2020 was an exceptional year for everyone, and like everyone, the hackers, scammers, and other technology criminals took advantage of new opportunities brought by COVID. Criminals reportedly used innovative approaches to exploit weaknesses created by the pandemic. You will learn tips and techniques from these events to help protect you, your company, and your data. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.
• List at least three major security incidents reported in the headlines in the last year and explain at least one primary control design or operation flaws that allowed the hack to occur
• Select the correct definitions from a list of standard security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
• Explain why home-grade computer hardware and applications are sometimes less secure than business and enterprise-grade hardware and applications
• List at least three best practices learned because of reviewing the incidents cited in the case studies
• Common security weaknesses that occur with hardware and software at home and in the office
• Malware, ransomware, data breach, and incident response tips
• Internal control failures resulting in the theft of assets or unauthorized manipulation of data
• User authentication and security awareness training
Business professionals desiring to improve information security by learning from recent technology crimes and data breaches.
Fundamental knowledge of computer operations and cybersecurity risks.
This webinar is produced by CalCPA. You will receive your login link/instructions and Certificate of Attendance directly from this third-party vendor. It is important that you review your COCPA confirmation for details on receiving your login instructions and COA from said vendor.