Developing a 360 Degree View of Internal Controls

Written on Jan 02, 2018

How often are handheld devices, laptops and personal home computers used by your employees in the performance of their job? What safeguards are in place to insure data is controlled by your organization, properly used by employees, and not intercepted by hackers?

Cyber criminals are increasing focus on smaller entities such as CPA firms and smaller businesses to gain access to this wealth of personal, sensitive, and confidential information. Join H. Kyle Anderson, CGMA, CMA, CPA as he explains the technology strategies you should put in place to protect your clients and your business.

Purchase this 1-hour On-Demand course today.

Leave a comment