Skip to content

The Fraud of Identity Theft

Provider: CeriFi Checkpoint Learning

Auditing 2 CPE Credits Basic QAS self study Fraud Related
Where do fraudsters go to steal identities? They target storehouses of data-businesses. In addition, thieves can use business systems to send fake emails, create a duplicate website to trick customers, and capture banking and network passwords used for company operations. Business owners and managers who ignore that their information may be a target for identity thieves face serious legal, operational, and financial consequences. This course discusses what data criminals are after, how they manage to steal it, why identity theft should concern businesses, and, most importantly, how to protect against it using strong internal controls. This basic level course is most beneficial to professionals new to identify theft who may be at the staff or entry level in organization but also for a seasoned professional with limited exposure to this topic.

Not an LCvista user, get in touch with our team to get started.

Get Started Back to Catalog