Surgent's Data Security: Best Practices to Protect Your Business and Yourself

Monday, March 24, 2025
Webcast or Webinar, Online
2:00 PM - 3:00 PM (opens at 1:30 PM) EST
1Credits
Technical Business

Registration is Open

Members
$59.00 Regular Price
Non-Members
$74.00 Regular Price

CPE PowerPass Users

Click the "Apply PowerPass" button to use your PowerPass for the applicable course below.
$20.00 Members / $28.00 Non-Members
Course Type: Webcast
Course Code: 24/SUDTS161
Level: Basic
Vendor: Surgent
Field of Study: Information Technology

Overview:

Data security is a front-of-mind topic for most businesses because the risk and cost statistics are sobering. Each of us is in the crosshairs because a typical internet-connected computer faces a cyberattack every 39 seconds. Businesses of all sizes should be cognizant of the ethical issues that must be considered when planning their approach to privacy and data security. In this webinar, we will explore both the risks we have traditionally faced in the workplace personally, as well as the novel set of data privacy threats and compliance challenge issues employers face with a remote and mobile workforce.

Objectives:

  • Plan an effective approach to privacy and data security in the workplace as well as for the remote workforce
  • Explain common data privacy risks and threats faced today by both individuals and businesses

Major Topics:

  • Ethical duty to safeguard employee, client, and litigant data
  • Common threats, including phishing, ransomware, and bad password management
  • Security management of business and personal electronic devices
  • Best practices for creating and securing passwords
  • Insight into how our personal information is exploited in our daily lives

Major Topics:

  • Ethical duty to safeguard employee, client, and litigant data
  • Common threats, including phishing, ransomware, and bad password management
  • Security management of business and personal electronic devices
  • Best practices for creating and securing passwords
  • Insight into how our personal information is exploited in our daily lives

Designed For:

Anyone responsible for designing or implementing data security policies for their company or firm or anyone who wants to better understand the current data privacy threats for individuals and businesses

Prerequisites:

None