Avoiding Cyber Fraud in Small Businesses: What Auditors and Owners Need to Know
×
Success!
×
Error!
×
Information !
Rights Contact Login For More Details
- Wiley
More About This Title Avoiding Cyber Fraud in Small Businesses: What Auditors and Owners Need to Know
- English
English
INCREASE THE LIFE SPAN OF YOUR SMALL BUSINESS
The average small business has a life span of about five years, and inadequate internal controls are the main cause of failure. Cyber fraud, the leading culprit today in internal criminal activity, occurs when advanced technologies are used to steal money or property. The majority of such crimes occur in-house, and the lack of sufficient capital and technological resources committed to protecting company assets makes small businesses especially vulnerable. Awareness of the dangers of internal theft by computer, illegal access to information systems, credit card fraud, and Internet scams is integral-especially as auditors, business owners, and managers are increasingly held responsible for negligence.
Providing critical guidance on what auditors and businesses can do to better prevent and detect the growing number of occurrences of cyber fraud, the information in this one-of-a-kind manual:
* Protects outside auditors by supplying the knowledge to ensure they meet their responsibilities
* Protects small business owners by providing them with the necessary tools to meet due diligence requirements in cyber fraud prevention
* Focuses on the key areas of vulnerability
Take the first step in protecting your company-and your future-with Avoiding Cyber Fraud in Small Businesses, the only book committed to helping you keep your small business free of computer crime.
The average small business has a life span of about five years, and inadequate internal controls are the main cause of failure. Cyber fraud, the leading culprit today in internal criminal activity, occurs when advanced technologies are used to steal money or property. The majority of such crimes occur in-house, and the lack of sufficient capital and technological resources committed to protecting company assets makes small businesses especially vulnerable. Awareness of the dangers of internal theft by computer, illegal access to information systems, credit card fraud, and Internet scams is integral-especially as auditors, business owners, and managers are increasingly held responsible for negligence.
Providing critical guidance on what auditors and businesses can do to better prevent and detect the growing number of occurrences of cyber fraud, the information in this one-of-a-kind manual:
* Protects outside auditors by supplying the knowledge to ensure they meet their responsibilities
* Protects small business owners by providing them with the necessary tools to meet due diligence requirements in cyber fraud prevention
* Focuses on the key areas of vulnerability
Take the first step in protecting your company-and your future-with Avoiding Cyber Fraud in Small Businesses, the only book committed to helping you keep your small business free of computer crime.
- English
English
JACK BOLOGNA, BBA, JD, CFE, is President of Computer Protection Systems, Inc. His numerous publications include The Accountant's Handbook of Fraud and Commercial Crime (Wiley).PAUL SHAW is the Editor and Publisher of Computing & Communications: Law and Protection Report and Assets Protection, periodicals that ship to over 4,000 individuals.
- English
English
Cyberfraud is Here to Stay.
Cyberfraud and Cyber Criminals.
Risk and Vulnerability Assessments.
Assessing Fidelity Risks.
Establishing Effective Compliance Programs.
Computers and Ethics: An Oxymoron?
Designing Persuasive Policies.
Communications Systems Policy Guide.
Internal Protection Controls.
Security-From Fence to Firewall and Beyond.
Protection of Proprietary Information.
Setting Up Your Website: Business, Security and Liability Considerations.
Disaster Planning for Information Systems.
Cyberfraud Audits and Investigations.
Insurance for Cyberfraud and Cybertorts.
Appendices.
Cyberfraud and Cyber Criminals.
Risk and Vulnerability Assessments.
Assessing Fidelity Risks.
Establishing Effective Compliance Programs.
Computers and Ethics: An Oxymoron?
Designing Persuasive Policies.
Communications Systems Policy Guide.
Internal Protection Controls.
Security-From Fence to Firewall and Beyond.
Protection of Proprietary Information.
Setting Up Your Website: Business, Security and Liability Considerations.
Disaster Planning for Information Systems.
Cyberfraud Audits and Investigations.
Insurance for Cyberfraud and Cybertorts.
Appendices.