Courses
CPE Course Catalog
Engaging Professional Education Classes for Business Professionals
Excel, Accounting, Fraud, Security, Automation, AI and more!
Explore over 50 NASBA-qualified CPE courses by Stephen Yoss on CPE Today, spanning a diverse range of topics from Excel mastery to fraud prevention. Dive into his expert-led classes to enhance your accounting and technology prowess and propel your career forward. Browse his offerings below for a transformative educational experience.
CPE Today
Sponsor ID#: 167619
Securing Confidentiality: Safeguarding Client Data Under IRS Rules
Course Category: Security
Tax practices face a critical responsibility: safeguarding client data against cyber threats. This course is tailored for professionals in the tax . . . industry, offering a deep dive into the essentials of creating and maintaining a Written Information Security Plan (WISP) as mandated by IRS regulations and the FTC Safeguards Rule. With a focus on IRS Publications 4557, 5293, and 5708, along with insights from NISTIR 7621, participants will learn not just the theory but the practical steps needed to enhance their practice’s security posture. The course content is designed to be direct and engaging, ensuring that attendees can easily translate knowledge into action.
The curriculum covers a broad spectrum of critical topics, from developing a compliant WISP to recognizing and responding to cyber threats, and from implementing strong access controls to effective data protection measures. Special emphasis is placed on real-world strategies for preventing data breaches, including the use of encryption, backup procedures, and secure data disposal methods. Participants will also explore the importance of employee training and the continuous monitoring and improvement of security practices to address new cyber threats and business changes. For tax professionals committed to upholding the highest standards of data security and building a trust-based relationship with their clients, this course is a vital resource. Attendees will not only gain the knowledge to protect their clients’ data but also the confidence to implement best practices within their organization.
Are You Really Ready? Effective Disaster Recovery & Business Continuity Planning
Course Category: Security
Disaster can come in many forms, from a flood to a data breach, to the death of a critical member of your team. When a disaster happens, it is never . . . at a convenient time. It doesn’t matter if it is the holidays, right before your vacation, or at the end of a grueling busy season. It just happens and you’re left to pick up the pieces. The first 24 hours of a disaster are the most critical. How are you going to get back online? How are you going to organize a safe work environment for your staff? How are you going to communicate what has occurred and what you are doing to resolve it to your stakeholders? An organization that is without its data or communications for a prolonged period has a significant risk of going out of business. Every minute of downtime is lost productivity, a missed deadline, or a forfeited opportunity. It isn’t a matter of if a disaster occurs, but when it does occur how you will respond.
This course will discuss a wide range of disasters from acts of God to man-made calamities, including data breaches and employee maleficence. It offers insight into the major risks, their causes, methods for mitigation of risks, and recommendations for resolution. It will have a detailed discussion on how using technology effectively can help minimize and hedge business risk and ensure continuity of operations. It will examine best practices for data security, the use of hot/cold sites, how to ensure that data is properly backed up, utilizing the Cloud for enhanced redundancy, and more. It is a good course for any organization that is concerned about the continuity of operations and surviving a disaster.
Practical Advice for Preventing Organizational Data Breaches
Course Category: Security
In today’s digital age, safeguarding sensitive information has become a paramount concern for financial professionals. With the ever-evolving threat . . . landscape, understanding how to fortify an organization against data breaches is not just necessary; it’s a critical skill set. This comprehensive course equips participants with the tools and knowledge to protect their organization’s valuable data assets. Attendees will delve into the anatomy of a data breach, dissecting real-world examples to understand the vulnerabilities exploited and the staggering costs incurred by businesses across the globe. With a curriculum designed to resonate with professionals already versed in the basics of data security, this course offers a blend of strategic insights and practical measures that can be implemented immediately.
Participants will gain mastery over a range of protective strategies, from conducting thorough data inventories to deploying cutting-edge encryption techniques. The course emphasizes the importance of maintaining up-to-date systems, enforcing strong password policies, and implementing advanced monitoring to detect and prevent unauthorized access. Attendees will also learn to establish rigorous cybersecurity training for all stakeholders, fostering a culture of vigilance against threats such as social engineering and phishing. By the end of this course, financial professionals will not only understand the major topics around data breaches but will also be equipped with actionable steps to prevent them, ensuring their organization’s resilience against cyber threats. Join this essential training to transform the way your organization perceives and responds to the risk of data breaches.
Critical Tips for Avoiding Identity Theft & Data Breaches
Course Category: Security
In today’s digital age, financial professionals are at the forefront of a relentless battle against identity theft and data breaches. With . . . cybercriminals constantly evolving their tactics, staying one step ahead is no longer just an option—it’s a necessity. This course offers a deep dive into the mechanisms of digital threats, equipping attendees with the vital knowledge and strategies required to safeguard their clients’ sensitive information. Participants will gain insights into the latest attack profiles and breach methods, learning not just how to react, but how to proactively protect against potential security compromises.
Understanding that prevention is only half the battle, the course also provides a comprehensive guide on recovery from identity theft and data breaches. Attendees will leave with actionable recommendations for enhancing security measures and an informed perspective on the nuances of digital defense. This is an opportunity for financial experts to fortify their defenses against the ever-present danger of cyber threats. Don’t miss the chance to enhance your expertise—secure your spot now and empower yourself with the tools to maintain the integrity and trust that is the foundation of your profession.
Developing and Deploying Effective Cloud Cyber Security Best Practices For Your Organization
Course Category: Security
Protecting your organization from cyber threats is paramount in today’s business environment. There are countless ways that your data can be . . . compromised and the industry’s best practices are ever-changing to adapt to the latest threats. Increasingly more professionals are working remotely and Cloud technology is what is connecting us all. It is business-critical that our organizations have correct and relevant security settings and procedures. Permissive security and privacy controls for Microsoft 365, Microsoft Azure, Amazon Web Services, or Google could pose a major security risk to the organization.
This course looks at practical approaches to managing the security and privacy settings of today’s major Cloud tools. It will give specific and direct advice on best practices for configuration and settings for today’s major Cloud platforms to promote better security. Specific attention will be paid to the major Cloud business platforms including, Microsoft, Google, Amazon, and Zoho. We will review everything from the importance of multi-factor authentication, to user levels/permissions, to methods to quickly identify when a user’s account might be compromised. Business professionals will leave the class with specific insight on how they can protect their organization’s cloud data.
Phishing & Frauds: Online Defense Tactics
Course Category: Security
Join “Phishing & Frauds: Online Defense Tactics” and arm yourself against cyber threats. This course cuts through the noise to deliver practical, . . . actionable tips. You’ll recognize phishing emails, dodge spearphishing, and reject vishing calls. Smishing texts and tech support cons will no longer be a threat.
We cover ransomware to romance scams, online shopping to fake checks. You’ll learn to spot government impersonators and resist investment lures. By the end, you’ll navigate the web with confidence, keeping scammers at bay. Secure your digital life—enroll now and stay ahead of fraudsters.
DIY Penetration Testing for Your Home and Organization
Course Category: Security
Every year, countless data breaches occur around the world that cost organizations billions of dollars. All reports that the frequency, size and scope . . . of data breaches is increasing at an alarming rate. A recent report by IBM showed that average cost of a data breach is $3.86 million dollars, if you’re lucky! Penetration testing is a security procedure that can help identity your potential deficiencies. This course will focus on practical, do-it-yourself methods of checking the security IT of your home or office. It will help you identify areas where your security could be improved, and potential holes closed.
Data Government and Privacy For Organizations – GDPR and CCPA
Course Category: Security
This course is going to look at data governance in 2021 and provide recommendations for compliance with GDPR and CCPA for organization. The amount of . . . data organizations are collecting keeps increasing. This course will look at compliance issues in 2021 and beyond.
Cybersecurity 2024: Proactive Defense for CPAs
Course Category: Security
In an era where digital threats are evolving at an unprecedented pace, financial professionals require a robust understanding of cybersecurity . . . measures to protect both their personal and client data. This course offers a thorough update on the latest security and privacy challenges that CPAs and business experts will face in 2024. Participants will delve into the intricacies of Windows 11 security features, learn to recognize and respond to sophisticated ransomware attacks, and understand the implications of data breaches in a heavily interconnected world. With a focus on practical solutions and actionable strategies, this course equips attendees with the knowledge to implement robust privacy policies, counteract phishing attempts, and navigate the complex landscape of regulatory compliance.
Attendees will emerge from this course not only with a comprehensive grasp of the most pressing cybersecurity issues but also with best practices tailored for the financial sector. They will gain insights into mitigating IoT threats and managing the unique risks associated with work-from-home arrangements. By the end of the sessions, CPAs and business professionals will be armed with the tools necessary to fortify their digital defenses and ensure the integrity of their professional services. Secure a spot today and commit to being at the forefront of cybersecurity proficiency, safeguarding your practice and enhancing your value in the marketplace. Act now to transform your approach to digital security and lead with confidence in the face of cyber threats.