Protecting Your Business From Hackers

Similar documents
Wire Fraud Scams: How to Protect

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Wire Fraud Begins to Hammer the Construction Industry

Safety and Security. April 2015

Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

How Cyber-Criminals Steal and Profit from your Data

Preventing and Identifying Phishing Scams January 31, 2017

Who We Are! Natalie Timpone

Your security on click Jobs

Online Scams. Ready to get started? Click on the green button to continue.

zipform Plus official training guide & ziplogix Digital Ink

Personal Cybersecurity

Best Practices Guide to Electronic Banking

Evolution of Spear Phishing. White Paper

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Chapter 6 Network and Internet Security and Privacy

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries

Target Breach Overview

Top 5 Tips To Take A Stand Against Telephone Scams

Train employees to avoid inadvertent cyber security breaches

CAREERBUILDER.COM - PRIVACY POLICY

The Dime Bank Security Tips

Cyber Security Updates and Trends Affecting the Real Estate Industry

South Central Power Stop Scams

Security Awareness. Chapter 2 Personal Security

Security & Phishing

Phishing / Wire Fraud. Today s Topics 12/5/2017. Hacked and the Money is Gone: What s My Liability?

IMPORTANT SECURITY INFORMATION PHISHING

Maintaining Trust: Visa Inc. Payment Security Strategy

ziplogix Digital Ink User Support Guide

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Newcomer Finances Toolkit. Fraud. Worksheets

FREQUENTLY ASKED QUESTIONS

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

2014 CliftonLarsonAllen LLP Cyber Crime and Payment Fraud Trends Key Threats to All Businesses CliftonLarsonAllen LLP. CLAconnect.

FAQ. Usually appear to be sent from official address

Cyber Insurance: What is your bank doing to manage risk? presented by

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

Credit Card Frauds Sept.08, 2016

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin

Notice to our customers regarding Toll Fraud

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Fraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

National Travel Associates

Guide to Getting Started. Personal Online Banking & Bill Pay

Securing Americans Identities: The Future of the Social Security Number

Sectigo Security Solution

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

STEVE GOODING JUNE 15, 2018

Create strong passwords

Employee Security Awareness Training

Legal Considerations and Case Studies

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security

ASSESSMENT LAYERED SECURITY

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

Guide to credit card security

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648

Web Cash Fraud Prevention Best Practices

FRAUDULENT TRAVEL SCAMS

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Guide to Personal Online Banking. Great Things Happen!

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

Personal Online Banking & Bill Pay. Guide to Getting Started

Cyber and data security How prepared is your charity?

Financial scams. What to look for and how to avoid them.

Employee Privacy in the Electronic Workplace

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

DESIGNATING AGENTS TO CONTROL ACCESS TO DIGITAL PROPERTY IF YOU CANNOT DO IT YOURSELF (Estate Planning Advisory No. 3)

1 of 11 10/1/ :26 AM

But it Was Such a Little Phish February 2016 Webinar

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

Top Tips zipform Plus

Today s Presentation. Define phishing Explain phishing techniques Examples of phishing Statistics about phishing Defense against Dark Arts Resources

FAQ: Privacy, Security, and Data Protection at Libraries

How to Build a Culture of Security

PCI Compliance. What is it? Who uses it? Why is it important?

IMPORTANT DATES. Friday, January 18 th

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

FNB ewallet TERMS AND CONDITIONS

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017

TIPS TO AVOID PHISHING SCAMS

SOMETHING BRILLIANT IS ON THE HORIZON. Preview & User Set-Up Guide. Important Dates: Preview & User Set-up: October 9-19 Launch Date: October 22

2018 Edition. A Practical Guide to Protecting Your Organization. proofpoint.com

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Action Fraud & the NFIB. DS Martina MCGRILLEN

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Business Compromise: Operation Wire Wire & New Attack Vectors

Red Flags/Identity Theft Prevention Policy: Purpose

The. Guide. Managing Business Compromise and Impostor Threats to Keep Your Organization Protected

ELECTRONIC BANKING & ONLINE AUTHENTICATION

PBX Fraud Information

An improved security model for identity authentication against cheque payment fraud in Tanzanian banks

Transcription:

Protecting Your Business From Hackers

Technology Has Changed Real Estate Today, consumers have access to vast troves of information that enable them to make decisions faster than ever before Real estate professionals all benefit from faster and more efficient communication via email, mobile devices and other technologies Both groups generally agree that technology has brought greater convenience to the real estate transaction

Technology Opens Door to Cyber Thieves, Hackers and Scammers Cyber criminals have discovered numerous ways to gain access to confidential real estate information In 2016, the FBI reported business e- mail compromise as a 3.1 billion dollar scam 1,300% increase in identified exposed losses since January 2015 with 22,143 victims

The Latest Scam: Stealing Earnest Money, Down Payment or Seller s Proceeds How it Works: Cyber criminal obtains an agent s personal information and breaches an email or other online account With access to the agent s emails, transaction files and other information, the hacker creates fake emails that appear to be legitimate At the appropriate time, the scammer diverts the client s earnest money deposit or down payment to his account, or alters escrow instructions initiating a fraudulent wire transfer Funds stolen using these scam communications often are deposited into an offshore account

If You Have Been Scammed Immediately contact the bank and escrow holder to stop payment of funds If the funds have been distributed, call the FBI immediately (310-477-6565). Funds may be recoverable if the loss is reported within 24 hours Banks should file a complaint with the F.B.I. s IC3 unit at www.ic3.gov or contact the nearest Secret Service office at www.secretservice.gov/field_offices.shtml Notify all affected parties, change your passwords, talk to your attorney and be sure to determine whether any of your own personal or business accounts have been compromised

Avoid Becoming a Victim of a Scam: Verify Avoid sending and receiving sensitive information by email Never wire funds prior to calling your escrow officer to confirm instructions. Use only the verified telephone number specified at the beginning of the transaction. Advise clients to do the same Voice verify that the wire transfer instructions are legitimate, and that the bank routing and account numbers are accurate

Avoid Becoming a Victim of a Scam: Educate Educate clients about wire fraud risks: Use C.A.R. s Wire Fraud Advisory (form WFA) Share C.A.R. s brochure: Tips to Avoid Cybercrime in Real Estate Share C.A.R. s video short on cybercrime

Avoid Becoming a Victim of a Scam: Email If you must send sensitive information via email, encrypt the message using an email encryption service When using a free email account (Yahoo, Gmail, etc.), use two-factor encryption Don t use free email without a Virtual Private Network (VPN)

Avoid Becoming a Victim of a Scam: Passwords Use a strong password that combines upper and lower case letters, numbers, symbols, etc. Better yet, use passphrases Change passwords often, and don t share passwords Don t write down your password or post it in or around your desk

Real Estate Scam Red Flags Misspelled words, poor grammar and unprofessionallooking communications are a sure red flag. Delete these emails immediately (and don t click on any links!) Today s scammers are much more sophisticated. Communications will be more professional. The scammer is likely to know something about you and will use that information to build trust Pay attention to email addresses. Scammers may use an email address that is slightly different from the real agent. For example, jsmith@realtyworld.com may appear as jsmith@realtyworlds.com

Handling Sensitive Documents What documents are considered sensitive? The FIRPTA Form AS Contains social security number and name Preapproval letters that contain bank information Verification of down payment. (Delete or black out account numbers on bank statements)

TIP! zipform encrypts documents in transit and at rest on zipform. Use a ziplogix Community account with your client to video, audio or text sensitive information in a secure environment. Handling Sensitive Documents Bank account and social security numbers on closing statements. (Best practice is for the buyer to deliver these encrypted) Personal checks given as earnest money should be delivered directly to escrow (This is a default option in the RPA-CA)

Summing it up Technology has brought convenience to the real estate transaction and hackers/scammers The most recent scam involves stealing client s earnest money, down payment or sale proceeds by diverting funds to the scammer s account using a fraudulent wire transfer If you or a client have been scammed, immediately contact the bank and escrow holder to stop payment and notify the F.B.I. and/or Secret Service If you must use email, avoid becoming a victim by securing your email system and encrypting sensitive documents Use C.A.R. s Wire Fraud Advisory (Form WFA) and other Legal Tools to educate your clients about fraud risk

Additional Resources C.A.R. Legal Q & A: Protect Your Brokerage from Cybercrime C.A.R. Form WFA, Wire Fraud Advisory (available within zipform ) C.A.R. Brochure: Tips to Avoid Cybercrime in Real Estate (available within zipform in the epubs library and on www.car.org in the Legal Tools section) C.A.R. Cybercrime Video Short (available on www.car.org in the Legal Tools section)