Blog & Newsroom

Pay Attention to Your Emails and Make Sure They Are Real

Pay Attention to Your Emails and Make Sure They Are Real

We all get emails from UPS, Walmart, Costco and other big retailers, airlines or travel resorts, but are they real?

Cybercriminals are always looking for ways to get your information, steal money or steal your identity. They will create emails that look like they are from your bank, the IRS, a store you shop at, coworkers, relatives, or friends.

These emails will contain links they want you to click so you can enter your information. Unfortunately, once you do that, the damage is done.

read more…
Password Managers for Personal Use

Password Managers for Personal Use

It feels like two or three times a day, there is a report in the media about a company admitting its data was breached and customer information, including passwords, was stolen.

Even large firms or companies such as Facebook, Twitter and Target have admitted to breaches.

The truth is, no organization is immune from these attacks.

What most people need to be told is that you need to protect yourself not only by paying attention, but by carefully managing your various passwords.

read more…
The Equifax Data Breach – What you need to know now

The Equifax Data Breach – What you need to know now

On September 7, 2017, Equifax, one of the three main credit reporting agencies, announced a massive data security breach that, according to the Wall Street Jurnal, exposed vital personal identification data — including names, addresses, birth dates, and Social Security numbers — on as many as 143 million consumers, roughly 55% of Americans age 18 and older.
Cleveland CPA firm Zinner & Co helps people who may be victims of identity theft.jpeg

This data breach was especially egregious because the company reportedly first learned of the breach on July 29 and waited roughly six weeks before making it public (hackers first gained access between mid-May and July) and three senior Equifax executives reportedly sold shares of the company worth nearly $2 million before the breach was announced.

DOWNLOAD: FREE Ebook – Income Tax Return Fraud and Identity Theft

Moreover, as CNN points out, consumers don’t choose to do business or share their data with Equifax; rather, Equifax — along with TransUnion and Experian, the other two major credit reporting agencies  — unilaterally monitors the financial health of consumers and supplies that data to potential lenders without a consumer’s approval or consent.

read more…
5 Steps to Avoid Phishing Attacks

5 Steps to Avoid Phishing Attacks

 

There’s a threat called Phishing and it can put your entire organization at risk. Phishing, a technique malefactors use to steal sensitive information such as user names and passwords, is a growing segment of crime.5 tips avoid phishing

Phishing typically involves the use of an authentic-looking email or website that prompts you to enter sensitive data that can be used to hack or hijack your business’s systems. Phishing techniques are becoming increasingly sophisticated and more difficult to spot and prevent. read more…

7 Steps to Combat Elder Fraud

7 Steps to Combat Elder Fraud

Every year around this time, the IRS issues a warning about scams that attempt to victimize taxpayers and steal from them. More often than not, the victims of these crimes are senior citizens. The scams have varying levels of sophistication. From simple – such as calling on the phone7 steps prevent elder fraud and posing as an IRS agent – to sophisticated phishing scams that attempt to get taxpayers to reveal information that can be used to hack key user accounts. read more…

Cyber Attacks and Data Breaches: Protecting your email accounts

Cyber Attacks and Data Breaches: Protecting your email accounts

You have read security warnings advising you to stay away from particular websites and of course, not to click on the link to become the beneficiary of a far-away royal. Mike-J---tech-enewsletter_checklist2-182875-edited.png

You know not to download free apps, to stay clear of file sharing, and are current with anti-virus and firewall protection. Rightfully and confidently, you feel good about the protective steps you have taken to reduce your risk of identity theft. Then –  WHAM! Along comes a hacker who successfully infiltrates some of the largest technology companies in the world and as a result, steals your email password.

Related read: Classic Hackers: What War Games taught us about technology in the workplace

I recently read  the following news on Forbes.com: 

read more…
Bad Phish: Don’t Get Caught in the Net of the Latest Scam

Bad Phish: Don’t Get Caught in the Net of the Latest Scam

Do you remember when you were in school and the teacher would give each student a worksheet to “spot the difference” between two side-by-side detailed scenes?  You would look carefully at each of the two images, trying to spot subtle details, such as an extra button on a shirt or a missing shoe on a person. Maybe it was the number of petals on a daisy or a cone of ice cream missing the cherry on top. The directions would indicate there would be six differences, but try as hard as you did, (and even when you asked a classmate for help) you could still only find four or five differences, and were convinced there was never a sixth.

read more…
Help! I Can’t Remember All My %&*!# Passwords

Help! I Can’t Remember All My %&*!# Passwords

Q: I am fed up and frustrated trying to keep—and remember passwords that are both complex and creative. This is frustrating and I am at my wit’s end. What can I do to make it easier for me to remember but more secure against attacks? -Mary Kay C, Business Executive, Brookpark, Ohio


A: Thanks for your question, Mary Kay. Yours is one that almost everyone can relate and you are not alone in your frustration. Fortunately, I may be able to provide some insight and an alternative for you.  read more…
Since 1938, Zinner has counseled individuals and businesses from start-up to succession. At Zinner, we strive to ensure we understand your business and recognize threats that could impact your financial situation.
DOL Proposes New Independent Contractor Rule

What Employers and Workers Should Know The U.S. Department of Labor’s Wage and Hour Division announced a proposed rule intended to clarify when a worker is an employee and when the worker may be classified as an independent contractor under the Fair Labor Standards...

USPS Postmark Changes

A Tax Filing Risk Alert for Taxpayers For decades, many taxpayers have relied on a simple rule of thumb: if it is in the mail by the deadline, you are fine. However, recent U.S. Postal Service (USPS) clarification makes that assumption riskier. On Dec. 24, 2025, the...

Top Security Issues Tax Clients Must Watch Out for in 2026

Tax season has always been a prime opportunity for scammers, and 2026 is emerging as one of the most dangerous years yet. With increased filing confusion, AI‑powered fraud tactics, and a surge in data breaches fueling identity theft, tax clients need to be more...

Zinner & Co. Volunteers at Cleveland Food Bank Healthy Choice Market

On Jan. 22, Zinner & Co. employees spent the afternoon volunteering at the Greater Cleveland Food Bank’s Community Resource Center Healthy Choice Market. Our team was proud to support neighbors directly by helping make the shopping experience easier, more...

No Tax on Overtime Pay

The recently enacted One Big Beautiful Bill Act introduces a major change to the federal tax code, delivering welcome news for both employees and employers for tax years 2025 through 2028, as qualified overtime pay will not be subject to Federal income tax. This...

Send us your questions and we’ll share our insights with you on our blog!

Share Your Idea For 
A Zinner Blog Article