10 Biggest Cybersecurity Mistakes Accounting Firms Still Make (and How to Fix Them)
Handling sensitive financial data has made accounting firms – of all sizes – prime targets for cybercriminals. In fact, cyberattacks on accounting firms have surged by 300% since the start of the COVID-19 pandemic. Yet many small and mid-sized firms continue to overlook critical cybersecurity practices. Below, we break down the ten biggest cybersecurity mistakes accounting firms still make and how to fix each one.
1. Insufficient Employee Security Training
One of the most significant vulnerabilities in any firm is its people. Human error – such as falling for phishing emails or clicking malicious links – is often a leading cause of data breaches according to Phishr. For example, a single click on a malware-laced link cost one small CPA firm $450,000 and shut down their systems. Despite these risks, many accounting firms provide minimal cybersecurity training to staff.
How to Fix It: Make security awareness an ongoing priority. Conduct regular training sessions to teach employees how to spot phishing scams, use strong passwords, and handle sensitive information. Simulated phishing exercises and interactive workshops can reinforce good habits. Fostering a culture of vigilance – where employees double-check unusual requests and feel comfortable reporting threats – will significantly reduce the human-error factor in cyber incidents.
2. Using Weak or Reused Passwords
Weak or reused passwords are a cyber criminal’s dream. Unfortunately, many accountants still use simple passwords (like “Password123“) or reuse the same credentials across multiple accounts. Studies show that weak passwords contribute to a large portion of breaches – one report found they caused about 30% of data breaches globally, and poor password practices (like reusing passwords) were factors in over 80% of company hacks. This means that if an attacker cracks or steals one password, they can potentially access numerous systems.
How to Fix It: Implement a strict password policy. Require passwords to be long (at least 12+ characters) and complex (mix of letters, numbers, symbols) and prohibit using the same password on different systems. Encourage or require the use of secure password managers to generate and store unique passwords for every account. Educate staff never to share credentials or write them on sticky notes. By upgrading password hygiene and eliminating reuse, firms can close one of the easiest doors hackers use to break in.
3. Failing to Implement Multi-Factor Authentication (MFA)
Even strong passwords can be compromised – via phishing, data breaches, or brute-force attacks. Relying solely on passwords is a mistake, yet some firms still haven’t rolled out multi-factor authentication. MFA adds an extra verification step (like a smartphone code or biometric check) to confirm the user’s identity. This extra layer is incredibly effective: Microsoft research shows that enabling MFA can block over 99.9% of account compromise attacks. Without MFA, a single stolen password can unlock your entire system.
How to Fix It: Enable multi-factor authentication on all important accounts and remote access points – email, cloud bookkeeping systems, client portals, VPNs, etc. Modern MFA solutions are user-friendly (e.g. mobile authenticator apps or push notifications) and vastly improve security. Make it mandatory for both employees and clients who access your systems. In addition, disable any legacy login methods that bypass MFA. While no security is foolproof, MFA drastically reduces the odds that a leaked or guessed password will lead to a breach.
4. Delaying Critical Software Updates and Patches
Outdated software is a ticking time bomb. Cybercriminals actively exploit known vulnerabilities in unpatched software and operating systems. A notorious example is the WannaCry ransomware attack in 2017, which spread worldwide by exploiting a Windows vulnerability that had a patch available two months prior. Organizations that failed to apply the update were left wide open, leading to massive disruptions and losses. Many accounting firms, however, still put off software updates – whether it’s an old version of QuickBooks, an unpatched server, or even not updating anti-virus definitions.
How to Fix It: Adopt a proactive patch management strategy. Enable automatic updates where possible, and regularly check for patches on all software (including office applications, tax software, and operating systems). It’s wise to designate someone (or an IT partner) to monitor security bulletins and apply patches promptly, especially for critical vulnerabilities. Before deploying firm-wide, test updates on a spare system to ensure compatibility, but don’t delay once tested. By keeping systems current, you remove the easy exploits hackers rely on and significantly strengthen your defenses.
5. Poor Network Security and Unsecured Remote Access
Accounting firms must guard not just their data, but the networks and devices that data travels through. Inadequate network security – such as poorly configured firewalls, unsecured Wi-Fi, or open remote desktop ports – can invite intruders. Common weaknesses include using default network settings, not segmenting networks, or failing to secure remote connections for staff. An attacker who slips into an undefended network can install malware, eavesdrop on data, or access client records without detection. With many accountants now working remotely, an unsecured home Wi-Fi or no VPN requirement can be an open door for hackers.
How to Fix It: Strengthen your firm’s network defenses. Ensure you have a quality firewall in place and that it’s properly configured to block unauthorized traffic. Encrypt your Wi-Fi networks with strong passwords (and update those periodically), or use enterprise-grade Wi-Fi with individual user credentials. For any remote access, require a VPN (Virtual Private Network) or secure remote desktop solution – this encrypts data in transit and authenticates users. Limit remote access privileges to only what’s necessary and monitor login logs for any unusual locations or times. Additionally, consider deploying intrusion detection systems that alert you to suspicious network behavior. By locking down the network and remote entry points, you make it much harder for cybercriminals to sneak in.
6. Not Backing Up Data (or Not Testing Backups)
Regular data backups are often the last line of defense against ransomware or catastrophic IT failures. Yet some accounting firms either don’t perform reliable backups or never test their restore process. The result? When a server crashes or ransomware encrypts everything, they lose crucial client data and have no quick way to recover. This mistake can be fatal – lost financial records can cripple an accounting practice. Imagine being unable to access client tax returns or audit workpapers during a deadline crunch. Moreover, cybercriminals know to target backups as well; if your backups are accessible on the network, ransomware will try to encrypt or delete those too.
How to Fix It: Institute a rigorous backup and disaster recovery plan. Back up all important data regularly (daily, or even multiple times a day for active data). Follow the “3-2-1” rule: keep 3 copies of data, on at least 2 different media (disk and cloud, for example), with 1 copy stored off-site (or offline) where malware can’t reach it. Equally important, test your backups periodically by attempting actual restores of files. This ensures your backups are valid and that you know how to recover quickly in an emergency. If possible, maintain an encrypted cloud backup solution that automatically retains version histories of files – so even if data is tampered with, you can roll back. Solid backups won’t prevent an attack, but they can turn a potential business-ending disaster into a manageable IT hiccup.
7. Using Unsecured or Unsanctioned Tools (Including AI Apps)
In the quest for efficiency, accountants sometimes use convenient online tools or AI services without vetting their security. This is a major risk. For instance, uploading client spreadsheets to a free AI chatbot or file converter might save time, but you could be inadvertently exposing confidential data to a third-party. The recent boom in AI tools has made this concern more urgent – if staff feed client financials or personal info into an AI like ChatGPT, that data is now on external servers outside your control. Data confidentiality is paramount in accounting, and regulators require it. The AICPA and others warn that when you enter data into generative AI, you are “sharing that data with the AI tool’s owners” and trusting them to protect it. If the AI provider suffers a breach, or uses your data to train models, your firm could face legal and reputational fallout.
How to Fix It: Treat unapproved applications and AI tools as you would any third-party risk. Develop a clear policy on AI and cloud tool usage: for example, prohibit uploading confidential client information to public AI services unless explicitly approved and secured. If you want to leverage AI, explore enterprise versions or self-hosted solutions where data can be protected. Likewise, provide secure, approved software for common tasks (e.g. a vetted PDF editor or data-sharing platform) so employees aren’t tempted to use random free websites. Educate your team about why using unauthorized apps can be dangerous. By keeping sensitive data within controlled and encrypted environments, you avoid inadvertently handing the keys to your clients’ info to an unknown party.
8. Lack of Formal Security Policies and Incident Response Plans
Many smaller firms operate on informal trust and ad-hoc decisions, which can lead to inconsistent security practices. Not having a written cybersecurity policy or incident response plan is a costly mistake. Without formal procedures, employees may not know how to handle a suspected breach, secure their devices, or comply with data protection laws. This gap is not just a technical issue – it’s increasingly a compliance issue. Under regulations like the FTC’s Safeguards Rule, accounting firms (as financial institutions) are expected to implement a written information security plan (WISP). In fact, CPAs must certify on their IRS PTIN applications that they have a WISP in place to protect client data. Lacking such plans can also mean slower, more chaotic responses to incidents, worsening the damage when a cyberattack does occur.
How to Fix It: Create and maintain a comprehensive cybersecurity policy for your firm. This should cover acceptable use of technology, password requirements, data encryption, remote work rules, and what to do if an incident is suspected. Equally important, develop an Incident Response Plan – a step-by-step playbook for containing and recovering from security incidents (who to call, how to isolate affected systems, notification steps, etc.). Make sure all employees know there is a plan and understand their role in it. Review and update these documents annually (or whenever major changes occur in your IT environment or regulations). By formalizing your security protocols, you ensure consistency and compliance – and you’ll be far more prepared to react effectively if something goes wrong.
9. Giving Employees Excessive Access Privileges
It’s convenient to give staff broad access to systems and data so they can get their work done. However, too much access for too many people dramatically increases risk. If every employee can access every client file or financial record, a single compromised account (or malicious insider) could spell disaster. This is especially relevant in accounting firms where junior staff might not need full access to all client data, yet sometimes have it by default. Additionally, not using the principle of least privilege means malware that infects one user’s machine might spread or encrypt data across shared drives that the user had no real need to access. Failing to restrict permissions is a mistake that can turn a minor breach into a firm-wide catastrophe.
How to Fix It: Audit and adjust your user access controls. Follow the principle of least privilege – each employee (and each software service account) should have only the minimum access necessary to do their job. Segment client data so that, for example, an employee in tax prep only has access to the tax documents and applications relevant to their clients, not the entire firm’s database. Use role-based access control features in your accounting software and file systems to set group permissions wisely. Also, establish a process to promptly revoke access when someone leaves the firm or changes roles. By containing what each account can see or do, you limit the blast radius if an account is compromised. In practical terms, this could be the difference between one client’s data being exposed versus your entire client roster.
10. “Do-It-Yourself” IT Security and Underestimating Threats
Small firms often operate on thin budgets and may forego professional IT security help, assuming that basic antivirus and a firewall are enough. This DIY approach and the mindset of “we’re too small to be targeted” is a big mistake. Cybercriminals do not discriminate by size – they use automated tools to find any vulnerable company. In fact, hackers actively target accounting firms of all sizes because of the valuable data they hold (tax IDs, bank details, etc.). Trying to manage cybersecurity completely in-house, without expertise or adequate resources, can leave gaps in defense. There may be no one regularly monitoring for intrusions, no time to research emerging threats, and no incident response expertise on standby. Underestimating the threat or believing that low-profile firms are safe can lead to a false sense of security – until a breach happens.
How to Fix It: Recognize that professional help and updated solutions may be needed to truly secure your firm. This doesn’t always mean hiring a full-time cybersecurity staff; you can enlist a reputable managed IT/security service to handle things like 24/7 threat monitoring, periodic security audits, and upkeep of defenses. At minimum, consult with an IT security expert to assess your vulnerabilities and shore them up. Additionally, take cyber threats seriously: invest in robust security software (endpoint protection, email filtering, etc.) and consider cyber insurance as a backstop. Most importantly, shed the “not us” mentality – treat cybersecurity as critical infrastructure for your accounting practice. By bringing in the right expertise and tools, you’ll avoid costly mistakes that come from going it alone, and you’ll better protect your clients’ trust and your firm’s reputation.
Conclusion
In an era of escalating cyber risks, accounting firms cannot afford to repeat these common mistakes. Each of the pitfalls above – from untrained employees and weak passwords to lax policies and DIY security – can be remedied with a proactive, informed approach. The solutions often involve a mix of technology upgrades, employee education, and policy improvements, all geared toward one goal: keeping client data safe and your firm’s operations running smoothly. By learning from the mistakes others have made and implementing the fixes outlined, even a small accounting firm can build a formidable defense against cyber threats. Remember, cybersecurity is not a one-time project but an ongoing commitment. Firms that embrace this will not only avoid breaches and fines, but also reinforce the confidence that clients place in them to be diligent stewards of sensitive financial information. In short, tightening up your cybersecurity now is far easier (and cheaper) than dealing with a breach later. Stay vigilant, stay updated – and your firm will be far better equipped to thrive securely in the digital age.