Business Email Compromise/Email Account Compromise – Part 2

(It’s a lot to say – SupercaliFRAUDulisticexpialidocious) Email can be sinister. It can encourage changes (not authorized, not legitimate), it can “warn” recipients of dire circumstances if instructions are not followed, it can be shaped and branded to look like an institution all parties are familiar with, and it can assist in fraud that involves any number of untoward outcomes …

Test My Site from Google Delivers a Better Customer Experience

Every second it takes for your pages to load, you risk losing both new and existing users. Several factors come into play when businesses build their websites and blogs, but most important among them is ensuring that your website provides the best experience possible for the user, especially on mobile devices. Visuals – color schemes, font size, text placement and overall …

Voice Search is the Future for Marketers

Hey, Alexa! Hi, Siri! Hey, Google! “Can you tell me what the temperature is going to be today?” There’s no question that voice search, which allows users to speak directly into a device in lieu of typing text into a search field to generate results, is gaining momentum. And with the increasing popularity of voice search (also known as digital assistants), …

Flagging Fraud (Part 1): Know These Indicators of Transaction Fraud

Every year the U.S. government comes out with a growing list of warnings on cyber fraud, real estate fraud, email fraud – the list goes on. Some warnings are common sense: delete suspicious-looking emails, don’t give away banking information or social security numbers, never wire anyone money without triple checking – and then checking again. We’re committed to ensuring that …

Increased Risk Means We Need to Increase Training

Threats are constantly evolving and your training and testing must also evolve to counter these threats and keep your defense robust. A cyberattack is a malicious and deliberate attempt by and individual or an organization to breach the information system of another individual or company, seeking benefit from the disruption, ransom, or theft of data. This electronic threat is increasing …

Improve Your Marketing Email Campaigns By Integrating These Tips

Marketing pros live and die by email, and with good reason: Email marketing provides the highest ROI of any marketing channel, especially when it’s done correctly. But while your ROI has the potential to be monumental, the strategies behind successful email marketing campaigns aren’t always quick or easy. To maximize your reach and covert your copy into a convincing narrative, you’ve got …

Written Cybersecurity and Response Plans: Just Do It

Despite the rising threat, recent survey results show a surprisingly small number of agents are prepared, as most do not have a written cyber security and response plan. A cyberattack is a malicious and deliberate attempt by and individual or an organization to breach the information system of another individual or company, seeking benefit from the disruption, ransom, or theft …

3 Social Media Strategies to Increase Leads, Likes and Longevity

Remember the days prior to social media? Nor do we. Just about every business – big and small – has a designated social media manager or consultant that’s responsible for tweets, content posts, audience engagement, follows, shares, comments, insight and data reports and messaging. It’s a big job that goes far beyond those “likes” and shares. To be a social …

Title Industry’s Cyber, Escrow Fraud Preparedness Needs Improvement

A national survey of title agents conducted by the American Land Title Association shows that our industry has farther to go when it comes to formalizing cyber and escrow security plans. Results of the survey also hint that the threat landscape is becoming increasingly perilous for title agents, consumers and others involved in real estate transactions. Of the survey’s more …