Author : | Paul Winn, CLU, ChFC |
Course Length : | Pages: 53 ||| Review Questions: 13 ||| Final Exam Questions: 15 |
CPE Credits : | 3.0 |
IRS Credits : | 0 |
Price : | $26.95 |
Passing Score : | 70% |
Course Type: | NASBA QAS - Text - NASBA Registry |
Technical Designation: | NonTechnical |
Primary Subject-Field Of Study: | Business Management & Organization - Business Management & Organization for Course Id 1387 |
Description : | The annual global cost of cybercrime is high and getting higher all the time. In fact, cyber criminals reap a windfall from their activities that is estimated to have been $450 billion in 2015 and is anticipated to climb to an annual $10.5 trillion average by 2025. In the United States alone, the FBI received reports of 800,944 cybercrime complaints involving $10.3 billion in 2022. Almost all of that cybercrime began with—and continues to start with—a social engineering concept known as “phishing.” Certain business organizations, among which are those referred to as “financial institutions,” are charged by the FTC with taking particular steps to protect their customers’ financial information. Included in the category of financial institutions are professional tax preparers. Professional tax preparers normally maintain a significant amount of taxpayer information in various files—electronic and paper—that would be a treasure trove for cyber criminals. In this taxpayer data security course, tax preparers are introduced to the problem of cybercrime and its costs, offered methods that can be expected to reduce the chances of becoming a cybercrime victim, and informed of proper steps to take if they do become victims of cybercrime. Accordingly, this taxpayer data protection course will examine cybercrime and will discuss:
|
Usage Rank : | 19375 |
Release : | 2024 |
Version : | 1.0 |
Prerequisites : | None. |
Experience Level : | Overview |
Additional Contents : | Complete, no additional material needed. |
Additional Links : |
Taxes. Security. Together. We all have a role to play in protecting your data
|
Advance Preparation : | None. |
Delivery Method : | QAS Self Study |
Intended Participants : | Anyone needing Continuing Professional Education (CPE). |
Revision Date : | 08-Feb-2024 |
NASBA Course Declaration : | Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam. |
Approved Audience : | NASBA QAS - Text - NASBA Registry - 1387 |
Keywords : | Business Management & Organization, Keeping Taxpayer Data, Secure, cpe, cpa, online course |
Learning Objectives : |
Course Learning Objectives Upon completion of this course, you should be able to:
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
|
Course Contents : | Course Learning Objectives Introduction to the Course Chapter 1 - Introduction to Cybercrime Chapter Learning Objectives Introduction The Nature of Cybercrime Computer Viruses Denial-of-Service Attacks Installing Malware Phishing, Vishing, Smishing & Pharming Staying Current on Cyberthreats & Avoidance Strategies FBI Internet Crime Report Summary Chapter Review Chapter 2 - Laws & Regulations Safeguarding Taxpayer Data Chapter Learning Objectives Introduction The Gramm-Leach-Bliley Financial Modernization Act FTC Standards for Safeguarding Customer Information Rule FTC Privacy of Consumer Financial Information Rule The Contents of the Privacy Notice Sarbanes-Oxley Act of 2002 Penalties for Unauthorized Disclosure or Use of Taxpayer Information Code of Federal Regulations §301.7216.1 Internal Revenue Code §6713 Internal Revenue Procedure 2007-40 Summary Chapter Review Chapter 3 - The Costs of a Data Breach Chapter Learning Objectives Introduction Data Breach Causes of Data Breach Cybercrime Costs IBM-Ponemon Study Customer Loss Number of Records Stolen or Compromised Time Required to Identify and Contain a Data Breach Cause of the Data Breach Remediation and Other Costs Following Identification of Breach Probability of Experiencing a Data Breach Summary Chapter Review Chapter 4 - The Information Security Plan Chapter Learning Objectives Introduction Ensuring Data Security Where to Begin: Determining Responsibility Identifying the Risks and Their Impact Writing an Information Security Plan Securing the Physical Facility Personnel Security Information and Computer Systems Security Media Security Summary Chapter Review Chapter 5 - Best Practices for Securing Data Chapter Learning Objectives Introduction Recommended Practices Employee Management Employee Training Policies and Procedures Maintaining Information System Security Information Storage Customer Data Transmission Disposal of Customer Information DOL Best Practice Guidance Summary Chapter Review Chapter 6 - When a Data Breach Occurs Chapter Learning Objectives Introduction When a Data Breach Occurs Secure the Firm’s Operations Remove Improperly Posted Information from the Web Interview Fix Vulnerabilities Thinking about Service Providers Checking the Firm’s Network Segmentation Working with Forensics Experts The Firm’s Communications Plan Notify Appropriate Parties Notify Law Enforcement Notify Affected Businesses Notify Individuals Model Letter Summary Chapter Review Appendix I Appendix II Glossary |