Wire Fraud Scams: How to Protect

Similar documents
CYBERCRIME AND CYBER SECURITY. Jessica Edgerton, Associate Counsel, NAR

Protecting Your Business From Hackers

Personal Cybersecurity

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

Phishing / Wire Fraud. Today s Topics 12/5/2017. Hacked and the Money is Gone: What s My Liability?

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

Best Practices Guide to Electronic Banking

Preventing and Identifying Phishing Scams January 31, 2017

Cyber Insurance: What is your bank doing to manage risk? presented by

Regulation P & GLBA Training

Web Cash Fraud Prevention Best Practices

Who We Are! Natalie Timpone

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

How Cyber-Criminals Steal and Profit from your Data

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

DATA BREACH NUTS AND BOLTS

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

Keep the Door Open for Users and Closed to Hackers

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017

WPBOR WEEKLY UPDATE August 18, 2017 Don t Miss Our Veterans Homeownership Resource Fair See Flyer Below

Legal Considerations and Case Studies

Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training

What to do if your business is the victim of a data or security breach?

Not Just Another Day of HIPAA

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

ELECTRONIC BANKING & ONLINE AUTHENTICATION

LCU Privacy Breach Response Plan

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Train employees to avoid inadvertent cyber security breaches

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

Chapter 6 Network and Internet Security and Privacy

ASSESSMENT LAYERED SECURITY

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

The Cyber War on Small Business

ISACA West Florida Chapter - Cybersecurity Event

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Why you MUST protect your customer data

Cyber Risks in the Boardroom Conference

Cybersecurity The Evolving Landscape

Newcomer Finances Toolkit. Fraud. Worksheets

Cyber security tips and self-assessment for business

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Your security on click Jobs

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Preparing for a Breach October 14, 2016

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Business/Commercial Client Internet Banking Awareness and Education Program

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

HELPFUL TIPS: MOBILE DEVICE SECURITY

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

Cyber Risks, Coverage, and the Board of Directors.

WHO PROTECTS YOUR MAIL? MAILERS TECHNICAL ADVISORY COMMITTEE Guy Cottrell, Chief Postal Inspector

PTLGateway Data Breach Policy

A practical guide to IT security

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

Maintaining Trust: Visa Inc. Payment Security Strategy

How to Build a Culture of Security

FNB ewallet TERMS AND CONDITIONS

Legal Aspects of Cybersecurity

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Data Security Essentials

The Regional Cyber Crime Unit response to Cyber Crime

Anatomy of a Data Breach: A Practical Guide for Small Law Departments

Safeguarding Your Dealership from Fraud

Summary Comparison of Current Data Security and Breach Notification Bills

Security & Phishing

Keeping your healthcare information secure: Simple security and privacy tips

1 of 11 10/1/ :26 AM

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Data Security and Breach Notification Legislative Update: What You Need to Know (SESSION CODE CRM001)

June 2 nd, 2016 Security Awareness

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins

UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017


SHS Annual Information Privacy and Security Training

ANNUAL SECURITY AWARENESS TRAINING 2012

ADMA Briefing Summary March

Service Provider View of Cyber Security. July 2017

Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool. Cyber Security 3.0 Better Together August 18, 2017

LWMMI. Protecting The Communities We Live In. DIRECTORS. David Benforado Village Trustee Village of Shorewood Hills

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

Employee Security Awareness Training Program

CYBERSECURITY: STAYING ONE STEP AHEAD DANIEL D. WHITEHOUSE, ESQ. WHITEHOUSE & COOPER, PLLC

PBX Fraud Information

Electronic Communications with Citizens Guidance (Updated 5 January 2015)

Preventing Tax Preparer Data Theft

Keys to a more secure data environment

Data Breaches and Securing Healthcare Humans James Tarala, The SANS Institute

Cybersecurity and Nonprofit

Retail/Consumer Client Internet Banking Awareness and Education Program

Credit Card Data Compromise: Incident Response Plan

Employee Security Awareness Training

Data Breach Preparation and Response. April 21, 2017

Transcription:

1 Wire Fraud Scams: How to Protect Your Buyer Clients Connection Jessica Edgerton, NAR Associate Counsel

GOV GODWIN EMEFELE <postmaster@cooky112.de> URGENT NOTICE, Is my pleasure to inform you that your deliveryman has arrived with your cash trunk boxes value $8.3 million dollars being your inheritance/ compensation payment? Most importantly you are advised to send your full data to him, which include your Full Name, Current Residential Address, Direct Cell Number, and A copy of any identity card to verify that you are the right receiver to avoid mistakes and enable him deliver your cash consignment boxes to your house without any further delay. CONGRATULATIONS. MR.GODWIN EMEFELE, EXECUTIVE GOVERNOR, CENTRAL BANK OF NIGERIA

Best Email Practices Avoid sending sensitive information via email. Use encrypted email. Don t open. Don t click. Don t reply. Clean out your email regularly. Use strong passwords. Change your password regularly. Do not do business over free wifi. Be aware that a free email service may have fewer protections in place than a business email account.

Best Business Practices Communicate and educate. Get all parties to the deal up to speed on fraud prevention. Call the intended recipient of wired funds immediately prior to sending the funds. Use an independently verified phone number. Implement technology security. Be paranoid.

Damage Control If money has been wired, call the banks immediately to stop funds. Contact all other parties to the transaction. Contact the police. Change all passwords. Report to FBI Internet Crime Complaint Center: http://www.fbi.gov/scams-safety/e-scams Report to REALTOR Association(s).

Legal Exposure Negligence. Breach of fiduciary duty. Violations of state data security laws. Failure to maintain standards set forth in company security policy. FTC Action. (FTC v. Wyndham Worldwide Corp., No. 14-3514 (3 rd Cir. Aug. 24, 2015)).

Cyber Insurance? Cyber Insurance still in wild west territory. Don t purchase without consulting specialist. Policies for small businesses are available. Policies may become outdated quickly in light of new threats so review often. As applicable, review coverage under NAR policy prior to purchase.

What to Watch For Email Phishing still popular, but numbers going down. What s on the rise? Attacks via: Social media Mobile devices: Apps, SMS Compromised websites And what s next? Wearables Automobiles

Resources http://www.realtor.org/topics/data-privacy-and-security/resources http://www.realtor.org/videos/window-to-the-law-cyberscams-and-thereal-estate-professional http://www.realtor.org/law-and-ethics/nars-data-security-and-privacytoolkit http://www.realtor.org/articles/request-to-redirect-funds-should-triggercaution http://www.realtor.org/topics/data-privacy-and-security http://www.realtor.org/articles/internet-security-best-practice

PROTECTING YOUR BUSINESS AND YOUR CLIENTS FROM CYBERFRAUD LEGAL AFFAIRS DEPARTMENT By 2019, cybercrime will cost businesses an estimated $2 trillion annually. Don t be a part of that statistic! Implement the following best practices to safeguard you, your clients, and your business from online criminals. Best Business Practices: Develop and enforce formal policies for ensuring data security. Create, maintain and follow a comprehensive Data Security Program.* Create, maintain and follow a comprehensive Document Retention Policy.* Avoid storing clients personally identifiable information for longer than absolutely necessary. When you no longer need it, destroy it. Best Email Practices: Unsecure email accounts are open doors to cyber criminals. Follow these guidelines to help keep that door securely shut and locked tight. Whenever possible, avoid sending sensitive information via email. If you must send sensitive information via email, make sure to use encrypted email. Never trust contact information in unverified emails. If an email looks even slightly suspicious, do not click on any links in it, and do not reply to it. Clean out your email account regularly. You can always store important emails on your hard drive. Do not use free wifi to transact business. Avoid using free email accounts for business. Use strong passwords. Change your password regularly. * See NAR Data Security and Privacy Toolkit for guidance. http://www.realtor.org/law-andethics/nars-data-security-and-privacy-toolkit

PROTECTING YOUR BUSINESS AND YOUR CLIENTS FROM CYBERFRAUD LEGAL AFFAIRS DEPARTMENT Best Transaction Practices: Real estate transactions require flurries of information between numerous parties. This makes for primetime opportunities for fraudsters. How do you secure your deal? From the very start of any transaction, communicate and educate. Get all parties to the transaction up to speed on fraud red flags, and make sure everyone implements secure email practices. When wiring money, the person doing the wiring should pick up the telephone and call the intended recipient of the wired funds immediately prior to sending the funds in order to verify the wiring instructions. Remember to use only independently verified contact information. Stay paranoid. A few years back the director of the FBI almost got taken by an email banking scam. If it can happen to him, it can happen to us. Best Damage Control Practices: It s happened. A breach of data, a successful scam, a hack. What to do? If a money wire has gone out, immediately contact the bank to try and stop the funds. Notify all affected or potentially affected parties. Many states have data breach notification laws. Change all of your passwords. If possible, change usernames as well. Talk to your attorney. Contact the police. Report the breach to the FBI Internet Crime Complaint Center: http://www.ic3.gov/default.aspx Report to your REALTOR Associations.