Insider's Guide to Information Security and Avoiding Identity Theft (Currently Unavailable)

Author: Stephen M. Yoss

CPE Credit:  2 hours for CPAs
2 hours Federal Tax Related for EAs and OTRPs
2 hours Federal Tax Law for CTEC

Identity theft is the fastest growing crime in America with approximately 10 million occurrences every year. On average, it will cost the victim several hundred dollars and dozens of hours to resolve. It can cause irrevocable damage to an organization's public opinion and reputation. This course will examine the major causes, factors, and outcomes of identity theft and organizational security breaches. Participants will be presented with current examples from a wide range of industries and attack types. This course will show participants how to identify when theft occurs, what information is most at risk, where the stolen information is used, and best practices on how to prevent it from occurring. This course is recommended for anybody concerned about their online safety and responsible for safeguarding their organizational data.

Participants are encouraged to bring their technology devices to follow along with interactive discussions, technology demonstrations, and demo tools. Financial professionals will walk away from this course with valuable tools and insights into understanding, managing, preventing security theft in their organizations.

Publication Date: April 2019

Designed For
Practitioners concerned about their online safety and responsible for safeguarding their organizational data,

Topics Covered

  • The Mechanics Of Identity Theft
  • A Discussion on Identity Theft
  • Identity Theft Defined
  • Identity Theft: By the Numbers
  • Who Commits Identity Theft?
  • General Signs Of Identity Theft: What To Be On The Lookout For
  • Identity Theft & Social Media
  • Tax Identity Theft
  • Are Identity Theft Losses Deductible?
  • Child Identity Theft
  • You've Become A Victim Of Identity Theft: What do you do next?
  • Freeze Vs. Lock Vs. Alert
  • FTC's Free Identity Theft Resources
  • Sample Resolution Letters
  • Other FTC Identity Theft Resources
  • Consider Identity Theft Protection
  • Discussion Of Data Breaches
  • Overall Security Recommendations

Learning Objectives

  • Identify and classify potential threats in technology areas, which leave organizations susceptible to privacy breaches, data theft and distribution
  • Identify the major causes of identity theft, how it occurs and best practices for preventing from happening to you or your family
  • Recognize how to build an action plan to safeguard personal and organizational data from potential threats and identity theft
  • Identify the threat actors and areas of data risk based on industry profile
  • Describe how to implement data security best practices for their personal and organizational information
  • Identify a general sign of identity theft you should be on the lookout for
  • Recognize what to do if you have determined that you're a victim of identity theft,
  • Describe security recommendations and how to best utilize
  • Identify types of internet-based data backup solution
  • Recognize best practices with respect to the use of social media and preventing identity theft
  • Identify what is typically involved regarding child identity theft
  • Identify the primary government agency for managing identity theft crimes

Level
Basic

Instructional Method
Self-Study

NASBA Field of Study
Computer Software & Applications (2 hours)

Program Prerequisites
None

Advance Preparation
None

">
 Chat — Books Support