fbpx

You are viewing our site as a Broker, Switch Your View:

Agent | Broker     Reset Filters to Default
Why You Need to Say 'Yes' to Multifactor Authentication
Purchasing a home is typically the largest and most significant investment of our lives. It's a milestone interwoven with personal dreams, aspirations, and an immense amount of confidential information. Real estate agents, brokers, and their MLSs are more than just facilitators of a home purchase – you are stewards of trust, responsible for managing, protecting, and maintaining the confidentiality, integrity, and security of sensitive information on behalf of buyers and sellers. Trust remains the core reason most people select a real estate agent. According to research from the National Association of Realtors, 97 percent of consumers said honesty and integrity were the most important traits for a real estate agent. Agents, brokers, and MLSs must ensure that their clients' personal details, financial records, and other sensitive data are kept secure and confidential. When clients choose to work with you, they entrust you with the most personal and confidential information they will ever share in a purchase transaction. In our digital era, where anyone can access data from anywhere at any time, you must actively protect personal information. Real estate in the crosshairs Security company Astra reports an average of 2,200 cyberattacks per day in the U.S. across all industries, and real estate is fast becoming a preferred target. According to leading cyber security firm Octiv, bad actors were responsible for 75 real estate industry breaches last year, including well-publicized ransomware incidents that delayed some property closings for weeks, costing the industry more than $50 million. The experts at Octiv recently warned at a CoreLogic conference of MLS executives that real estate is becoming a bigger target for hackers than ever. The problem with passwords Security experts say the challenge for real estate is that the passwords we use to protect access to our systems and the personal information of clients on those systems are not enough. Research by NordPass documents the widespread use of poor passwords in every industry, not just real estate. However, real estate is particularly vulnerable because of the size of these transactions, the wiring of large amounts of funds, and the disclosure of buyers' and sellers' deep financial and personal details. Multifactor authentication offers a solution Despite efforts to strengthen password use, NordPass research shows that these efforts are a massive failure overall in the U.S. The growing solution to our password problems is multifactor authentication. Multifactor authentication (MFA) requires users to provide two or more forms of identification to access an account. These factors can include something you know (like a password), something you have (like a smartphone), or something you are (like a fingerprint or biometric scan). MFA ensures that even if one of your credentials is compromised, unauthorized access to your account is still blocked. By requesting multiple forms of identification, MFA makes it significantly harder for hackers to gain unauthorized access to your accounts. Requiring more than one form of identification provides vastly more robust security protection than using even a complex password. How MFA works Think of MFA as adding a deadbolt lock to your door – even if someone has the key (your password), they still can't get in without the second one, and that additional form of authentication is your added protection. Common steps to an MFA process: Step 1 – You enter your email address or mobile number. Step 2 – You are sent a one-time link to access your account. Step 3 – After you click on the link, you are prompted to enter a one-time numerical code (with a short expiration) sent via your account registered email or mobile number. Step 4 – You enter the code provided and get access to your account. Another MFA approach begins with prompting you for your username and password. Once verified, you are taken to a page requiring you to enter a one-time code, either to your registered email or mobile number associated with your account. The code has a short expiration, so you must enter that code quickly to obtain access to the account. A little pain for a lot of gain While MFAs are quickly becoming standardized in real estate, this has not been without resistance. MLSs and brokerages don't like the idea of "forcing" their users to change. Change is hard, especially when the behavior you are trying to change is among independent private contractors. Overall, many agents don't like the idea that they might have to take extra steps to log in and would rather use a password. Again, the problem tech companies face is that password strength is abysmal overall. In fact, the Nordpass study found that "123456" and "password" are still among the most commonly used passwords in America. Our weak password culture is a ticking time bomb, waiting to be exploited by hackers. Multifactor authentication creates a layer of security that solves the password problem by requiring additional forms of identification, making it exponentially harder for unauthorized users to gain access. MFA is your digital bodyguard Yes, multifactor authentication may occasionally require a little more work to access your accounts, but its extra protection is more than worth it. Consider the potential consequences of a security breach: lost client trust, financial losses, and damage to your professional reputation. Verifying your identity takes only a few extra seconds. Think of it as an investment in the long-term security of your business. Imagine this scenario: A hacker gains access to your email account and starts sending fraudulent messages to your clients, requesting sensitive information or funds. The damage to your reputation and client relationships could be irreparable. Now, consider the same scenario with MFA enabled. Even if the hacker obtains your password, they won't be able to access your account without the second form of authentication, effectively stopping the attack in its tracks. The minor inconvenience of an extra login step – or two – pales in comparison to the potential consequences of a breach. Artificial intelligence is improving MFA One valuable and practical benefit of artificial intelligence is that it is making the MFA process less frequent. Known as "adaptive authentication," it uses built-in AI and machine learning to selectively decide and deploy MFA only when it determines it is required. CoreLogic recently rolled out adaptive authentication as part of its Clareity security offering to deter unauthorized users, bots, and deceptive login attempts in real time. By learning your behavior patterns, it can instantly spot potentially nefarious activity. For example, if you normally log in from Miami but MFA sees you are attempting to log in from Moscow, it will deploy MFA. Otherwise, when it recognizes you accessing your Single Sign-On dashboard from the same place, you will be able to sign in without additional authentication. Better to be safe than sorry Cyber threats are becoming increasingly sophisticated in the real estate industry. Embracing multifactor authentication is no longer a choice but a necessity. Keep in mind that whenever you struggle to use any new technology, Tech Helpline analysts can help. This service is available to over 750,000 Realtors in North America as a member benefit from their MLS or association. Saying "yes" when asked to opt into MFA helps uphold the trust your clients place in you, safeguarding the very foundation of your business – and our industry. Related reads From the Tech Helpline Blog: 4 Ways to Improve Your Cybersecurity 6 Reasons Not To Use Similar Passwords And The Best Alternatives Is Your Computer Protected from All The Newest Cyber Threats? A Quick Checklist Tricia Stamper is Director of Technology at Florida Realtors®, which owns both Tech Helpline and Form Simplicity.
MORE >
[Podcast] Navigating Realtor Safety: Insights with Shannon Cutler
In this episode of Million Dollar Question, host Billy Ekofo chats with Shannon Cutler, an expert deeply committed to Realtor safety. With seasoned experience and hands-on knowledge, Shannon enlightens us about the importance of ensuring safety in the real estate profession. She delves into practical strategies and simple tips for prioritizing while navigating the intricate realm of real estate dealings. In this episode of Million Dollar Question: What prompted Shannon's transition from police officer to Realtor Property market dynamics on Vancouver Island Tactics for safe real estate practices Misconceptions around safety in the real estate industry Potential pitfalls of hurrying through deals and how to avoid them Connect with Shannon: LinkedIn: Shannon Cutler Website: shannoncutler.com Instagram: @islandshannoncutler Listen to this podcast on: Spotify Apple Podcasts RadioPublic Visit the episode homepage for show notes and more detail.
MORE >
Third-Party Cookies Do Crumble With Google Chrome's Privacy Shift
MORE >
The Future Is Secure: Understanding the Importance of Security by Design
In today's digital age, cybersecurity has finally become a top priority for organizations across all industries — especially in real estate after last year's events. Cyber threats are becoming more sophisticated by the day, and data breaches can have devastating effects on businesses. Despite this, many organizations still take a reactive approach to cybersecurity, only implementing security measures after a breach. However, there is a better way to approach cybersecurity – one that offers greater protection against attacks and reduces the risk of data breaches. This approach is known as Security by Design. A friend of mine who is a chief information security officer for a real estate brokerage was discussing last year's incident and his achievement of SOC-2 compliance. During our conversation, he mentioned how implementing Security by Design was crucial to achieving SOC-2 compliance. We discussed how Security by Design involves incorporating security measures at every part of an organization rather than adding them as an afterthought. He said implementing Security by Design enables organizations to recognize and mitigate potential security risks early on, therefore ensuring compliance with industry standards and SOC-2. That raised another question for me. What is Security by Design? I learned that Security by Design is a proactive approach to cybersecurity that involves integrating security measures into an organization's operations and culture from the ground up. Instead of treating security as an afterthought, Security by Design requires security to be an integral part of an organization's design and development processes. This helps to create a more secure foundation for an organization's digital infrastructure, making it less vulnerable to cyber threats. It's a practice I have been taking for a long time within my own environments. How does Security by Design work? Security by Design involves a range of practices and techniques that help to embed security into an organization's culture. These include things like adopting a risk management approach to security: By integrating security into the software development life cycle Providing regular security training and education to employees Regularly updating and patching systems to address vulnerabilities. By making security a part of an organization's DNA, it becomes much more difficult for cybercriminals to exploit weaknesses in an organization's security measures. Why is Security by Design important? The importance of Security by Design cannot be overstated. Cyber threats are growing in sophistication, and the consequences of a data breach can have a devastating impact on businesses and their customers. The financial cost of a data breach can be significant, and damage to an organization's reputation can is more difficult to recover from. By adopting a Security by Design approach, organizations can significantly reduce the risk of cyber-attacks and mitigate the impact of data breaches if they do occur. How do I Benefit from Security by Design? Adopting a Security by Design approach offers a range of benefits for your organization. It helps to create a more secure floor for an organization's digital infrastructure, reducing the risk of data breaches and cyber-attacks. It can also help to reduce the cost of cybersecurity by preventing breaches before they occur and minimizing the impact of breaches that do occur — it is not a question of if a breach occurs, it is when. In addition, it can improve an organization's brand reputation, product, or services. It is a demonstration of your commitment to security and data protection. How to Implement Security by Design? Implementing Security by Design takes a lot of work to implement and maintain. The whole approach requires a fundamental shift in how organizations approach cybersecurity. There are a range of best practices and techniques that organizations can adopt to embed security into their operations and culture. These include things like: Conducting regular security audits Adopting a risk management approach to security Integrating security into the software development life cycle Providing regular security training and education to employees Regularly updating and patching systems to address vulnerabilities. By implementing these best practices in a strategic and coherent way, organizations can make Security by Design an integral part of their culture. Be Proactive! In today's digital age, cybersecurity should be a top priority for all organizations. According to Verizon's 2023 Data Breach Investigative Report, over 74% of data breaches are cause by human actions. These are either through social engineering or phishing scams that continue to innovate on fooling their victims for access to an organizations data vault. A reactive approach to cybersecurity is no longer enough. Adopting a proactive Security by Design approach is essential to mitigate the risks associated with cyber threats. Leverage an IT Services or Managed Service Providers organization that offers cybersecurity services. They can at least assist in monitoring your digital environment. If you need assistance evaluating any services or having a conversation about Security by Design, call me, David Gumpper. Embedding security into an organization's culture and operations from the ground up creates a more secure foundation for its digital infrastructure and significantly reduces the risk of data breaches and cyber-attacks. Implementing Security by Design requires a fundamental shift in how organizations approach cybersecurity, but the benefits are clear – greater protection against cyber threats, reduced risk of data breaches, and a more secure future for businesses and their customers. To view the original article, visit the WAV Group blog.
MORE >
The Truth About Sexual Harassment in Real Estate Brokerages
MORE >
Start with Training and Education to Defend Yourself and Your Organization from Phishing Scams
It was a Sunday morning, and I was taking a break from doing chores around the house. The house phone rings and my mom (a Baby Boomer) picks it up. I can only hear this side of the conversation, but quickly I gathered that it was "DirecTV" on the phone. The call went on for a fairly long time. Finally, when my mom hung up the phone, I asked her who it was. She told me it was DirecTV and they claimed to need to replace some of the equipment for our satellite to provide us with a better signal. The equipment normally costs $1,000, but it would only cost us $300, and after six months, we would get the money back. But something did not feel right. My mom called DirecTV from their number posted online, and guess what? DirecTV did not call her. It was someone trying to scam her out of $300. The scary part? It was really convincing. However, she knew to second guess the caller before providing her information. Why? Because it is something we have talked about as a family. The FTC reported that Americans lost billions of dollars in 2021 from scams. Americans are not the only ones losing billions of dollars because of scams. So are businesses. The exact dollar figures are not important. What is important is what you should be doing to protect your MLS, brokerage, or association. You must start with the first layer of defense against scams: educating your people. Start with educating yourself and your staff I'm not saying it is that simple, but the reason phishing scams work so well is that they are designed to target even the brightest people. Some scams are more obvious than others. Here is a phishing scam that someone tried recently targeting WAV Group's Facebook page and its followers: This one seems fairly obvious that it is a scam. But they wouldn't be doing it if it didn't work at least some of the time. You must stay diligent even when your team says, "Yeah, yeah, I know." Our data and technology experts at WAV Group have helped many clients over the years examine their technology stacks and consult with their staff to keep the scammers out. If you would like an expert to examine the vulnerabilities of your digital platforms or get help educating your team on the dangers lurking in their inbox, cell phone, text messages and social media, WAV Group is here to help. David Gumpper, our digital security expert, will be happy to help protect your team and your company from disaster. Click here and we will be happy to schedule a time to talk to you. To view the original article, visit the WAV Group blog.
MORE >
CFPB Issues Guidance to Protect Mortgage Borrowers from Pay-to-Play Digital Comparison-Shopping Platforms
MORE >
[Free Download] Data Security and Privacy Toolkit for Your Business
We all know how important it is to protect our personal data, but do you have a plan in place to protect your client's confidential, personal information? As a fiduciary, you have a responsibility to protect your client's information, such as social security number, bank account information, credit card information, driver's license, and even tax return information. Think of the damage that can occur if your client's information falls into the wrong hands. Therefore, it is important that you and your brokerage have a data security and privacy plan in place. Each state has its own definition of "personal information," so be sure to do your due diligence and check with your state's laws. The National Association of REALTORS® has created a Data Security and Privacy Toolkit that provides you with tips and tools to help you and your business safeguard personal data, information on state laws, and even sample policies. Be proactive instead of reactive—create your own data security and privacy plan for your business! Download the Data Security and Privacy Toolkit To view the original article, visit the SentriLock blog.
MORE >
Digital Dangers: 4 Ways Your Agents Can Keep Their Clients' Data Safe
MORE >
How You Can Protect Your Business with an Effective Cybersecurity Strategy
Even though the influence of a growing number of remote employees on real estate markets has been widely discussed, there is little information available about the impact that remote workers have on real estate firms themselves, although this impact has been significant. Like with other sectors, most of the influence has been good. However, there have also been some negative consequences. It is known as cybercrime, and if you are not vigilant, it will find its way into your real estate business. Cybercrime may be highly damaging to real estate agents and their clients. In recent years, real estate investment trusts (REIT), brokerages, and other real estate businesses have experienced increased cyber attacks, ranging from phishing to email-compromised cyberattacks to data breaches. While cyberattacks are becoming more advanced, you can still apply measures to safeguard your real estate business, and the process begins with developing a comprehensive cybersecurity strategy. Taking the threats that cybersecurity poses to the real estate sector, it is clear that a solid investment in cybersecurity is the only way to ensure data protection and consumer safety. Read on to get information about a basic cybersecurity strategy you can use for your real estate business. Why Do Real Estate Practitioners Need Cybersecurity? Real Estate Transactions Routinely Involve Large Sums of Money Since the real estate sector frequently deals with and transfers enormous amounts of money, real estate companies are on the radar of every cybercriminal. Thus, it is not just real estate experts and investors that profit from the real estate market. Cybercriminals can also profit from the real estate market. It has been estimated that one-third of small businesses, including real estate companies, have been a cyberattack target in the past two years, according to CNBC. Personally Identifiable and Financially Sensitive Data Real estate companies also make attractive targets for hackers due to the large volumes of financially sensitive and personally identifiable data they manage, such as social security numbers and bank credentials. Cybercriminals and Hackers Use Advanced Tools and Techniques To launch their attacks, cybercriminals and hackers have access to all of the tools, skills, and tactics they have. Business email compromises (BECs), for example, are one of the most common attack methods used today. A business email compromise occurs when an attacker impersonates a firm to persuade another business to move cash to a fake account. It is common for the hacker to send the email using a fictitious account that appears to be associated with a legit company. Compromised landing pages, ransomware, malicious attachments, trojans, and attacks on cloud-based services are all significant threats to real estate firms. Cybersecurity Tips: 5 Ways for Real Estate Agents to Avoid Getting Hacked Mobile Data Encryption More people are using smartphones and laptops today than ever before. Cybersecurity solutions can prevent hackers from gaining access to your communication networks. Data encryption software is an effective solution when it comes to protecting your data from hackers. It makes your data secure and protects sensitive data. Effective Email and Password Hygiene Resisting assaults and keeping organizations secure are very easy yet have strong effects. Here are a few tips from the National Association of Realtors (NAR) to prevent being hacked. Use two-factor authentication. Avoid using public or unsecured WIFI. Use a different password for multiple accounts. It is recommended that you use a password manager. Long passwords with combinations of letters, numbers, and symbols should be used. Never open files received from unknown sources. These may contain malware. Secure access to email and confidential information used in transactions. To communicate sensitive information, use a transaction management platform, encrypted email, or file-sharing software. Clean your email account regularly and save copies of essential correspondence in a safe place for future reference. Make Use of Reliable Antivirus Protection A built-in antivirus protection system is included in most PCs. Because it takes a short time for updates to be applied, some consumers may ignore the process of upgrading their antivirus system. However, when it comes to cybersecurity, the most common solutions are antivirus software and protection. A paid antivirus system guards your system against cybercriminals and hackers more effectively. The paid versions involve the updating of antivirus software on a regular or basis. Every operating system is vulnerable to attack from hackers. So do not ignore the antivirus updating your software. Always Check URLs Usually, real estate professionals will submit all of their legal paperwork over the internet rather than in person. The submission of information over the internet is only a small portion of the rapid processing method. However, before uploading the papers, double-check that the URL is authentic. If you come across a website that begins with simply HTTP, avoid visiting that website. If the final "S" is not there, then the website is highly unsafe. Antivirus software prevents these websites from opening or displaying high-risk websites. Insurance Considerations, Law, and Policy Working with your attorney, establish a written disclosure alerting clients of the risk of cybercrime. The NAR has prepared a wire fraud email notice template that your counsel may use and customize. Keep track of the state legislation linked to personal information, creating and maintaining data security policies, and other security-related company practices. Final Words In recent years, cybersecurity has become a major headache, and real estate pros are increasingly confronted with cybersecurity-related challenges in their businesses. Like you would encourage clients not to relocate to unsafe districts, you must follow the same advice regarding your own business and ensure that your business operates in a secure digital area. A smart strategy that complies with the cybersecurity procedures outlined above is one of the most beneficial real estate investments you can make today. To view the original article, visit the Realtyna blog.
MORE >
Is Your Computer Dangerously Out-of-Date?
MORE >
New Web Browser Security Measures Coming in January 2021
Browser security is a big part of the next release of Chrome. It will have a major impact on websites that contains mixed content downloads, i.e., content that is downloaded from secured and unsecured sites. There are a significant number of websites that have the current warning that they are "Not Secure" even with HTTPS. Watch the video above to learn more.
MORE >
Real Estate Fraud Prevention Coalition Recognizes National Cybersecurity Awareness Month
MORE >
Realtor Safety Is Serious Business All Year
September Is National REALTOR Safety Month Imagine the excitement and anticipation of getting a new client. You decide to meet at the perfect home. You get out of the car, lead the new client inside and before you can ask their opinion of it, you are brutally attacked. Unfortunately, many agents have experienced attacks such as this; some have lost their lives to criminals posing as potential clients. Moreover, far too many attacks go unspoken and unpunished.
MORE >
Security and Business Continuity: Learnings from the Pandemic
MORE >
Keep Your Agents Safe: 45 Videos on Smarter, Safer Selling
Over the past year, we've been running two video series on Realtor safety from Real Safe Agent. We encourage our brokerage and MLS/association readers to share these videos freely with your agents. Safety, after all, is a community effort! To that end, we've compiled links to all 45 videos for easy access and sharing. The first series, "Safe Selling," is a 28-part course that focuses on how predators think and how agents can use this knowledge to prevent tragedy before it even happens. Covering everything from body language, to marketing messaging, to social media, client communications, and beyond, Safe Selling is a crash course in real estate criminal psychology. The second series, "Real Answers," offers practical tips on safely showing vacant homes, talking down angry office visitors, detecting thieves posing as buyers, and more. Both series are produced by Real Safe Agent. You can learn more about Real Safe Agent in our Company Directory, or by watching the two videos below: Safe Selling Safe Selling: Predators vs. Thieves Safe Selling: Understanding How a Predator Thinks Safe Selling: The Timeline of a Crime Safe Selling: How to Recognize a Common Scam that Thieves Play Safe Selling: Buyer or a Thief? How to Tell Safe Selling: How Predators Use Agent Photos to Select Their Next Victim Safe Selling: How to Avoid Marketing Language That Attracts Predators Safe Selling: Why Agents Should Avoid Getting Personal in Their Marketing Safe Selling: 5 Tips for Staying Safe on Social Media Safe Selling: How to Spot Dangerous Red Flags Over the Phone Safe Selling: Why Copying that Driver's License Won't Keep You Safe Safe Selling: A Script (and a Trick) for Screening Prospects Safe Selling: New Listing? Here's Why Agents Should Meet the Neighbors Safe Selling: How Agents Can Use Appointment Times to Establish Control Safe Selling: The 3 Steps Agents Should Take to Prepare a Home for a Showing Safe Selling: 4 Times Real Estate Agents Should ALWAYS Have a Showing Buddy Safe Selling: How to Maximize Your Visibility During a Showing Safe Selling: How Taking the Literal High Ground Can Protect Your Agents Safe Selling: The 'No Influence' Sales Strategy that Deters Predators Safe Selling: How to Keep a Safe Distance from Prospects at a Showing Safe Selling: Why Bedrooms Are a Danger Zone During Showings Safe Selling: Dealing with the Dangers of Master Suites Safe Selling: Opening a Lockbox and Door Safe Selling: Easy Tricks for Navigating Stairs Safe Selling: Stay Out of Outbuildings! Safe Selling: Showing Prep Tips for When You Can't Arrive Early Safe Selling: Reading the Predator, Part 1 Safe Selling: Reading the Predator, Part 2 Real Answers How to Show a Vacant Property Safely, Part 1 Dealing with Squatters: Avoiding Confrontation During a Showing Dealing with Squatters: How to Calm an Agitated Person Dealing with Squatters: How to Ask Them to Leave Office Safety: Dealing with Angry Visitors Office Safety: Dealing with Angry Visitors, Part 2 Office Safety: Dealing with Angry Visitors, Part 3 Office Safety: Dealing with Angry Visitors, Part 4 Detecting Thieves Posing as Buyers, Part 1 Detecting Thieves Posing as Buyers, Part 2 Detecting Thieves Posing as Buyers, Part 3 Realtor Safety: Opening a Lockbox and Door Realtor Safety: Navigating Stairs without Making Yourself Vulnerable to Attack Who's Attacking Real Estate Agents? Realtor Safety: Preparing a Home for a Showing Showing Safety: Where to Stand During a Home Tour Showing Safety: Where to Stand During a Home Tour, Part 2
MORE >
Office Safety: Dealing with Angry Visitors, Part 4
MORE >
Office Safety: Dealing with Angry Visitors, Part 3
So now you know the first two steps (see parts one and two) in dealing with an agitated person who visits your real estate office. You're aware of how to identify an angry person from a distance, and the non-verbal tricks that can help you de-escalate the situation. Now, let's talk about verbal strategy. What do you say to an upset individual to defray a tense situation? Watch this week's episode of "Real Answers" to find out. In the video above, you'll learn: Why validation is key to calming an agitated visitor Sample scripts for validating their feelings Why you need the person to be calm and rational, and how to get them there Next week: Learn the next steps for defusing the situation with your upset office visitor.
MORE >
How to Strengthen Security in the Virtual Workplace, Part 2
MORE >
Office Safety: Dealing with Angry Visitors, Part 2
When an agitated visitor comes into your office, it's better to be proactive than reactive. If you can identify an angry person as they approach, you can prepare yourself to de-escalate the situation--and keep you and those in your office safe. How can you do that? In this week's episode of "Real Answers," we'll show you exactly what to look for. Watch the video above to learn: The physical signs of an agitated person Why you need to lead the de-escalation process, not the visitor The body language to display to better calm a person--and the physical stances to NEVER take in a tense situation Want to learn more? Check out part one of this series, where we showed you what NOT to do when an angry person visits your brokerage, association, or MLS office. Next week: The verbal strategy to use to defray a tense situation.
MORE >
How to Strengthen Security in the Virtual Workplace, Part 1
MORE >
Office Safety: Dealing with Angry Visitors
For weeks, we've been sharing strategies that agents can use when faced with an agitated squatter. But what happens when the agitated person is a member of the public--and they're in your office? In this week's episode of Real Answers, brokerages, MLSs and associations will learn what NOT to do when an upset individual enters their office and makes a scene or starts a confrontation. This episode is the first in a series of four that looks at how to handle this potentially dangerous scenario. Next week: Learn what TO DO when confronted by an angry person in your office!
MORE >
Dealing with Squatters: How to Ask Them to Leave
MORE >
Dealing with Squatters: How to Calm an Agitated Person
So the home you're showing has a squatter, and the squatter not only won't leave the property, but the situation seems to be headed toward a confrontation. What can you do de-escalate the situation? Watch this week's episode of "Real Answers" to find out: The body language to use to show squatters that you're not a threat Why you should validate the squatters feelings, even if you don't agree with them A sample script to use to talk down an agitated squatter Once you've calmed the squatter and de-escalated the situation, it's time to take the next step. What's that? Find out in next week's episode of Real Answers! Next week: How to safely ask a squatter to leave a property.
MORE >
Dealing with Squatters: Avoiding Confrontation During a Showing
MORE >
How to Show a Vacant Property Safely, Part 1
Vacant properties, while convenient to show, present a host of safety issues for real estate agents. First among those concerns, according to Real Safe Agent CEO Lee Goldstein, is the potential presence of squatters. In this week's episode of "Real Answers," a video series on real estate safety issues, Goldstein shows us how to deal with vacant homes in general and squatters in particular. Watch the video above to learn: What to do before you enter a vacant listing Why it's important to take accompaniment when previewing or showing vacant properties And more! Next week: Be sure to tune in again as we cover Part 2 of how to show vacant listings!
MORE >
Dealing with Malware
MORE >
Safe Selling: Easy Tricks for Navigating Stairs
We're going to bust another showing safety myth today: Despite what you may have been told, agents should NEVER let a prospect go all the way up a flight of stairs before they do. Why? Because the agent will lose sight of them, and then a predator posing as a prospect can hide around a corner in preparation for attack. So what's a better alternative? Find out in this week's Safe Selling video. Watch the clip above to learn: The ideal distance an agent should keep between theselves and a prospect when climbing stairs One trick to keep prospects in sight even when they turn a corner Why the handrail is an agent's best tool for self-protection The move agents need to make to evade an attack from above Next week: Why it's absolutely critical for agents to stay out of outbuildings during showings.
MORE >
Consumers' Corner: How the CCPA Affects Real Estate
MORE >
Safe Selling: How Taking the Literal High Ground Can Protect Your Agents
There are several subtle tricks that real estate agents can use to psychologically "turn off" a predator who's posing as a prospect. We've talked about about a few of them over the last few months--everything from maintaining control of the showing time to a phone technique that agents can use to screen prospects. This week, we're sharing a simple secret that can demonstrate to predators that this agent is not one to mess with. That secret? Taking the high ground... literally. Watch the video above to learn: How standing slightly above a prospect unconsciously signals the agent's dominance How agents can find slightly elevated surfaces to stand on when greeting prospects at a listing or public place Why this simple act works as a "buzzkill" to potentially dangerous prospects Why legitimate prospects won't be affected by this technique--so agents don't have to worry about alienating them Next week: The sales technique that turns off predators, but makes real prospects feel like a million bucks!
MORE >
Safe Selling: The 'No Influence' Sales Strategy that Deters Predators
MORE >
Safe Selling: 4 Times Real Estate Agents Should ALWAYS Have a Showing Buddy
Brokers, how often have you advised your agents to "Just take someone with you" on a showing to stay safe? While the buddy system is an effective way to stay safe, it's not always practical. Other agents aren't always available, and the last-minute nature of some showings makes recruiting a colleague challenging. So even though agents with solid safety skills can usually go to showings without accompaniment, there are still times when your agents should ALWAYS pair up with a colleague. Watch the video above to learn the four scenarios where a showing buddy is CRITICAL for safety—and make sure your agents are aware of these situations. In this video, you'll also learn: How the buddy system tips the "flight or fight" balance in the agent's favor The unexpected reason why cell phone coverage matters to agent safety Why "Uncomfortable saves your life, but scared gets you dead"
MORE >
Safe Selling: The 3 Steps Agents Should Take to Prepare a Home for a Showing
MORE >
Safe Selling: How Agents Can Use Appointment Times to Establish Control
"Always take power and control wherever you can." That's the advice from agent safety expert Lee Goldstein. In this week's "Safe Selling" video, Lee shares another way that agents can turn off potential predators--by taking control of what time they meet a prospect for a showing. It's a simple tactic. Rather than simply agreeing to meet a new prospect at the time they suggest, Lee recommends that agents tell the prospect they'd prefer to meet them at an alternative time. Because predators look for weakness and subservience in victims, this minor pushback may signal that the agent isn't an easy target, and that the agent is the one in control. Watch the video above to learn: Why this tactic turns off predators, but leaves real clients unphased Why agents should never apologize or ask if the alternate time is "okay" with a prospect Next week: The three safety-minded things agents should do to prepare a home for a showing.
MORE >
Safe Selling: New Listing? Here's Why Agents Should Meet the Neighbors
MORE >
Safe Selling: A Script (and a Trick) for Screening Prospects
We've talking a lot about red flags lately--specifically how to spot them in new prospects. This week, learn a quick trick that agents can use over the phone to uncover hints that a prospect might be dangerous. The trick is called 'The Training Play' and it can help agents gauge a prospect's hidden motives. Watch the video above to: Hear a sample script for using the Training Play on the phone Find out which vocal cues to be alert for How agents can decide if they should take another agent with them to a showing Next week: See why it's so important to learn about the neighborhood—and to share your findings in the Showing Notes.
MORE >
Safe Selling: Why Copying that Driver's License Won't Keep You Safe
MORE >
Safe Selling: How to Spot Dangerous Red Flags Over the Phone
As a broker, have your agents ever commented that they felt 'funny' when talking to a new prospect? Don't brush off their concerns--that may be their intuition warning them that a prospect is not who they seem to be. Instead, share this video on 'active listening' and the red flags that can warn agents that something is off with a prospect—before they ever meet them in person. Watch this week's 'Safe Selling' video to learn: What active listening is, and how to use it with prospects How to tell a legitimate buyer from a suspicious prospect The 'onion peeling process' of drilling down into what a prospect says and looking for inconsistencies Why inconsistencies in what a prospect tells you are a red flag And, bonus, while active listening can help you weed out shady prospects, it can also help you gain a deeper understanding of what real buyers need! Stay tuned until next week when we'll explore why meeting a new prospect in your office and copying their license is a safety myth.    
MORE >
Safe Selling: 5 Tips for Staying Safe on Social Media
MORE >
Future of Online Identity Verification
Due to rapidly developing technology and a growing threat from identity fraud, the online verification process needs to keep evolving. Most individuals are already used to security measures like entering a PIN number or signing on the (virtual) dotted line to complete a transaction. But for high-value agreements, businesses often need to verify the identity of the person doing the electronic signing or data entry. This not only makes the process more secure, but it also helps companies meet compliance and regulatory requirements.
MORE >
Safe Selling: Why Agents Should Avoid Getting Personal in Their Marketing
MORE >
Who Is Covered by CCPA and What Does It Require?
The California Consumer Privacy Act, often thought of as "California's GDPR," is prompting companies across the US to do far more than update their privacy policies. Starting January 1, 2020, new requirements will affect thousands of businesses that leverage a wide range of personal data connected to the nearly 40 million California residents, their households, and devices. While there's no singular roadmap to being "CCPA compliant" (and ongoing amendments to the CCPA text make that a moving target), there is no shortage of strategies to prepare for this new data privacy law.
MORE >
Safe Selling: How to Avoid Marketing Language That Attracts Predators
MORE >
Safe Selling: How Predators Use Agent Photos to Select Their Next Victim
Brokers, could your agents' headshots be putting them in danger? That's the issue we explore in this week's Safe Selling episode. While the internet has made it easier for consumers to find a Realtor to work with, it's also made it easier for predators to choose their next victim. But what about a headshot makes a predator more likely to target one agent over another? Turns out, it's all about power. As we know, predators target those they perceive as weak or subservient, and avoid those who come off as strong or self-assured. In this video, we explore how agents can project power in their real estate headshots and deter predators from the get-go. Watch the clip above to learn: The body language and expressions that intimidate predators The posture and facial expressions that attract predators The two types of agent headshots: professional vs. intimate Why professional photos actually earn agents more business Stay tuned for next week's episode, where we'll learn how to deter predators with strong, not subservient language.  
MORE >
Safe Selling: Buyer or a Thief? How to Tell
MORE >
Safe Selling: How to Recognize a Common Scam that Thieves Play
Predators aren't the only danger that Realtors in the field have to worry about. Sometimes, they have to worry about individuals that are a threat to the home and personal property of their sellers. That's right, we're talking about thieves. In this week's episode of Safe Selling, learn the behaviors that thieves display and how to identify them. Today's episode is focused on a scam called "The Couple's Play," where two thieves pose as husband and wife and separate during the tour while one a) distracts the Realtor while b) the other half of the couple cases or steals from the home. Brokers, share the video above with your agents so they can understand: What the role of each person in the suspicious couple is How to identify a prospect who's deliberately distracting you How a woman playing the role of distractor talks differently to male and female agents Stay tuned for next week when we'll learn more about dealing with thieves during a showing!  
MORE >
Safe Selling: The Timeline of a Crime
MORE >
Preventing Real Estate Ransomware
The real estate industry is increasingly aware of the dangers of ransomware, which have been raised due to some recent high-profile incidents. Ransomware is malware (malicious software) that encrypts the files on your network or otherwise blocks access to them. It's called ransomware because you may be prompted to pay a ransom to regain access to the files. Most security professionals advise clients to not pay the ransom because often the hacker will not unencrypt or allow access to the files as a result. The purpose of this article is to suggest some best practices for avoiding ransomware, limiting its impact, and recovering from it. No suggested best practices can prevent all incidents of ransomware – there will always be a new attack that can bypass certain types of defenses. However, there are some reasonable steps you can take to reduce the ransomware risk for your organization.
MORE >
Hefty Security Breach Fines by the U.K. Under GDPR Regulation
MORE >
The Day I Learned of a Chilling Plot to Digitally Censor My Voice
This story is unusual and somewhat disturbing. Some of you may have seen a quick glimpse of my Amazon Echo 5 article a few weeks ago. A day after it was published, there was an incident causing me to redirect the page web address (URL) to the blog page of WAVGroup.com. It was a sunny, hot, and humid morning, the windows in my office fogged with condensation. I was beaming with pride because I published an article the night before that was fun to write. The premise of my article was to explore how technology was on a path to deliver content as a multimodal experience and its relevance to NAR MLS policy.
MORE >
Fail First Approach to Cybersecurity Is Costly
MORE >
Office Safety: Dealing with Angry Visitors, Part 4
Over the past month, we've been showing you what to do when an agitated person visits your brokerage, MLS, or association office. Today, our series wraps up with the final steps you need to take to deescalate a tense situation. Watch the video above to learn: How to guide an agitated person to a resolution by offering them options Why it's important to stress the consequences of each option Why respect and validation are crucial—and why ultimatums never work Sample scripts for offering options and validating their choice Need to catch up on this rest of this series? Check out parts one, two, and three here.  
MORE >
Office Safety: Dealing with Angry Visitors, Part 3
MORE >
Office Safety: Dealing with Angry Visitors, Part 2
When an agitated visitor comes into your office, it's better to be proactive than reactive. If you can identify an angry person before as they approach, you can prepare yourself to de-escalate the situation--and keep you and those in your office safe. How can you do that? In this week's episode of "Real Answers," we'll show you exactly what to look for. Watch the video above to learn: The physical signs of an agitated person Why you need to lead the de-escalation process, not the visitor The body language to display to better calm a person--and the physical stances to NEVER take in a tense situation Want to learn more? Check out part one of this series, where we showed you what NOT to do when an angry person visits your brokerage, association, or MLS office. Then stay tuned for a new episode next week!
MORE >
Office Safety: Dealing with Angry Visitors
MORE >
Friday Freebie: The Only Guide You'll Ever Need on Agent Safety
Your brokerage, MLS, or association can help keep agents safe by building a "culture of safety." That's according to a new guide to Realtor safety--a comprehensive 65-page ebook that includes everything from a full safety training guide, to lead assessment worksheets, free resources, and more. Want to snag your own copy? In this week's Friday Freebie, we'll show you how (no contact info required).
MORE >
A Broker's Guide to Cybersecurity: Part 3
MORE >
When Hackers Attack: The Broker's Guide to DDoS
Any company that operates online can run into cybersecurity issues--and a particularly nasty tactic that hackers sometimes use is DDoS. These attacks are a lot like hurricanes; we can predict that they'll happen, but we never actually know when they'll happen or how powerful they'll be when they do. A DDoS attack can quickly take out websites and servers of any size, even if they're properly equipped to handle it. So today, let's take a quick look at what a DDoS attack is, why they're hard to defend against, and what you can do to safeguard against them.
MORE >
GDPR and Its Effect on the US Real Estate Industry
MORE >
eXp Realty Launches Safety Check for Workplace by Facebook
eXp Realty has announced its implementation of Safety Check for Workplace by Facebook. With this tool, eXp Realty now can better confirm who is safe or might need assistance in the event of a natural disaster or crisis. Now the company's more than 18,000 agents, brokers and staff across North America can more easily connect with eXp Realty staff who can provide help and valuable resources.
MORE >
This Website Is Not Secure!
MORE >
Privacy Regulation for Everyone Coming Soon
Similar to new data security and privacy laws sweeping the European Union and California, it is only a matter of time before new laws are required throughout the United States. This week's news is the U.S. House and Senate held hearings on data security and personal privacy. The timing of the first set of hearings on Capitol Hill aligns with the fact that several other states – such as Washington, North Carolina, Oregon, and Virginia – are on a pathway to either pass new or update their security and privacy laws.
MORE >
Google Flags Websites that Are Not HTTPS as Not Secure
MORE >
4 Key Questions to Ask about Cloud Data Security
The cloud is one of those things that we all use without realizing it. As soon as you ask your browser to save a password or even a credit card number for you so you can check out of Amazon a little faster next time (not that that's a real experience or anything), you're using the cloud. We tend to assume when it comes to the most important information we have. We trust companies to make sure it's safe, and we don't ask more questions. Why not?
MORE >
Data Privacy: Everyday Best Practices to Remember
MORE >
How the FBI Foiled a Wire Transfer Scam
Wire transfer scams continue to plague the real estate industry, but brokers are deploying countermeasures and collaborating with the Federal Bureau of Investigation to catch these criminals. WAV Group was provided with an insider's overview of a recent victory by the FBI to shut down a huge ring of scammers. The story was amazing. The first thing that you should know is that a lot of these crime rings are operating out of Ghana, Nigeria, and other African nations.
MORE >
How to Connect to a Computer Remotely
MORE >
Safe Selling: Understanding How a Predator Thinks
We're re-running this popular agent safety video series from Real Safe Agent on our broker channel to highlight the importance of safety on the job. Brokers, please feel free to share and/or reuse this content on your own blog, website, social media account, internal communications, and beyond! What do alcoholics and predators that prey on real estate agents have in common? Find out in this week's Realtor safety video. Last week, we learned the differences between predators and thieves and why predators are the ones that target real estate agents for violent crimes. Today, we're taking a deep dive into the mind of the predator to learn how they think. Why? Because understanding their behavior allows us to prevent them from committing crimes. In the video above, Lee Goldstein, founder of Real Safe Agent, talks about the "offender cycle" -- a psychological pattern that both predators and substance abusers share. Watch the video to learn: How negative feelings of self-worth trigger the offender cycle How predators progress from deviant thoughts to a deviant fantasy life The point of no return when a predator decides to commit a crime Tune in next week for our next installment of Safe Selling!
MORE >
Safe Selling: Predators vs. Thieves
MORE >
Showing Safety: Where to Stand During a Home Tour, Part 2
We're re-running this popular agent safety video series from Real Safe Agent on our broker channel to highlight the importance of safety on the job. Brokers, please feel free to share and/or reuse this content on your own blog, website, social media account, internal communications, and beyond! How can agents stay safe during a showing? Over the past three weeks, we've been breaking down proactive measures agents can take to ensure their safety--both before and during a showing. This week, our video series wraps up with a demonstration on where to stand during a home tour. Last week, you learned where to stand in the entryway and kitchen. In today's video, find out how to safely position yourself in the rest of the house. Watch this video to learn: Where to stand in the living room during a showing Where to stand when prospects are touring rooms down a hallway What to do when the garage is your exit point What to do when a sliding glass door is your exit point How to make sure you can exit from the backyard More articles in this series Realtor Safety: Preparing a Home for a Showing Showing Safety: Where to Stand During a Home Tour    
MORE >
Clearing the Air: Cloud Security for Real Estate Brokerages
MORE >
Showing Safety: Where to Stand During a Home Tour
We're re-running this popular agent safety video series from Real Safe Agent on our broker channel to highlight the importance of safety on the job. Brokers, please feel free to share and/or reuse this content on your own blog, website, social media account, internal communications, and beyond! If you tuned in last week, you know just how to prepare a home in order to stay safe during a showing. But there's still one last thing you need to do before your prospects arrive... It's called "blocking," or planning where you're going to stand during a home tour. The objective is to be aware of the home's layout and position yourself in a way that doesn't make you vulnerable to potential predators. This means keeping in mind line of sight, your visibility to the outside, and access and exit points. In this week's agent safety video, you'll learn: Where to guide your prospects first How to identify possible 'choke points' How to use home features, like countertops, to distance and protect you And how to pull it all off while still seeming warm and welcoming! Stay tuned until next week when we'll talk more about staying safe during showings!
MORE >
Phishing in Real Estate and Recruiting Experience
MORE >
Realtor Safety: Preparing a Home for a Showing
We're re-running this popular agent safety video series from Real Safe Agent on our broker channel to highlight the importance of safety on the job. Brokers, please feel free to share and/or reuse this content on your own blog, website, social media account, internal communications, and beyond! In a recent edition of our agent safety video series, we learned how those who attack Realtors are different from the average criminal--they're outright predators who plan their attacks. In today's video, we'll learn how to set up a home for a showing in a way that deters those with a predatory mindset. This is the first in a miniseries of three videos on making a home safe for a showing. Watch the video above to learn the very first things you should do when you arrive at a property--and before your prospect shows up. You'll find out how to ensure that neighbors and passersby can see and hear you should anything go wrong. Stay tuned for next week when we'll reveal more tips for showing a home safely!    
MORE >
Realtor Safety: Navigating Stairs without Making Yourself Vulnerable to Attack
MORE >
Who's Attacking Real Estate Agents?
We're re-running this popular agent safety video series from Real Safe Agent on our broker channel to highlight the importance of safety on the job. Brokers, please feel free to share and/or reuse this content on your own blog, website, social media account, internal communications, and beyond! Can real estate agents get attacked in affluent, low crime areas? That's the question Lee Goldstein tackles in this week's Realtor safety video. The short answer: yes, absolutely. Violence against Realtors isn't a crime of opportunity--it's premeditated and planned out by predators. In this short video, you'll learn: How crime against agents differs from ordinary street crime Why the affluence of the area you serve doesn't matter The average profile of predators who target real estate agents--it may not be who you think! Stay tuned 'til next week for more tips and tricks on staying safe in the field!
MORE >
Realtor Safety: Opening a Lockbox and Door
MORE >
Three Stories for You to Read: Amazon, Cybersecurity, App Dev
In the event of Inman Connect this week, these were three stories I found which piqued my interest this last week. Will Amazon Uber-ize the Real Estate Industry? Cisco and Juniper Networks stocks slipped last Friday on news from The Information that Amazon was entering the $14 billion data center equipment business. While searching for more news, I stumbled upon investment firm TwinRock Partners' article about Amazon and real estate.
MORE >
Essential Tips for Protecting Client Data
MORE >
A Broker's Guide to Cybersecurity: Part 2
For part one of this series, click here. Now that we've acknowledged that yes, your brokerage is a potential target for hackers, let's start with setting some ground rules for cybersecurity. While these rules aren't very sexy, they are absolutely essential to protecting your brokerage. Establish an Acceptable Use Policy (AUP) First, each employee and agent using your network should be subject to signing an acceptable use policy (AUP).
MORE >
GDPR Playing Havoc in the EU
MORE >
A Brokers Guide to Cybersecurity
As a real estate broker, you want to provide your customers, staff, and agents with access to the Internet and information in a way that is easy, quick, and timely. However, with that service comes the responsibility of making sure it is secure. Not many months go by where we don't hear about a cybersecurity breach (e.g., Home Depot, Target, Equifax, Yahoo, Facebook, etc.). While these breaches cost companies millions of dollars, the loss of customer confidence is more expensive still. Your brokerage is a target, no matter the size.
MORE >
How Europe's New Personal Data Rule Impacts Real Estate
MORE >
10 Questions to Ask Your Tech Vendor About Your Data
You've most likely heard about the recent news in the industry calling to question the safety of your personal contacts, sphere, leads or other data that belongs to your real estate business. The security and integrity of your personal sphere and its corresponding data in many ways is the core of your business and repeat business. Many tech platforms expect you to freely hand over your private sphere data in order to use their solutions. And there lies the question: How safe is your data when you hand it over?
MORE >
WAV Group Systems Audits and Integration
MORE >
All Computers and Servers at Risk from Spectre and Meltdown
Every computer device – server, laptop, desktop, every router, every wireless router, every network printer, every network fax machine, and every phone is impacted. Don't freak out. Being impacted and being attacked are two different things. We are going to explain what is happening in layman's terms and help you get through it. Right before Christmas, researchers discovered that there is a security vulnerability (like an open door) that exposes computers built after 1995 to risk. Google found it (nod in reverence to Jann Horn of Google who was a key researcher who found both vulnerabilities – Meltdown and Spectre. If you want to geek out, visit this website). Basically, all of your usernames and passwords go through your chipset without encryption. This means that the door is open, not that you are infected with a virus. If you want to super geek out, look at Jann Horn's blog. Here is the layman's understanding of the issue. Unless you live under a rock, you have heard about Intel processors. Intel is a brand, and all brands of processors are open to attack. Processors are the electronic pieces of hardware that do all of the work on all computer devices. This is not a vulnerability that is limited to Intel processors, however. It impacts all multi-core processors. If you know what a kernel is, that is what is open to attack. Basically, every chipset in every electronic device after 1995 is at risk. Again, it is not a virus, it's a flaw and there is a risk that the hardware can be attacked. Everyone, everywhere is at risk and it will impact every device you use and every cloud service you use. Your anti-virus software will not prevent this attack – in fact, it may block the software patch from being installed properly. Read what your anti-virus vendor tells you.
MORE >
Can Blockchain Restore Trust in Real Estate Transactions?
MORE >
Why You Should Use HTTPS for a Safe and Secure Site
Do you have HTTPS or SSL enabled on your real estate website? By implementing HTTPS, you can further protect the integrity of your site, as well as data you are collecting. With HTTPS enabled, you will gain an immeasurable advantage over your competitors by instilling trust in potential leads. First things first: What is SSL? SSL (Secure Sockets Layer) creates an encrypted connection between your web server and your visitors' web browser. This allows for sensitive information (such as passwords or email addresses) to be transmitted without being hacked, tampered with or intercepted. If someone were to capture the data being transferred via HTTPS, it would be unrecognizable. Why do you need it? Perhaps most importantly, Google Chrome displays a 'Not secure' warning for all HTTP pages. By enabling SSL, you'll proactively prevent pop-up warnings and increase the amount of time users spend on your site, resulting in more lead capture opportunities. Not to mention, since security is a top priority for Google, HTTPS enabled sites are automatically given a minor ranking boost! Why should you want it? Google isn't the only one who cares about your website's security; so do prospective clients! According to the National Association of REALTORS® Home Buyer and Seller Generational Trends, home seekers rated honesty and trustworthiness as the most important factors when choosing an agent. Well, since 44 percent of home searches start online, this sense of security begins with your real estate website. To sum up, the benefits of HTTPS/SSL compatibility include: Gaining an unparalleled advantage over competing real estate websites by providing visitors with peace of mind. Ensuring you remain at the leading edge of SEO functionality and Google's Chrome browser updates with SSL functionality. Keeping visitors coming to your real estate site is important, and they are more likely to leave if they encounter any roadblocks or feel their security is at risk. Enabling HTTPS or SSL ensures your leads feel safe and secure, while enhancing the credibility of your real estate site. Your visitors will love knowing you take their security seriously! To view the original article, visit the IDX Broker blog.
MORE >
Can You Get Protection Against Cyber Fraud?
MORE >
Stay Safe When You Use Drone Photography and Honor Others' Privacy
As drones become ever more popular in the business and home entertainment sectors, privacy concerns abound – and incensed Americans are taking offensive action. With some states allowing private citizens to shoot at drones, safety and the protection of privacy and property are becoming an increasingly important facet with drone video usage in real estate marketing. How can you protect yourself?
MORE >
Phishing: Preventing the Bait and Hook in the Pond of Security for Brokers
MORE >
Which Brokerage Intranet Solution is Right for You? (Part 2)
Yesterday, we took a look at the first of two intranet solutions for brokerages. Today, we're highlighting WOLFconnect, an intranet and "front office" platform from our 2017-18 Technology Guide. What is WOLFconnect? WOLFconnect is part of Lone Wolf's Complete Enterprise Solution, a full service brokerage platform that includes back office, accounting, website management, transaction management, and more. While WOLFconnect can stand alone, it is arguably more powerful when connected to the rest of the suite. WOLFconnect itself is a modular solution that offers five different modules that brokerages can purchase as suits their needs:
MORE >
Which Brokerage Intranet Solution is Right for You? (Part 1)
MORE >
Zillow Protects Broker Data
WAV Group supports brokers and MLSs in constructing data licensing agreements with users of data records that belong to the broker. When a company like Zillow ingests broker data, like all recipients, they must adhere to the data license agreement, which typically requires that you cannot allow the data to be used by a third party. The blog McMansionHell.com is learning the hard way that using data from Zillow without proper authority is a copyright violation that Zillow will pursue. Not only will Zillow pursue the violation, but they are contractually bound to pursue the violation. The media around the case is a bit confused, so let me try to break it down in layman's terms.
MORE >
Home Office Security: What Every Business Owner Should Know
MORE >
The IRS Warns Against These Tax Scams
It's tax season and that means tracking down all your forms, maximizing your write-offs with things like the mileage deduction and potentially getting a refund. The scammers are also out in force this time of year. Here are some common tax scams the IRS has rounded up and some tips on how to avoid them. Phone Call Scams There are thousands of scammers who try to trick people over the phone every year. This often involves somebody claiming you owe taxes or penalties and if you don't pay quickly, you'll be faced with punitive measures—including jail. What's insidious about this is that the scammers can have legitimate information about you including your name, address or Social Security number. The IRS will never: Demand that you pay taxes without giving you the chance to question or appeal the amount they say you owe Require a certain payment method for your taxes, such as a prepaid debit card Call you about taxes you owe without first mailing you an official IRS notice Ask for credit or debit card numbers over the phone Threaten to bring in local police or other law enforcement to have you arrested for not paying.
MORE >
REALTOR® Safety Webinar: Get Smart about Smart Homes and Your Safety (9/14)
MORE >
[Video] It's Your Business, It's Your Data!
Do you know how, where, and when your transaction data is being used? Brokers are overwhelmingly turning to cloud solutions to manage and complete transactions, and the handling of that transaction data is a top concern. As the facilitators of the real estate transaction, brokers are responsible for the care of sensitive client information. Are your technology vendors transparent about how and where they store your business data once it has been entered into their system? If you're not sure, watch the video below. It's a recording of a live webinar we hosted earlier today on how to evaluate technology vendors for data security. We were joined by special guests Glenn Shimkus and Georg Gerstenfeld of DocuSign, a global leader in the push for standards in digital transaction management. Brokers from across the nation tuned in to the webinar to learn key considerations and questions to ask technology providers. If you were unable to join us, don't worry. You can watch the full recording below:
MORE >
Groundbreaking Agent Safety Class and Study Announced
MORE >
Cyber Security: How Brokerages Can Protect Themselves
October is National Cyber Security Awareness Month, and today we're looking at how brokers can better protect sensitive client data. Digital security is increasingly complex goal to achieve. Every advance in technology brings new risks alongside the benefits. Wi-Fi untethered us from our desks and ethernet cables, but also made our devices vulnerable. The Internet opened up a new world of marketing, including on social media, but gave criminals an easy way to target their next victim. And let's not forget the rapidly evolving "Internet of Things" where wearable devices, appliances, cars, smart home technology and more are able to connect and "talk" to each other. No wonder cyber security is so complicated! That said, there are steps brokers can take to ensure their firm is as safe as possible. Obviously, this includes things like securely storing digital documents and carefully evaluating software and other tech tools that handle client data (see more tips here). However, much of the security burden falls on agents' shoulders and the measures they take when they're away from the confines of your secure office. Below is a list of digital security tips you can share with your agents and staff to keep them (and their devices) as safe as possible: 1. Know how to identify a tampered document - While many brokers provide their agents with e-signature and transaction management solutions, some do not. Unfortunately those agents who "go it alone" don't always choose secure solutions that protect documents from tampering. That can jeopardize the legality of an entire transaction! To learn how to protect yourself, your client, and the sale, see Can You Trust That eSignature? How to Spot a Tampered Document.
MORE >