K2’s Working Remotely – The New Normal
Information Technology
4 CPE Credits

Major Topics
- Key technologies that facilitate remote work options
- Cybersecurity issues impacting remote work environments
- How to communicate and collaborate when working remotely
Learning Objectives
- Differentiate between options for remotely accessing your computer, applications, and data
- Identify recommended security practices for remote access and related tools and services
- List examples of Cloud-based services and suites that can contribute to working remotely
- Distinguish between communication and collaboration tools for remote workers
Description
Many team members now work remotely, whether by choice or necessity. As a result, questions abound about remote access to desktops and data, security, communications, collaboration, and other considerations in this new normal. When implemented correctly, remote work strategies can be a “win-win” for all involved; however, failed implementations may lead to inefficiencies, security issues, and dissatisfied team members.
This session will teach you today’s best practices for working remotely. Specifically, you will learn about various remote access tools, communication and collaboration options, and security best practices. You will also learn about managing and monitoring workflows in remote work environments and tools you can use. After completing this session, you can implement a remote work strategy that yields efficiency, security, and satisfaction to all involved.
Compliance Information
Overview
Many team members now work remotely, whether by choice or necessity. As a result, questions abound about remote access to desktops and data, security, communications, collaboration, and other considerations in this new normal. When implemented correctly, remote work strategies can be a “win-win” for all involved; however, failed implementations may lead to inefficiencies, security issues, and dissatisfied team members.
This session will teach you today’s best practices for working remotely. Specifically, you will learn about various remote access tools, communication and collaboration options, and security best practices. You will also learn about managing and monitoring workflows in remote work environments and tools you can use. After completing this session, you can implement a remote work strategy that yields efficiency, security, and satisfaction to all involved.
Course Details
- Fraud in small business environments
- Internal control options in small business accounting software
- Understanding the need for application controls and general controls
- Common challenges associated with implementing appropriate internal controls in small business environments
- Cite internal control fundamentals, including definitions and concepts, types of internal control activities, and the need for internal controls
- Identify common small business control deficiencies and issues, including concentration of ownership and inadequate segregation of duties, and list five key risk areas for small businesses
- Recognize the common types of fraud schemes occurring in small businesses and implement internal control measures to reduce the threat of becoming a victim
- List the objectives and common deficiencies of small business accounting systems
- Define the purpose of general controls and list examples of typical control techniques in small businesses
- Implement technology tools to prevent and detect occupational fraud
- List opportunities to enhance security over information systems and sensitive data
Intended Audience — Business professionals responsible for internal control and fraud prevention and detection
Advanced Preparation — None
Field of Study — Auditing
Credits — 8 Credits
IRS Program Number –
Published Date – November 2, 2022
Revision Date –