Description
Security is a top concern for business professionals every year, and yet many hacks result from the failure of organizations to implement effective internal controls over information technology. Learn about critical IT-related controls in a case study approach using examples from recent breaches and security failures to help you better understand how to protect your company and its data.
Learn more about IT-related controls which can be used to prevent computer crimes such as unauthorized access, theft of information, identity theft, data exfiltration, tax refund fraud and more.
Highlights
- Security Incidents
- Two-factor authentication and one-factor authentication
- Home-grade computer hardware and business and enterprise grade hardware and applications
Objectives
- List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
- Define the three factors used to authenticate someone to a system, and explain why two-factor authentication is preferable to one-factor authentication
- Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
- List at least three best practices learned as a result of reviewing the incidents cited in the case studies
Designed For
CPAs and financial professionals.
Registration for this course has passed.
Course Pricing
WYOCPA Member Fee
$60.00
Non-Member Fee
$94.00
Your Price
$94.00
Upcoming Courses
-
Understanding the New Forms K-2 and K-3
April 25, 2024
-
Power BI - Share Your Data Analysis using PowerBI.com
April 25, 2024
-
COSO's Internal Control Framework Essentials
April 25, 2024
View all upcoming courses