K2’s Current Tech Crimes – Ripped from the Headlines

Security is a top concern for CPAs every year. Yet many hacks result from organizations not implementing effective internal controls over information technology. In this session, you will learn about critical IT-related controls using a case study approach with stories which are all new for 2020. More specifically, you will learn from real-world examples of breaches and security failures. Accordingly, you will understand better how to protect your company and its data. Attend this fast-paced session and learn more about IT-related controls you can use to prevent computer crimes such as identity and information theft, tax refund fraud, and more. This program was recorded in April 2020. The lesson quizzes that populate after each lesson are not part of the final exam. You must pass the final exam to receive your certificate of attendance with a 70% or higher.

K2’s Current Tech Crimes – Ripped from the Headlines

K2’s Current Tech Crimes – Ripped from the Headlines

Course Details

Security is a top concern for CPAs every year. Yet many hacks result from organizations not implementing effective internal controls over information technology. In this session, you will learn about critical IT-related controls using a case study approach with stories which are all new for 2020. More specifically, you will learn from real-world examples of breaches and security failures. Accordingly, you will understand better how to protect your company and its data. Attend this fast-paced session and learn more about IT-related controls you can use to prevent computer crimes such as identity and information theft, tax refund fraud, and more.

Format: QAS On-demand learning, including review and final exam questions. To earn credit, participants must pass the final exam with a score of 70% or better within one year of registering for this course.

Upon completing this session, you should be able to:

  • List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
  • Define the three factors used to authenticate someone to a system and explain why two-factor authentication is preferable to one-factor authentication
  • Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
  • List at least three best practices learned as a result of reviewing the incidents cited in the case studies
  • Data breach and computer security tips
  • Security awareness training
  • Learn more about current events and improve your security
  • knowledge at the same time
Update
<p>Busy accounting and financial professionals who want to improve their personal and organizational productivity</p>
Information Technology
2

Fundamental knowledge of hardware, software, and technology trends

Your browser is out-of-date!

Update your browser to view this website correctly.

Update my browser now

×