Tax Software Hosting

Local Tax Software Hosting Risk Guide

A practical overview of the cybersecurity and IRS / WISP compliance risks of running desktop tax preparation software on local PCs, mapped network drives, peer-to-peer shares, and in-office file servers — plus a directory of software-specific risk articles for the most widely used U.S. professional tax packages.

Key takeaway

Desktop tax software on a local network is not automatically unsafe, but the architecture concentrates taxpayer data in a place where the security of every return depends on the weakest workstation, password, and remote access tool in the office. A controlled hosted-server model with individual MFA-protected access is materially easier to defend.

Who this applies to

Tax preparation firms, CPA firms, EAs, bookkeepers, EROs, service bureaus, and accounting offices that run any major U.S. desktop tax package on local PCs, mapped drives, peer-to-peer shares, or an office file server.

Why this matters

Most professional tax software in the U.S. is still commonly deployed in a desktop or local-network configuration. Multiple preparers open returns from a shared data folder over the office LAN, often through a mapped drive. That setup is fast and familiar — and it is also exactly the configuration attackers are most successful against during tax season.

Tax data is a high-value target. A single shared folder typically holds names, Social Security numbers, dates of birth, dependent information, employer data, bank routing details, prior-year returns, e-file submission information, and identity verification details. When that folder is reachable from every workstation in the office, the security of the entire firm depends on the weakest endpoint, the weakest password, and the weakest remote access tool in the environment.

Common local-network risks

  • Phishing or malware on a single workstation that reaches the shared tax data folder
  • Ransomware encrypting mapped drives and any reachable local backups in the same incident
  • Exposed RDP or poorly secured third-party remote access tools used during tax season
  • Shared Windows logins that eliminate individual accountability for who accessed which return
  • Over-permissive file shares with no centralized audit trail
  • Inconsistent endpoint protection, missed patches, and old workstations during busy season
  • Unencrypted or co-located backups that go down with the live data
  • No documented Written Information Security Plan (WISP) or evidence of access controls

A more defensible architecture

The pattern that holds up better under IRS Publication 4557 and FTC Safeguards Rule expectations is a controlled hosted-server model — either a reputable tax software hosting provider or a properly hardened internal server designed to behave like one. In that model, each preparer authenticates with a unique account, MFA is required on every session, the tax database is not exposed as a raw network share to ordinary office desktops, backups are segmented and monitored, and access is logged in a way the firm can show during a security review.

Important nuance

"Hosted" does not automatically mean "compliant." What matters is the architectural pattern: individual user access, enforced MFA, segmentation between desktops and tax data, centralized backups, and documented controls — combined with an actual written WISP that reflects how the firm operates.

Tax software directory

Pick your tax software below to read a focused risk article covering desktop / local-network deployment, attack scenarios, recommended hosted-server architecture, and a software-specific FAQ.

CCH ProSystem fx Tax

Wolters Kluwer / CCH

Why running CCH ProSystem fx Tax on local PCs, mapped drives, or office file shares creates avoidable cybersecurity and IRS WISP exposure for tax firms.

Read the risk guide

CCH ATX

Wolters Kluwer / CCH

How CCH ATX desktop and network installations expose taxpayer data, and why a hosted-server model with MFA is a more defensible WISP-aligned setup.

Read the risk guide

CCH TaxWise Desktop

Wolters Kluwer / CCH

CCH TaxWise Desktop on a local office network can expose taxpayer data. Learn why a hosted-server architecture with MFA is a stronger compliance posture.

Read the risk guide

UltraTax CS

Thomson Reuters

Running Thomson Reuters UltraTax CS on a local server or LAN exposes taxpayer data. See why a hosted-server architecture with MFA is more defensible.

Read the risk guide

Lacerte Tax

Intuit

Lacerte Tax network installations on local PCs or shared drives expose taxpayer data. Learn why hosted Lacerte with MFA is a more defensible architecture.

Read the risk guide

ProSeries Professional / Basic

Intuit

Intuit ProSeries Professional and Basic desktop network installs put taxpayer data on the office LAN. See why hosted ProSeries with MFA is more defensible.

Read the risk guide

Drake Tax

Drake Software

Drake Tax desktop on a local office network exposes taxpayer data to ransomware and credential attacks. Learn why hosted Drake with MFA is more defensible.

Read the risk guide

TaxAct Professional / Enterprise

TaxAct

TaxAct Professional and Enterprise desktop network installs leave taxpayer data on the office LAN. See why hosted access with MFA is more defensible.

Read the risk guide

TaxSlayer Pro Desktop / Classic

TaxSlayer Pro

TaxSlayer Pro Desktop and Classic on a local office network expose taxpayer data. See why a hosted-server model with MFA is a stronger compliance posture.

Read the risk guide

CrossLink 1040 Desktop / Professional

CrossLink

CrossLink 1040 Desktop and Professional on a local office network expose taxpayer data. See why hosted access with MFA is a more defensible architecture.

Read the risk guide

UltimateTax Desktop

UltimateTax

UltimateTax Desktop on a local office network exposes taxpayer data to ransomware and credential attacks. See why hosted access with MFA is more defensible.

Read the risk guide

OLT PRO Desktop

On-Line Taxes, Inc.

OLT PRO Desktop on a local office network exposes taxpayer data to ransomware and credential attacks. See why hosted access with MFA is more defensible.

Read the risk guide

CFS Tax Software / TaxTools WorkShop

CFS Tax Software

CFS Tax Software and TaxTools WorkShop on a local office network can expose taxpayer data. Learn why hosted access with MFA is a more defensible setup.

Read the risk guide

Start your free trial and have an audit-ready WISP in one afternoon.

Start Free Trial
Start Free Trial