Back to Search
Social Media Fraud: Detecting and Controlling the Threat Webinar
Social Media Fraud: Detecting and Controlling the Threat Webinar
Details
Pricing
PICPA Member: $79 | Nonmember: $104
More Information
Course No.
GZPGFSM2
Level
Basic
Note
This webinar is hosted by PICPA's partner, CPA Crossings, LLC. After registering, you will receive an email from messenger@webex.com with the log-in information.
Description
3.8 billion people use Social Media worldwide. Translation: A huge cyber hunting ground for online fraudsters of all kinds.
Companies, non-profits and government agencies are all targets of social media scammers. These cyber-predators impersonate legitimate Facebook, Instagram and Twitter accounts to trick users into giving up their personal information or even unknowingly sending money to the bad guys. Other social media attacks include brand theft, identity fraud and account sabotage.
Fortunately, these and other scams have been around long enough for the good guys to figure out how organizations and individuals can protect themselves from them. Learn how to identify social media scams before it’s too late….and how to train employees in how to avoid putting organizations at risk of these costly attacks.
This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Learning Objectives:After attending this presentation you will be able to...
- Identify the seriousness of social media fraud schemes to your organization
- Recognize which social media schemes put your organization at greatest risk
- Provide clarity about differences between internal and external social media fraud attacks
- Define and describe best practices for detecting and preventing social media fraud
Highlights
The major topics included in this presentation are...
- Details of how common social media fraud schemes are committed
- How to detect social media attacks where you least expect them
- How to identify red flags of possible social media schemes
- Who the most common perpetrators are
- Best practices for training all employees in how to detect, report and prevent social media attacks
Speaker(s)
You May Also Like
March 31 | Webinar
Have
you
ever
thought
that
entering
transactions,
reconciling
accounts,
and
preparing
tax
returns
was
the
definition
of
accounting?
You
have
probably
seen
it
in
your
practice
but
just
didn't
know
...
March 5 | Webinar
Until
recently,
paying
vendors
was
a
simple
matter
of
processing
an
invoice
and
issuing
a
check.
No
longer.
Ongoing
advances
in
technology,
credit
card,
debit
card,
and
ACH
require
advanced
...
March 8 | Webinar
There
are
as
many
ways
to
commit
Travel
&
Entertainment
fraud
as
there
are
employees.
And
now
employees
can
commit
fraud
with
Purchasing
Cards
-
no
paper
needed.
T&E
fraud
...