
Sign up to save your podcasts
Or


In this episode of Poised for Exit, we welcome back Steve Enzler, Owner and CEO of Tangible Values, for the second half of our deep dive into the cybersecurity threats impacting today’s business owners.
In Part 2, Steve shares shocking real-world examples of W-2 and 1099 fraud, including how organized criminal networks are filing thousands of fake returns using stolen business IDs, employee data, and even credit card information. He explains why the first few weeks of January through early March have become the prime window for identity-related tax fraud, and what every business owner and employee must do to protect themselves.
We also revisit the essential safeguards required under the FTC Safeguards Rule, breaking them down into physical, technical, and administrative protections. Steve outlines six practical steps that any business can implement immediately, from full-system encryption and auto-updates to multi-factor authentication, network security, and proper incident response.
This episode is full of practical guidance, cautionary stories, and straightforward action steps to help you guard against rapidly evolving threats.
Next Steps: Learn more at WispBuilder.com
Explore PracticePanda.com for client communication
Consider enrolling in the IRS Identity Protection PIN Program:
Learn More Here
Connect with Julie Keyes, Keyestrategies LLC
Founder, Consultant, Author, Pod-caster and Instructor
By Julie Keyes5
1919 ratings
In this episode of Poised for Exit, we welcome back Steve Enzler, Owner and CEO of Tangible Values, for the second half of our deep dive into the cybersecurity threats impacting today’s business owners.
In Part 2, Steve shares shocking real-world examples of W-2 and 1099 fraud, including how organized criminal networks are filing thousands of fake returns using stolen business IDs, employee data, and even credit card information. He explains why the first few weeks of January through early March have become the prime window for identity-related tax fraud, and what every business owner and employee must do to protect themselves.
We also revisit the essential safeguards required under the FTC Safeguards Rule, breaking them down into physical, technical, and administrative protections. Steve outlines six practical steps that any business can implement immediately, from full-system encryption and auto-updates to multi-factor authentication, network security, and proper incident response.
This episode is full of practical guidance, cautionary stories, and straightforward action steps to help you guard against rapidly evolving threats.
Next Steps: Learn more at WispBuilder.com
Explore PracticePanda.com for client communication
Consider enrolling in the IRS Identity Protection PIN Program:
Learn More Here
Connect with Julie Keyes, Keyestrategies LLC
Founder, Consultant, Author, Pod-caster and Instructor

588 Listeners

4,348 Listeners

10,774 Listeners

112,416 Listeners

9,736 Listeners

26 Listeners

10 Listeners