COMPREHENSIVE GUIDE TO IDENTITY THEFT WITH CASE STUDIES
You have completed only 0% of the video. Please continue watching the video.
Please don’t fast forward or alter the cursor of the video. You must watch entire video to get your CPE credits.

Before starting this self study progarm, please go through the Instructional Document.

Download

Course Details

Overview of Topics

  • What is Identity Theft?7 mins
  • Types of Identity Theft44 mins
  • Stolen Balance Transfer Checks80 mins
  • Tax return Identity Theft126 mins
  • Leaning About Vishing179 mins
  • Learning About Rensomware263 mins
  • How Data Breaches Occur302 mins
  • Obtaining Fake IDs322 mins
  • Preventing Identity Theft: Individuals353 mins

Course Description

Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or purchases. Committed very tactfully and often misunderstood, identity theft leads to numerous problems for the victim and businesses. It is imperative that everyone know and understand how an identity can be stolen and how to prevent it. 

This webinar takes a very raw approach and helps understand the very basis and types of identity theft. It also delves into the legal and ethical implications to identity theft. However, it is really difficult to understand it from just the theoretical perspective. Hence, this webinar will delve deep into the subject with real world examples. It will help to explore the understanding the risk that the victim is exposed to. 

The webinar will:

  • Identify the need is to understand and develop a strong system that prevents identity theft from the business perspective 
  • Recognize what a business can do and what steps individuals can apply to restrict the theft of identity will be a key part
  • Explore which internal control mechanisms can help you reduce the loss transactions of stolen identity
  • Provide a guidance about what steps should be taken to report identity theft and which investigative procedure should be considered for conducting an identity theft fraud.

Through various case studies Dr. Robert Minniti, president of Minniti CPA LLC, will provide us a comprehensive view on how you can make your firm and personal practice safe from the risk of identity theft. With numerous qualification and years of experience in field with a doctorate degree Dr. Minniti holds the expertise in the field, to ensure that you and your businesses stay compliant and follow healthy practices. 

This is a must webinar for all the businesses, and professionals who want to ensure that their business and clients stay safe. It is an appropriate education for the CPAs, CFEs, CFOs, CEOs, staff accountants, employees, and others to make sure their practices are in line with the safe practices.

Webinar Qualifies for

  • 8 CPE credit of Accounting for all CPAs
  • 8 General Educational credit for Tax Professionals/Bookkeepers/Accountants

Learning objectives

  • To recognize the various types of identity theft
  • To identify how criminals commit acts of tax refund identity fraud
  • To educate with what you can do to help prevent identity theft
  • To recognize the red flags for identity theft
  • To design internal controls that prevent and detect identity theft

About Presenter

Dr. Robert Minniti

President,Minniti CPA LLC

minniti.cpa@cox.net

Dr. Minniti is the President and Owner of Minniti CPA, LLC. Dr. Minniti is a Certified Public Accountant, Certified Forensic Accountant, Certified Fraud Examiner, Certified Valuation Analyst, Certified in Financial Forensics, Master Analyst in Financial Forensics, Chartered Global Management Accountant, and is a licensed private investigator in the state of Arizona. Dr. Minniti received his doctoral degree in business administration from Walden University, received his MBA degree and Graduate Certificate in Accounting from DeVry University’s Keller Graduate School of Management, and received his Bachelor of Science in Business Administration degree from the University of Phoenix. Dr. Minniti taught graduate and undergraduate courses in forensic accounting at DeVry University, Grand Canyon University, Kaplan University, Northwestern University, and the University of Phoenix.

He designed graduate and undergraduate courses for Grand Canyon University, Northwestern University, and Anthem College. He is a writer and public speaker. He has experience in forensic accounting, fraud examinations, financial audits, internal audits, compliance audits, real estate valuations, business valuations, internal control development, business continuation planning, risk management, financial forecasting, and Sarbanes-Oxley compliance work. Dr. Minniti is an instructor teaching continuing professional education classes for the American Institute of Certified Public Accountants, Compliance Online, CPE Link/CCH . AccountingEd, Global Compliance Panel, Clear Law Institute, CPE Solutions, Canopy CPE, The Institute of Management Accountants, the National Association of Valuators and Analysts, the Association of Certified Fraud Examiners, the Institute of Internal Auditors, and various state CPA Societies.

MINNITI CPA LLC is seeking professional, hard-working, licensed CPAs with at least four years of experience.

The Firm demands independence, integrity, objectivity, competence and due care from all of its personnel in the conduct of its engagements. Our Firm is structured to provide leadership in achieving high quality professional performance while maintaining the concept of individual responsibility. Policies and procedures have been established providing assurance that professional engagements are properly planned and executed. Decisions are based on the substance of issues, not on form.

Our policies and procedures designate Partners of the Firm for consultation on significant ethical, technical and industry questions. The policies and procedures are designed to assure that clients receive the best professional services we can provide. We continually keep in mind the public interest. We expect our Partners and Associates to identify and resolve all important engagement issues.

The job requires high level tax preparation skills, superior tax research and problem solving abilities, broad software knowledge, and excellent written and oral communication skills. We have a team approach to provide high quality client service for tax compliance, planning, financial statements, and general business consulting.

Review Questions

  • Question 1 : 00:15
  • Question 2 : 00:30
  • Question 3 : 00:46
  • Question 4 : 01:00
  • Question 5 : 01:15
  • Question 6 : 01:30
  • Question 7 : 01:45
  • Question 8 : 02:00
  • Question 9 : 02:15
  • Question 10 : 02:30
  • Question 11 : 02:45
  • Question 12 : 03:00
  • Question 13 : 03:15
  • Question 14 : 03:30
  • Question 15 : 03:45
  • Question 16 : 04:00
  • Question 17 : 04:15
  • Question 18 : 04:30
  • Question 19 : 04:45
  • Question 20 : 05:00
  • Question 21 : 05:15
  • Question 22 : 05:30
  • Question 23 : 05:45
  • Question 24 : 06:00
  1. Which one of the following is true for identity theft?
  2. Which of the following is true for identity theft?
  3. Until which year identity theft was not recognized as a crime at the state level?
  4. According to Consumer Sentinel Network Data Book January-December 2019, which one of the following is the highest number of reported identity theft type?
  5. Which one of the following is true for child identity theft?
  6. Which one of the following is required to take over a checking account in account takeover fraud?
  7. Which one of the following fraud involves individuals who continue to apply for and receive government benefits for deceased individuals?
  8. Which one of the following is used for utility fraud?
  9. Which one of the following is used as a means to forestall a foreclosure?
  10. The IRS reported that fraudulent returns were filed claiming refunds in excess of _________ for the 2013 tax year.
  11. Which one of the following can lead to identity theft if your purse or wallet is stolen?
  12. Which one of the following information is targeted to be used for identity theft in phishing?
  13. Social security numbers, credit card number, user names and passwords are targeted to be used for identity theft in phishing.
  14. _____________________ is the term used to describe fraudulent e-mail activity in which the sender’s address or other parts of the e-mail header are altered to appear as though the e-mail originated from a different source.
  15. Which one of the following is a character of pretexting type of identity theft?
  16. In which type of identity fraud the fraudster searches the trash cans for documents containing personal information?
  17. Which one of the following is an example of Internet dating scam type of identity theft?
  18. Which one of the following are the type of charity frauds?
  19. According to FBI estimates ransomware is a _______ a year fraud.
  20. Typical ransomware software uses which encryption to encrypt files?
  21. The average cost of a data breach in 2019 was:
  22. Which one of the following are other examples of data breaches?
  23. Which one of the following represents the things businesses must do tackle data breach legal issues?
  24. Which one of the following represent the levels of internet?
  1. Which one of the following developed the Fraud Triangle theory?
  2. The speaker quotes which famous writer’s quote to emphasis on the importance of the identity?
  3. Which one of the following is the section that provides the federal criminal definition of identity theft?
  4. Which one of the following is state to pass first law against identity theft?
  5. Which one of the following is the top five cyber security?
  6. What can be used to protect RFID?
  7. In the Government Document Fraud the documents have the name of the victim, but the photo of the ___________.
  8. Which form us used for nonemployee compensation?
  9. The following form must be filed by January 31 and does not provide the filer automatic extensions?
  10. Which is one of the oldest method of identity theft?
  11. ___________ is accomplished by using fraudulent e-mail messages that appear to come from legitimate businesses or government agencies.
  12. In which type of identity fraud personal information is obtained over the phone?
  13. ___________ is commonly used by spammers to hide the origin of an e-mail.
  14. Free public Wi-Fi can gain control of:
  15. Identify the theft: “One make a copy of all the information contained on the other cell phone and use that information to steal the victim’s identity”.
  16. In which type of identity theft the fraudster makes a copy of all the information contained on the cell phone and use that information to steal the victim’s identity?
  17. In pretexting the perpetrator poses as which one of the following?
  18. In which type of fraud the fraudster setup fake websites for nonexistent charities and then spam for victims?
  19. In which type of fraud the fraudster pose as officials of the Nigerian government, or another government, and ask the victim for help in moving funds out of the country?
  20. In which type of fraud the fraudster poses as a barrister from another country and claim that victim is the sole surviving relative of their deceased client.
  21. Which one of the following is an example of lottery fraud?
  22. Which fraud is similar to Corporate Prize scam?
  23. Which one of the following is the term that is used to describe fraudulent e-mail activity in which the sender’s address or other parts of the e-mail harder are altered to appear as through the e-mail originated from a different source?
  24. In which fraud the fraudster attaches a device to a machine that records the information on the card’s magnetic strip?
  25. What do criminals use sockpuppets for?
  26. Which one of the following does the victim use the malware in charging stations?
  27. Which one of the following is a way to commit identity fraud through fake census workers?
  28. Why obituary surfing is less risky for the fraudster?
  29. What does the fraudster try to access when a victim is accessing free public wi-fi?
  30. Why ransomware is placed on computer of the victims?
  31. For a normal computer an estimated _____ number of years is required to crack an RSA 2048 key.
  32. The release or taking of data from a secure source to an unsecured third-party location is known as:
  33. Larger data breaches with more than 50,000 records stolen cost an average of $6.4 million.
  34. Which one of the following can be the cause of the data breach?
  35. Which one of the following is a common way to access a computer unethically?
  36. Which one of the following makes it difficult to trace the funds accessed by stolen data?
  37. Which one of the following is one of the most commonly used passwords in 2019?
  38. What is required to access dark web?
  39. Which one of the following is part of the dark web?
  40. Which one of the following is the way to hide online activity?

FAQ

  • myCPE self-study courses are online.
  • The self-study format allows you to access the material online 24/7 and study at your own pace.
  • As per NASBA guidelines, you have one year from date of registration to complete each program.
  • Complete your final exam at any time and get CPE Credit instantly. You can retake the exam multiple times without any additional charges.
  • Course have minimum passing score of 70% and test takers will not be provided feedback on failed exams.
  • These are Live recorded presentations converted into Self Study (On-Demand Videos).

Refund/Cancellation Policy

  • For more information regarding refund, complaint and program cancellation policies, please contact our offices at 646-688-5128
  • Please email to   help@my-cpe.com  in case of any self study program queries.

Reviews

5
(4)
100%
0%
0%
0%
0%

NASBA Approved

MY-CPE LLC, 1600 Highway 6 South, Suite 250, Sugar Land, TX, 77478

MY-CPE LLC (Sponsor Id#: 143597) is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.NASBARegistry.org.

On-Demand Webinars

WORK WELL REMOTE: BOUNDARIES FOR BETTER HABITS
Wednesday, October 21, 2020 View Details/Register
FUNDAMENTALS OF INCOME TAXATION OF TRUSTS & FORM 1041 PLANNING: WHAT EVERY ADVISORS NEEDS TO KNOW
Wednesday, October 21, 2020 View Details/Register
ACCOUNTANT PREPARED A RETURN AND IT IS UNDER CRIMINAL INVESTIGATION BY THE IRS, NOW WHAT?
Wednesday, October 21, 2020 View Details/Register
GENERALLY ACCEPTED GOVERNMENT AUDITING STANDARDS: THE NEW YELLOW BOOK (LATEST FOR NON-PROFIT)
Thursday, October 15, 2020 View Details/Register
CUTTING THE GORDIAN KNOT: ECHECK FRAUD, MOBILE BANKING FRAUD, CHECK 21 & HOLDER IN DUE COURSE
Tuesday, October 13, 2020 View Details/Register
CYBERSECURITY BASICS FOR ACCOUNTING & TAX COMMUNITY
Monday, October 12, 2020 View Details/Register
Ethics for Wyoming CPAs
Friday, October 09, 2020 View Details/Register
CYBERSECURITY ESSENTIALS FOR TAX PREPARER
Friday, October 09, 2020 View Details/Register
FORENSIC ACCOUNTING : VALUE ADDED SKILL FOR EVERY ACCOUNTANT
Thursday, October 08, 2020 View Details/Register
TAX FIRM MARKETING: 5 ESSENTIAL DIGITAL STRATEGIES FOR UNCERTAIN TIMES
Thursday, October 08, 2020 View Details/Register
UNDERSTANDING FRAUD, THE BASICS
Wednesday, October 07, 2020 View Details/Register
NEW CYBER FRAUDS & CYBERSECURITY INTERNAL CONTROLS (POST PANDEMIC)
Wednesday, October 07, 2020 View Details/Register
Accounting Changes and Error Corrections (2 CPE)
Thursday, August 27, 2020 View Details/Register
Corporate External Financial Reporting Decisions
Tuesday, September 29, 2020 View Details/Register
Internal and System Controls
Tuesday, September 29, 2020 View Details/Register
  • Cost $80
  • CPE Credits 8
  • Subject Area Accounting
  • Course Level Basic
  • Instructional Method QAS Self Study
  • Prerequisites None
  • Advanced Preparation None
  • Published Date October 08 ,2020
  • Who should attend? Accountant Business Owner CPA - Small Firm CPA - Mid Size Firm Accounting Firm CPA (Industry) Auditors Young CPA CPA in Business Entrepreneurial CPA Staff of Accounting Firm
  • Handout Material Download
  • Key Terms Download

On-Demand Webinars

WORK WELL REMOTE: BOUNDARIES FOR BETTER HABITS
Wednesday, October 21, 2020 View Details/Register
FUNDAMENTALS OF INCOME TAXATION OF TRUSTS & FORM 1041 PLANNING: WHAT EVERY ADVISORS NEEDS TO KNOW
Wednesday, October 21, 2020 View Details/Register
ACCOUNTANT PREPARED A RETURN AND IT IS UNDER CRIMINAL INVESTIGATION BY THE IRS, NOW WHAT?
Wednesday, October 21, 2020 View Details/Register
GENERALLY ACCEPTED GOVERNMENT AUDITING STANDARDS: THE NEW YELLOW BOOK (LATEST FOR NON-PROFIT)
Thursday, October 15, 2020 View Details/Register
CUTTING THE GORDIAN KNOT: ECHECK FRAUD, MOBILE BANKING FRAUD, CHECK 21 & HOLDER IN DUE COURSE
Tuesday, October 13, 2020 View Details/Register
CYBERSECURITY BASICS FOR ACCOUNTING & TAX COMMUNITY
Monday, October 12, 2020 View Details/Register
Ethics for Wyoming CPAs
Friday, October 09, 2020 View Details/Register
CYBERSECURITY ESSENTIALS FOR TAX PREPARER
Friday, October 09, 2020 View Details/Register
FORENSIC ACCOUNTING : VALUE ADDED SKILL FOR EVERY ACCOUNTANT
Thursday, October 08, 2020 View Details/Register
TAX FIRM MARKETING: 5 ESSENTIAL DIGITAL STRATEGIES FOR UNCERTAIN TIMES
Thursday, October 08, 2020 View Details/Register
UNDERSTANDING FRAUD, THE BASICS
Wednesday, October 07, 2020 View Details/Register
NEW CYBER FRAUDS & CYBERSECURITY INTERNAL CONTROLS (POST PANDEMIC)
Wednesday, October 07, 2020 View Details/Register
Accounting Changes and Error Corrections (2 CPE)
Thursday, August 27, 2020 View Details/Register
Corporate External Financial Reporting Decisions
Tuesday, September 29, 2020 View Details/Register
Internal and System Controls
Tuesday, September 29, 2020 View Details/Register