IRS News:

PHOENIX ― The Internal Revenue Service, the states and the tax industry recently urged taxpayers to take steps to protect themselves online to help in the fight against identity theft.

Scammers, hackers and identity thieves are looking to steal taxpayers’ personal information and ultimately their money. But, there are simple steps taxpayers can take to help protect themselves, like keeping computer software up-to-date and being cautious about giving out their personal information.

This is the first reminder to taxpayers during “National Tax Security Awareness Week,” which runs through Friday. This week, the IRS, the states and the tax community are joining together to send out a series of reminders to taxpayers and tax professionals as a part of the ongoing Security Summit effort.

Here are some best practices taxpayers can follow to protect their tax and financial information:

- Understand and Use Security Software . Security software helps protect computers against the digital threats that are prevalent online. Generally, the operating system will include security software or you can access free security software from well-known companies or Internet providers. Essential tools include a firewall, virus/malware protection and file encryption if you keep sensitive financial/tax documents on your computer. Do not buy security software offered as an unexpected pop-up ad on your computer or email. It’s likely from a scammer.

- Allow Security Software to Update Automatically. Set security software to update automatically. Malware – malicious software – evolves constantly, and your security software suite updated routinely to keep pace.

- Look for the “S.” When shopping or banking online, always look to see that the site uses encryption to protect your information. Look for “https” at the beginning of the web address. The “s” is for secure. Unencrypted sites begin with an http address. Additionally, make sure the https carries through on all pages, not just the sign-on page.

- Use Strong Passwords. Use passwords of eight or more characters, mixing letters, numbers and special characters. Don’t use your name, birthdate or common words. Don’t use the same password for several accounts. Keep your password list in a secure place or use a password manager. Don’t share passwords with anyone. Calls, texts or emails pretending to be from legitimate companies or the IRS asking to update accounts or seeking personal financial information are almost always scams.

- Secure Wireless Networks. A wireless network sends a signal through the air that allows it to connect to the Internet. If your home or business Wi-Fi is unsecured, it also allows any computer within range to access your wireless and potentially steal information from your computer. Criminals also can use your wireless to send spam or commit crimes that would be traced back to your account. Always encrypt your wireless. Generally, you must turn on this feature and create a password.

- Be Cautious When Using Public Wireless Networks. Public Wi-Fi hotspots are convenient but often not secure. Tax or financial Information you send though websites or mobile apps may be accessed by someone else. If a public Wi-Fi hotspot does not require a password, it probably is not secure. Remember, if you are transmitting sensitive information, look for the “s” in https in the website address to ensure that the information will be secure.

- Avoid E-mail Phishing Attempts. Never reply to emails, texts or pop-up messages asking for your personal, tax or financial information. One common trick by criminals is to impersonate a business such as your financial institution, tax software provider or the IRS, asking you to update your account and providing a link. Never click on links even if they seem to be from organizations you trust. Go directly to the organization’s website. Legitimate businesses don’t ask you to send sensitive information through unsecured channels.

To learn additional steps you can take to protect your personal and financial data, visit Taxes. Security. Together.Also, read Publication 4524, Security Awareness for Taxpayers.

Each and every taxpayer has a set of fundamental rights they should be aware of when dealing with the IRS. These are your Taxpayer Bill of Rights. Explore your rights and our obligations to protect them on

Design your blog - select from dozens of ready-made templates or make your own; simply “point & click” - click here!



Dollar for dollar,workers-compensation premium scams may be larger than bogus work injury claims.At least that’s what many expert say. And the problem seem to be getting worse,especially in urban centers with deep underground economies.

The Coalition met recently with an unlikely ally in thiseffort: the United Brotherhood of Carpenters. It represents organized labor inthe building trades. The union believes premium-avoidance schemes harm workersand cost governments mightily in lost revenue.

Whylost revenues?

Shady businesses lowballhow many workers they have, and their payroll size. They often pay workers incash, under the table. All of this helps dishonest employers avoid paying fullworkers-comp premiums, plus a bevy of federal, state and local taxes.

So, governments lose taxrevenues. Workers are cheated out of workers- comp protection, wages, overtime,unemployment benefits and Social Security. Honest employers lose business andincome because cheaters use the illicit savings to underbid them for contracts.And, workers comp insurers lose premiums.

Our recent meeting with thecarpenters union revealed disturbing examples of prominent building jobs thatincluded premium-avoidance schemes: A building at the University of Connecticut,a Florida hospital, construction at the Atlanta airport, and a building at theWalter Reed military hospital complex in suburban Washington, D.C.

The latter hits close to home — I drive by the hospitalcomplex almost daily.

The carpenters’ proposals for comp insurers are a primeron why partnerships could be a great resource to move an anti-fraud agendaforward more decisively:

*Work together on best practices for conducting auditsand investigations into premium-avoidance schemes;

*Adopt procedures to red-flag potential premium fraud;and

*Cooperate with stakeholders on investigations.

Workers-comp insurersalready appear to be doing much of this. Yet it needs repeating that expanding everyone’s knowledge of schemes is aforce multiplier. This will help identify more plots schemes, and boost theentire anti-fraud effort.

Fraud fighters mustwork with allies to educate state policymakers to better stop costly comp scams— premium avoidance and bogus injury claims.

We can make greaterprogress by including non-traditional allies such as the carpenters union. Themore influential allies that are brought together, the stronger the efforts againstcomp scams will become.

The carpenters union is a clarion call that effectivepartnerships will help everyone better combat workers-comp schemes of everykind.

About the author: Howard Goldblatt is director ofgovernment affairs for the Coalition Against InsuranceFraud.



The cyber security industry is growing as you’re reading this.More specialists join the ranks, more malware is being launched every day thanever before: 230,000 new malware samples/day according to the lateststatistics. Naturally, more resources are being deployed to counter cyberattacks. That’s why I thought it would be helpful to sum up 10 cyber securityfacts that define the current information security landscape.

One of these essential facts is the estimated annual cost forcyber crime committed globally which has added up to 100 billion dollars! Anddon’t think that all that money comes from hackers targeting corporations,banks or wealthy celebrities. Individual users like you and me are alsotargets.

As long as you’re connected to the Internet, you can become avictim of cyber attacks.

So that’s why we wanted to walk you through some of the mostshocking cyber security facts that you maybe wish you’d known until the presentmoment.

These will give you a much more accurate idea of howdangerous it really is to go online without proper protection.

1. The most wantedcyber criminals in the world

On FBI’s Most Wanted List for cyber criminals you willcurrently find 19 individuals, each being responsible for consumer lossesranging from $350,000 to more than $100 million. They are from all over theworld and huge rewards are offered for their capture.

2. The most expensivecomputer virus of all times

Ever wondered how much damage a computer virus can do? Let usgive you a compelling example through this next cyber security fact. MyDoom isconsidered to be the most expensive virus in the world and in cyber securityhistory, having caused an estimated financial damage of $38.5 billion!

3. Social media – ahackers’ favorite target

Currently, according to in depth statistics, there are morethan 1.6 billion social network users worldwide with more than 64% of internetusers accessing social media services online. Moreover, social networking isone of the most popular ways for online users to spend their time, and apreferred way to stay in contact with friends and families.

4. 99% of computers arevulnerable to exploit kits

Cyber security fact: Oracle Java, Adobe Reader or Adobe Flashis present on 99% of computers. That means that 99% of computer users arevulnerable to exploit kits (software vulnerabilities).

Why? Because the vulnerabilities that these types of softwareoften present are extremely critical: all it takes is one click on an infectedadvertising banner to give a hacker full access to your computer.

5. Security warning:inside jobs

Maybe you’ll be surprised to find out that a shocking 59% ofemployees steal proprietary corporate data when they quit or are fired. Butthere are more types of insider threats to get protection.

6. Social engineering –cyber criminals’ favorite way to manipulate victims

People are the weakest link when it comes to cyber security,which is why psychological manipulation of cyber attack victims is so common.

7. Your government ismaking you more vulnerable

Cyber security fact: governments around the world arecreating malware and using it as digital weapons or in espionage programs. Inthe past 5 years, more than a handful of government malware have beendiscovered (such as Stuxnet), but their origins have yet to receive fullattribution.

8. There is a real-timemap that shows cyber attacks in action

Ever wondered how cyber attacks look at a global scale? Nowyou have the chance to do it with this real-time map put together by Norse.

9. Hacktivism is themain motivation that drives cyber attacks

Hacktivism accounts for half of the cyber attacks launched inthe world. The term represents a subversive use of computers and computernetworks to promote a political agenda. With roots in hacker culture and hackerethics, its ends are often related to the free speech, human rights, or freedomof information.

10. 68% of funds lostas a result of a cyber attack were declared unrecoverable

Cyber crime is not only costly, but poses other problems aswell for organizations worldwide.



The FinancialCrime & Compliance Investigations (FCCI) Unit comprises of severalteams that conduct complex & serious investigations across all types offraud and financial crime risk. The role holder is principally responsible forinvestigations into the most serious financial crime. Role holders must be ableto conduct competent investigations into all types of Financial Crime, workingalone/as part of a team, sharing knowledge and experience as appropriate. Therole holder is required to assist the Senior Investigations Manager, FCCI indesigning and deploying, policies, procedures and strategies that will minimiserisk of Financial Crime within or against HSBC.

Duties & Responsibilities

·        Assisting a team of investigators who undertakedetailed financial crime investigations

·        Day-to-day, ensuring compliance with procedures,Global Standards and local legislative/regulatory requirements are met acrossall financial crime risks, i.e. Sanction, Anti Money Laundering (AML) AntiBribery & Corruption (AB&C), Fraud and GIIG (Global InternalInvestigations Group).

·        Assist the Senior Investigations Manager FCCI inidentifying best practices/ procedures providing guidance and solutions to theBusiness and / or involved areas, in timely and effective manner for each ofthe identified cases focusing on control weaknesses, responsible and decision

·        Assisting the FCCI Investigations Manager and RegionalHead FCCI, providing expertise to the implementation of globally led changeinitiatives within regions across all Financial Crime and Risks

·        Building collaborative and excellent workingrelationships with internal/external stakeholders

·        Identifying cases which meet the criteria forescalation to the Regional Investigation Oversight (RIO) Committee

·        Providing clear lines of investigation for each caseand streamlining processing to minimize duplication of effort

·        Directing and implementing investigations to ensurethey are efficiently and effectively managed within the agreed timeline whilstremaining mindful that investigations can be diverse and complex, adapting anapproach to the requirements of each investigation

·        The proactive identification, mitigation and timelyrecovery and reporting of  financiallosses

·        Supervision of FCCI related tasks formed and closed byteam members within the Case Management System

·        Provide guidance and identify ongoing improvements ofpractical guidance to business lines in respect of queries which relate to aninvestigation

·        Providing clear direction and support to team members,acting as a “go-to” person, escalating any immediate issues/concerns to SeniorManagement/HR if necessary.

·        Maximise loss recovery and minimise risk exposure bytaking prompt action where required.

·        Provide oversight of intelligence / case files beingshared with Law Enforcement / government agencies

·        Assist in complex Global investigations as well asGIIG lead investigations as requested.

·        Ensure that the Bank’s interests are externallyrepresented in order to build and reinforce professional and positiverelationships with external customers/stakeholders. Maintain closerelationships with Law Enforcement and other government agencies involved inthe management of cases.

Knowledge & Experience

·        Investigative skills from law enforcement, regulatory,forensic accountancy or legal disputes. Seasoned professional with directinvolvement, particularly within FCC environment

·        Ability to undertake intrinsic investigations/analysisof customer activity and Case Management experience

·        Good working knowledge of Sanctions, Financial Crimeand AB&C legislation  in the regionand, associated regulation & guidance

·        Ability to manage and lead change, contributing tojoining up with the other teams in Risk and Business globally

·        Ability to recognize suspicious financial activitiesand escalate to meet internal/external regulatory requirements

·        Lateral thinker with an ability to exercise strongjudgement, interpret and solve complex issues, working independently forextensive periods of time with minimal supervision

·        Excellent attention to detail required along with ahigh level of analytical competency

·        An inquisitive approach to practices, procedures andspecific transactions. Personal authority and integrity. Independence,creativity, resourcefulness and resilience

·        Excellent communicator with strong inter-personal andinfluencing skills, who will be able to adapt their approach for differentaudiences

·        Proficient user of Microsoft Office

High Risk Role

Within HSBC certain roles aredesignated as High Risk. High Risk Roles are those where employee malpracticecould lead to significant financial and/or reputational damage through internalfraud, data loss, bribery or the leaking of confidential information. For theseroles, all internal and external applicants are required to undergo a range ofenhanced security/background checks as part of the pre-employment vettingprocess. In the event that you are short-listed for this role, further detailsare available from the HSBC Recruitment team on our enhancedsecurity/background checking processes.

Business Area

HSBC’s Global Functions (GF) play avital role in supporting the bank’s Global Businesses and offer a broad rangeof career opportunities in areas from legal, risk and finance to humanresources, sustainability, marketing and communications. Our operational andfunctional teams around the world help HSBC’s Global Businesses to operateefficiently and effectively on a day-to-day basis. They also focus on controlsand governance to reduce risk and protect the Group’s reputation. For moreinformation visit;

About HSBC

HSBC is one of the world’s leadingbanks, with a network covering 71 countries and territories. Our global reachmeans we offer many ways for you to develop your career. We offer an inclusive,values-led culture, tailored learning and development programmes andcompetitive benefits. We have roles in retail, commercial, investment andprivate banking and a range of operational and functional teams.


We put diversity at the heart ofour business and we take our responsibility to develop our talent seriously.Joining HSBC will give you the chance to work in a collegiate, supportive andinclusive environment in which we seek to develop and promote people based onmerit. We will provide you with tailored training and support to help youidentify and follow your chosen career path, as well as access to a range ofmarket-competitive benefits.

What to expect at HSBC

·        The chance to realise your ambitions

·        Globally connected careers

·        A strong emphasis on values

·        Learning and development opportunities

·        An inclusive, meritocratic culture

·        Market-competitive benefits

Global Careers Opportunities

Visit our Global Careers site whereyou can explore our business, meet our people and find useful application hintsand tips