Information Security and Wire Transfer Fraud are critical topics for the land title insurance and settlement industry. Wire Transfer Fraud is a threat to every title operation regardless of size, location or years in business. ALTA’s priority is helping you protect your systems, plan for a rapid response in case of an incident, and prepare your employees, clients and customers to be aware and vigilant.

The ALTA Board has identified information security and wire transfer fraud as a Strategic Priority and staff are working to educate members on security threats to their businesses in both cyber and physical environments, collaborate with coalition partners to raise consumer awareness about information security and wire transfer fraud, and promote best practices for protecting personal funds and information and seek policy change that will protect consumers.

Do You . . .

  • work in the land title insurance industry?
  • use a computer, tablet or smartphone?
  • talk and email with vendors, clients, customers and consumers?

ALTA Helps You

Tools You Can Use

Get The Facts

  • 2019 Internet Crime Report. Published by the FBI's Internet Crimes Complaint Center (IC3). Take 30 minutes to read this report and discover the trends in cyber crime, which impact more than 200,000 victims every year and result in losses topping $1 billion. The report shows there were 11,677 victims of real estate wire fraud in 2019 with $221 million in losses.

Establish and Maintain Operational Readiness

  • NEW ITEM: ALTA Outgoing Wire Preparation Checklist: Use this checklist as a best practice for verifying outgoing wire information.
  • ALTA Rapid Response Plan for Wire Fraud Incidents: The standard ALTA Rapid Response Plan for Wire Fraud Incidents has been developed by the ALTA Information Security Committee. Download and customize:
  • ALTA Best Practices. The third pillar of ALTA’s “Title Insurance and Settlement Company Best Practices” provides procedures that should be taken to protect non-public personal information (NPI).
  • Federal RequirementsGramm-Leach-Bliley Act (GLB): This regulation requires financial institutions—companies that offer consumers financial products or services like loans, financial or investment advice, or insurance—to explain their information-sharing practices to their customers and to safeguard sensitive data. These companies include title and settlement companies, as well as law firms.
  • State RequirementsForty-seven states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private, governmental or educational entities to notify individuals of security breaches of information involving personally identifiable information.

Promote Employee Awareness and Preparation

Title and settlement professionals are on the front line in the battle against wire transfer fraud. Use these tools to help prepare your employees:

Be a Leader for Clients & Consumers

ALTA has developed tools to help you educate consumers about the dangers of wire fraud.

  • Wire Fraud Tips Video: Share this 1-minute video with homebuyers so they know how to protect their money.
  • ALTA Wire Fraud Video: This 2-minute video provides four tips on how consumers can protect their money and offers advice on what to do if they have been targeted by a scam. Link to this video from your website, include in your email or share on social media.
  • ALTA Wire Fraud Infographic: ALTA has produced this Rack Card explaining Wire Fraud. ALTA Members can brand the infographic with their own information at the ALTAprints website.
  • ALTA Wire Fraud PowerPoint for Consumer Education: (Member-only content) Use this presentation to educate consumers about the dangers of phishing emails and wire transfer fraud. The presentation provides information on what to do if you’ve fallen victim to a scam and also highlights 10 tips to prevent wire fraud.

Get Information to Help Your Business and Your Customers

Information Security Articles

Recent 2020 2019 2018 2017 2016 2015 2014

 Learn How to Identify Valid and Suspicious Email
December 1, 2016
While companies may have spam filters and antivirus software, spam and phishing emails can still slip through employee inboxes. Email recipients are the most critical element in preventing an attack. Read on for some tips on how to identify the authenticity of a questionable email.
How ALTA Members Can Defend Against Ransomware
November 10, 2016
Ransomware has emerged as one of the most serious online threats facing businesses, according to the Federal Trade Commission (FTC). Read on for tips on how to defend against ransomeware and how to respond if your company becomes a victim.
 How (Un)Lucky are You? One in Three Cyberattacks Results in a Security Breach
November 8, 2016
One in three targeted cyberattacks over the past 12 months results in a security breach, according a new survey from Accenture. While the survey also found that 75 percent of all respondents were "confident" they were doing the right things, there's a cyber conundrum in what companies perceive is their ability to secure data versus reality.
Top 4 Cybercrime Threats to Small Businesses
October 28, 2016
Small business owners: protecting your business against cybercrime is now more important than ever.
Responding to a Data Breach?
October 25, 2016
You suspect that your business experienced a data breach. Maybe an employee lost a laptop, or a hacker got into your customer database, or information was inadvertently posted on your website. Whatever happened, you’re probably wondering what to do next. The FTC’s new Data Breach Response: A Guide for Business outlines the steps to take and whom to contact.
Regulators Propose Cybersecurity Standards for Banks
October 20, 2016
Three federal banking regulatory agencies approved an advance notice of proposed rulemaking inviting comment on a set of potential enhanced cybersecurity risk-management and resilience standards that would apply to large and interconnected entities under their supervision.
 How to Develop a Data Breach Response Plan
October 13, 2016
Here’s a step-by-step guide to help you create an effective data breach response plan. You can also check out a handy checklist of things you should do in the first 24 hours if a breach has occurred.
Companies Should Understand Where Cybercrime Thrives
October 13, 2016
As global cybercrime increases, governments and businesses are struggling to keep up with the threats they are facing.
Cybercrime: Ransomware, CEO Fraud Still Going Strong
September 29, 2016
Drawn by the promise of faster, less expensive and more effective crime-committing capabilities - with lower risk - and backed by the easy availability of "as a service" offerings, more criminals than ever have been operating online.
The 2016 Trends in Cybercrime That You Need to Know About
September 28, 2016
The volume, scope and cost of cybercrime have reached very high levels – and are set to get even higher, according to a report from Europol – the European Union's law enforcement agency.
 Suffer a Data Breach? Here’s Your First 24-Hour Checklist
September 20, 2016
Acting quickly and strategically following a data breach can help you regain your security, preserve evidence and protect your brand. Once a breach is discovered, contact legal counsel for guidance on initiating these 10 steps.
How Cybercriminals Target Victims: Report Cites Top Information Resources
September 20, 2016
Cybercriminals, whose attacks cost organizations millions of dollars a year, do extensive research on their targets. They gather organizational and personal information before deciding which vulnerabilities to exploit.
 New York Proposes Cybersecurity Regulations
September 15, 2016
The proposed regulation would require regulated financial institutions to establish a cybersecurity program; adopt a written cybersecurity policy; designate a chief information security officer responsible for implementing, overseeing and enforcing its new program and policy; and have policies and procedures designed to ensure the security of information systems and nonpublic information accessible to, or held by, third-parties, along with a variety of other requirements to protect the confidentiality, integrity and availability of information systems.
Financial Regulators Release Revised Information Security Booklet
September 15, 2016
The revised booklet addresses the factors necessary to assess the level of security risks to a financial institution’s information systems. The booklet also helps examiners evaluate the adequacy of the information security program’s integration into overall risk management.
Cyber Snipers Zero In on Industry
September 13, 2016
Title and settlement agents must be vigilant against an onslaught of fraudulent email schemes as regulator attention has accelerated.
FBI Arrests Two Alleged Hackers of Crackas With Attitude Group
September 13, 2016
Crackas with Attitude (CWA) hackers who made headlines for hacking high-profile government officials in the United States are feeling the wrath of law enforcement agencies – US authorities have arrested two alleged hackers of the group.
HR a Target for Cyber-Crime, Must Defend Itself
September 12, 2016
The human resources department is a target for cyber-crime because it controls employees’ personal information, so it must take an active role in its own defense, consultants say.
Public Yawns at Threat of Cyber Crime
September 7, 2016
The seemingly inpenetrable National Security Agency was hacked recently. So was the Democratial National Committee, and voter registration offices in Illinois and Arizona.
FTC Seeks Comments on Safeguards Rule
September 6, 2016
The Safeguarding Customer Information (Safeguards Rule) requires financial companies (including title insurance and settlement service companies) to protect customer information. Comments are due on or before Nov. 7, 2016.
The NIST Cybersecurity Framework and the FTC
September 1, 2016
The Federal Trade Commission frequently gets this question, “If I comply with the NIST Cybersecurity Framework, am I complying with what the FTC requires?” From the perspective of the FTC staff, NIST’s Cybersecurity Framework is consistent with the process-based approach that the FTC has followed since the late 1990s, the 60+ law enforcement actions the FTC has brought to date and the agency’s educational messages to companies.
Big Banks Team Up to Fight Cyber Crime
August 10, 2016
Eight of the largest U.S. banks, including J.P. Morgan, Bank of America and Goldman Sachs, are forming a group that seeks to tackle the growing threat.
Insurers Working to Fill Cyberinsurance Data Gaps
August 4, 2016
Insurers are starting to expand their services to better educate their customers about cyber risk and even help them defend against attacks before they happen and deal with the fallout of when a breach does occur.
What If Your ISP Could Stop Cybercrime Before It Happened?
July 27, 2016
Although major hacks generate news headlines, most companies and institutions quietly contend ongoing web-based probes and attacks, with the average CISO at the largest businesses managing ecosystems of 50-75 vendors in hopes of catching security breeches.
Everything You Need to Know About Ransomware
July 20, 2016
Ransomware is one of the most feared security threats today and it is fast becoming one of the most profitable areas of cybercrime for attackers. It allows criminals to monetize their cybercrime efforts quicker than previous tactics allowed.
U.S. Bank Regulator Chief Unaware of Any Hacking Cover-up
July 15, 2016
The head of a U.S. banking regulator on Thursday said he was unaware of any efforts by his staff to cover up hacking of the agency's computers by a foreign government in 2010 and 2011, as outlined by a congressional report.
Cybersecurity Blind Spots: Mitigating Risks and Vulnerabilities
July 15, 2016
Cybersecurity blind spots based in risk and vulnerabilities can be difficult to spot and address. Several cybersecurity experts and CISOs offer insight into some of the hidden risks and vulnerabilities they've discovered, as well as some of the more persistent and growing threats to enterprise security.
Employee Training May Be Best Defense Against Cybercrime
July 6, 2016
For businesses and health-care institutions, the threat of cyberfraud is on the rise, unleashing fierce competition between law firms and consultants seeking to advise them.
Early Signs on Fintech from Consumer Financial Protection Bureau
June 30, 2016
There is no doubt that the regulation of financial technology (fintech) companies is on the rise. Fintech companies broadly mean companies that provide products, services and technology where traditional banking and financial services leave off and technology takes off.
 Report: NAIC Cybersecurity Task Force Chair Wants Data Security Model Law by Fall
June 28, 2016
The chair of the National Association of Insurance Commissioners (NAIC) Cybersecurity Task Force wants the task force to approve a data security model law no later than this fall, according to a report.ALTA has sent two letters to the NAIC offering modifications that should be made to the NAIC's proposal.
Protect Yourself From Cybercrime: 6 Best Practices To Implement Now
June 21, 2016
Today, most companies have at least a basic awareness of the need to reduce their vulnerability to cybercrime. There is also increasing awareness of the need to be prepared for the possibility they will be the victim of an attack.
Cybercrime Market Sells Servers for as Little as 6 Dollars to Launch Attacks
June 17, 2016
A major underground marketplace acting like an eBay for criminals is selling access to more than 70,000 compromised servers allowing buyers to carry out widespread cyber-attacks around the world, security experts said on Wednesday.
 FBI Reports Email Fraud Schemes Result in $3.1B in Losses Since 2015
June 16, 2016
Sophisticated email scams targeting businesses that regularly perform wire transfer payments has increased 1,300 percent and resulted in losses totaling $3.1 billion, according to the FBI. Read on for several red flags to help identify a fraudulent email scams and and tips to protect your operation.
What Can We Do to Better Protect Sensitive Personal Information?
June 16, 2016
It is likely that 2016 will be considered the ”year of the exploit” as we see a shift to higher-impact identity-impersonation cybercrime that takes advantage of the large amount of sensitive data accumulated in 2015.
Hackers Sought to Steal Over $3 Billion Through Wire-transfer Fraud: FBI
June 15, 2016
Hackers have sought to steal more than $3 billion from businesses in a pernicious, fast-growing type of scam in which criminals impersonate company executives in emails ordering large wire transfers, the Federal Bureau of Investigation warned on Tuesday.
 ALTA: Model Cyber Law Should Protect Consumers, Not Duplicate Existing Safeguards
June 14, 2016
In a letter, ALTA tells the National Association of Commissioner's that its draft Insurance Data Security Model Law would not meet the NAIC’s goal of creating a uniform standard, but would create a competing patchwork of regulations to existing state law.
Two Charged in Cyberfraud Against JPMorgan and Others, Plead Not Guilty
June 10, 2016
Two Israeli citizens pleaded not guilty on Thursday to orchestrating a massive computer hacking and fraud scheme that included an attack against JPMorgan Chase & Co and generated hundreds of millions of dollars of illegal profit.
Feds Not Prosecuting Enough Cyberthieves, Survey
June 9, 2016
Two-thirds of adults surveyed last month believe the government is inadequate in its pursuit and prosecution of cyberthieves, according to an ESET blog.
CFPB Brings First Data Security Enforcement Action
June 8, 2016
The Consumer Financial Protection Bureau (CFPB) recently brought its first data security enforcement action, adding itself to the growing list of federal regulators tackling data security issues. The CFPB’s enforcement action was against Dwolla Inc., a Des Moines, Iowa-based online payment platform.
Civil Liberties Groups Push Back on Cybercrime Bill
June 3, 2016
Civil liberties groups are pushing back on a bill intended to prevent so-called botnet attacks.
Scene of the Cybercrime: Lessons from a Cyberattack
June 2, 2016
Cyberattacks are all but inevitable now for organizations large and small. That means being prepared--both before and after a breach. When it happens to you, the first 48 hours will be critical for evidence gathering and reassuring your members.
Battling Cyber Threats Begins With Employee Education
June 2, 2016
Technology is a driving force for organizational goals. The rapid adoption of cloud computing and the widespread availability of mobile devices and apps has moved technology from serving as simply a support mechanism to the critical differentiator in the way in which companies operate day-to-day and in how they prepare for the future.
Microsoft Steps Up Its Fight Against Cybercrime [video]
June 1, 2016
Cybercrime costs businesses millions of dollars annually. Bloomberg Canada's Anthony Lacavera and Amber MacArthur speak with Microsoft’s Director of Security Tim Rains to find out what tech giants are doing now to tackle new threats.
Ransomware Complaints Double in a Year, Total Over $1.5 Million
May 26, 2016
The number of victims reporting ransomware attacks has nearly doubled in a year, and the reported loss to victims nearly tripled, according to an FBI report based on information provided by the public.
Senators Take Aim at 'Armies of Zombie Computers'
May 23, 2016
A group of senators this week introduced reworked legislation to combat botnets, which transmit computer viruses, after the measure failed to make it into the major cybersecurity bill passed late last year.
What You Ought to Know About the Common Cybercrime Techniques of 2016
May 20, 2016
2015 was the year of bold and sophisticated cybercrimes in Australia when major corporations such as The Commonwealth Bank, Target,T-Mobile, K-mart, X-box, Anthem Inc., and Slack lost millions of dollars in security breaches and lost data records. You can expect 2016 to be no different unless companies take proactive measures to improve their IT security.
How Does Cybersecurity Affect the Mortgage Industry?
May 11, 2016
As the digital age surges forward, mortgage companies now have a new issue on their hands—cybersecurity.
3 Ways Cybersecurity Affects the Mortgage Industry
May 10, 2016
As the digital age surges forward, mortgage companies now have a new issue on their hands—cybersecurity.
Buyer Beware: In Hot Housing Market, Scam Targets Real Estate Closings
May 6, 2016
With home prices rising and inventory low, the housing market in the Triangle is more competitive than ever, putting pressure on buyers to move quickly when they find a home they want.
Election Fraud Feared as Hackers Target Voter Records
May 3, 2016
A series of data breaches overseas are spurring concerns that hackers could manipulate elections in the United States.
In Case You Missed It: Know What You Need to Do When Data is Breached
May 3, 2016
The frequency and cost of data breaches continues to rise. The risk of a title or settlement company getting hacked isn’t a question of if, it’s when. Listen to a recording of the webinar “Life Cycle of a Data Breach: Know What You Need to Do,” to learn about breach notification requirements, the potential costs to resume operations following a breach and how to develop a plan and be prepared in case a breach happens to you.
Hultgren Proposes Legislation to Prevent the Release of Private Mortgage Information
April 26, 2016
U.S. Reps. Randy Hultgren (R-IL) Andy Barr (R-KY) and Mia Love (R-UT) introduced legislation on Wednesday aimed at preventing the potential posting online of private financial data of thousands of citizens as part of the Home Mortgage Disclosure Act.
4 Ways to Dodge Cybercrime When Banking, Shopping on Mobile Phones
April 22, 2016
The nature of identity fraud is changing. With the rollout of smart chips in credit and debit cards making it more difficult to steal using cards themselves, thieves have their eyes on your data instead.
ALTA Helps Pressure NAIC to Open Dialogue About State Model Cyber Law
April 21, 2016
Responding to feedback and pressure from ALTA and state regulators, the commissioner of the National Association of Insurance Commissioners has agreed to hold an extended in-person discussion to address concerns about the NAIC’s proposed state model cybersecurity law.
Creator of Malware Used to Drain Bank Accounts Gets 9 Years
April 21, 2016
The Russian creator of a computer program that enabled cybercriminals to infect millions of computers and drain bank accounts in multiple countries was sentenced Wednesday to serve 9 ½ years in federal prison.
Attorney Blamed for Cyber Theft of $1.9M Manhattan Co-op Deposit
April 20, 2016
Robert Millard, a managing partner at Realm Partners, and his wife, Bethany, blame their real estate attorney, Patricia Doran, for “cybercriminals” stealing the 10 percent deposit intended for a Manhattan co-op they were buying for $19.4 million, according to a new lawsuit filed in New York State Supreme Court. The Millards claim that Doran’s use of an AOL e-mail account and her lack of computer security essentially served as a neon sign welcoming hackers to snatch their money.
 Do State Breach Notification Laws Apply to Electronic and Paper Records?
April 19, 2016
Although most security breach notification laws focus on incidents affecting electronic data, a number of state and federal laws impose notification requirements when an incident concerns hard-copy records that contain personal information.
Meet MIT's New Cyber-Attack Detection Tool
April 19, 2016
Researchers merged artificial intelligence with 'analyst intuition' to create AI2.
Cybercrime Increases As Online Crooks Grow Smarter
April 18, 2016
Symantec's 2016 Internet Security Threat Report (ISTR) reveals that the year 2015 saw an increase in hacking numbers and smarter attacks.
American Company Lost $100 Million to Email Fraud, U.S. Says
April 15, 2016
An unidentified American company was defrauded last year out of nearly $100 million by individuals who created a fake email address in order to pose as one of its legitimate vendors, U.S. authorities said on Thursday.
 Training Tips to Help Employees Spot Fraudulent Emails
April 12, 2016
There are many steps title and settlement companies can take to thwart email schemes and potential account takeovers. Companies are encouraged to train employees to identify suspicious email. Read on for three training tips.
 Three Principles to Deprive Cyber Attackers Opportunity to Access Data
April 7, 2016
There are many kinds of cybercrime being perpetrated every second across the globe. But there are three in particular that are sky rocketing due to the ease of carrying them out and their highly profitable outcome.
ALTA Submits Comment on Draft NAIC Model Cyber Security Law
April 5, 2016
ALTA is concerned that an insurance-specific data security law could conflict with other state and federal data security laws, making it impossible for title and settlement agents to comply with all their legal and contractual obligations.
 Cyber Vulnerability is Between the Chair and Keyboard
April 5, 2016
During the Opening General Session of ALTA’s Business Strategies Conference in Indianapolis, Renault Ross, the cybersecurity business strategist at Symantec Corp., offered an overview of the cybersecurity landscape to help attendees understand current and evolving threats. Read on to learn why a company's biggest cyber vulnerability is "between the chair and keyboard."
 Tennessee Amends Breach Notification Statute
April 5, 2016
A bill signed by Gov. Bill Hallam amends Tennessee’s breach notification statute setting a specific time to send notice and eliminated a provision requiring notice only in the event of a breach of unencrypted personal information.
12 Top Cloud Security Threats
April 1, 2016
Most organizations now have some presence in the cloud, but data security remains a top concern, especially when business units acquire cloud services independent of the IT department. To help illustrate the problems such practices can create, the Cloud Security Alliance has compiled its list of “The Treacherous 12: Cloud Computing Top Threats in 2016."
Register for Webinar to Learn the Lifecycle of a Data Breach and Know What You Need to Do
March 31, 2016
The frequency and cost of data breaches continues to rise. The risk of a title or settlement company getting hacked isn’t a question of if, it’s when. Register for ALTA’s next Title Topics webinar “Lifecycle of a Data Breach: Know What You Need to Do,” as experts examine potential breach notification requirements, the potential costs to resume operations following a breach and examine the lifecycle of a breach. Attendees will leave with a plan to be prepared in case a breach happens to them.
 FTC Issues Warning About Phishing Scheme Targeting Wires for Closings
March 31, 2016
Hackers have been breaking into some consumers’ and real estate professionals’ email accounts to get information about upcoming closings.
Here’s the Cybercrime Scenario that has Many Business Owners Worried
March 23, 2016
It’s a business owner’s worst nightmare. You arrive for work, sit down at your computer and find that you can’t access any of your files because cyber criminals have encrypted them, locking them from being accessed by anyone but the hackers themselves.
5 Immediate Ways to Fight Cybercrime
March 22, 2016
CEOs are being held accountable for breaches. These techniques can help protect you.
 14 Tips to Protect Data
March 17, 2016
Data loss and identity theft occur from an increasing level of deceptive practices. Social engineering, forged email, malvertising, phishing and fraudulent acquisition of Internet domains are rising. Read on for 14 recommendations businesses can implement to protect data.
Warning: Do Not Disburse Funds from Email Confirming Wire Instructions
March 15, 2016
Title and settlement agents should always be aware of fraudulent email schemes that attempt to divert escrow funds to unauthorized accounts. Now, there’s a new wrinkle in cyberattacks hitting the title and settlement industry.
Training? What Training? Workers' Lack of Cybersecurity Awareness Puts Businesses at Risk
March 8, 2016
Human error is responsible for the worst data breaches and, because of a lack of cybersecurity awareness, organisations are risking their reputation, customer trust, and potentially their bottom lines when employees mishandle data.
Why the CFPB is About to Ramp Up Cyber Enforcement
March 4, 2016
The Consumer Financial Protection Bureau stepped into the cyber security enforcement realm on Wednesday, announcing its first enforcement action related to the adequacy of a company’s data security practices.
 Report: Email Fraud Schemes on the Rise
March 3, 2016
Total losses due to account takeover schemes more than doubled in 2015 while losses related to fraudulent email attacks increased nearly threefold, according to a report from PricewaterhouseCoopers' Financial Crimes Unit. Read on for additional fraud schemes identified in the report.
Beware of Social Media and Cybersecurity
March 1, 2016
There are no hackers, only spies, says Eric O’Neill, former FBI counterterrorism and counterintelligence operative.
Eight Proven Strategies To Deal With Cybercrime
February 10, 2016
Elite CIOs, CTOs & executives from Forbes Technology Council offer firsthand insights on tech & business.
 Cybersecurity Outlook and Tips to Protect Data
February 9, 2016
As the cybersecurity and data privacy landscapes continue to shift, the importance of companies in the title and settlement services industries to understand the threats and respond in strategic and coordinated efforts will be greater than ever in 2016. Read on as the law firm Mayer Brown highlighs five priorities companies should consider as they asses their cybersecurity and data privacy programs, while the non-profit organization Online Trust Alliance offers advice to help businesses optimize privacy and security practices to help reduce the risk of data loss.
Title Agent Snuffs Out Fraudulent Email to Obtain Funds
February 9, 2016
Maureen Pfaff, general manager and chief financial officer for Olympic Peninsula Title Co., recently received a random email requesting the company wire nearly $11,000 to a TD Bank in Florida. Pfaff said she knew immediately the email was fraudulent because the message came from her father, who wouldn’t make a request like this. Read on to learn about additional red flags and other schemes title professionals should be aware that are being used by criminals.
Hackers Stealing Closing Funds by Intercepting Lawyer-Client Email, Experts Say
February 3, 2016
Hackers are intercepting email between lawyers and clients, as well as real estate agents and their clients, in an effort to steal closing funds.
Bank of America's Unlimited Cybersecurity Budget Sums Up Spending Plans In A War Against Hackers
January 28, 2016
The U.S. federal government, big banks, and big businesses are spending big bucks in a war against hackers and cyber criminals.
Cybercrime and Threats Are Growing in 2016
January 22, 2016
It’s a new year, and we are poised again for another round of malicious, often successful cyberattacks, many of which will draw upon ever more sophisticated technology. And some of which will be surprisingly deceptive.
SEC, Finra Continue Cybersecurity Scrutiny in 2016
January 21, 2016
As 2016 begins, the U.S. Securities and Exchange Commission and Finra have again placed cybersecurity at or near the top of their areas of emphasis, which could lead to a new round of enforcement activity, say compliance experts.
How to Improve Cybersecurity? Just Eliminate the Human Factor
January 20, 2016
The computer systems that run our world—the ones that secure our financial information, protect our privacy and even keep our power grid running—all have a critical, unpatchable weakness. It’s the humans who use them.
Here’s Why Everyone Needs to Tackle Cybercrime
January 20, 2016
As we have recently heard, the dream of the connected car could actually quite soon become a nightmare; we now have proof that any skilled engineer could take control remotely of any connected "thing". This new reality changes the traditional rules of warfare -- both for defense strategists and businesses.
5 Biggest Cybersecurity Concerns Facing CIOs, CISOs in 2016
January 19, 2016
The cybersecurity software maker Raytheon, which analyzed threat data from 22,000 customers in 155 countries, says hackers will conjure attacks that target emerging technologies, such as mobile payments and top-level domains.
Cybercriminals Will Increasingly Target Mortgage Industry, Security Expert Jeff Bernstein Says
January 19, 2016
The rising tide of cyber attacks by hackers, online criminals and international terrorists was treated as an “existential threat” to mortgage companies by panelists at the Mortgage Bankers Association annual convention in San Diego this past October.
For the First Time, More Are Mobile-Banking Than Going to a Branch
January 13, 2016
Are you one of those people who think, “Why on earth does anyone go into a bank branch anymore,” as you tap your mobile banking app? If so, you’re not alone.
New Scams to Avoid in 2016
January 6, 2016
The lowdown on the latest trends in identity theft and phone fraud.
Hack to the Future: Experts Make 2016 Cybersecurity Predictions
January 4, 2016
Everything from smart fridges to connected Barbies to the Apple Watch found their way into American homes in 2015. That trend should continue in 2016 — something hackers will probably exploit, according to several experts.
In this FREE webinar, learn how to become successful remote workers & leaders in the Title & Escrow industry.