CYBER SECURITY TIPS

Be alert for phishing attempts. Phishers typically send an email, instant message, comment or text message that appears to come from a legitimate source.

  • This includes internet leads
    • Have a list of basic questions to ask a new e-lead or customer to make sure you’re dealing with a bona fide customer before you proceed to do a property search.
  • Hover over the logo
  • Closing statements from title companies and closing agents
    • This is one of the most common hacks, Call before opening
  • The phisher’s goal is to get you to share personal, business or customer information or to click on a link that will install malware on your device.
  • If you get a suspicious message:
    • Do not select links or open attachments from unknown senders, especially if they are zip or executable files.
    • Look for spelling and grammatical errors that may indicate a phishing attempt.
  • Be especially wary of URLs that do not end with common extensions like .com, .gov, .org and .edu.
    • Hover over links in your email with your mouse to see the true source of the link.
  • Never enter personal information or credentials into a pop-up window or on an unknown website.
    • Legitimate companies have access to your account login and password information; they will not contact you to confirm it.
    • Delete the message without opening it or contact the sender through a different communication channel to verify its authenticity.
  • For messages that appear to be from known or reputable businesses, use your Internet browser to identify the company’s legitimate URL and verify its contact information. This information may also be found on your last bill or statement.
    • If in doubt, contact the company directly to confirm the validity of a request from the number in your statement or card.
  • Be cautious about including business contact names and telephone numbers in out-of-office messages that may be sent to external recipients.
  • Register for 2-step verification that will alert you if someone accesses your email, bank account, or any other type of account from anywhere except a trusted device. Here’s a link that offers 2 step authentication for various websites, such as Gmail, Facebook, Twitter, Yahoo Mail etc.  If you need assistance enabling the 2 step authentication, please log into EWM’s live help. http://lifehacker.com/5938565/heres-everywhere-you-should-enable-two-factor-authentication-right-now
  • If you receive a suspicious email and you are not sure if it is safe to open, do not open or click on it contact the sender or forward the attachment with the words “FRAUD” on the subject line to [email protected].

The most effective way to prevent fraud is to speak to the other person before opening attachments.

Attachments and links in unidentified emails basically hack into your accounts and track your email activity to see who you are communicating with and then begin communicating directly with you or your client and giving them false information.

 WHAT TO DO IF YOU ARE A VICTIM

  • If funds are transferred to a fraudulent account, it is important to act quickly:
  • Contact your financial institution immediately upon discovering the fraudulent transfer
  • Request that your financial institution contact the corresponding financial institution where the fraudulent transfer  was sent
  • Contact your local Federal Bureau of Investigation (FBI) office if the wire is recent. The FBI, working with the United States Department of Treasury Financial Crimes Enforcement  Network, might  be able to  help return or  freeze  the funds
  • File a complaint, regardless of dollar loss, at IC3.gov

When contacting law enforcement or filing a complaint with the IC3, it is important to identify your incident as “BEC”, provide a brief description of the incident, and consider providing the following financial information:

  • Originating Name:
  • Originating Location:
  • Originating Bank Name:

File a Complaint with IC3 at www.IC3.gov

The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. They can best process your complaint if they receive accurate and complete information. Therefore, they request you provide the following information when filing a complaint:

  • Victim’s name, address, telephone, and email
  • Financial transaction information (e.g., account information, transaction date and amount, who received the money)
  • Subject’s name, address, telephone, email, website, and IP address
  • Specific details on how you were victimized
  • Email header(s)
  • Any other relevant information you believe is necessary to support your complaint

 

Leave A Reply

Your email address will not be published. Required fields are marked *