K2's Securing Your Data: Practical Tools For Protecting Information

Wednesday, April 02, 2025
Webcast or Webinar, Online
11:00AM - 2:30 PM (opens at 10:30AM) EST
4Credits

Registration is Open

Members
$159.00 Regular Price
Non-Members
$209.00 Regular Price

CPE PowerPass Users

Click the "Apply PowerPass" button to use your PowerPass for the applicable course below.
$80.00 Members / $112.00 Non-Members
Course Type: Webcast
Course Code: 25/3127665
Level: Intermediate
Vendor: California CPA Education Foundation
Field of Study: Information Technology

Overview:

Security is not optional, and yesterday's security techniques do not minimize today's threats. Therefore, now is the time to tune up what you know about protecting sensitive data. This program will teach you the latest tools and techniques for securing your data, including encryption, virus protection, safe communications, electronic signatures, secure authentication, and more. You will also learn how to implement a practical, five-step approach to securing your PC and the questions you should ask your staff to ensure server-based information remains protected. Security failures, such as client or customer data breaches, are costly - they can even drive your company out of business. So, what security tools do you need, and how should you use them to secure your sensitive data and systems? Can you risk attempting to manage today's threats using yesterday's techniques? Participate in this program to learn how to identify viable and practical solutions to mitigating today's security threats.

Objectives:

• Assess the relevant security risks in your organization • Identify specific tools and techniques to protect sensitive data • List five specific steps to improve PC security • Differentiate between security procedures to improve organizational security

Major Topics:

• Understanding today's cybersecurity risks • Identifying major cybersecurity risks Implementing specific steps to reduce risk

Major Topics:

• Understanding today's cybersecurity risks • Identifying major cybersecurity risks Implementing specific steps to reduce risk

Designed For:

Business professionals seeking to secure sensitive data

Prerequisites:

Basic understanding of computer operations