[House Hearing, 114 Congress] [From the U.S. Government Publishing Office] SMALL BUSINESS AND THE FEDERAL GOVERNMENT: HOW CYBER ATTACKS THREATEN BOTH ======================================================================= HEARING before the COMMITTEE ON SMALL BUSINESS UNITED STATES HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION __________ HEARING HELD APRIL 20, 2016 __________ [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Small Business Committee Document Number 114-057 Available via the GPO Website: www.fdsys.gov ______ U.S. GOVERNMENT PUBLISHING OFFICE 20-072 WASHINGTON : 2016 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 HOUSE COMMITTEE ON SMALL BUSINESS STEVE CHABOT, Ohio, Chairman STEVE KING, Iowa BLAINE LUETKEMEYER, Missouri RICHARD HANNA, New York TIM HUELSKAMP, Kansas CHRIS GIBSON, New York DAVE BRAT, Virginia AUMUA AMATA COLEMAN RADEWAGEN, American Samoa STEVE KNIGHT, California CARLOS CURBELO, Florida CRESENT HARDY, Nevada NYDIA VELAZQUEZ, New York, Ranking Member YVETTE CLARK, New York JUDY CHU, California JANICE HAHN, California DONALD PAYNE, JR., New Jersey GRACE MENG, New York BRENDA LAWRENCE, Michigan ALMA ADAMS, North Carolina SETH MOULTON, Massachusetts MARK TAKAI, Hawaii Kevin Fitzpatrick, Staff Director Emily Murphy, Deputy Staff Director for Policy Jan Oliver, Chief Counsel Michael Day, Minority Staff Director C O N T E N T S OPENING STATEMENTS Page Hon. Steve Chabot................................................ 1 Hon. Nydia Velazquez............................................. 2 WITNESSES Mr. Richard Snow, Owner, Maine Indoor Karting, Scarborough, ME... 4 Mr. Kevin Dunn, Technical Vice President, NCC Group, Austin, TX.. 6 Mr. Nicholas A. Oldham, Counsel, King & Spalding, LLP, Washington, DC................................................. 7 Mr. Stephen F. Mankowski, CPA, National Tax Chair, National Conference of CPA Practitioners (NCCPAP), National Secretary, NCCPAP, Partner at EP Caine & Associates CPA, LLC, Bryn Mawr, PA............................................................. 9 APPENDIX Prepared Statements: Mr. Richard Snow, Owner, Maine Indoor Karting, Scarborough, ME......................................................... 25 Mr. Kevin Dunn, Technical Vice President, NCC Group, Austin, TX......................................................... 36 Mr. Nicholas A. Oldham, Counsel, King & Spalding LLP, Washington, DC............................................. 42 Mr. Stephen F. Mankowski, CPA, National Tax Chair, National Conference of CPA Practitioners (NCCPAP), National Secretary, NCCPAP, Partner at EP Caine & Associates CPA, LLC, Bryn Mawr, PA......................................... 47 Questions for the Record: None. Answers for the Record: None. Additional Material for the Record: NAFCU - National Association of Federal Credit Unions........ 54 SMALL BUSINESS AND THE FEDERAL GOVERNMENT: HOW CYBER ATTACKS THREATEN BOTH ---------- WEDNESDAY, APRIL 20, 2016 House of Representatives, Committee on Small Business, Washington, DC. The Committee met, pursuant to call, at 11:00 a.m., in Room 2360, Rayburn House Office Building. Hon. Steve Chabot [chairman of the Committee] presiding. Present: Representatives Chabot, Luetkemeyer, Hanna, Gibson, Brat, Hardy, Kelly, Velazquez, Clarke, Payne, Meng, and Adams. Chairman CHABOT. Good morning. The Committee will come to order. I want to thank you, everyone, for being here today, and we want to especially thank all of our witnesses for coming here to share your insights and expertise with this Committee on a very timely and important subject. In April of last year, this Committee heard from a panel of industry experts about how small businesses across the country are being threatened by a growing number and variety of cyber attacks. Since then, the threat to small businesses has only grown. Unfortunately, in many ways, the Federal Government's efforts to guard against this threat have not kept pace. This morning, the Committee will look at the effects of cyberterrorism and cyber attacks on both small businesses and on the Federal Government. Small businesses face an increased risk because they lack the resources to protect themselves against sophisticated cyber attacks. We must make sure that the Federal Government is part of the solution and not adding to the problem. It is vital to both the economic and national security of this nation that the sensitive data held by Federal Government be safeguarded. The owners, employees, and customers of America's 28 million small businesses need to have confidence that their data is secure. I think it is fair to say that confidence has been shaken in recent years with the cyber attacks on the IRS, the State Department, OPM, and even the White House. Between foreign hackers from countries like China and Russia and domestic identity thieves, the Federal Government has a target on its back that seems to get larger by the day. This is why recent findings by the Government Accountability Office (GAO) on cybersecurity problems at agencies like the IRS and the SBA, are so troubling to me and many other members of this Committee. Just this month, the GAO reported that the IRS paid $3.1 billion in fraudulent identity theft, or IDT, tax returns. Three billion dollars for people filing tax forms, for example, that were not the person who actually should be getting the credit back. When the GAO testified before this Committee earlier this year, they told us that ``the SBA has not conducted regular reviews of its IT investments.'' In these scenarios, American small businesses and consumers were put at risk due to a lack of diligence by Federal agencies. Just last week, I asked IRS Commissioner Koskinen about the data breach at his agency last May, which compromised the data of approximately 700,000 accounts. The commissioner informed our Committee that there are 1 million cyber attacks at the IRS every day. Think about that. One million cyber attacks every day at the IRS, people trying to get into files for illicit, illegal purposes. With over 3 billion different mobile applications and $340 billion in online commercial sales last year, business transactions are moving away from the cash register and toward the smartphone. It is great to be able to order your coffee or pay your electric bill or reserve a car ride using your phone, but with this convenience comes increased exposure for both the customer and for businesses. In 2015, the average amount stolen from small business bank accounts after a cyber attack was over $32,000. The fast pace of changes in technology means that hackers are coming up with more sophisticated methods to go after intellectual property, accounts, Social Security numbers, and anything else that can be used for financial gain or a competitive edge. With all of the uncertainty facing small businesses in today's world of e-commerce, it will take vigilance by all Federal agencies, and the watchful eye of this Committee, to ensure the data of small businesses and individual Americans remain secure. We must also look for new and innovative ways to help small businesses protect their data for this great and growing threat. I look forward to hearing from our witnesses here this morning, and I will now yield to the Ranking Member for her opening statement. Ms. VELAZQUEZ. Thank you, Mr. Chairman. Technological innovations are vital to our modern economy, and even more essential to the nation's small firms. In fact, small businesses are some of the savviest users of technology by using the internet to access new markets to grow and diversify. Yet, for all the benefits technology brings to the equation, it also creates additional challenges for business owners, consumers, developers, and vendors. As more consumers and businesses participate in E-commerce, protecting our financial information from cyber attacks is critical. Unfortunately, recent data breaches at federal agencies, like the IRS and OPM, compromised financial data and personal information of millions of people. Attacks like this have made clear the weaknesses of the current cybersecurity landscape. Last year's attack on the IRS exposed over 700,000 taxpayers' accounts, and just last week we found out a former FDIC employee breached the information of 44,000 FDIC customers. These attacks strike close to home for many of us, including small business owners. Keeping software and networks up-to-date with the latest security is no longer enough. Cyber threats come in many forms, but they are devastating to both business owners and their customers. A single attack can wipe out a small business, which is why cybercrime poses severe problems for small businesses that are unprepared. Sadly, some small companies fail to recognize the value of cybersecurity as an investment until it is too late. On the other hand, small firms that do recognize the importance of such an investment often lack the resources to implement an effective security system. Just as we must strengthen private sector cybersecurity, we need to ensure Federal agencies take precautions. The testimony we will hear today will help us better protect the nation's small businesses from growing cyber threats. We will discuss the strengths and weaknesses of our federal initiatives and what more must be done for private and government data protection. In advance of the testimony, I want to thank all the witnesses for both your participation and insights to this very important topic. With that, Mr. Chairman, I yield back. Chairman CHABOT. Thank you very much. The gentlelady yields back. If Committee members have opening statements prepared, we ask that they be submitted for the record. I would like to take just a moment to explain our timing and lighting system here. It is pretty simple. You get 5 minutes. The green light will come on there and you can talk for 4 minutes. The yellow light will come on. That will let you know you have a minute to wrap up. Then the red light will come on after a total of 5 minutes, and if you could try and stay within that, we would greatly appreciate it. The members hold ourselves to the 5-minute rule, also, and we will ask you questions then. I would now like to introduce the panel. Our first witness is Richard Snow, owner of Maine Indoor Karting in Scarborough, Maine. Mr. Snow is here to provide his experience as a small business owner whose company was the victim of a cyber attack. Our second witness is Kevin Dunn, technical vice president of NCC Group in Austin, Texas. He has over 14 years of experience as a professional security consultant. And our third witness today is Nicholas Oldham, counsel at King and Spalding in Washington, D.C. In his current role, Mr. Oldham assists clients with cybersecurity and risk management, data privacy, incident response, and internal government investigations. We welcome you all here today. I would now like to yield to the Ranking Member to introduce the final witness. Ms. VELAZQUEZ. Thank you, Mr. Chairman. It is my pleasure to introduce Mr. Stephen Mankowski, the national tax chair and national secretary for the National Conference of CPA Practitioners. He is also a partner at EP Caine and Associates CPA, LLC, where he advises individuals and small businesses on issues related to accounting, taxation, business consulting, and litigation support services. Welcome. Chairman CHABOT. Thank you very much. I would now like to recognize Mr. Snow. You are recognized for 5 minutes, sir. Thank you. STATEMENTS OF RICHARD SNOW, OWNER, MAINE INDOOR KARTING; KEVIN DUNN, TECHNICAL VICE PRESIDENT, NCC GROUP; NICHOLAS OLDHAM, COUNSEL, KING AND SPALDING LLP; STEPHEN F. MANKOWSKI, CPA, NATIONAL TAX CHAIR, NATIONAL CONFERENCE OF CPA PRACTITIONERS, NATIONAL SECRETARY, NCCPAP, PARTNER AT EP CAINE AND ASSOCIATES CPA, LLC STATEMENT OF RICHARD SNOW Mr. SNOW. Good morning. Thank you, Chairman Chabot, Ranking Member Velazquez, and members of the House Small Business Committee for inviting me to testify today on the current state of cybersecurity for small companies and how phishing scams have impacted my own small business. My name is Rick Snow, and I am the owner of Maine Indoor Karting, located in Scarborough, Maine. We are an indoor entertainment venue with a go-kart track, mini golf course, arcade, and cafe. We have about 20 employees. I am pleased to be here representing the National Small Business Association, where I currently serve as a Board of Trustee member and Chair of the Environmental and Regulatory Affairs Committee. NSBA is the Nation's oldest small business advocacy organization with over 65,000 members representing every sector and industry of the U.S. economy. NSBA is a staunchly nonpartisan organization devoted solely to representing the interests of small businesses which provide almost half of all private sector jobs to the economy. Several data breaches within the Federal Government, including OPM, IRS, and DOD make it clear the government struggles to combat cyber attacks. If the government cannot protect its networks and data from cyber attacks with almost unlimited resources at its disposal, how can we expect America's small businesses to do so? Forty-two percent of NSBA members surveyed indicated that they have been the victim of cyber attack. In almost half of those attacks there was an interruption in service. I was the victim of a phishing attack, and I have also had my credit card stolen three times. When I was phished, I received an email from my bank that there had been a suspicious attempt to gain access to my account. The email urged me to immediately log in to my account and confirm that it was, in fact, an unauthorized attempt. The link provided in the email looked identical to the log-in page of my bank. Frantic that there had been a breach, I logged in, and as soon as I typed my password, I realized what had happened. I raced to the local branch of my bank to set up a new account which took several hours. It took about a week to get the new checks and debit cards for the new account to us. Since we used the cards and checks for all our bills and local purchases for our business, I had to either use our company line of credit or my own credit cards. This is not unusual as many small business owners often need to use their personal credit cards to support their business, especially during difficult times. The financial cost to my business paled in comparison to the delays and disruptions. My wife, who runs the day-to-day operations of our business, and her work were limited because she spent the week trying to update all of the vendors with the new account information. According to the NSBA 2015 Year-End Economic Report, in 10 percent of cyber attacks, a bank account was improperly assessed. I was one of those. Two weeks after the initial phishing attack, I logged into our new account late Friday evening, and to my horror, found that my balance was zero. It was payday and I was terrified that the paychecks that were issued that day would not clear. We are supporting a number of families, many of which live paycheck to paycheck and could not have made it without that particular payday. I quickly discovered that three wire transfers were made that night to three different bank accounts around the country totaling $15,000. This is an ongoing threat of internet age, and it will evolve as long as the internet continues to facilitate commerce in the global economy. It is unlikely that there will be one solution. I am sorry. I missed a page. So, excuse me. Sorry. After a night of no sleep, I had to be at the bank first thing Saturday morning. I was lucky and was able to stop the wire transfers. I had to then spend another day away from work opening another account and going through the process of getting all my new cards and ordering new checks. My poor wife had to spend another week updating vendors. She spent the better part of 2 weeks away from her normal duties because of this phishing incident. My bank told me that this was a standard phishing loss and that I was lucky that I discovered it before the 48 hours had lapsed so no money was actually stolen. My business accounts were not protected against theft the way that my personal accounts would be, so the losses would have been on my business. This attack could have ended my business if I had not been able to recover the money. Most small businesses do not have a significant cushion to absorb these type of losses, and we are no different. Losing thousands of dollars during a tough time in the economy can make a significant different for me, my business, and my employees. As small businesses become increasingly dependent on the internet, they become a larger target for cybercriminals. These threats are very real and immediate. In fact, 94 percent of small business owners indicate they are concerned about being targeted by cyber attacks. For many small businesses, a cybersecurity incident could lead to an entire network being down for many days until the full extent of the problem is known and then fixed. This is an ongoing threat of the internet age and it will evolve as long as the internet continues to facilitate commerce at the global economy. It is unlikely that there will be one solution to stop the attacks. In fact, slowing and preventing these attacks will most likely require an ongoing process to identify new threats, vulnerabilities, and ultimately, solutions. I urge Congress and this Committee to always bear in mind the unique challenges that small businesses face and continue to include the small business community in that process. Thank you for allowing me to testify before the Committee today, and I would be happy to answer any questions that you might have for me. Chairman CHABOT. Thank you, Mr. Snow, for your testimony today. What a scary situation. Thank you. Mr. Dunn, you are recognized for 5 minutes. STATEMENT OF KEVIN DUNN Mr. DUNN. Good morning, Mr. Chairman, Ranking Member Velazquez, and other esteemed members of the Committee. Thank you for the opportunity to testify today. My name is Kevin Dunn, Technical Vice President for NCC Group. For the last 15 years, I have dedicated my career to carrying out cybersecurity attacks against private companies and government organizations. I am not a criminal; I am a penetration tester. For our actions in this highly specialized field, my colleagues and I determine ways to break into organizations via cyber and physical means. Specifically, we are hired to identify vulnerabilities that allow a company's security to be compromised. This exercise subsequently allows us to provide customized advice to our clients, detailing the short- and long-term actions they should take to reduce their susceptibility to attack. My testimony today will focus on four areas: the strengths and weaknesses of cybersecurity training, increasing security when using cloud service providers, the potential impact of small business security on the government, and the benefits of a data-driven risk model. To evaluate the state of high level cybersecurity training designed for small businesses, I would like to explore two examples: training provided by the U.S. Small Business Administration and training provided by the Federal Communications Commission. Through these trainings, small businesses are able to gain awareness of important cybersecurity threats such as the dangers associated with phishing emails, malicious websites, malware, ransomware, and the typical motivations of attackers. This information provides an ample start for educating small businesses in a general awareness capacity and extends to providing cybersecurity tips for the major areas of concern. However, the training and guidelines are high level in nature and lack the depth of information needed to convert directly into hands-on actions. In the world of small business IT support where efforts are typically coordinated by owner-operators, this information may not be comprehensive enough to make a worthwhile difference beyond providing general education. Many small businesses use cloud service providers to implement important services like email, file storage, and data backup. This often unburdens the IT administration overhead from small business owner-operators or small businesses with a one- or two-person IT team. The use of third-party cloud service providers is typically a positive security move for small businesses. The attention to security from the major providers in this space affords a number of features that greatly increase the security of data for a small business. However, it should be noted that there are additional features that should be enabled to make attacks harder for adversaries. These features are often not enabled by default. Chief among these is the use of multifactor authentication. The majority of major online services now support the use of multifactor authentication using at least SMS messages to a cell phone as a means of out-of-band authentication. But despite this inexpensive option, it is often overlooked by organizations that use cloud services or internet services, relying instead on single factor authentication in the form of user names and passwords. The impact of a small business on the government should be considered in at least two key ways. The first concerns the direct and indirect connectivity between a small business and a government network. The second concerns small businesses in the government supply chain. A small business with a direct connection to a government network is likely a rare occurrence, but in such a scenario, if the small business is compromised sufficiently, an attacker's ability to traverse to a government network could be a simple task. However, examples of indirect connectivity are more common and are typically databased in nature. When government users consume the services of a small business, their user names, passwords, personal information, and other data could be used in a subsequent attack against government systems if extracted from a compromised small business system. Of course, the reverse is true as well. The second area to consider is when a small business is in some way part of the supply chain to a government department or agency. The most typical examples of this are where a small business develops software or hardware that is subsequently installed on government networks. Finally, a good way to think about security and a means to ensure that the approaches chosen to secure your organization are fit for purpose is to think first about the data you care about. Considering the data first is an excellent approach and one that is advised in the FCC's small business cyber plan at all. However, too few organizations actually consider their data or subsequently plan security around the value of different data types. Even fewer organizations consider what will happen when, not if, an attacker gains access to their data. Using a data-centric risk management model would allow small businesses to focus their security attention where they need it most. Thank you again for this opportunity to address this Committee. I will be happy to answer any questions. Chairman CHABOT. Thank you very much. Mr. Oldham, you are recognized for 5 minutes. STATEMENT OF NICHOLAS OLDHAM Mr. OLDHAM. Mr. Chairman, Ranking Member, and members of this Committee, thank you for allowing me the opportunity to appear before you today. I have been involved in cyber issues for many years as a former Federal prosecutor at the U.S. Department of Justice, and now as an attorney at King and Spalding. In my practice, I counsel clients, both large and small, on cybersecurity risk management. Our interconnectivity is growing at an astonishing rate. This interconnectivity, especially the internet of things, holds tremendous promise for consumers and companies. It also creates new challenges in terms of cybersecurity because anything connected to the internet can be hacked. Cyber attacks cost businesses billions of dollars every year as a result. Where do small businesses fit into this landscape? The interconnected world lets small businesses develop new products and services and compete across the globe, but with cybersecurity, small businesses often get burned at both ends. They are less likely to have the resources to prevent breaches, and also may have fewer resources to respond to those breaches. It can be difficult for small businesses to find the right information and training, and the cost of mitigation measures in response can significantly impact a small business' bottom line. As a lawyer, I do not manage corporate networks. I do not conduct vulnerability testing. Rather, I believe that cybersecurity is as much a people and a process issue as it is a technical issue. I focus on the people and process side of the equation, addressing the legal and business cybersecurity risks faced by companies. I also help manage companies comply with their legal obligations, interact with various regulators, and respond to regulatory enforcement actions and litigation. These legal and business costs, including compliance costs, drain on employee morale, and time and reputational damage can be significant. There are at least three ways the government can play a role in lowering these costs. First, by addressing the cybersecurity education gap. When weighing the costs and benefits of enhancing their cybersecurity, companies may find that it is far more expensive to not implement basic security measures. The problem here is that there is a cybersecurity education gap. Small businesses may not find the information they need to properly assess and mitigate these costs. Bridging this education gap can be difficult for small businesses, especially those that lack the resources to hire specialized employees or cybersecurity experts. Even when information is available online, it is often difficult to find, rarely updated, and often inadequate. In many ways, cyber threats have analogs to traditional crime. In the traditional crime scenarios, small businesses would likely call the local police department for best practices in preventing or responding to crime. In the digital crime scenarios, there is no one logical place to call. The government may have a role in bridging the cybersecurity education gap by encouraging the development of cybersecurity education resources and connecting them to those who need them in the private sector. Second, many of the cybersecurity initiatives receiving the most attention are not necessarily tailored to small businesses. For example, the NIST cybersecurity framework is emerging as a leader, which is a promising development. This could simplify the landscape for small and large businesses alike. The current iteration of the NIST framework, however, is not particularly geared towards small businesses. It can be difficult and expensive to understand and implement regardless of business size, and until it is better tailored to small businesses, for some of them it may just be one more program that they cannot afford to keep up with. Perhaps more importantly, a small business might become subject to a cybersecurity framework by virtue of its contractual relationships. In this case, the small business might inadvertently expose itself to significant liabilities and cyber risks. While good cyber hygiene is important, to improve the NIST framework and similar programs and policies, the government should make a serious effort to increase the involvement of small business owners in all phases of the legislative and rulemaking process. Third, the current regulatory regime for cybersecurity presents additional difficulties for small businesses who will inevitably struggle to determine both what cybersecurity measures they are required to meet, and when a breach or attack does occur, what procedures the law requires them to follow. There are currently 51 different State or territory data breach notification laws and many of them are inconsistent with each other. I have seen a growing number of Federal agencies also stepping into this space. In short, there is a need to clarify and simplify what companies must do. Because of the complicated and evolving landscape, the on-the-ground expertise of the private sector must necessarily play an important role in these efforts. Thank you for the opportunity to testify today, and I look forward to your questions. Chairman CHABOT. Thank you very much. Mr. Mankowski, you are recognized for 5 minutes. STATEMENT OF STEPHEN F. MANKOWSKI Mr. MANKOWSKI. Thank you. Mr. Chairman, Ranking Member Velazquez, and members of the Committee, thank you for inviting me to testify today. My name is Stephen Mankowski, a partner with EP Caine and Associates, the Executive Vice President of NCCPAP, the National Conference of CPA Practitioners, and a member of the AICPA. NCCPAP has been at the forefront of identity theft issues through our advocacy and testimony at prior hearings dealing with ID theft. NCCPAP members have helped guide numerous clients who have been victims of identity theft. ID theft has been growing exponentially for years. It seems that no matter what controls are put in place, criminals have better and more focused resources to circumvent these safeguards. The IRS reminds practitioners that they must be vigilant with their system integrity. Criminals are aware that the prize for breaching tax practitioner systems could yield not only names and Social Security numbers, but also several years of earnings, as well as bank information and dates of birth. Two Midwestern firms were compromised this tax season and had fraudulent returns submitted by utilizing their Electronic Filing Identification Number or EFIN. While firms are required to obtain an EFIN from the IRS to electronically file tax returns, paid preparers are required to use a Practitioner Tax Identification Number or PTIN. Firm information, including their Employer Identification Number, however, still appears on their tax return. Given the risk of firm ID theft, why has the IRS not adopted a firm PTIN, something that NCCPAP strongly recommends. Over the past year, as noted by the other panelists, the IRS has had multiple system breaches. First, the IRS online transcript program, Get Transcript, was compromised in May 2015. The number of accounts affected now exceeds 700,000. The second breach was related to the IP PIN retrieval tool that was contained on the IRS website and is more troubling. The taxpayers who have IP PINs have already been victims of tax refund fraud and obtained the six-digit IP PIN to prevent further unauthorized account access or tax filings. This tool had been used using the same interface as Get Transcript but had remained available to the public, and unfortunately, those less scrupulous. Social Security uses a banking prenote to verify the accuracy of the recipient's banking information prior to the initial payment. Unfortunately, the IRS refund system does not include prenote account verification. The implementation of a prenote system could result in a significant reduction of the annual $3.1 billion misappropriation of government funds. While it is easy to understand that taxpayers want to receive their refunds as quickly as possible, one must ask a simple question: Is paying a tax refund in 7 to 10 days prudent? A recent survey by Princeton Research Group noted that 22 percent of taxpayers surveyed would be willing to wait up to 6 to 8 weeks to receive their refund if they knew it would combat identity theft. Taxpayers are urged to protect their personal data, but with widespread internet usage, online shopping, and criminals just waiting to pounce on unsuspecting victims, ID theft continues to grow. Individuals and businesses remain the target of cyber attacks and must remain cautious when opening emails with attachments, visiting web pages, or simply paying for the family groceries. Taxpayers often do not realize they have been a victim of tax-related ID theft until their electronically filed tax return gets rejected. Once a taxpayer has been victimized, they expect to obtain an IP PIN from the IRS, and starting in January 2017, they automatically will. In conclusion, NCCPAP feels that using the prenote technology that already exists and is used throughout the financial industry would allow taxpayers to continue receiving their refunds promptly while reducing refund fraud. Further, NCCPAP urges Congress to pass legislation to provide the IRS the necessary authority to regulate all tax preparers and require paid preparers to meet minimum standards. Currently, only CPAs, EAs, and attorneys are subject to the requirements of IRC Circular 230. Finally, NCCPAP calls on Congress to provide the necessary funding for the IRS to continually modernize and upgrade their systems to minimize and eliminate data security breaches. The first step would be Congress reauthorizing streamline critical pay authority to allow the IRS to secure top IT talent without a 3- to 6-month waiting period. Thank you for the opportunity to present this testimony, and I welcome your questions. Chairman CHABOT. Thank you very much, and we appreciate the testimony of all the witnesses here this morning. It was excellent. Mr. Snow, first, let me apologize to you for having to return a call there before your testimony. I apologize for that, but I had your written statement ahead of time, so I am prepared. You experienced a worst-case scenario for a small business cyber theft. What advice would you give to others who are put in the same or a similar situation? Mr. SNOW. The first thing I would do is to ensure that when you look at the website at the top, web ID, that there is a https ID, and that would have prevented that from happening. I just learned that in that process. But it would be very difficult to stop someone from just accessing the way it was with me because it was an identical website to the bank website. The login looked identical. In fact, there was no difference. What was more disconcerting to me was the fact that they stole the new account number, and to this day, no one understands how that happened; how they were able to access a brand new account opened with all that information and move money out of the new account, not the old account. Chairman CHABOT. How long did it take you to straighten all this out? Mr. SNOW. The whole process was about a month because, the first time we had to rush everything because they have to print new checks and new credit cards and everything, so it was about a week and a half. Then when we discovered the loss, it was 2 weeks later. Then we had another week and a half or so of additional time to go through that whole process again. Chairman CHABOT. Mr. Dunn, in your testimony, you provided the example of using text message authentication as an inexpensive use of multifactor authentication. Are there other inexpensive steps the Federal Government or small businesses could make in order to verify accounts? Mr. DUNN. Yes. I think that you can use email. There are a number of channels that you can use. The situation really is that when you rely on just one thing, in perhaps this case as well, just a username and password, that that is a single point of failure. The point is to have more than one authenticating factor. A number of things could do that so long as it is out of band from the process. Chairman CHABOT. Thank you very much. Mr. Oldham, protecting the privacy and civil liberties of Americans is obviously an important component of cybersecurity discussions. What effort is the private sector making to protect consumers in this area? Mr. OLDHAM. One of the key goals is transparency, communicating to consumers what information is being collected and how is it being used. That has become even more important as the ecosystem is growing so that everything is connected, multiple third parties and the like, and the third party would include, for instance, sharing information with the government. I think the most critical step the private sector is taking is ensuring that there is this transparency. Chairman CHABOT. Thank you very much. Mr. Mankowski, in your testimony, you gave a firsthand account of how a tax preparer dealt with confusion and delays with the IRS in response to a data breach. What would you recommend to the IRS for future responses to a tax preparer once a breach has been confirmed? Mr. MANKOWSKI. That is a very good question, Mr. Chairman. What I would recommend, first of all, is that I have reached out to my contacts that I deal with through some of my committees at the IRS, and it is being addressed tomorrow at a monthly meeting. But in addition, I would advise practitioners to know who their local stakeholder liaisons are so they have an area that they could reach out to so that they can start the process of communicating with the IRS when they suspect there may be a breach, not once they actually confirm. Because during that period of time, if their EFIN was being used improperly, the IRS could have stepped in very quickly, disabled their EFIN, and could have potentially stopped fraudulent returns from being processed. Chairman CHABOT. Thank you. Let me give you another question. You mentioned a recent audit where 6 of 13 e-filing sites failed to take steps to protect consumers from fraudulent and malicious emails. What recommendations would you offer these sites in order to improve their cybersecurity? Mr. MANKOWSKI. That is also a very interesting question. I believe that is one that Mr. Dunn could probably help with as far as the cybersecurity aspect. But they would certainly need to ensure that as they are going through their systems that they are making sure that any incoming emails are being checked. There has been widespread spoofing of calls as well as emails coming in to companies that are purporting themselves to be high-level individuals within a company asking for data that they would normally be asking for, such as W-2s and such, that everything looks to be coming from that individual, everything looks the same, just the email address may be slightly or just something a little bit off. Companies really need to be vigilant as to looking at who emails are coming in from, and if they are not sure if it is legitimate or not, they should pick up the phone and call the person who they are actually getting this request from. Simply responding to that email, you are responding back to the criminal. Of course, they are going to say, oh, yeah, I am so-and-so, and I need to get this information to finalize a report for the board. They are further spoofing. They just need to be careful when they are responding, and as Mr. Snow had mentioned, making sure that any websites they go into do have the https that would mean that it is a secured website. Chairman CHABOT. Thank you very much. Mr. Dunn, I would follow Mr. Mankowski's advice, except that I am out of time, and I like to hold myself to the same rules I do everybody else. So I will yield back my time, and the gentlelady, the Ranking Member is recognized for 5 minutes. Ms. VELAZQUEZ. Thank you, Mr. Chairman. Mr. Mankowski, last week we had the Commissioner of the IRS here testify before our committee, and he talked about the Cybersecurity Summit between the IRS and tax practitioners. From the industry perspective, do you believe this partnership is effective at preventing tax fraud? Mr. MANKOWSKI. I think it is a very good first step, and they have already shown that it has been successful. They have met with, and they have included initially people from State associations, State government, as well as the banking and software community, to work on trying to prevent tax returns at the onset when they are being processed into the IRS system. They have gone further and expanded their focus now to starting including practitioners into their groups, and they are estimating that last year, with the first year of their summit, they prevented in excess of 3 million fraudulent returns from getting into the system. Now they just need to understand that returns are, unfortunately, getting through the filters, so now they need to keep working on filters during the processing and primarily protecting the refunds because that is taxpayer dollars, as well as government funds, that are being misappropriated. Ms. VELAZQUEZ. Thank you. Mr. Snow, I am concerned that typically, small business owners view an investment as a way to increase revenues, yet, with cybersecurity they are expected to make an investment in order to prevent revenue losses. So is it often hard to persuade small firms to spend money without seeing an immediate return? What needs to be done to bridge this gap? Mr. SNOW. I think the number one issue that we have as a small business is that every single thing leads to the bottom line. Every decision you make adds a cost. In our case we have added insurance, cybersecurity insurance, to our overall cost. The unfortunate part of that is that the deductible is very high. It is a $5,000 deductible. For me, I am out that immediately. That is the same as my burglary insurance as well. When we have someone break into our building, which happened a few months ago and they destroyed our security system, it cost us $5,000, which is also our deductible. We are out that money. That happened to be all the revenues that we had for that particular month. So it really eats into our bottom line. It is very expensive. Ms. VELAZQUEZ. Mr. Dunn, in your estimation, how much would it cost a company, a small company, one with fewer than 250 employees, to become cyber safe? Mr. DUNN. I think it is very hard to provide that estimation because it really depends on the data that they hold, the types of inputs and communication channels they have. We could be talking about a very simple setup or we could be talking about a very complicated setup. It is true that the cybersecurity industry has a certain price point that currently is very difficult for small business owners to take part in. Certainly, we are probably talking thousands of dollars in order to get consultative help. Ms. VELAZQUEZ. Thank you. Mr. Oldham, who do you think is best situated to handle cybersecurity threats, the federal government or private industry? Or do you think some sort of balanced public-private partnership is needed to properly address cybersecurity needs? Mr. OLDHAM. I think the balanced public-private partnership is the key. This industry is evolving so rapidly, and when the government gets involved, it becomes very static. I think it is important to make sure the private sector has a huge input, and that is why I think something like in this framework is a great start because it is voluntary. It attempts to coalesce the best standards that are out there, but it is also something that has a recognition that it needs to evolve over time. My worry is tipping the scale to one side or the other will cause the current industry to stagnate more. Ms. VELAZQUEZ. What type of recommendations would you offer for encouraging that type of partnership? Mr. OLDHAM. Number one, supporting NIST's efforts and what they are doing. Right now, NIST has put out a framework. It has had some widespread success but also quite a bit of criticism from industry. They held a workshop last month where they heard from several sectors of the industry, including small business, that it is not really approachable and useful. Just as a big picture, the NIST framework was designed for critical infrastructure, so it is not approachable for small businesses, ensuring that the NIST is putting the appropriate emphasis on adapting itself to particular market sizes and industries. Chairman CHABOT. The gentlelady's time has expired. Ms. VELAZQUEZ. Thank you. Chairman CHABOT. Thank you. Ms. VELAZQUEZ. Thank you, Mr. Chairman. Chairman CHABOT. The gentleman from New York, Mr. Gibson, is recognized for 5 minutes. Mr. GIBSON. Thanks, Mr. Chairman. I appreciate the opportunity here today to hear from the panelists' illuminating testimony provided. Mr. Snow, I want to begin with you, just a point of clarification. You, in telling us about what had happened to you, you had made the comment that, fortunately, within 48 hours you were able to take action. What was implied in your statement is we have a differentiation between business and personal liability or accounts. I am looking for clarification. Is there some dimension of FDIC that protects people? Why is it different? If you could just help me understand that, number one. Mr. SNOW. Number one, I do not know the exact ramifications. My understanding was because it was a wire transfer there is a 48-hour time that it runs. If you can stop it within that timeframe, the money does not actually transfer or they can call it back, the bank, with the interbank processes. Mr. GIBSON. Do any other panelists know the answer for that? Why is it that business does not seem to have the same protection as an individual? One of my constituents out there, if somebody was to do a phishing expedition on them and they would be under similar circumstances, I am curious if anybody knows the answer to that. Okay, for the Committee, I think that is something probably worth checking into. A concerning situation. I am glad it worked out okay for you there. Then Mr. Oldham--even though I know that it was Mr. Snow-- it was very burdensome and onerous on your bottom line based on you had to divert resources. Mr. Oldham, in one of your comments you talked about that the Federal Government might want to look at clarification or clarity in terms of what companies must do when these circumstances happen, reporting requirements and the like. What is your understanding of what the SBA requires now with regard to--or the United States Government--in terms of a protocol when a company faces an attack? Mr. OLDHAM. I am not aware of anything from the SBA, but the notification requirement at large are a hodge-podge. If it involves financial information, the Gramm-Leach-Bliley Act would require notification. If it is healthcare information, regulations under HIPAA would require notification. Each of the State data breach laws have different definitions, and I think one of the key concerns, especially if you are a small business and you may have information involving people from multiple jurisdictions or multiple types of information, there is an enormous cost of just figuring out what you have to do at the beginning. Mr. GIBSON. I appreciate that comment. In fact, it mirrors some of my experiences in the U.S. military. I think that is also worthwhile for the Committee to capture that. Maybe we should consider a clearinghouse requirement that really socializes, if you will, what companies must do under these circumstances. Finally, for the panel, I would love to hear your insights on this question, that with regard to science and technology, research and development, sort of blue sky, if you will, what do you think, based on your experiences, would be a worthwhile endeavor to address the issue of cyber attack at large--on businesses, on people, on government--on where you think we should put emphasis on for science and technology, research and development, to protect? Mr. DUNN. I think in most cases, every incident I have ever been involved with, the visibility of what is actually happening from a data and packet level is never where it needs to be. I would definitely like to see strides in that direction, some way of increasing the ability for us to understand from a network and data perspective what has happened in a given scenario. Mr. GIBSON. Thank you. Mr. SNOW. I think the most frustrating thing for me was to realize that someone at the receiving end of that money was going to show up and get that money, and that there was no action taken. On my private credit card thefts, purchases were actually made. The merchant was out of that merchandise. Obviously, they got the money for that merchandise, but we absorb it as all of the consumers in the overall doing business. There is no authority trying to stop these people, that I know of, trying not catch these people who are making these purchases with fraudulent credit cards or other things. That is the frustration that I have. I know that I can call my local police when they break into my building. If I walk into a bank and demand money, the FBI will be chasing me forever. But in this case, there is really no action that is done beyond what we had to do as individual business owners. Mr. GIBSON. Thank you. Mr. Chairman, I see my time has expired. I wonder if maybe science and technology, research and development into biometrics, is a possibility as a surety for any kind of transaction is worth our endeavors. But I thank the Chairman for the opportunity. Chairman CHABOT. Thank you very much. The gentleman's time is expired. The gentlewoman from North Carolina, Ms. Adams, who is the Ranking Member of the Investigations, Oversight, and Regulations Subcommittee is recognized for 5 minutes. Ms. ADAMS. Thank you, Mr. Chair. Thank you, Ranking Member Velazquez, for hosting this hearing. Some of you have mentioned the importance of education and training in cybersecurity. I am long-time educator and very interested in what we can do there. The Federal Government is involved in this in a number of ways. For example, last year, the Obama Administration announced the New Cybersecurity Consortium consisting of 13 Historically Black Colleges and Universities, HBCUs, two national labs, and a K-12 school district. The goal is to create a sustainable pipeline of students focused on cybersecurity. My question to any of you, is the Federal Government doing enough to provide the kinds of expertise that small businesses need to ensure their cybersecurity? If you could speak to maybe some relationships between educating students beyond this point. Mr. MANKOWSKI. Ms. Adams, I will start the discussion. I believe that from a tax standpoint, the amount of education really starts from the government, from the IRS. As practitioners, we are continually discussing this with our clients that the IRS, with the different phishing phone calls and the email scams, that the IRS currently is not phone calling or emailing people. If they get any of these calls, they should hang up. If they get a email that says it is from the IRS, that they have an extra refund, just delete it, because they are not going to be authentic. But every day during tax season, it seemed my office was getting a phone call from someone who received a phone call that they were getting ready to get arrested. My partner in my firm had gotten a similar phone call. We actually had a little bit of fun with the people. We kind of strung them along for a little bit. But as times are changing, with the rules that were passed recently with collections within the IRS, some of that, as the collections get outsourced, the companies that are going to be taking over will be calling and could potentially be emailing our clients. It is going to create an even greater disparity of the education because what we have been telling our clients for years, come whatever point that the IRS is able to implement that process, everything we have worked on and gained with our clients over the last few years will pretty much be thrown out if they start getting phone calls from a collection for old tax balances. Thank you. Ms. ADAMS. Mr. Oldham? Mr. OLDHAM. I think there are two separate issues; both are very important. One is educating students as they come up about cybersecurity. That is critical. Just like educating people how to balance their checkbook to keep good financial sense, teaching people good cyber hygiene is going to be imperative for minimizing the cyber threats in the future. Today, educating small businesses can be more challenging because they have not had the years of education, such as a secondary student. However, the biggest issue that I see is that there is not a lot of helpful information out there that is practical and granular for small businesses. In fact, in preparation for my testimony today, I searched around the internet looking for small business guides and was surprised that in many locations, including on government websites, the links were broken, the guides were out of date, or the guides were so high level that I do not know how an owner-operator without IT security background would be able to implement security measures based on those guides. Ms. ADAMS. Okay. Well, let me move on to another question. Online marketplaces, such as eBay, have given small businesses greater access to suppliers and customers abroad. A McKinsey Global Institute study found that 97 percent of U.S. small- to medium-size businesses on eBay engage on export to other countries. My question is, do these marketplaces and international transactions expose small businesses to greater cybersecurity risk? Mr. Dunn, if you want to answer that? Mr. DUNN. I think the websites themselves and the online marketplaces do have to be vetted, do have to be verified to understand if they have any security flaws because, having a security flaw in a marketplace like that will expose the vendor and the small business to potential attacks. Understanding if there are any flaws in that marketplace is really critical. Ms. ADAMS. Quickly, Mr. Dunn, you talked about the use of cloud computing. What is the best way that small businesses could benefit from using cloud providers to improve their security? Mr. DUNN. I think not doing conventional IT in-house is a good move. Using email and file storage from a cloud service provider will be beneficial because it is not on premises, and typically, the major providers of those services are doing a lot in security and more than a small business could do. Ms. ADAMS. Thank you. I am out of time, Mr. Chair. I yield back. Chairman CHABOT. Thank you very much. The gentlelady yields back. The gentleman from Mississippi, Mr. Kelly, is recognized for 5 minutes. Mr. KELLY. Thank you, Mr. Chairman. I thank each of you witnesses for your insight here today. First of all, I would like to echo what the gentleman from New York, Mr. Gibson said. I think it is important for us as a Committee to find out if there are different rules for persons and small businesses and then large corporations to make sure that we are protecting each of those in an appropriate manner. Second, Mr. Snow, it is a travesty what happened to you, but that story is repeated over and over again across this nation. As a former district attorney, I can tell you that there is a lot of room that we can improve in this. Do you have any specific areas that you think the Small Business Committee or the Small Business Administration can help to either educate or inform the general public and small business users that we can take forward? Mr. SNOW. Thank you. I believe that education is probably the key. Obviously, cost is another big concern for every small business. When you start a business, capital is usually at a premium, and when you sit down, in my case, I have close to 70,000 members who come in and race at my track throughout the time that we have been open. I have their data, and it is in a server that I have to protect. That is a concern. My software is provided by a Belgium-based software company, so I have to have access to them. They come in at night to update and upgrade the system on a regular basis. In an international marketplace that we are in, I think education is very important so that the small businesses understand. The other issue is the liability is significant, and a lot of small businesses do not understand that. When I sat down with my insurance agent to renew our insurance, that was one of the questions I asked, and I was amazed, number one, at the cost to get the coverage, but number two, how few businesses actually apply and get that coverage. It can be very expensive for a small business. Mr. KELLY. Mr. Oldham, going back, as I said, first of all, thank you for your service as a prosecutor. I think they are some of the most important people enforcing this law, and being a former one, I am obviously biased in that. But I thank you for your service. As a former district attorney, I was on the local level or I was on the State level, and you as a Federal prosecutor. Quite commonly what I saw is that, number one, when small businesses or individuals are victimized, they do not know who, how, what they need to report. The second thing that I saw is quite often the jurisdictions are not clear. It is not clear where it is coming from, and they do not inform other jurisdictions, so they do not know if it is Federal, they do not know if it is State, they do not know if it is county, they do not know if it is the next State over. It is outside the jurisdiction of this hearing, but I think it is important that we inform law enforcement on how to deal with this and small businesses on how to inform law enforcement so there is a database that we can use to stop this. Do you have any ideas in that area? Mr. OLDHAM. I would say generally the jurisdiction issue is a major issue in prosecuting cyber crime cases. The resources are not there at the local level and it is hard to chase criminal information that is as wide as the web and tracks lead everywhere in the world. I think, going back to the education point from earlier, training local enforcement who are going to get the calls from businesses that have been breached on who to report to, who is the right person in the Federal Government who can help, or where is this database, as you mentioned, would be incredibly helpful to make sure the information is not just coming in for prosecution, but also going out to help the small businesses around the country. Mr. KELLY. On that same line, quite often, these people who take advantage of small businesses or individuals move from jurisdiction to jurisdiction, and there is not any database that gets us ahead of the curve. Quite commonly, they use the same scheme. From Mississippi, they will move to Alabama, they will move to Tennessee, they will move to New York City, but they continue to do that. Are you aware of any Federal database which keeps up with ongoing scams, especially those that are quite frequently the same group or persons or organizations that are doing the scams? Mr. OLDHAM. I am not. In my role now in advising private companies, I know we call the local law enforcement, usually at the Federal level, to report information, and we rely on them to come back to us with whatever information. But not with a lot of visibility of what is going on behind the scenes. Mr. KELLY. Are you aware of any program, and this is for any of you, from the SBA or from anyone else that keeps people informed of what the current scams are and the current phishing expeditions and those things? Because quite frequently, people fall victim to something that has been used over and over. Is there anything that keeps people informed where they can go to one source and see that? Mr. MANKOWSKI. I know that the IRS does release what they consider to be their ``Dirty Dozen,'' which are the top tax frauds that they are suspecting or they are seeing in any given year. What I have seen, especially with a lot of the phishing and the phone calls, is that initially, some of the local news stations were not all that keen on picking up on it, I believe until they started to realize that even some of the people, the top people within the IRS were getting the same phone calls as you and I may be getting, saying that they are about ready to get arrested or your wife is getting arrested or the sheriff is coming to take your car. Now the news stations are broadcasting that the IRS does not make the phone calls. They are getting the word out, which is good, because by getting it out on the news on that end, they are not using any of the budget that is constrained within the IRS at this time. Chairman CHABOT. The gentleman's time is expired. Thank you. The gentleman from New Jersey, Mr. Payne, is recognized for 5 minutes. Mr. PAYNE. Thank you to the Chairman and to the Ranking Member. I appreciate the opportunity to be here, and to all the witnesses, thank you. I want to ask, would it make sense to coordinate cybersecurity efforts that are focused on small businesses through the SBA? My thought is that if business owners are more informed of computer security techniques and products to secure their networks, we may be able to help curtail some of these cyber attacks. Does that make sense? Mr. DUNN. Yes, I think so. I think having coordination and a place where really, truly, detailed information about threats and what to do about them is put at and made available to small businesses, would be excellent. Mr. MANKOWSKI. Just as a comment on that as well, one of the areas as far as coming out with too much specifics as to what you need to do, you are then laying out the playing field for what the criminals need to do to get around your system. That was evident, 2 years ago when the IRS released that no more than three refunds in a calendar year can go into a specific bank account. Through a lot of reverse engineering, they found out that if you start putting a zero before the account number and a second number and a third zero, it was tricking the IRS systems and the banks were disregarding it. It is nice to have the education, but they need to be aware that too much specifics as to what you are doing or what you need to do, you are laying out a simple playing field for the bad guys to just circumvent. Mr. OLDHAM. I think consolidating information in a place like the SBA would be very helpful. Mr. Dunn had mentioned the FCC planning tool earlier, which is a good start, but that is an agency that has jurisdiction over telecommunication companies. I do not think a small retailer or other companies of that nature would be going to the FCC's website. I think you want to be able to have those resources in a place that folks are willing to call or to search for. Mr. PAYNE. Sure. I think it would be a natural depository of information. They are already dealing with the agency, so that is something that might make sense. Unfortunately, even when consumers receive notification of a security breach, many of them do nothing about it or just do not know what to do and the next steps to remedy the breach. What should they do to protect themselves from increased risk of identity theft? Mr. SNOW. I have got a number of levels of security systems that I have put in place. Number one, I have an external server provider that has a junk mail box. So anything that does not look accurate or looks not quite right, it goes directly into the junk mail. I have an internal system within my network in the building that also looks at that, and that has a separate junk mail file. So if it gets through the first level of protection, it then goes to the second level, at which point the user would have to override that junk mail from both levels. That is one. Going back to your other question, I think for me as a small business owner, consistency is very important. As the other members mentioned, every state has a different jurisdiction, and for me as a small business owner, I have customers all over the world. If I were ever to be breached and that data was accessed, I would have a number of different jurisdictions to go after and figure out what I need to do. There is a tremendous cost in that. Mr. DUNN. I think to the point of defense in depth and not relying on any single point of failure, that is pretty key. The concept of having several things that ultimately would have to be bypassed is typically the best approach instead of just having one particular thing. Mr. OLDHAM. One thing that your question raises is the fact that many Americans are receiving these breach notification letters and they all give the same advice: monitor your accounts, sign up for credit monitoring. It seems like maybe a better way of getting at that is general consumer education as opposed to forcing companies to send out these notifications that many of us receive every week, every month, and doing it maybe a slightly different way that is more impactful for the consumers. Mr. MANKOWSKI. Finally, from a tax perspective, people, taxpayers, if they do receive one of these breach notifications and find out that they have been a victim of identity theft, they need to not only report it to the three credit agencies, they should also file a specific form with the IRS, which would put them on notice that they were a victim and that to be careful for a fraudulent tax return coming in from them. Mr. PAYNE. Thank you, Mr. Chair, I yield back. Chairman CHABOT. Thank you very much. The gentleman's time is expired. The gentleman from Missouri, Mr. Luetkemeyer, who is the Vice Chairman of this Committee, is recognized for 5 minutes. Mr. LUETKEMEYER. Thank you, Mr. Chairman. Mr. Oldham, quick question for you. We have seen that cyber attacks come in all shapes and sizes and go after businesses of all shapes and sizes, including government agencies, such as the NSA and Office of Personnel Management. While no one thinks that one size can fit all, should not every business and government agency that handles highly sensitive data have some reasonable, but also mandatory, policy and procedure in place for security data against loss and theft? Mr. OLDHAM. Absolutely there should be policies in place that is standard and mandatory at any government agency that handles sensitive data. Mr. LUETKEMEYER. It is interesting. Mr. Snow talked about an insurance policy in place. Can you elaborate just a bit, Mr. Snow, with regards to availability and cost and coverages of insurance policies that are out there for cyber attacks? Does it count for your monetary loss or losses to your customers? Does it also cover the liability exposure that you may have to other customers that do business with you? Mr. SNOW. My understanding is it covers the notification mandates that are required around the country. What would happen, from my perspective, is that I would notify the insurance company, and they would immediately come to my aid in terms of notifying all the customers that their data may have been breached, and also to provide that security to the individual that had the breach in terms of credit reporting and other things. That was my understanding. That was the least expensive of the policies that are out there. There is a whole gamut of different insurance policies that you can get, I am sure covering all the way up to the large liabilities. We have also, on top of that, an umbrella policy that we hope will cover what we feel--in our case we have a $2 million liability policy--we hope that we will not exceed that in any particular breach, but it is an uncertain area. Mr. LUETKEMEYER. Mr. Oldham, you advise people on the risks that they incur. I would assume you have a pretty good knowledge or extensive knowledge of the availability of these things and how far they go and the costs? Mr. OLDHAM. Insurance policies. I am not an insurance lawyer, but certainly that comes up in cases. There is a wide range. To the cost in general, it depends on the number of pieces of data, such as affected individuals. If I am advising a client who has to give notifications in 30 different States, that is 30 different statutes that have to be reviewed to do that. Mr. LUETKEMEYER. So it is basically a policy that is tailored to the individual risk? Mr. OLDHAM. Yes, again, I am not an insurance lawyer, but when these insurance policies do come up and we have to look at them, there is a great variation. I am not aware of a standard insurance policy, and I think Mr. Snow, that is probably what your experience was that you were talking about, the marketplace is so new at this point. Mr. LUETKEMEYER. It seems to me that that is a burgeoning area of need, obviously, and so we will see how it develops. Along that line, Mr. Dunn, you mentioned a while ago that for small businesses that do business with the government, is there a possibility of compromising government information with those businesses and, therefore, they are exposed for a liability situation? Is there something in the contract that protects them, or do they need to be covering a risk there? How does that work? Mr. DUNN. I do not know necessarily about a contractual obligation. I think from the perspective of interconnecting systems or share of data there is a liability in either direction. If an attacker was to gain access to a small business that services a government client, the assumption is either the value of the data or some direct connectivity to the government agency may exist. Mr. LUETKEMEYER. We have an exposure there you need to be careful of, right? As a business, you are going to have to have some sort of, I would think, an insurance policy or some bond of some kind that would protect you in case something went wrong. Mr. DUNN. I think the whole area of cybersecurity insurance is quite new and fairly immature. I do not know an awful lot about it, but I often wonder what do you have to do in order to be insurable and how do you stay insurable. That may have some kind of compliance or regulatory check. Mr. LUETKEMEYER. I have always thought that the insurance companies are going to drive this issue because at some point they are the ones that are going to have to insure the issue, and therefore, they are going to demand certain standards. When those standards are out there, they are going to be the ones driving how this is all done. Mr. Chairman, I yield back the balance of my time. Chairman CHABOT. Thank you. The gentleman yields back. The gentleman from New York, Mr. Hanna, who is the Chairman of the Subcommittee on Contracting and Workforce is recognized for 5 minutes. Mr. HANNA. Thank you. Thank you, Chairman. Thank you all for being here. I want to talk about a bill--Mr. Payne actually mentioned it inadvertently--I coauthored with Derek Kilmer from Washington. It is the Improving Small Business Cybersecurity Act of 2016. We have 900 small business development agencies around the country. This bill, which would cost, we estimate almost nothing, would authorize and change the Small Business Act and direct these SBDCs to offer cyber support services to small businesses, again, at no additional cost. We would simply be leveraging the SBDCs cyber support services, DHS, and Department of Homeland Security, and the Small Business Administration would simply be required to review current Federal programs and develop, along with the SBDC, a cybersecurity strategy to help in all communities throughout the country. I want to ask you a question, Mr. Dunn, and anyone who wants to weigh in, it sounds like this problem is, at the very least, a moving target, and it is not just a moving target; it is an intellectually moving target. It is a one- upmanship. It is a constant game, cat-and-mouse type of thing. You mentioned in your statement, Mr. Dunn, and I apologize for being late to this hearing, training needs to be offered but it tends to be too general. Is it a practical thing to talk to a small business person who may have one or two people and still have enormous impact potential against them. Is it practical in today's world to ask a person to be up to speed in the way they need to be, not just today but going forward. How do you manage that Mr. Oldham, anybody interested in answering that? Mr. DUNN. The concept is giving them-specific advice on the things that really matter to them. If the example is perhaps they want to offset their email services to a cloud provider, telling them specifically the settings that would be useful to turn on and the benefits is better than just telling them about general awareness concepts about the dangers of email, for example. Striving for this education around data as being the factor considered the most, you do not have to be up on all the security concepts that currently are happening, but you do have to understand what data you have, the value of it, and then what you should do based on the different value of the different data that you have. Mr. HANNA. In that sense, Mr. Oldham, anyone, so it is practical to do certain minimal things that help people broadly to limit the possibility of an attack? Mr. Oldham? Mr. OLDHAM. I think when you step back to the risk management aspect and not just to the zeros and ones, it is very important, as Mr. Dunn said, to focus on what the issue is, and it is usually driven by the types of data. Certain data is more sensitive than other data. Providing high-level guidance that says cybersecurity is important, you should have good cybersecurity, is not helpful to small businesses. It is helpful to provide targeted advice that is practical and granular to their specific situation. Mr. HANNA. The Small Business Development Centers around the country, the 900, would it be possible for them to establish a basic format that would help the majority of small businesses out there without making it too complicated, difficult, and would it be helpful? Mr. OLDHAM. I think it would be helpful as long as they have the right expertise going into that guidance. One of the issues that happens in this space is guidance gets put out but it does not evolve with the threat. That is one of the big top- level messages, this threat evolves rapidly, and so do the legal requirements. Mr. HANNA. If the Small Business Development Centers were able to do this updating, they could be a source in that community, rather than so many randomly small businesses trying to do it on their own and maybe not being entirely effective in that? Mr. OLDHAM. It sounds very promising. Yes. Mr. HANNA. Thank you. Chairman, I yield back. Chairman CHABOT. Thank you. The gentleman yields back. I want to thank our witnesses for being with us here today. They have helped to clarify just how vulnerable many small businesses and individuals are to cyber attacks. It is a growing and evolving problem, and you have helped shed some light on what should be done to combat it. For that we thank you very much. I ask unanimous consent that members have 5 legislative days to submit statements and supporting materials for the record. Without objection, so ordered. If there is no further business to come before the Committee, we are adjourned. Thank you very much. [Whereupon, at 12:15 p.m., the Committee was adjourned.] A P P E N D I X [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Statement of Nicholas A. Oldham Counsel King & Spalding LLP before the U.S. House of Representatives Small Business Committee April 20, 2016 Chairman Chabot, Ranking Member Velazquez, and members of the Committee, thank you for the opportunity to appear before you today.\1\ --------------------------------------------------------------------------- \1\ The views and opinions expressed in this statement are mine and do not necessarily reflect the views or opinions of King & Spalding or any of its clients. I have been involved in cyber issues for many years--as a former federal prosecutor at the U.S. Department of Justice and now as an attorney with King & Spalding. In my practice, I counsel clients, both large and small, on the legal aspects of --------------------------------------------------------------------------- cybersecurity risk management. Today, I focus my testimony on the cybersecurity landscape for small businesses, and on three areas of particular concern--the cybersecurity education gap, the need for cybersecurity initiatives to be calibrated for small businesses, and the need to clarify and simplify the current regulatory environment. Background We are living in exciting times. Digital assets and connected systems have generated new products and services, redefining how business is conducted and services delivered. But the truth is that we are only at the beginning of the beginning when it comes to understanding the implications of our reliance on this interconnectivity and the dangers that cyber threats present. Our interconnectivity is growing at an astonishing rate, with some estimates that there will be as many as 50 billion devices connected to the Internet by 2020. As a result, we are marching toward an infinitely connected world: always online, our information moving from network to network and device to device. Partly as a result of this interconnectivity, businesses are gathering and utilizing an ever-growing amount of information to improve their business practices and better serve their customers. Today, every online communication, transaction, and anything else you can think of can be captured and stored, and then transmitted electronically anywhere and at anytime. This interconnectivity, especially including the Internet of Things, holds tremendous promise for consumers and companies. It also creates new challenges in terms of cybersecurity because anything connected to the Internet can be hacked. Cyber threats vary from the technologically sophisticated to the surprisingly low tech methods such as ``social engineering'' and spear phishing. A recent RAND Corporation study found that over a quarter of American consumers received a notice that their data was stolen within the past year alone. Forbes recently reported that cyber-attacks cost businesses an estimated $400-500 billion per year, and because many cyber- attacks are not reported, it is believed that the real number is significantly higher. These reports underscore the significant costs of preparing for, responding to, and recovering from cyber incidents. Where do small businesses fit in this landscape? The interconnected world enables small businesses to develop new products and services and compete across the globe. However, growing cyber threats presents greater challenges to the same small businesses, which can lack the tools needed to effectively cope with the growing danger. Small businesses are appealing targets. Small businesses often have more digital assets than individual consumers, but their resources may not allow for the same level of focus on cybersecurity as large companies. Businesses of all sizes need adequate cybersecurity education, but it can be difficult for small businesses to find the right information and training. Small businesses also often feel the impact of cyber threats differently than large companies. Establishing effective cybersecurity and incident response mechanisms is complicated and can be expensive. When any business implements mitigation measures or responds to a cyber incident, it can lost significant time and money. The costs can sink a small business. Small businesses get burned at both ends--they are less likely to have the resources to prevent breaches and they also may have fewer resources to respond to those breaches. From Cyber Threat Awareness to Cyber Risk Management In June 2011, various Committees in both the House and Senate held hearings regarding data breaches at Sony and Epsilon Data Management. In March 2012, then-FBI Director Mueller gave a now famous speech at the RSA Conference in San Francisco. His oft repeated quote is that ``there are only two types of companies: those that have been hacked and those that will be.'' These events were key, early moments that helped raise awareness of cyber threats. We have much farther to go in terms of awareness and, perhaps more importantly, companies need to move from awareness to expertise in managing the new normal of cyber threats. As a lawyer, I do not manage corporate networks or conduct vulnerability testing. Rather, I believe that cybersecurity is as much a people and process issue as it is a technical issue. I focus on the people and process side of the equation, addressing the legal and business cybersecurity risks faced by companies including cybersecurity risk governance, compliance, and incident response processes. I also help companies comply with breach notification obligations, interact with various regulators, and manage their responses to regulatory actions or litigation. The legal and business costs, including compliance costs, drain on employee time and morale, and reputational damage, can be significant. The Cybersecurity Education Gap Before spending precious resources on increasing cybersecurity measures, it is natural for small businesses to carefully weigh the cost of putting new measures into place versus the cost to the company of the inevitable cyber incident if it does not take action. Because of the enormous potential costs of a cyber incident, which is difficult to quantify, companies may find that it is far more expensive to not implement basic security measures. The problem here is that there is a cybersecurity education gap: small businesses may not be able to get the information they need to properly assess and mitigate these costs. Bridging this education gap can be difficult for small businesses, especially those that lack the resources to hire specialized employees or cybersecurity experts. Basic resources are available online, but even where they provide crucial information, they can be difficult to find, are rarely updated, or are inadequate. On the legal compliance front, the Federal Trade Commission recently released a new web-based tool for developers who make health-related apps. The tool asks developers a series of 10 high-level, yes or no questions related to their apps covering topics such as the apps' functions, data they collect, and the services they provide. Then, based on the answers to the high- level questions, the tool identifies four potentially applicable federal laws. While useful as a starting point for introducing and orienting developers and other healthcare industry players to the legal thicket affecting health apps, the tool provides high-level guidance on the basics of only a few relevant laws. The FTC's tool is one example of an approach geared toward educating the public on legal compliance. The tool is somewhat promising, but does not cover all relevant laws and does little more than point the developers to summaries of the relevant language. This approach, however, could go a long way toward helping small businesses stay informed on cybersecurity legal best practices, provided such tools are expanded to cover a broader set of laws and give more specific, timely information. In many ways, cyber threats have analogs to traditional crime. Ransomware is cyber extortion, spear phishing is nothing more than a con artist taking advantage of the ubiquity of e- mail. Hackers, moreover, are like burglars. They use their ``gloves,'' ``dark clothes,'' and ``tools'' to get inside a network, stealing digital loot along the way. In the traditional crime scenarios, small businesses would likely call the local police department for best practices in preventing these crimes or responding to them. In the digital crime scenarios, there is no one logical place to call. The government may have a role in bridging the cybersecurity education gap by encouraging the development of cybersecurity education resources and connecting them to those who need them in the private sector. Existing Programs Are Not Geared Toward Small Businesses Many of the cybersecurity initiatives receiving the most attention are not necessarily tailored to take into account the realities of small business owners. Standards seem to be coalescing around the NIST Cybersecurity Framework in some areas, for example, which is a promising development. This has the potential for simplifying the landscape for small and large businesses alike. The current iteration of the NIST Framework, however, is not particularly geared toward the needs of small businesses. The Framework itself can be difficult and expensive to understand and implement regardless of business size, and until it is better tailored to small businesses, for some of them it may just be one more program that they cannot afford to keep up with. Perhaps more importantly, a small business might become subject to a cybersecurity framework by virtue of its contractual relationship with a partner that passes its cybersecurity obligations through its supply chain. In this case, the small business might agree to obligations under the cybersecurity framework without the same level of vetting it might undertake if it were adopting the framework from scratch, and thereby inadvertently expose itself to significant liabilities and expose itself and its partners to significant cyber risks. While good cyber hygiene is important, to improve the NIST Framework, and similar programs and policies, the government should make a serious effort to increase the involvement of small business owners in all phases of the legislative and rule-making process. Until small business concerns are fully baked into these standards, they could face serious challenges of adoption. The Current Regulatory Regime Is Difficult to Navigate The current regulatory regime for cybersecurity presents additional difficulties for small businesses, who will inevitably struggle to determine both (1) what cybersecurity measures they are required to enact, and (2) when a breach or attack does occur, what procedure the law requires them to follow. There are currently 51 different state or territory laws that pertain to the notifications a company that has been the victim of a data breach provide to its customers. They are inconsistent with each other in a variety of ways. Additionally, several states have enacted laws requiring companies to put ``reasonable security measures'' in place. What ``reasonable'' means in this context is evolving and can differ by jurisdiction and industry. I have seen a growing number of federal regulatory agencies stepping into the same space. The cost of ensuring compliance with laws for any company is enormous even before taking into account the cost of litigation and reputation damage if a breach does occur. Small businesses in particular are vulnerable to these costs because they can consume a much larger proportion of their available funds. Small businesses would benefit from a public sector approach that lowers the cost of compliance and the cost of implementing best practices. In short, there is a need to clarify and simplify what companies must do. Because of the complicated and evolving landscape, the on-the-ground expertise of the private sector must necessarily play an important role in these efforts. Thank you for the opportunity to testify before you today. I look forward to your questions. NATIONAL CONFERENCE OF CPA PRACTITIONERS 22 Jericho Turnpike, Suite 110 T: 516-333-8282 Mineola, NY 11501 F: 516-333-4099 Chairman Chabot, Ranking Member Velazquez and members of the Committee, thank you for inviting me to testify today. My name is Stephen Mankowski. I am a Certified Public Accountant, Executive Vice President of the National Conference of CPA Practitioners, (NCCPAP - the countries' second largest CPA organization) and a member of the American Institute of CPAs (AICPA). NCCPAP is a professional organization that advocates on issues that affect Certified Public Accountants in public practice and their small business and individual clients located throughout the United States. NCCPAP members serve more than one million business and individual clients and are in continual communication with regulatory bodies to keep them apprised of the needs of the local CPA practitioner and its clients. Accompanying me is Mr. Sanford Zinman, National Tax Policy Chair of NCCPAP. My firm, E.P. Caine & Associates CPA, LLC, has been preparing tax returns for over 30 years. My firm annually prepares well over 2,000 small business and individual tax returns as well as sales tax returns, payroll tax returns, highway use tax returns and Forms W2 and Forms 1099 informational returns. We are in the trenches with clients discussing their tax, financial and personal issues, and the impact events and proposed tax law changes may have on them. Although our clients are mostly in the Pennsylvania, New York, New Jersey and Delaware areas, we serve clients in over 30 states and also provide services to clients in Canada and Europe. In this respect our practice is the same as many members of NCCPAP and other smaller CPA firms throughout the United States. NCCPAP has been at the forefront of identity theft issues through our advocacy and testimony at prior hearings dealing with ID theft in June 2012. The initial hearings focused on the refund scams that were prevalent at the time, such as Mo Money. NCCPAP has remained vigilant on the topic and has been discussing these issues annually when our members meet with Congress and their staff and with IRS representatives. Our members have helped guide numerous taxpayers who have been victims of ID theft to navigate through the IRS to minimize the risk of further consequences. ID theft has been growing exponentially for years. It seems that no matter what controls are put in place, criminals have better and more focused resources to circumvent these safeguards. All businesses are at risk, from the largest to the smallest. Weekly, we are hearing about the latest business to be a victim of some level of cybercrime or ID theft. Mr. Richard Snow, who is also on the panel of witnesses today, has been a victim. All businesses are at risk, but CPA firms and tax practitioners are at a greater risk. The IRS reminds tax preparers that they must be vigilant with their system integrity. The criminals are aware that the ``prize'' for breaching tax practitioner systems could yield them not only names and social security numbers, but also several years of earnings as well as bank information and dates of birth. Thus, the IRS recommends that tax preparers create a security plan. IRS Publication 4557, Safeguarding Taxpayer Data, provides suggestions and a checklist. My firm has reviewed the Publication, continually trains our staff and, along with our IT consultants, monitors our information and controls to ensure that our offices not only meet but exceed these suggestions. Our network logs usage form all users and is monitored to ensure no unauthorized access. This includes staff with remote access to our server. We also require a user id and passwords to gain access to all of our software packages. Not all firms have been as fortunate regarding cyber security. Two Midwestern firms were compromised this tax season and had fraudulent returns filed through their electronic filing identification number (EFIN). I was able to speak with a partner at one of the affected firms. They were under the impression that their systems were secure. However, the breach occurred after installing a new copier system that had not been properly secured within their network. Once they determined that they did in fact have a breach, they attempted to contact the IRS. Unfortunately, there is no easy means to identify the proper area within the IRS to contact. Ultimately, it took nearly one month for a response from the IRS. Ensuring the security of client data has been and remains the goal of my firm and we take that task very seriously. Although our software has the ability to auto-generate the PINs for electronic filing (EF PIN), we became aware that the EF PIN was using a portion of the taxpayer SSN. We have opted to not use this part of our software and have chosen to manually enter the EF PIN. Some tax software packages use a random five-digit number and we have suggested our software provider offers the same option. Taxpayers are also able to obtain their own specific EF PIN through the IRS website through the entry of select information. Currently, this system is too new to ascertain the true effectiveness of the program; however, concerns exist as to whether the return would reject if this number was not used or what would happen if the taxpayer lost this number. It is not clear if there is a mechanism to retrieve the number from the IRS. Practitioners are also reminded to protect their EFIN. The IRS suggests practitioners log into e-services on a regular basis and verify the number of returns processed for their EFIN. While the number probably will not be exact due to the timing of return processing and updating of this service, significant differences could be a cause for alarm. Practitioners should contact the IRS e-Help Desk immediately if the difference is excessive. At the beginning of this filing season, the tax software community requested that tax practitioners update their EFIN authorization letter before they start using their EFIN. This is just another step in preventing potential unauthorized access to a practitioner EFIN. While in many cases the timing of this request might not have occurred at the most opportune time, such as when the first returns were to be filed, it sent a signal to the practitioner community that the software vendors understood the issues and were working in conjunction with practitioners to address ID theft. While firms that electronically submit tax returns are required to obtain an EFIN from the IRS, paid preparers initially included their social security number on tax returns and in 1999 were first offered the ability to use a Preparer Tax Identification Number (PTIN). The requirement to include the preparer's firm information, which includes their employer identification number, began in 1978. Given the risks of firm ID theft, why has the IRS not adopted a firm PTIN? There are two primary reasons that criminals attempt to breach systems--the challenge and/or for the information contained in the systems, both reasons for IRS action. The IRS has been transitioning to modern technology within its network protocols to enhance safeguards. During this transition, the IRS has encountered many of the same compatibility concerns that affect most businesses. As a CPA, I became aware of this when the IRS announced the planned retirement of the Disclosure Authorization (DA) and Electronic Account Resolution (EAR) options on IRS e-services in August 2013. When the tax practitioner community complained that the elimination of these options would have a significant impact on their practices, we were told that the platform on which these services were designed was not compatible with the new system architecture and the initial costs to rewrite the programming was excessive. The IRS has looked at a relaunch of these services in the future, but the added authentications might make the systems overly burdensome. In March 2015, one tax software vendor had its electronic processing systems compromised to the extent that the state of Minnesota and subsequently all states temporarily ceased accepting electronically filed returns from that vendor. One positive result of this situation was the formation of the IRS Commissioner's Security Summit, which initially included representatives from state governments, banking and the software community. This group approach was a positive signal from the IRS that the issues of identity theft and data security required a multi-faceted approach to work at stemming the increases in data security and ID theft. Their initial focus was addressing and stopping suspected fraudulent returns through the implementation of protocols to address issues with tax returns before processing and during the initial processing. According to a recent General Accounting Office (GAO) report, it is estimated that during the 2014 filing season the IRS paid approximately $3.1 billion in fraudulent refunds while preventing $22.5 billion. This was before the creation of the Security Summit. In its initial year, the Summit estimates that it has prevented in excess of three million fraudulent returns from being processed and refunds issued during the 2015 filing season, but many fraudulent returns are still getting through. The Summit has not been expanded to include tax practitioners. The next level of focus needs to be on securing the refund process. According to Senator Wyden, the IT budget within the IRS is now operating at a level lower than it was six years ago due to budget cuts. The criminals, however, have ample cash and sophisticated systems. They continually attempt to reverse engineer the security measures implemented by the IRS. One recent instance occurred when the IRS announced that only three IRS refunds would be able to be direct deposited into a bank account in any calendar year. It was determined that adding zeros before the account number would trick the IRS systems to think it was a different account number and allow the refunds to be deposited. It satisfied the IRS systems while being disregarded by the financial institutions. This was a case that I believe the IRS learned a valuable lesson--while you can publicly address the solutions being implemented, you should not provide the specifics. The limitation of refunds was designed as a deterrent, but ultimately only served as a means of preventing tax preparers from illegally collecting the fees from a taxpayer refund. The timing of the receipt of data by the IRS often comes into question. Often fraudulent returns are submitted with refunds transmitted long before the data needed to verify the income and the tax withholding is received by the IRS. Businesses filing Forms W-2 on paper are required to submit the data by the end of February, while electronic filers had an additional 30 days. In addition, an automatic 30-day extension had been available. Because of the delay in submission of these information returns, the criminals have begun filing fraudulent W-2s. In an effort to counter this practice, Congress has removed the automatic extension for filing paper or electronic information returns. However, a time discrepancy still remained. The Protecting Americans from Tax Hikes Act of 2015 (PATH) clarified and simplified these dates. For tax years beginning in 2016, Forms W-2s will be required to be submitted to Social Security and Forms 1099-MISC will be required to be submitted to the IRS with the same due date as to the recipient. This accelerated timeframe should pose a significant hindrance for those who submit fraudulent returns. However, there is still the issue that the IRS will start processing tax returns during the month of January, usually on or about January 20, leaving a window for fraudulent tax returns to be submitted and processed before the IRS has the opportunity to match data. The IRS has estimated that it averages approximately one million breach attempts daily. However large that number might be, as a taxpayer I would expect that every attempt would be defeated. Unfortunately, over the past year, the IRS has had actual system breaches. First, the IRS online transcript program, ``Get Transcript'', was compromised in May 2015 and the number of accounts that the IRS admitted were affected has doubled several times. In February 2016 the IRS announced the affected accounts exceeded 700,000. The second breech that occurred recently related to the Identity Protection PIN (IP PIN) retrieval tool that is contained on the IRS website and is more troubling than the prior breach. The taxpayers who have IP PINs have already been victims of tax refund fraud and obtained the six digit IP PIN to prevent further unauthorized access or filings. This tool had been using the same interface as Get Transcript but had remained available to the public and, unfortunately, those less scrupulous. Finally, the IRS took this page offline in February 2016, nearly nine months after the initial Get Transcript breach. The March 2016 GAO report identified that the IRS has improved access controls, but noted that weaknesses still remain. One of the primary concerns addressed by the GAO surrounds the authentication of the user ID. The IRS has employed a multifactor approach using two or more factors to achieve authentication. This provides the basis for establishing accountability and for controlling access to the system. Their systems require that Homeland Security Presidential Directive 12-Compliant Authentication be implemented for IRS local and network access accounts. This involves password-based authentication with passwords that are not found in dictionaries and expire at a maximum of 90 days. This same protocol should be implemented for all user accounts, including e-services. The direct deposit of refunds is a fast, inexpensive and relatively secure means of issuing refunds. The IRS utilizes banking's ACH system, whereby a refund goes to a selected financial institution based upon their respective routing or ABA number. If an account number exists within the institution, the refund goes into the account. The IRS is mandated to process refunds within 21 days, unless additional processing time is required. Prior to the current Modernized e-File (MeF) system, the IRS had been operating on a ``accept by Thursday, refund following Friday'' schedule. Often under the MeF system, refunds have been processed even quicker. Taxpayers have grown accustomed to getting the quick refund and now wonder if there is a problem when it is taking longer than a week for their refund to appear in their account. Social Security Administration uses a banking ``pre-note'' to verify the accuracy of the recipient's banking information prior to the initial payment. The financial institution has five days to verify the information and notify SSA if there are errors or discrepancies. Failure to notify SSA could result in the institution being held liable for the funds if the funds are misdirected. Unfortunately, the IRS refund system does not include pre-note account verification. Funds are simply transmitted through the ACH network to the respective institution. Once deposited, there is no control on the usage of funds and often where there is fraud those deposits are moved immediately upon receipt. The implementation of a pre- note system could result in a significant reduction of the annual $3.1 billion misappropriation of government funds. As discussed, Congress has mandated 21 days for refunds to be processed. While it is easy to understand that taxpayers want their refunds processed as quickly as possible, one must ask a simple question. Is paying a tax refund in seven to ten days a prudent use of taxpayer dollars? A recent survey by Princeton Research Associates noted that 22% of taxpayers surveyed would wait up to six to eight weeks for their refunds if they knew it would combat identity theft. NCCPAP members feel that simply using the pre-note technology that already exists and is used throughout the financial industry would allow taxpayers to receive their refunds promptly while reducing fraud. Unfortunately, despite all of the efforts of the IRS and Congress to curb ID theft, often the cause is unscrupulous preparers that are often unregulated by any authority. NCCPAP urges Congress to pass legislation to provide the IRS the necessary authority to regulate all tax preparers and required paid preparer to meet minimum standards. Currently, only CPAs, EAs and attorneys are subject to the requirements of IRS Circular 230. In conclusion, ID theft is an issue that initially gained traction with Congress in 2012. Much has occurred since the initial hearings and, unfortunately, the criminals have taken more steps to obtain information than the IRS has been able to block. The IRS is not alone in this battle. It seems that not a week goes by where there is not news of a major corporation announcing that their systems had been hacked. Taxpayers have become victims of ID theft through these breaches and do not necessarily understand the importance of contacting the IRS. While knowing that the IRS successfully thwarts approximately one million breach attempts each day is comforting, we should keep in mind that even one successful breach could be catastrophic to not only the IRS but to the taxpayer. Often, taxpayers do not realize they have been a victim of ID theft until their electronically filed tax return gets rejected. Once a taxpayer has been victimized, they expect to obtain an IP PIN from the IRS and starting in January 2017 they will. In Florida, Georgia and Washington, DC where ID theft has been rampant, the IRS implemented a voluntary IP PIN program. Unfortunately, this program failed to achieve the number of participants to make the program successful. Taxpayers are urged to protect their personal data, but with widespread Internet usage, online shopping and criminals waiting to pounce on unsuspecting victims, ID theft continues to grow. Individual and businesses remain targets of cyberattacks and must remain cautious when opening emails and attachments, visiting web pages and simply paying for the family groceries. There are several electronic filing options available to taxpayers. Many taxpayers use Free File, thirteen IRS-approved free e-filing tax service sites. In a recent audit performed by the Online Trust Alliance (OTA), six of the thirteen websites failed due to poor site security and not taking steps to help protect consumers from fraudulent and malicious email. IRS Commissioner Koskinen had the foresight to convene the initial Security Summit in 2015, which has proven to be successful. Unfortunately, the criminals always seem to be pushing the envelope further and further. Their approach is more focused and better funded. The Security Summit has now expanded its focus to include additional user groups, including tax practitioners, to further address cyber security and develop a multi-tiered approach to combat it. The only way to truly combat ID theft is to incorporate input from various sectors of the marketplace. This is a problem impacting businesses and taxpayers worldwide and will require global efforts to minimize and hopefully resolve. NCCPAP calls on Congress to provide the necessary funding to continually monitor, modernize and upgrade IRS systems to minimize and eliminate data security breaches. The first step would be Congress reauthorizing Streamlined Critical Pay Authority to allow the IRS secure top IT talent without a three to six month waiting period. Thank you for the opportunity to present this testimony and I welcome your questions. Respectfully submitted, Stephen F. Mankowski, CPA Executive Vice President, NCCPAP [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] [all]