• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
Don’t Fall Victim To A W-2 Phishing Scam
Phishing Scam, Computer Keyboard with a yellow blank sticky note with text Phishing Scam

Don’t Fall Victim To A W-2 Phishing Scam

May 29, 2018 Posted by OCD Tech fraud, phishing

Businesses have been victimized by W-2 phishing scams in growing numbers. The scams are a variation of traditional phishing scams, where criminals trick email users into providing confidential information and then use that information to steal money or the victim’s identity.

W-2 Phishing Scams Explained

In this type of scam, cybercriminals claim to be someone from company’s management team.  They send emails to employees — typically in payroll, benefits or human resources departments. The emails often request a list of employees along with their W-2 forms, Social Security numbers or other confidential data.

The emails often appear to be legitimate because scammers use convincing techniques such as business email compromise or business email spoofing. Many emails contain the company’s logo along with the name of actual corporate executives. The messages use language such as “Kindly send me the individual 2015 W-2 (PDF) and earnings summary of all W-2 of our company staff for a quick review.”

If the employee responds to the phishing email, criminals can use this information to file fraudulent tax returns in the employees’ names. The ultimate objective of these scams is to fraudulently claim tax refunds.

Prevention Through Education

Recently, the IRS released an alert urging employers to educate payroll staff and other employees about the dangers of W-2 phishing scams. Be sure to inform all employees, particularly those in areas that handle sensitive data, about these scams and remind them not to click on links or download attachments from emails that are unsolicited, sent from addresses they don’t recognize, or that seem suspicious.

Employees often are nervous about questioning a request that appears to come from upper management. So encourage them to double-check all email requests that are for sensitive information, no matter who appears to be making the request. To do this, they should talk directly with the supervisor or colleague who “sent” the email as opposed to responding to directly to the suspicious email.

Keep Technology Up-To-Date

Install trusted antivirus software and use spam filters and download any and all updates.   With the right employee training and necessary precautions put in place, your business should remain protected against w-2 phishing scams.  However, if you suspect that you are the victim of a W-2 phishing scam, contact the IRS at [email protected] as soon as possible.

In the meantime, for more information about how you can prevent phishing scams within your workplace, we can help.  Visit our website to see all of the social engineering services that we offer.  Employee education is truly the key to preventing a breach!

Phone:  844-OCDTECH
Email: [email protected]

 

Share
0
Avatar photo

About OCD Tech

We provide independent and objective assurance of your IT controls. Using industry recognized frameworks and best practices, we assess your company’s technology risks and evaluate existing controls for risk mitigation. Your business processes are constantly evolving. We ask you, are your IT controls keeping up?

You also might be interested in

Cybersecurity Audit

How to Prepare for a Cybersecurity Audit

Sep 23, 2024

In an era where cybersecurity threats are constantly evolving, maintaining[...]

DoD Rulemaking Update and Impact on Defense Contractors

DoD Rulemaking Update and Impact on Defense Contractors

Jan 18, 2023

DoD released its long-awaited Rulemaking Agenda for CMMC 2.0 last[...]

OCDTECH.QUALITIESOFEFFECTIVEITAUDITOR

Qualities of an Effective IT Auditor 

Feb 6, 2024

In the world of technology, the role of an IT[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next