K2’s Data Security And Privacy Issues And Solutions
Information Technology
2 CPE Credits

Major Topics
- Understanding the differences between data security and data privacy
- The major types of security and privacy breaches
- Key steps you can take to mitigate your risks of becoming another victim
Learning Objectives
- Identify at least five examples of common data security and privacy issues affecting businesses today
- Create estimates of the costs associated with data security and privacy breaches
- List examples of internal control best practices you can use to mitigate your security and privacy risks
Description
Data security and privacy issues continue to plague businesses of all sizes. No matter where you look, the numbers are bad – really bad! But that doesn’t mean you can’t take steps to reduce these risks. In this session, you will learn about the key security and privacy risks facing businesses today and the steps you can take to mitigate these risks.
This session starts with a review of how cybercriminals attack businesses of all sizes and the related costs of these attacks. From there, you will progress into discussions of practical tools, policies, and other solutions you can use to mitigate cybersecurity risks to prudently acceptable levels. This is a “must-see” session for all concerned about data security and how to mitigate threats to sensitive and confidential data.
Compliance Information
Overview
Data security and privacy issues continue to plague businesses of all sizes. No matter where you look, the numbers are bad – really bad! But that doesn’t mean you can’t take steps to reduce these risks. In this session, you will learn about the key security and privacy risks facing businesses today and the steps you can take to mitigate these risks.
This session starts with a review of how cybercriminals attack businesses of all sizes and the related costs of these attacks. From there, you will progress into discussions of practical tools, policies, and other solutions you can use to mitigate cybersecurity risks to prudently acceptable levels. This is a “must-see” session for all concerned about data security and how to mitigate threats to sensitive and confidential data.
Course Details
- Understanding the Cloud-based options available in a Microsoft 365/Office 365 environment
- How to use tools such as Teams, Planner, and Power Automate
- Storing data in SharePoint Online and OneDrive for Business
- Identify relevant, Cloud-based components of the Microsoft 365/Office 365 subscription model
- Differentiate between OneDrive, OneDrive for Business, and SharePoint Online
- Cite examples of how Teams can improve productivity and enhance collaboration and communication
- List examples of other Cloud-based services available through a Microsoft 365/Office 365 subscription
- Specify situations in which tools such as Planner, Power Automate, Bookings, Stream, and Sway might enhance individual and organizational productivity, efficiency, and profitability
Intended Audience — CPAs and other business professionals who are seeking to leverage their Microsoft 365/Office 365 subscriptions by taking advantage of some of the Cloud-based features available in these environments
Advanced Preparation — None
Field of Study — Computer Software and Applications
Credits — 4 Credits
IRS Program Number –
Published Date – November 2, 2022
Revision Date –