Cybersecurity: Protecting Your Business from Fraud
Missouri State University

Cybersecurity: Protecting Your Business from Fraud

Dates:
February 28, 2018Check for other dates
Meets:
W from 11:00 AM to 2:00 PM, 1 session
Hours:
3.00
Location:
PCTR 1001
Instructor:
Instructor Information
Fee:
$39

Sorry, we are no longer accepting registrations for this course. Please contact our office to find out if it will be rescheduled, or if alternative classes are available.


Course Description

Is your business safe from a cyber-attack?  Small business owners will learn what actions they can take to take to lessen the risk of their business being hacked or compromised by a cybersecurity incident.  In the past four years, cyber-attacks on small businesses have increased 660 percent.  According to the National Small Business Association, the average attack on a small business costs that business $7,115.  Companies that had their bank accounts hacked lost an average of $32,020.

The goal of this seminar it to protect your organization's confidential data from cyber and internal criminals. This session focuses on a widespread form of targeted fraud impacting small to medium-sized business, non-profits, schools and public sector entities utilizing today’s technology.  Perpetrators of the crime attempt to transfer money out of bank accounts using wire transfers and ACH transactions as well as other internal fraud schemes. 

FBI-recommended risk mitigation techniques will be presented.  Learn inexpensive and zero cost measures to protect your business today!

·         Hear from a panel of experts in the fields of accounting, information technology,    banking, insurance and computer recycling

·         Learn the steps to safeguard your business

·         Learn how to access resources and connect to professionals

Presentation will cover:

1. Introduction: internal/external risk

2. Description: how the fraud works, victim selection, perpetration methods


3. Protection: education; computer, network & process enhancements; responsibilities and liabilities

4. Detection:  account monitoring, warning signs, anti-virus software

5. Response:  compromised computer handling and reporting suspicious activity

6.  Destruction:  how to safely destroy hardware and responsible disposal

 

 

 

   Enrollment Progress ...     What's This?