Learn the warning signs and dangers of having permeable networks – computer and human Obtain an understanding of how to begin the process of securing your networks – – computer and human
One day you get a call: "We have ceased all the information on your servers. It'll cost you $100,000 to get it back. If you do not pay, we will notify all your clients that we easily stole their info from you and that we sold it on the Dark Web." You try to get on your computer - you can't. No one in your whole CPA office can. Not even the stamp machine is working. Now what?
Companies big and small are clamoring to lock down their clouds and servers in an effort to insulate themselves, their employees and their clients from the bad guys. But was it in time? Was it enough? Or, after all that time, effort and money, is there someone on the inside who just handed over the keys to your kingdom?
In this programs, we will dare to assay into the abyss of cyber security. Personal and corporate. Everything from warning signs to glossary terms to possible outcomes. Let's explore the latest information, ideas and strategies surrounding cyber security and identity theft together. It's about to get very personal and totally global!
Delivery Method: Individual webcast
CPE Credit: Information technology
Program Level: Basic