This course will provide you with a comprehensive checklist of the dozens of security measures you should take to secure your company, your data and your information. The information is designed to help you analyze your companys security step-by-step to identify dangerous shortcomings in your security, and then provide recommendations presented in an easy to understand fashion. While securing the services of a professional security consultants are recommended, the course assumes you will be tackling your companys security on your own. This approach helps you better understand the threats and solutions for yourself, which places you in a better position to understand the threats and solutions, and work with outside security personnel, if needed.
Rather than focusing on just information security, this course focuses on virtually every aspect of security including data security, email security, physical security, employee background checks, privacy, employee contracts to ensure security, data and computer backups, strong passwords; proper computer disposal, and more. Many of the security recommendations are based on either free or low-cost products available in the marketplace. For example, for more than a decade Microsoft Windows has included a good anti-virus product call Windows Defender which is free; however, to run this program you must remove all other anti-virus products that may be installed on your computer. You will learn how to run free online security checks to search for threats and vulnerabilities in your systems.
Integral to this course, it will offer simple and advanced solutions for combating your security problems. Some of the topics to be discussed software and hardware updates; firewalls; password protected screen savers; encrypting your wireless routers; encrypting your data files, folders and hard drives; encrypting your e-mail; online versus on-premise backups (why you should do both); uninterruptible power; Internet filtering; upgrading door locks; shredding periodic computer checks; Physical inventories and surprise cash counts; bolting down computer systems; filtering spam; and specific identity theft procedures.
- Information security
- Data security
- E-mail security
- Compliance with government regulations
- Physical security
- Employee background checks, privacy, employee contracts to ensure security
- Data and computer backups
- Strong passwords
- Proper computer disposal, and more
You will receive a detailed checklist and see live demonstrations providing dozens of key security measures they should take to ensure compliance with laws and regulations, and how best to protect the integrity of their computers, data files and client information. This approach helps you better understand the threats and solutions for yourself, which places you in a better position to understand the threats and solutions, and work with outside security personnel, if needed.
Any CPA concerned about the security of their data, information, or company
Early Registration Member Fee
Applicable if you are a HSCPA member in good standing and register by October 10, 2019.
Applicable if you are a HSCPA member in good standing.
Early Registration Non-Member Fee
Applicable if you are not a HSCPA and register by October 10, 2019.
Applicable if you are not a HSCPA member.
Neighbor Island Discount
Applicable for Neighbor Island members in good standing
Associate Neighbor Island Discount
Applicable for Associate Neighbor Island members in good standing
CPE ChoiceLearn more about CPE Choice.
|CPE Choice Fee||$250.00|