This is the test site. For production click here
× Course by Subject Webinars Self-Study eBooks Certificates Compliance Manager Subscriptions Firm CPE Blog CCHCPELink.com

Identity Theft & Data Security for Accountants

Author: Stephen M. Yoss

CPE Credit:  2 hours for CPAs

Identity theft is the fastest growing crime in America with approximately 10 million occurrences every year. On average, it will cost the victim several hundred dollars and dozens of hours to resolve. It can cause irrevocable damage to an organization's public opinion and reputation. This course will examine the major causes, factors, and outcomes of identity theft and organizational security breaches.

Participants will be presented with current examples from a wide range of industries and attack types. This course will describe how to identify when theft occurs, what information is most at risk, where the stolen information is used, and best practices on how to prevent it from occurring. Critical Tips for Avoiding Identity Theft and Information Security Breaches is recommended for anyone concerned about their online safety and responsible for safeguarding their organizational data.

Publication Date: January 2019

Designed For
Financial professionals concerned about their online safety and responsible for safeguarding their organizational data.

Topics Covered

  • The size and scope of identity theft crimes in the USA & Canada
  • The mechanics of identity theft and how it occurs
  • Examples of identity theft and data breeches
  • What to look out for and prevention tips
  • Specific types of identity theft
  • Resources to help resolve a compromised identity

Learning Objectives

  • Identify and classify potential threats in technology areas, which leave organizations susceptible to privacy breaches, data theft, and distribution
  • Describe how some of the larger incidents of mass identity theft occurred, the victim groups and impact
  • Recognize how to build an action plan to safeguard personal and organizational data from potential threats
  • Identify and implement data security best practices for their personal and organizational information
  • Identify and locate resources for assisting in resolve identity theft
  • Describe identity theft statistics
  • Recognize types of TOR service
  • Identify a marketing term that can only be initiated by credit monitoring agencies
  • Identify a physical device or software package that prevents unauthorized access into or out of a network
  • Identify types of internet-based data backup solution
  • Recognize the estimated hours it takes the average victim to resolve each identity theft crime
  • Identify something you should do immediately after realizing you're the victim of identity theft
  • Describe the primary government agency for managing identity theft crimes
  • Identify a security recommendation with respect to identity theft

Level
Overview

Instructional Method
Self-Study

NASBA Field of Study
Computer Software & Applications (2 hours)

Program Prerequisites
None

Advance Preparation
None

Registration Options
Quantity
Fees
Regular Fee $55.00

">
 Chat — Books Support