Identity Theft & Data Security for Accountants
Author: Stephen M. Yoss
CPE Credit: |
2 hours for CPAs |
Identity theft is the fastest growing crime in America with approximately 10 million occurrences every year. On average, it will cost the victim several hundred dollars and dozens of hours to resolve. It can cause irrevocable damage to an organization's public opinion and reputation. This course will examine the major causes, factors, and outcomes of identity theft and organizational security breaches.
Participants will be presented with current examples from a wide range of industries and attack types. This course will describe how to identify when theft occurs, what information is most at risk, where the stolen information is used, and best practices on how to prevent it from occurring. Critical Tips for Avoiding Identity Theft and Information Security Breaches is recommended for anyone concerned about their online safety and responsible for safeguarding their organizational data.
Publication Date: January 2019
Designed For
Financial professionals concerned about their online safety and responsible for safeguarding their organizational data.
Topics Covered
- The size and scope of identity theft crimes in the USA & Canada
- The mechanics of identity theft and how it occurs
- Examples of identity theft and data breeches
- What to look out for and prevention tips
- Specific types of identity theft
- Resources to help resolve a compromised identity
Learning Objectives
- Identify and classify potential threats in technology areas, which leave organizations susceptible to privacy breaches, data theft, and distribution
- Describe how some of the larger incidents of mass identity theft occurred, the victim groups and impact
- Recognize how to build an action plan to safeguard personal and organizational data from potential threats
- Identify and implement data security best practices for their personal and organizational information
- Identify and locate resources for assisting in resolve identity theft
- Describe identity theft statistics
- Recognize types of TOR service
- Identify a marketing term that can only be initiated by credit monitoring agencies
- Identify a physical device or software package that prevents unauthorized access into or out of a network
- Identify types of internet-based data backup solution
- Recognize the estimated hours it takes the average victim to resolve each identity theft crime
- Identify something you should do immediately after realizing you're the victim of identity theft
- Describe the primary government agency for managing identity theft crimes
- Identify a security recommendation with respect to identity theft
Level
Overview
Instructional Method
Self-Study
NASBA Field of Study
Computer Software & Applications (2 hours)
Program Prerequisites
None
Advance Preparation
None