Cybersecurity regulations and threat environments continue evolving rapidly. Tax professionals who stay ahead of emerging requirements position their practices for seamless compliance transitions rather than scrambling to meet new mandates after enforcement begins.
Artificial Intelligence Security Requirements
AI-powered attacks are escalating in sophistication. Future IRS Publication 4557 updates and FTC guidance will likely mandate AI-enhanced threat detection systems capable of identifying AI-generated phishing content, verification protocols for voice and video communications to counter deepfake impersonation attacks, policies governing staff use of generative AI tools to prevent inadvertent taxpayer data exposure through LLM training data, and behavioral biometrics detecting account takeover based on typing patterns and mouse movements. Our analysis of AI agent cyber threats in 2026 covers how these attack techniques are already being used against small businesses.
Quantum-Resistant Cryptography
The National Institute of Standards and Technology published post-quantum cryptography standards in FIPS 203, 204, and 205, preparing organizations for quantum computing threats that could render current encryption algorithms obsolete. Forward-thinking tax practices should begin inventorying current cryptographic implementations, planning phased migration to quantum-resistant algorithms (ML-KEM, ML-DSA, SLH-DSA) as vendors implement them, and monitoring vendor announcements for quantum-safe updates to tax software, email encryption, and VPN solutions.
The "harvest now, decrypt later" threat is real — adversaries are collecting encrypted taxpayer data today, intending to decrypt it once quantum computers become practical. While that timeline remains 5–10 years out, the migration will require years of preparation, and tax practices with multi-decade client data retention obligations face longer exposure windows than most industries.
Bring Your Own Vulnerable Driver (BYOVD) Attacks
Attackers are increasingly using signed but vulnerable drivers to bypass endpoint security controls — a technique detailed in our analysis of EDR-killing BYOVD attacks in 2026. Tax practices running EDR solutions should verify their vendor's protection against driver-based evasion techniques, as standard antivirus products provide no protection against this class of attack.
Consequences of Non-Compliance: What's Actually at Stake
Tax professionals sometimes view IRS Publication 4557 requirements as bureaucratic overhead rather than genuine risk management. That framing understates the consequences of a breach or regulatory action substantially.
On the regulatory side, FTC civil penalties under the Safeguards Rule accrue at up to $46,517 per violation per day with no statutory maximum — meaning a single prolonged enforcement action can reach seven or eight figures. The IRS can suspend or revoke EFIN credentials, effectively shutting down a practice's ability to file returns electronically. State attorneys general in New York, Massachusetts, California, and other states have demonstrated willingness to pursue independent enforcement actions with their own penalty structures.
The civil liability exposure compounds these regulatory risks. Clients whose Social Security numbers or bank account information appear in criminal marketplaces after a breach have standing to pursue damages for identity theft, fraudulent tax returns filed in their name, unauthorized account access, and the costs of credit monitoring and identity restoration. Class action litigation following data breaches at tax practices has resulted in settlements ranging from hundreds of thousands to millions of dollars for mid-sized firms.
Beyond direct financial exposure, the reputational damage from a publicized breach can be practice-ending for firms that built their business on client trust. The IBM Cost of a Data Breach Report 2024 documents that organizations with strong security posture contain breaches in less than half the time of less-prepared organizations, translating directly to lower total breach costs and faster recovery.
For a complete picture of how these enforcement actions play out, see our guide on cybersecurity for accounting and CPA firms.
What This Means for Your Practice
Non-compliance with IRS Publication 4557 is not just a regulatory risk — it is a business continuity risk. A ransomware attack during filing season without tested backups, or a client data breach without incident response procedures, can cost more in lost revenue, remediation, and litigation than a full compliance program costs to implement over a decade.
Get a Free Tax Cybersecurity Assessment
Our experts will evaluate your current security posture against IRS Publication 4557 requirements and provide actionable recommendations tailored to your practice size and risk profile.
Frequently Asked Questions
IRS Publication 4557, titled Safeguarding Taxpayer Data: A Guide for Your Business, is a federal compliance document published by the Internal Revenue Service establishing mandatory cybersecurity standards for all tax professionals who prepare, process, or transmit tax returns for compensation. It covers the Security Six technical controls, Written Information Security Plan (WISP) requirements, incident response procedures, and data retention obligations. It is updated annually and derives legal authority from the Gramm-Leach-Bliley Act and the FTC Safeguards Rule.
Every individual and organization that prepares federal or state tax returns for compensation must comply, regardless of firm size, business structure, or number of returns filed annually. This includes CPAs, enrolled agents, seasonal preparers, tax preparation franchises, accounting firms offering tax services, and tax software developers. There is no minimum client threshold — a preparer filing 11 returns faces the same obligations as a firm filing 10,000.
The Security Six are the minimum baseline technical controls required by IRS Publication 4557: (1) enterprise antivirus and anti-malware software with behavioral detection, (2) hardware and software firewalls with next-generation capabilities, (3) full-disk encryption meeting FIPS 140-2 standards on all devices, (4) multi-factor authentication (MFA) on all systems accessing taxpayer data, (5) a 3-2-1 data backup and disaster recovery strategy with tested restoration procedures, and (6) a virtual private network (VPN) for all remote access to practice systems.
A Written Information Security Plan (WISP) is a formal document describing how your practice protects taxpayer information across administrative, technical, and physical security domains. Yes — IRS Publication 4557 requires all tax preparers to create, maintain, and regularly update a WISP, regardless of practice size. The WISP must address security coordinator designation, risk assessment methodology, safeguard implementation, service provider oversight, personnel training, incident response procedures, and program adjustment processes. The IRS provides a free sample WISP template through IRS Publication 5708.
Non-compliance can result in multiple overlapping penalties. The FTC can impose civil penalties up to $46,517 per violation per day under the Safeguards Rule with no maximum cap. The IRS can suspend or revoke EFIN credentials, preventing electronic filing. State attorneys general can impose separate penalties — Massachusetts charges up to $5,000 per compromised record, New York up to $5,000 per violation. Affected clients can pursue civil litigation for identity theft damages, with class action settlements at tax firms ranging from hundreds of thousands to millions of dollars.
Yes. IRS Publication 4557 draws no distinction based on practice size or volume. A solo preparer filing 25 returns from a home office faces identical legal obligations as a 50-person CPA firm. The scope and cost of implementation will scale appropriately — a single-person practice may satisfy requirements with a simpler WISP and fewer technical controls than a large firm — but the legal requirement to implement the Security Six and maintain a WISP applies universally to anyone preparing returns for compensation.
You should review and update your WISP at least annually, as well as whenever material changes occur — including adding new technology, changing vendors, hiring or departing employees with data access, experiencing a security incident, or encountering new regulatory requirements. The FTC Safeguards Rule specifically requires adjustments based on test results and security incidents. Many practices time their annual WISP review to coincide with the start of tax season preparation, typically September or October.
Yes. State data security laws apply based on where your clients reside, not where your practice is located. Massachusetts 201 CMR 17.00 applies if you serve any Massachusetts residents and imposes stricter requirements than the federal baseline, including penalties up to $5,000 per compromised record. New York's SHIELD Act requires 72-hour breach notification to the state attorney general. California's CCPA/CPRA creates a private right of action for data breaches of $100–$750 per consumer per incident. Multi-state practices must comply with every state's requirements for the clients they serve.
No. Free consumer antivirus products do not satisfy IRS Publication 4557 requirements because they lack centralized management, enterprise support, and the advanced threat detection capabilities required for protecting high-value taxpayer data. The publication requires enterprise-grade endpoint protection with real-time behavioral analysis, automatic updates, centralized management for multi-device practices, and ransomware protection with rollback capabilities. Independent testing shows consumer antivirus detects only 20–30% of modern threats, making next-generation Endpoint Detection and Response (EDR) solutions the appropriate standard.
Activate your WISP incident response procedures immediately. Key steps include isolating affected systems to prevent further spread, contacting the IRS at 1-800-830-5084 to report a data theft or loss (required), notifying your state tax agency, contacting your professional liability insurer, preserving forensic evidence before remediation, and notifying affected clients in accordance with your state's breach notification law. Federal law does not mandate a specific IRS breach notification timeline, but state laws vary — New York requires 72-hour notification to the attorney general, while other states require notification within 30–60 days of discovery.
Schedule
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



