Identity theft is a crime that 20 years ago was not on the radar for many businesses or individuals. Today, with the global economy and the prevalence of internet activity, it is one of the most recognized crimes in the U.S.
Identity theft is considered the use of one person’s identity or personally identifying information by another person without his/her permission. Identity theft can be committed against individuals as well as organizations.
Identity theft has become a major problem internationally. In 2006, President Bush issued an Executive Order which established the Identity Theft Task Force. Seventeen federal agencies and departments were appointed to create a national strategy to combat identity theft. This course focuses specifically on Business Identity Theft and processes companies can use to protect their information.
Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.
Prerequisites
No Advanced Preparation or Prerequisites are needed for this course.
Learning Objective
- Recognize the types of business identity theft
- Explore laws put into place to combat identity theft
- Explore why businesses are targeted
- Identify organizations that can help protect and save your business identity
- Explore methods to protect individuals and organizations against identity theft
Last updated/reviewed: July 6, 2025
(35) Reviews
(19 rating)Ethical issues are sometimes downrated, what is not correct. Great presentation.
This course is excellent for new auditors and a great refresher for seasoned auditors.
Exam was helpful in understanding the importance of a top-down risk assessment. Thank you.
Interesting and informative course with relevant information to understand the controllership function. Easy to follow and understand.
Very informative, a lot of great ideas and references to the additional resources.
This is an excellent course from Lynn Fountain! The real-life scenarios and current event considerations bring life to the topic.
Lynn, the generational divide is an important concept to understand when hiring. This class helps me to understand the challenges in how I must lead the different members on my Team. The biggest challenge is in group meetings and in Team building. This course is very helpful. Thank you, Larry
good information. Long sections but quality over was good
materials are 6 years old. Google algorithms have changed and continue to change. Course should be updated. Would have liked to have seen discussion abour White Hat and Black Hat SEO.
Liked how the instructor presented the information. She gave a lot of good websites to visit for more information.
Your courses have all been so wonderful, so informational, and so thorough--in short, greatly appreciated by me! Thank you for sharing your expertise, your wealth of knowledge, your inclusion of examples! I have greatly enjoyed reading and listening to all of your lectures thus far.
Great course on Cyber Security! I highly recommend this course to business professionals looking to get an overview on the cyber security process.
This course was very helpful. new tools for me to practice and master. If you work with data and excel this is the right course. take it and you will find that worth more than you imagine.
the final exam questions are not clearly addressed in the slides.
This instructor courses are always very helpful and are well thought out. I always look for her courses on-line as I always learn something new and interesting from her classes.
Very useful for anyone who is considering implementing a workflow system.
several mistakes in exam questions and answers and several mistakes in exam questions and answeres
good review and ideas for any manager. Thanks for the ideas
Many supporting materials didn't open. Many supporting materials didn't open.
great course for definitions and basic understanding of forensic accounting
Helpful tools for creating goals and setting priorities and how they are important in your career and day to day life.
Includes fraud not just by employee but also by customer. Includes not just cash but also effect on inventory. A good case for decreasing cash transactions.
This is an interesting and complex topic. I would have liked to see a longer, more indepth session.
Slides very helpful. Information very thorough.
Nice
Content not related to test!!!
Good introductory course to the topic
Good
Questions are vague
I was surprised at how challenging this course was.
Excellent course
Excellent Course!!
Bullet points - not the entire conversation or presentation - Please!!!!
I usually don't write reviews but in this case I will. I really enjoyed listening to this presenter. He is very knowledgeable and interesting and well worth my time taking this course. Thank you. Kim
l like learn about this course and subject We will follow full courses for an intense love thank you very much


Ask the instructor a question about this lesson