K2's Tales Of True Tech Crimes: Ripped From The Headlines
Security is a top concern for business professionals every year, and yet many hacks result from the failure of organizations to implement effective internal controls over information technology. Learn about critical IT-related controls in a case study approach using examples from recent breaches and security failures to help you better understand how to protect your company and its data.
Learn more about IT-related controls which can be used to prevent computer crimes such as unauthorized access, theft of information, identity theft, data exfiltration, tax refund fraud and more.
- Security Incidents
- Two-factor authentication and one-factor authentication
- Home-grade computer hardware and business and enterprise grade hardware and applications
- List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
- Define the three factors used to authenticate someone to a system, and explain why two-factor authentication is preferable to one-factor authentication
- Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
- List at least three best practices learned as a result of reviewing the incidents cited in the case studies
CPAs and financial professionals.
Applicable if you are a HSCPA member in good standing.
Applicable if you are not a HSCPA member.