Back to Search

K2's Remote Access for Small Businesses Webinar


Oct. 19
9:00 a.m. - 12:30 p.m.

CPE Credits



PICPA Member: $150 | Nonmember: $201

 More Information

Course No.
Fundamental understanding of personal computer operations


Differentiate between options for remotely accessing your computerIdentify recommended security practices for remote access and related tools and servicesList examples of Cloud-based services and suites that can contribute to working remotelyDistinguish between communication and collaboration tools for remote workers


Small businesses have unique and specific technology needs, including remote access. Whether for desktops, data, voice services, instant messaging, or Cloud-based services, the list of available options can be overwhelming!Learn practical solutions to provide remote access to small businesses, with a detailed review of solutions. Provide remote desktop access and work securely from remote locations. Examine key considerations when selecting Cloud-based solutions. Facilitate communication and collaboration in remote environments.


Thomas G. Stephens, Jr., CPA.CITP

    • Bachelor of Science in Business Administration, Major in Accounting,Auburn University
    • Master of Science, Major in Finance (emphasis in Corporate Finance), Georgia State University
    • Twenty-five Years of Public Accounting Experience, Five Years of Corporate Internal Auditing Experience, Four Years of Corporate and Cost Accounting Experience
    • Nineteen Years of Experience as a Continuing Professional Education Discussion Leader
    • Member of the American Institute of Certified Public Accountants and the Georgia Society of Certified Public Accountants; Past Member of the Institute of Internal Auditors
    • To Date, Has Presented Over 1,800 Continuing Education Sessions to Over 55,000 Participants

You May Also Like

K2's Integrating and Sharing Data Webinar
Oct. 28 | Webinar
Define and identify where their organization keeps its data and how to access that dataList various tools, services, and programs which can be used to manage data and share it ...
K2's Current Tech Crimes - Ripped from the Headlines Webinar
Nov. 4 | Webinar
List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the ...
K2's Technology Update Webinar
Nov. 19 | Webinar
List and describe key features of new communications technologies like 5G cellular, Wi-Fi 6, and WPA3Analyze developments in mobile and cloud technologies and develop optimal strategies for each areaIdentify security ...