CONTINUING EDUCATION FOR TAX & FINANCIAL PROFESSIONALS

Western CPE will be closed on July 3rd and 4th to celebrate Independence Day.

Securing Your Data: Practical Tools for Protecting Information

Icon_Webcast
Webcast
Icon_Level
Intermediate
Credits
CPE Credits
4 Credits: Information Technology

Course Description

Security is not optional, and yesterday’s security techniques do not minimize today’s security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. In this program, you will learn about the latest tools and techniques for securing your data, including encryption, virus protection, secure communications, electronic signatures, secure authentication, and more. You will also learn how to implement a practical, five-step approach to securing your PC and the types of questions you should ask your staff to ensure server-based information remains protected.

Security failures, such as a breach of client or customer data, are costly – they can even drive your company out of business. What security tools do you need, and how should you use them to secure your sensitive data and systems? Can you afford to take the risk of attempting to manage today’s threats by using yesterday’s techniques? Participate in this program to learn how to implement viable and practical solutions to mitigating today’s security threats.

Learning Objectives

Upon completing this course, you should be able to:

  • Assess the relevant security risks in your organization
  • Identify specific tools and techniques to protect sensitive data
  • List five specific steps to improve PC security
  • Differentiate between security procedures to improve organizational security

Course Specifics

Course ID
WC1222283689
Revision Date
April 25, 2022
Prerequisites

Basic understanding of computer operations

Advanced Preparation

None

Compliance information

NASBA Provider Number: 103220

Course Instructor

Thomas G. (Tommy) Stephens, Jr. Headshot
K2 Enterprises (Thomas G. (Tommy) Stephens, Jr., CPA, CITP, CGMA)

Thomas (Tommy) G. Stephens, Jr., CPA, CITP, CGMA, received a Bachelor of Science in Business Administration (Major in Accounting) from Auburn University in 1985. In 1994, Mr. Stephens opened his public accounting practice in the metropolitan Atlanta area. In his practice, Mr. Stephens provided accounting, tax, and consulting services to individuals and a wide variety of small and emerging businesses. He developed a successful consulting practice providing installation and support services of small business accounting software. Additionally, he has authored and presented continuing professional education courses to accounting and finance professionals. Mr. Stephens has lectured nationally on subjects such as …

K2 Enterprises (Thomas G. (Tommy) Stephens, Jr., CPA, CITP, CGMA) Read More »

Securing Your Data: Practical Tools for Protecting Information

CPE CREDITS
4 Credits: Information Technology

$196.00


Webcasts are available for viewing Monday – Saturday, 8am – 8pm ET.

Icon_Webcast
Webcast
Icon_Level
Intermediate
Credits
CPE Credits
4 Credits: Information Technology

Course Description

Security is not optional, and yesterday’s security techniques do not minimize today’s security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. In this program, you will learn about the latest tools and techniques for securing your data, including encryption, virus protection, secure communications, electronic signatures, secure authentication, and more. You will also learn how to implement a practical, five-step approach to securing your PC and the types of questions you should ask your staff to ensure server-based information remains protected.

Security failures, such as a breach of client or customer data, are costly – they can even drive your company out of business. What security tools do you need, and how should you use them to secure your sensitive data and systems? Can you afford to take the risk of attempting to manage today’s threats by using yesterday’s techniques? Participate in this program to learn how to implement viable and practical solutions to mitigating today’s security threats.

Learning Objectives

Upon completing this course, you should be able to:

  • Assess the relevant security risks in your organization
  • Identify specific tools and techniques to protect sensitive data
  • List five specific steps to improve PC security
  • Differentiate between security procedures to improve organizational security

Course Specifics

Course ID
WC1222283689
Revision Date
April 25, 2022
Prerequisites

Basic understanding of computer operations

Advanced Preparation

None

Compliance information

NASBA Provider Number: 103220

Course Instructor

Thomas G. (Tommy) Stephens, Jr. Headshot
K2 Enterprises (Thomas G. (Tommy) Stephens, Jr., CPA, CITP, CGMA)

Thomas (Tommy) G. Stephens, Jr., CPA, CITP, CGMA, received a Bachelor of Science in Business Administration (Major in Accounting) from Auburn University in 1985. In 1994, Mr. Stephens opened his public accounting practice in the metropolitan Atlanta area. In his practice, Mr. Stephens provided accounting, tax, and consulting services to individuals and a wide variety of small and emerging businesses. He developed a successful consulting practice providing installation and support services of small business accounting software. Additionally, he has authored and presented continuing professional education courses to accounting and finance professionals. Mr. Stephens has lectured nationally on subjects such as …

K2 Enterprises (Thomas G. (Tommy) Stephens, Jr., CPA, CITP, CGMA) Read More »

Securing Your Data: Practical Tools for Protecting Information

CPE CREDITS
4 Credits: Information Technology

Webcasts are available for viewing Monday – Saturday, 8am – 8pm ET.

$196.00