Back to Search

Google Security and Privacy Tools for Accountants Webinar

CPE

When
*Currently in Progress
6:00 - 8:00 p.m.

CPE Credits
2-Other

Details

 Pricing

PICPA Member: $79 | Nonmember: $104


 More Information

Course No.
GWGSPTW2
Level
Basic
Prerequisites
None
Note

This webinar is hosted by PICPA's partner, CPA Crossings. After registering, you will receive an email from CPA Crossings with the log-in information.

Description

  • Review Google’s security philosophy and policies.
  • Spotlight Google’s leading security and privacy applications.
  • Customize your Google experience to maximize safety and security.

Highlights

  • Why information stored on Google is more secure compared to on-premises computers  
  • Google Chrome Browser
  • Chrome Web Store
  • Find My Device
  • Google Password Manager
  • Google Privacy Checkup
  • Google Security Checkup
  • Google Activity Controls
  • Recent Security Events
  • Recently Used Devices
  • Apps with Access to Your Account
  • Ads Settings
  • Google Takeout
  • Google Two-Step Verification
  • Google Prompts
  • Connected Accounts
  • Google Smart Lock
  • Google Advanced Protection Program
  • Inactive Account Manager
  • Vulnerability Reward Program
  • Chromium Bug Tracker


Speaker(s)

Garrett Wasny, MA, CMC, CITP/FIBP is a professional development consultant to accountants, lawyers, engineers, doctors and executives worldwide.
 
He advises high-skill practitioners how to thrive in the digital age and unleash their online potential using productivity, search, mobile and social technologies.


You May Also Like

Excel Budgeting Ideas Webinar
Dec. 13 | Webinar
Be able to set up an in-cell drop down Discover the function that enables us to change formulas ...
Excel Shortcuts for Accountants Webinar
Dec. 13 | Webinar
Understand the function arguments to the functions presented Identify several features, functions and techniques that can help improve ...
The Importance of Security for Digital Information Webinar
Dec. 13 | Webinar
List some of the security risks that affect electronic information Develop vetting and selection processes for cloud storage providers ...