RISMedia's ACE
Exact matches only
Search in title
Search in content
Search in comments
Search in excerpt
Filter by Custom Post Type
{ "homeurl": "http://rismedia.com/", "resultstype": "vertical", "resultsposition": "hover", "itemscount": 4, "imagewidth": 70, "imageheight": 70, "resultitemheight": "auto", "showauthor": 0, "showdate": 0, "showdescription": 1, "charcount": 3, "noresultstext": "No results!", "didyoumeantext": "Did you mean:", "defaultImage": "http://rismedia.com/wp-content/plugins/ajax-search-pro/img/default.jpg", "highlight": 0, "highlightwholewords": 1, "openToBlank": 0, "scrollToResults": 0, "resultareaclickable": 1, "autocomplete": { "enabled": 1, "googleOnly": 1, "lang": "en", "mobile": 1 }, "triggerontype": 1, "triggeronclick": 1, "triggeronreturn": 1, "triggerOnFacetChange": 1, "trigger": { "delay": 300, "autocomplete_delay": 310 }, "overridewpdefault": 0, "override_method": "post", "redirectonclick": 0, "redirectClickTo": "results_page", "redirect_on_enter": 0, "redirectEnterTo": "results_page", "redirect_url": "?s={phrase}", "settingsimagepos": "left", "settingsVisible": 0, "hresulthidedesc": "0", "prescontainerheight": "400px", "pshowsubtitle": "0", "pshowdesc": "1", "closeOnDocClick": 1, "iifNoImage": "description", "iiRows": 2, "iiGutter": 5, "iitemsWidth": 200, "iitemsHeight": 200, "iishowOverlay": 1, "iiblurOverlay": 1, "iihideContent": 1, "loaderLocation": "auto", "analytics": 0, "analyticsString": "", "show_more": { "url": "?s={phrase}", "action": "ajax" }, "mobile": { "trigger_on_type": 1, "trigger_on_click": 1, "hide_keyboard": 0 }, "compact": { "enabled": 1, "width": "200px", "closeOnMagnifier": 1, "closeOnDocument": 0, "position": "fixed", "overlay": 0 }, "animations": { "pc": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "fadeInDown" }, "mob": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "voidanim" } }, "autop": { "state": "disabled", "phrase": "", "count": 10 } }
Share This Post Now!

Did you know it can take cyber criminals one day to decipher an eight-character password? Did you know it can take them 591 days to figure out a 10-character one?

“It is a crime for anyone to exceed their authorized access to a computer or computer network or system,” explained Martin Hellmer, a supervisory special agent for the FBI, in a recent Realty Executives webinar on wire fraud. “It can be as simple as someone gaining access to someone’s email account because they’ve learned their password, to someone hacking into your computer from the other side of the world.”

Whether by compromised data, cracked passwords or phishing, real estate is a target. More and more, homebuyers and sellers—and the practitioners who serve them—are reporting theft via wire fraud, in which criminals access emails, learn of a pending transaction, and then message phony wiring instructions to victims. The funds, generally, are irretrievable once sent.

Bogus DocuSign emails, emails with illegitimate referrals and ransomware are also on the rise. Aside from making off with money, criminals can filch personally identifiable information, or PII, through any or a combination of schemes.

“One of the reasons that makes real estate attractive [to criminals] is that there are smaller companies involved that may not have the security of Fortune 500 companies,” said Finley Maxon, senior counsel for the National Association of REALTORS® (NAR), on the webinar. “There’s a lot of different players.”

Carrying out these crimes is relatively simple, Hellmer noted. Criminals can easily find fraudster intel online, and hackers can interact with any one, accomplice or target, with a few keyboard strokes.

According to Hellmer, a lot of criminals conspire within the dark web. Many operate through Tor (a derivative of “The Onion Router,” developed by the federal government). Activity is concealed by layers of “relays”—”usually nine or 10 different relay nodes” in which traffic travels. With activity hidden, it can be problematic to trace.

Avoiding a breach comes down to education, Maxon said. Be cautious of changes to wiring instructions—it almost never occurs. Educate homebuyers and sellers on what to do should they get an email with information regarding a transfer.

“Educate and empower yourself, employees, business partners and clients,” urged Maxon. “It is very, very important that as real estate agents and brokers we’re talking to clients—not scaring them, but making them aware of what’s out there and what’s lurking.”

Basic Cyber Hygiene

  • Back up digital information and change passwords regularly.
  • Carefully determine if the email “From” field is legitimate.
  • Go beyond errors and omissions (E&O) insurance—there are holes in many policies.
  • Inspect third-party practices (apps included).
  • Keep operating systems updated.

Above all, care is key.

“People can close the door on hackers,” Maxon said. ” The No. 1 way [cyber crime] happens…is getting people to click things that they shouldn’t.”

DeVita_Suzanne_60x60Suzanne De Vita is RISMedia’s online news editor. Email her your real estate news ideas at sdevita@rismedia.com. For the latest real estate news and trends, bookmark RISMedia.com.

Facebook Comments