Current Tech Crimes - Ripped from the Headlines

The start date for this course has passed. Registration is no longer available.

This course is 2.00 credits
Field of Study
Technology
Course Level
Intermediate
Vendor
BPN, Inc ACPEN

Registration Fees

MSCPA-AICPA Member
$79.00
MSCPA Member
$79.00
AICPA Member
$109.00
Non-Member
$109.00
Return to Webinars List

Monday, Mar 1, 2021
2:00pm – 3:49pm

Security is a top concern for CPAs every year. Yet many hacks result from organizations not implementing effective internal controls over information technology. In this session, you will learn about critical IT-related controls using a case study approach with stories which are all new for 2020. More specifically, you will learn from real-world examples of breaches and security failures. Accordingly, you will understand better how to protect your company and its data. Attend this fast-paced session and learn more about IT-related controls you can use to prevent computer crimes such as identity and information theft, tax refund fraud, and more.

Security is a top concern for CPAs every year. Yet many hacks result from organizations not implementing effective internal controls over information technology. In this session, you will learn about critical IT-related controls using a case study approach with stories which are all new for 2020. More specifically, you will learn from real-world examples of breaches and security failures. Accordingly, you will understand better how to protect your company and its data. Attend this fast-paced session and learn more about IT-related controls you can use to prevent computer crimes such as identity and information theft, tax refund fraud, and more.

Designed For

All

Course Objectives

Upon completing this session, you should be able to:

  • List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
  • Define the three factors used to authenticate someone to a system and explain why two-factor authentication is preferable to one-factor authentication
  • Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
  • List at least three best practices learned as a result of reviewing the incidents cited in the case studies

Major Subjects

  • Data breach and computer security tips
  • Security awareness training
  • Learn more about current events and improve your security knowledge at the same time

Prerequisites

None

The start date for this course has passed. Registration is no longer available.