海角吃瓜黑料

Posts Tagged ‘email fraud’

A futuristic digital illustration featuring a metallic humanoid figure kneeling on a laptop keyboard while holding an oversized toothbrush. The figure is positioned in front of a glowing, circular portal emitting blue and white light, with digital grid patterns and neon-like circuitry in the background. The scene has a high-tech, cyber-themed aesthetic, symbolizing the concept of "cyber hygiene" and the importance of maintaining digital security habits, similar to personal hygiene practices.

Are You Practicing Good 鈥淐yber Hygiene鈥?

You know the value of practicing dental hygiene. The same is true for your cybersecurity!

Anyone who has been to the dentist knows the drill. You are in the middle of getting your cleaning, and your hygienist starts asking about your flossing habits and the toothbrush you use. This isn鈥檛 mere chit-chat but rather a way for your dentist to gauge your overall oral hygiene. Dentists know that keeping your teeth healthy requires more than an annual cleaning. It is a daily routine, involving consistent brushing, limiting your sugar intake, and replacing your toothbrush regularly.

While it may be tempting to take a 鈥渟et it and forget it鈥 approach to cybersecurity, resisting that impulse is crucial! Just like oral health requires daily maintenance, cybersecurity needs ongoing attention to prevent vulnerabilities from developing. In this blog, we’ll draw direct comparisons between the two to highlight the importance of good cyber hygiene.

MFA and Password Management = Daily Brushing and Flossing

Dentists will say that the first line of defense against dental problems is consistent, at-home brushing and flossing. Without a good routine in place, problems can quickly emerge. In the short term, this can include plaque build-up and gum inflammation. If neglect continues, tooth decay, cavities, chronic pain, and even systemic health issues can develop.

Weak password strategies and a lack of multi-factor authentication (MFA) often lead to similar outcomes for cybersecurity. Just like plaque builds up over time, the threat of phishing attacks or credential hacking increases without stringent protections. Eventually, the consequences can become severe, including stolen credentials, ransomware attacks, and operational disruptions. These issues can ultimately lead to reputational damage, economic fallout, and even legal penalties.

Just as brushing and flossing protect your teeth, using MFA and strong passwords can prevent cybersecurity issues before they arise.

Avoiding Suspicious Emails and Links = Reducing Sugary Food

Keeping your teeth pearly white also requires making smart choices, such as cutting back on sugar. When people indulge too much in sweet treats, it often leads to tooth decay and other issues like bad breath, gum disease, and even an increased risk of heart disease.

Similarly, failing to exercise caution with emails and links can expose your agency to cyber threats. A small lapse here and there may not seem like a big issue. But just as excessive sugar consumption eventually leads to cavities, frequent mistakes in identifying phishing attempts can quickly spiral into a security crisis.

The best way to prevent this is by changing the behaviors that create risk in the first place. Just like education on the dangers of sugar helps people make healthier dietary choices, cybersecurity training and vigilance can help your team operate more safely online.

Software and System Updates = Replacing Your Toothbrush

Good oral hygiene is not just about daily habits; it also depends on using the right tools. Experts routinely advise replacing your toothbrush every few months to maintain optimal dental health.

Like an old toothbrush that has lost its effectiveness, outdated security software may fail to detect emerging threats. Worse still, it can slow down your systems, hinder productivity, and even put your business at greater risk.

The lesson is clear: keeping your software up to date is just as critical for cybersecurity as keeping your toothbrush fresh is for dental health.

Good Hygiene: The Best Thing for Your Teeth and Your Tech!

Practicing cyber hygiene outside of an annual checkup is essential for the long-term health of both your technology stack and your business. Just as strong oral health depends on brushing, diet, and fresh tools, maintaining cybersecurity requires strong passwords, robust email security, and consistent software updates. Neglecting these steps can result in serious consequences鈥攚hether that be rotten teeth or IT system vulnerabilities. By taking these simple precautions, you can keep both your smile and your cybersecurity in top shape.

AI looking at colorful data with an eye of a security badge and lock.

Harnessing the Power of AI for Better Antivirus Protection

Harnessing the Power of AI for Better Antivirus Protection

Endpoint Detection and Response (EDR) is a next generation cyber security solution that provides more advanced and comprehensive protection for your devices compared with traditional, static antivirus applications that only address simple signature-based malware threats. While traditional antivirus programs detect and remove known malware, EDR is designed to detect and respond to more complex and sophisticated threats that often bypass or get through traditional antivirus protection. A good EDR solution can identify existing threats already hiding on a network, which is important as current threats are often undetected for several months. Since most malware intrusions originate at the end-user, it is critically important to have the very best antivirus protection on individual computers and laptops.

Here are some reasons to consider EDR as a preferred antivirus solution:

Smarter Detection: Traditional antivirus programs rely on pre-defined signatures to identify known threats. However, EDR takes a different approach. It uses behavioral analytics to detect suspicious activity in real-time, even if there are no known signatures. By monitoring file changes, registry modifications, and network traffic, EDR can detect and respond to the latest, advanced threats faster than traditional antivirus programs.

Complete Visibility: EDR provides security teams with a centralized management console to monitor and investigate activity across all devices in an organization. This makes it easier to deploy and manage security policies. Some vendors offer a fully managed model for businesses who cannot or do not want to deal with the administration or management of the EDR tool. With EDR, you don’t need to worry about manually updating antivirus software on individual devices. The central console ensures that the latest EDR protection is deployed, saving time and effort. In case of a security breach, EDR allows for a coordinated and rapid response to investigate and minimize the damage.

Real-time monitoring and continuous threat-hunting: EDR keeps a constant watch over servers, laptops, and mobile devices in real-time. It allows security teams to proactively identify and address threats before they can breach the system. By analyzing suspicious behavior, EDR can act before a breach occurs, reducing the risk of data loss or compromise.

Monitoring of servers, laptops, and mobile devices by EDR is critical to allow fast and effective solutions to threats before they breach, and in the event of a breach, to contain and solution the threat before there is contagion throughout the network. EDR has a proactive threat hunting feature that allows security teams to identify threats before they become an incident. Suspicious behavior is analyzed and reacted to before a breach occurs.

Forensic Capabilities: In the event of a security breach, EDR provides forensic capabilities that assist security teams to investigate and understand system events and scope of the attack. Detailed logs are available showing system events and user behavior. The logs may be used to identify the source of the attack, measure the extent of damage or intrusion, then develop a plan to prevent a future, similar attack. This is very useful to provide evidence of rapid response and the scope, extent, and timing of an event that is required with many state breach notification requirements.

Integration with other security solutions: EDR seamlessly integrates with other security solutions, enabling automated incident response workflows, event logging, and monitoring across multiple platforms. This integration enhances the overall effectiveness of your cybersecurity infrastructure.

With the rapid evolution of advanced threats and sophisticated malware, relying solely on traditional antivirus programs isn’t enough. Having a robust EDR solution provides the best available antivirus resource, deploying a tool that uses artificial intelligence to reiterate and continually evolve an endpoint defense. The combination of advanced detection, rapid response, real-time central monitoring, and enhanced forensic features provides a powerful tool to protect and secure your organization鈥檚 critical and sensitive data. Antivirus protection is a vital cyber-security shield on the frontline of defense, and it is imperative that defense is effective, today more than ever.

Interested in learning more about EDR? Notable companies that offer EDR solutions include SentinelOne, CrowdStrike, and Cisco. If you have questions about EDR and other tools and strategies to protect your networks and your business, feel free to contact me: tweyant@alliantnational.com

Male Fraudster with phone on dark background

Claims Blog: BEC/EAC – They鈥檙e (Still) Here!

The Federal Bureau of Investigation (FBI) has labeled business email compromise (BEC)/email account compromise (EAC) as 鈥渙ne of the most financially damaging online crimes鈥 as it is 鈥渢he top cyber threat.鈥 BEC/EAC is a scam in which fraudsters trick an unsuspecting party, typically by using a variety of social engineering and phishing tactics, into making payments to fraudulent accounts.  

Since 2016, over $43 billion has been lost through BEC/EAC attacks. In 2021, U.S. losses attributed to BEC/EAC cybercrimes were reported to be almost $2.4 Billion. This is more than one-third of the total cost of all cybercrimes reported to the IC3 in 2021. In a recent article from , the author noted that email cyberattacks have increased by 48% in just the first half of 2022. It is no surprise that the title insurance industry has been the target of fraud schemes for many years, especially with wire transfers being utilized more often.

Some common schemes we continue to see include:

  • Seller Spoof 鈥 fraudsters impersonate the seller (using an email address that may only be slightly different from the original, or using the actual seller鈥檚 email), and provide alternate bank account information for the seller proceeds.
  • Lender Spoof 鈥 in a transaction involving the payoff of a prior lender, fraudsters impersonate the prior lender. They often modify the original payoff provided by the prior lender (or create one) with wiring instructions for a fraudulent account.
  • Buyer Beware 鈥 fraudsters pose as the settlement or real estate agent using a similar email address, and instruct the buyer to wire their down payment funds to a fraudulent bank account.

There are many ways to protect a person or a business from becoming a victim of these costly schemes. A few tips include:

  • Meticulously examine the email address, URL, and spelling used in any correspondence. Fraudsters use only slight differences hoping you do not critically analyze the spelling.
  • Be suspicious about opening any email attachments from someone you don’t know and be wary of email attachments forwarded to you as they may include malware or other malicious software.
  • View all changes to wire instruction with extreme caution.
  • Always independently verify with the company any payments or wires being sent to a third-party by contacting them at a legitimate number, and be leery of any last-minute changes to account numbers or payment procedures.
  • Confirm with the intended recipient that the wire was received.
  • Be extremely suspicious if the requestor is pressuring you to act quickly.

If you do become a victim, do not wait to take the next steps since time is critical in this process. Have a plan in place and be prepared to:

  • Notify your office management.
  • Notify your financial institution and the recipient鈥檚 financial institution.  
  • Contact local law enforcement.
  • Contact your local FBI field office.
  • Contact your cyber-insurance, escrow security bond, and error and omissions provider.
  • File a complaint with Internet Crime Complaint Center (IC3).
  • Contact your title underwriter.

With our increased dependency on technology and the pace of our industry, we cannot let down our guard 鈥 we must stay vigilant! Heed the warning that fraudsters are not slowing down or giving up on these fraudulent schemes. If you are presented with any of these situations, the key is to be able to recognize the scam and then shut it down before it can infiltrate your transaction and create a web of issues.

You can learn more about identifying and preventing fraud by downloading 海角吃瓜黑料鈥檚 white paper 鈥 Escrow Fraud/Social Engineering: Recent Schemes and Prevention Tips.

Resources:

Escrow Fraud/Social Engineering: Recent Schemes and Prevention Tips, 海角吃瓜黑料mpany

Email cyberattacks increased 48% in first half of 2022, Security Magazine:

FBI – Business Email Compromise:

FBI 鈥 Internet Crime Complaint Center (IC3):

Head in the technology cloud

Business Network Hacks 鈭 What You Need to Know聽 聽

What does it mean to get hacked? And how might we mitigate cybercrime?

Hacking is unfortunately far from uncommon. By some counts, more than 2,200 cyberattacks occur per day, which means that one cyberattack occurs every 39 seconds.[i] These hacks carry a tremendous financial cost, with some estimates putting them as high as $6 trillion per year or $500 billion per month, $115.4 billion per week, $16.4 billion per day, $684.9 million per hour, $11.4 million per minute and $190,000 every, single, second.[ii] 

The figures are mind-boggling and scary, which is why it is more important than ever to understand what can occur when a business network is hacked. Without grasping the basics, it becomes more difficult to assess your risk and start proactively protecting your company.

What is the origin of the term 鈥渉acking鈥?

The use of the term 鈥渉acking鈥 in a computer science context began all the way back in the 1950s at MIT. In those days, hacking simply meant dealing 鈥渨ith a technical problem in a creative way.鈥[iii] It wasn鈥檛 until the late 1970s that hacking started to refer to illicit activity, a definition it retains to this day. 

These days, hacking primarily revolves around the compromising of digital devices and networks. While there is 鈥渆thical hacking,鈥 which focuses on improving security systems and keeping data safe, most is 鈥渂lack hat,鈥 which means that it is often motivated by money, such as: 

  • Wanting to sell private network information on the black market.
  • Obtaining access to sensitive information and then attempting to coerce victims into paying money.
  • Desiring to obtain confidential data and use it for financial benefit.
  • Holding data hostage until a payment is made.

How do hacks occur?

Typically, business networks are targeted through the multiple endpoints that are vulnerable to criminal activity. Just think about it. Every day, employees access business networks with numerous devices that may or may not be secure. But that鈥檚 not all businesses need to be concerned about. Similarly vulnerable areas include: 

  • Any cloud-related services 
  • Passwords 
  • Unsecured WiFi
  • Malicious websites 
  • Email accounts


Hacks come in every shape and style 

There is no 鈥渙ne way鈥 that hacking occurs, which makes it important to cover the different variations of hacking to gain a more complete understanding of the threat landscape. Here are seven distressingly common strategies that cybercriminals routinely employ: 

  • Phishing: By far, phishing is one of the most popular forms of hacking today 鈥 in part because it is so effective. To better understand the prevalence of phishing, look no further than to recent data that shows 1 in 99 emails is a phishing email.[iv] There are several different types of phishing emails, such as: 
    • Malware delivery emails, where malware is unleashed if the email recipient clicks on a malicious link.
    • There are also credential harvesting emails, where the sender will impersonate someone the recipient knows to get them to hand over sensitive information.

  • Denial of Service (DoS): DoScyberattacks occur when cybercriminals make an online property or service unavailable by inundating it with requests. This attack will frequently result in your website crashing or becoming unusable. 
  • Spyware: Spyware involves malicious code being embedded to monitor email correspondence or worse. Keying (key-logging) to obtain passwords is just one example.
  • Malware: You鈥檝e likely heard of malware before 鈥 and for good reason. Referring to any computer virus, worm, trojan horse, spyware, ransomware, adware or other malicious software, malware has been sneaking into user devices and business networks since the beginning of the computer age. 
  • Brute Force Password Decoding: In this type of hack, finesse or secrecy go out the window. The cybercriminal simply attempts to force his or her way inside your devices or network through automated tools that seek to decode your network passwords. 
  • DNS Attacks: With Domain Name Server (DNS) attacks, cybercriminals utilize an elaborate strategy where they take domain names and transform them into IP addresses, which often results in the domain name server redirecting web traffic to fake websites controlled by the criminal. 
  • Social Engineering: Social engineering cyberattacks are exceptionally difficult to guard against because they focus on manipulating human attributes like empathy, fear and urgency to gain access to personal information or a corporate network. Phishing is one example of such an attack, but there are many others that fall into this bucket. 

Are we powerless against hacking? 

With such a wide range of illicit cyber activity, it can feel almost impossible to keep up. However, there are numerous things business owners and employees can do to protect themselves and reduce the possibility of harm or financial loss. From following password best practices, to keeping your systems updated, to deploying new techniques like security awareness training (SAT), even the smallest firm can dramatically increase its security posture. The situation is not hopeless. In fact, by following expert advice and remaining vigilant, we all have the power to reduce our risk profile and stay safe online in both our personal and professional lives. 

Keep learning! Read more about 2022 cybersecurity trends, the rise of ransomware and how to streamline your password use.  

We also encourage agents to continue to explore and implement best practices to combat cyber fraud. Download 海角吃瓜黑料鈥檚 white paper 鈥 Escrow Fraud/Social Engineering: Recent Schemes and Prevention Tips to begin your own internal assessment.

[i] Clare Stouffer, Norton, 鈥115 cybersecurity statistics and trends you need to know in 2021,鈥 9 Aug. 2021, 
[ii] Ibid
[iii] ECPI University, 鈥淲hat is Hacking and Cracking in Cybersecurity?鈥, 
[iv] Michael Guta, SmallBiz Trends, 鈥1 in 99 Emails is a Phishing Attack, What Can Your Business Do?,鈥 4 May 2021, 

Manager calculating data with Financial analysis graphs during paperwork.

Why Fraud Costs Even More Than You Think

The cost of fraud to title and settlement services companies far exceeds the actual face value of a fraud incident, according to the released recently.

The 57-page report provides information on current fraud trends in the mortgage, title and settlement industries and details some of struggles companies face in addressing fraud detection, prevention and customer experience.

In terms of the cost of fraud, research indicates that for every $1 lost in an actual fraud incident, the cost to a title company is $4.19 or four times that of the face amount of the loss. The number rises to $5.34 for originators.

According to the research, the additional cost is related to the labor required for fraud detection, plus the expense of investigation, reporting and recovery following an incident.

For title companies, the biggest cost is labor, with the actual breakout of related costs as follows:

  • 35% attributed to labor costs
  • 21% for detection, investigation and recovery
  • 18% related to fines and legal fees
  • 13% covering fees during application and processing
  • 13% accounting for the face amount of the actual fraud

The actual cost is extraordinary, given that title companies reported a staggering 77% increase in fraud over the past three years. The growth in fraud is attributed in part to COVID, as a substantial portion of both mortgage and settlement services transactions moved to online and mobile-only transactions.

According to the LexisNexis report, although fraud originates largely in online and mobile-only transactions, it often the moves to the call center or phone-based point of interaction, which further adds to the risk, with the growth of remote workers handling these transactions.

For title companies working in the online and mobile transaction world, identity verification is the number one challenge.

鈥淭he challenge involves assessing digital identity attributes such as email and phone number,鈥 the report states. 鈥淭hat is contributing to challenges with identifying malicious bots and the ability to determine the source of the transaction. Synthetic identities are a key driver of identity verification challenges, particularly among organizations that do not use fraud solutions that assess digital identities and behaviors.鈥

LexisNexis noted that the mobile channel especially is contributing to the high volumes in recent years.

鈥淭his channel brings device-related risks that are unique from online browser transactions (SIM card swapping, malware, SMS phishing). This allows fraudsters to gain entry through anonymous remote transactions at the very start of the mortgage process.鈥

Title companies walk a bit of a tightrope, determined to invest in strong fraud prevention, while striving to create a positive customer experience. Customers reportedly get frustrated with the passwords, qualifying questions and multiple identifiers it takes to get through the transaction and have been known to give up and drop out of online and mobile device-related processes out of frustration.

Balancing these two necessities of doing business has been challenging, but title companies that put forth the effort can dramatically reduce their exposure to fraud.

To help our agents assess their efforts, 海角吃瓜黑料 released a white paper this year, titled Escrow Fraud/Social Engineering: Recent Schemes and Prevention Tips. The white paper provides agents with useful information, risk factors to consider, and practical action steps that will help you partner with consumers, real estate agents and lenders to defend against the fraudsters.

In addition, the LexisNexis report identifies four recommendations agents should consider, including remaining vigilant to increased fraud, increasing the use of technology, creating multi-layered solutions, and integrating cybersecurity and digital customer experience with your fraud processes.

Here are a few highlights from their list of recommendations:

  • Accelerated movement to online/mobile transactions will continue to grow; therefore, title/settlement companies should continue to buildout and enhance the digital customer experience while protecting against fraud.
  • Best practice fraud detection and prevention includes a multi-layered solutions approach, and the integration of fraud prevention with cybersecurity operations and the digital customer experience.
  • Layering in supportive capabilities such as Social Media intelligence and AI/ML further strengthens fraud prevention.

While fraud prevention in the current environment is challenging, the report concludes that 鈥渇irms which use a multi-layered solutions approach that is integrated with cybersecurity and digital customer experience operations can lower their cost and volume of successful fraud while improving identity verification and fraud detection effectiveness.鈥

We encourage agents to continue to explore and implement best practices as we all work together to combat fraud. Download our white paper 鈥 Escrow Fraud/Social Engineering: Recent Schemes and Prevention Tips 鈥 today to begin your own internal assessment.

To view the full LexisNexis study, .

Let's Connect

Discover more stories and conversations on our social media networks,
or drop us a line on our contact page.


The Independent Underwriter for
the Independent AgentSM