WISP READINESS · IRS 4557 · FTC SAFEGUARDS

Build a defensible Written Information Security Plan.

Wolf Tech helps tax professionals, CPA firms, and small businesses in South Florida understand and document the cybersecurity controls expected by the IRS and FTC. Start with our free WISP Starter Guide.

Provided for educational and planning purposes. Not legal advice or a guarantee of regulatory compliance.

WISP Starter Guide
PDF · 8 pages · free
  • What a WISP is and why it matters
  • Top 10 common security gaps
  • IRS Security Six checklist
  • Readiness scorecard & MFA / backup checklists
  • Short incident-response checklist
Get the PDF
Why a WISP matters

Documentation that maps to real-world risk

Regulatory expectation

The IRS expects every paid tax preparer to maintain a written security plan. The FTC Safeguards Rule applies to many small businesses handling customer financial data.

Real risk reduction

A WISP forces a clear inventory of sensitive data, access controls, and incident response — the same gaps attackers consistently exploit.

Trust with clients & insurers

Cyber insurance carriers, partners, and clients increasingly ask for documented security programs before engaging or renewing coverage.

Aligned with

IRS, FTC, and NIST guidance

IRS

Publication 4557

Safeguarding Taxpayer Data — guide for tax professionals on protecting client information.

IRS

Publication 5708

Creating a Written Information Security Plan — sample template and required elements.

FTC

Safeguards Rule (16 CFR 314)

Required information security program elements for financial institutions, including tax preparers.

NIST

Cybersecurity Framework

Identify, Protect, Detect, Respond, Recover — the structure many WISPs map controls against.

What we see most often

Common security gaps in small firms

  • No written security plan or outdated documentation
  • MFA missing on email, remote access, or admin accounts
  • Backups never tested or stored on the same network
  • Shared logins for tax/accounting software
  • Phishing training treated as one-time, not ongoing
  • No formal incident-response or breach-notification plan
  • Vendor and third-party access never reviewed
  • Personal devices used for client work without controls
  • Patching and endpoint protection inconsistent
  • Sensitive data stored unencrypted on local drives
What's inside the guide

Practical checklists, not theory

WISP overview

Plain-language explanation of what a WISP is and what it must cover.

Readiness scorecard

10-point self-assessment to identify where to focus first.

MFA checklist

Where multi-factor authentication should be enabled across your stack.

Backup checklist

Tested, offline, and immutable backup practices for small firms.

Phishing protection

Email controls and user-training cadence that meaningfully reduce risk.

Incident response

Short checklist for the first 24–72 hours after a suspected incident.

Download · WISP Review Request

Get the guide or request a readiness review

Tell us a little about your firm. Use one form for either action — we'll send the PDF instantly or schedule a no-pressure conversation.

We use your information only to send the requested resource and follow up. No spam.

What to expect

Practical, transparent, local

Miami-based

Local team serving South Florida firms.

SMB focused

Built for firms with 1–200 employees.

Framework-aligned

Maps to IRS, FTC, and NIST guidance.

Responsive

Reply within 1 business hour, Mon–Fri.

FAQ

Common questions

A Written Information Security Plan documents the administrative, technical, and physical safeguards your business uses to protect sensitive client and employee data.
Sources & references

Where this guidance comes from

This page and the downloadable guide are provided for informational and cybersecurity planning purposes only and should not be considered legal advice. Consult qualified legal counsel and your regulators for compliance determinations specific to your business.

Get Protected