Back to Search

Google Security and Privacy Tools for Accountants Webinar


Dec. 12
6:00 - 8:00 p.m.

CPE Credits



PICPA Member: $79 | Nonmember: $104

 More Information

Course No.

This webinar is hosted by PICPA's partner, CPA Crossings. After registering, you will receive an email from CPA Crossings with the log-in information.


  • Review Google’s security philosophy and policies.
  • Spotlight Google’s leading security and privacy applications.
  • Customize your Google experience to maximize safety and security.


  • Why information stored on Google is more secure compared to on-premises computers  
  • Google Chrome Browser
  • Chrome Web Store
  • Find My Device
  • Google Password Manager
  • Google Privacy Checkup
  • Google Security Checkup
  • Google Activity Controls
  • Recent Security Events
  • Recently Used Devices
  • Apps with Access to Your Account
  • Ads Settings
  • Google Takeout
  • Google Two-Step Verification
  • Google Prompts
  • Connected Accounts
  • Google Smart Lock
  • Google Advanced Protection Program
  • Inactive Account Manager
  • Vulnerability Reward Program
  • Chromium Bug Tracker


Garrett Wasny, MA, CMC, CITP/FIBP is a professional development consultant to accountants, lawyers, engineers, doctors and executives worldwide.
He advises high-skill practitioners how to thrive in the digital age and unleash their online potential using productivity, search, mobile and social technologies.

You May Also Like

Excel: Mastering PivotTables Webinar
Feb. 22 | Webinar
Obtain a basic comfort level using PivotTables Understand the various report layout options Recall ...
Google Forms for Accountants Webinar
Feb. 22 | Webinar
Explore Google Forms’ key capabilities from an accounting perspectiveCreate electronic forms that are easy to update and can be accessed from any web-connected deviceImmediately apply the online technology to accelerate ...
Five Common Sense Steps to Secure Your PC Webinar
Feb. 22 | Webinar
Learn how to implement five simple and proven steps that dramatically reduce the risk of data on compromised computers. Security is paramount to success in today's world. Yet, most computer ...