<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.zwirentitle.com/blogs/news-you-can-use/feed" rel="self" type="application/rss+xml"/><title>Zwiren Title Agency, Inc - ZTA Blog , News You Can Use</title><description>Zwiren Title Agency, Inc - ZTA Blog , News You Can Use</description><link>https://www.zwirentitle.com/blogs/news-you-can-use</link><lastBuildDate>Fri, 03 Apr 2026 12:11:02 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Even with MFA Enabled, Password Security Still Matters! ]]></title><link>https://www.zwirentitle.com/blogs/post/how-hackers-are-bypassing-mfa</link><description><![CDATA[Multifactor authentication is an incredibly effective security measure to add to accounts. However, we are now learning of hackers being able to bypass multifactor authentication using social engineering methods, such as fake websites. Learn how you can stay secure.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cJ2NvhlxSHqL1LHPmu0QDQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MwbBNeyyRBervbVCbXUS0w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VcVyPe1HToqPSxOixZmoUA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dCaV2OweR5uf1xkozqIvTA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:26px;">Even with Multifactor Authentication (MFA) Enabled, Password Security Still Matters</span><br/><span style="font-size:18px;">​How Hackers are Bypassing MFA</span></h2></div>
<div data-element-id="elm_9YA4UcMVSEKQCahryV1toQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p></p></div>
<p></p><span style="text-align:left;"><div style="text-align:justify;"> Setting up security measures does not mean you’re off the hook for being vigilant. It seems that every time a new security measure is introduced, it isn’t long before hackers find a way to circumvent those measures. Multifactor authentication (MFA) is an incredibly effective security measure to add to accounts. However, we are now learning of hackers being able to bypass multifactor authentication using social engineering methods, such as fake websites. </div></span><blockquote style="margin-left:40px;border:none;"><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;">&nbsp;</p></div>
</blockquote><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">1.&nbsp;Adversary in the middle (AITM) Attack</span></b></p></div>
</blockquote><div><p style="text-align:left;">AiTM attacks are similar to what we’ve seen from hackers in the past, with a unique new spin. Hackers are creating fake websites that look almost identical to legitimate websites. These fake websites are used to deceive users into believing they are logging into a real account. Users will enter in their login credentials into the hacker’s fake website, and as soon as hackers see the credentials are entered, they use those credentials to log in to the actual website, which will trigger the multifactor authentication email or text message or phone alert to get sent to the user. The user then enters in the code on the fake website, which the hackers then use as the code to log in to the actual website</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Prevention</b>: These fake websites are typically sent out via phishing emails, or spear phishing emails. Spear phishing is a form of phishing that targets specific individuals or organizations. The most basic solution for preventing yourself from falling victim to this form of an AiTM attack is not clicking the link in the email. When users receive emails with a link to view or sign into an account, don’t use the link in the email to get to the log in page. Open up a new tab or window in the browser and type in the URL, or Google search the company to find the login page, or even open up the mobile application to sign in.&nbsp;</p><p style="text-align:left;">Just DON’T CLICK THE LINK!</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">2.&nbsp;MFA Prompt Bombing / MFA Fatigue Attack</span></b></p></div>
</blockquote></div><div><p style="text-align:left;">Some mobile applications offer multifactor authentication in the form of a notification being sent to a smartphone, which opens the mobile application and gives the user the option to approve or deny the login attempt. MFA Prompt Bombing is a tactic hackers have started using after compromising a password (through the usual methods of phishing emails, etc). The hacker will attempt to log in to a user’s account, which sends the user’s phone the notification for approval. The user may find it rather unexpected, so they deny the notification. The hacker will then attempt to log in again, sending a second notification to the user’s phone. The user denies it again.&nbsp; The hacker will continually attempt to log in, spamming the user with MFA notifications, hoping that eventually, the user will either click approve by accident or get so fed up with the notifications, that they click approve to make it stop.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Example:</b>&nbsp;In one instance, when Uber was hacked in 2022, an external contractor was on the receiving end of the MFA Prompt Bombing received a message on WhatsApp from the attacker, pretending to be Tech Support. The message advised the user to accept the MFA prompt. This message is what caused the attack to be successful.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Prevention</b>: If a user finds themselves in the middle of an MFA Prompt Bombing attack, it is likely that the hacker already knows the user’s password – if they didn’t have the correct password, they wouldn’t progress to the MFA screen. Rather than just denying the login attempt over and over again, hoping it will stop, try logging into that account and changing the password. Ideally, that would stop the prompt bombing because the hacker would no longer have the correct password.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">3.&nbsp;Service Desk Attacks</span></b></p></div>
</blockquote></div><div><p style="text-align:left;">Hackers have learned they can bypass MFA by making phone calls to a help desk phone number, pretending to be a user who has forgotten their password. If the service representative on the phone does not enforce the proper verification procedures, they may grant access to hackers.</p></div>
</blockquote><div><div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
</div><div><blockquote style="margin-left:40px;border:none;"><span style="font-size:18px;"><p></p></span></blockquote><p></p></div>
<div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
<div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><p></p></div>
<div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
<div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><p></p><p style="text-align:left;"></p><p></p><p></p></div>
<div><p style="text-align:left;">&nbsp;</p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="text-align:left;"><b>Example:</b>&nbsp;The hackers behind the recent MGM Resorts attack used this method, calling to reset a password. The representative unknowingly gave the hackers access to their network, where they were able to upload malware to launch a ransomware attack.</p></div>
</blockquote><div><p style="text-align:left;">&nbsp;</p><p style="text-align:justify;">It is abundantly clear that users MUST continue to pay attention to their security, even with all of their security measures in place. There are several ways for hackers to bypass security measures, so staying vigilant is key (and doesn’t take too much effort). Avoid clicking the links in emails, especially links to login accounts. If for some reason you do click the link in the email, pay attention to the URL – is it the real website? Additionally, password security is still important, even will all the additional security procedures in place. Make the effort to regularly change your passwords and when you do change them, make them unique for each account, with a mix of upper- and lower-case letters, numbers, and special characters. Implementing a strong, unique password for each account makes guessing passwords more difficult for hackers and spammers.</p><p style="text-align:right;"><span style="font-size:8px;">-Emily Comora</span></p></div>
<p></p></div></div><div data-element-id="elm_QiREneI2LnR4QZQyXE75WA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:10px;">The Hacker News (2024, Feb 24) 4 Ways Hackers use Social Engineering to Bypass MFA.&nbsp;<i>The Hacker News.&nbsp;</i>Retrieved from&nbsp;</span><span style="font-size:10px;">https: //thehackernews</span><span style="font-size:10px;">. com/ 2024/ 02/4-ways-hackers-use -social-engineering.html</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 30 Apr 2025 14:28:00 -0400</pubDate></item><item><title><![CDATA[Augmented Reality]]></title><link>https://www.zwirentitle.com/blogs/post/augmented-reality</link><description><![CDATA[Augmented Reality (AR) is a technology that has gained immense popularity in recent years, offering a revolutionary way to seamlessly integrate digital information into the real world. AR technology superimposes digital information, such as images, videos, 3D models, or sound, on to the real world.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yCsg76EjT5i-GqPu5UN2pQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-96rdWQURnKFd57UaqLvSg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_CbZKvHq8RBWgK-yfElhKDw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9jrtIqFZT-G9oO6LroharA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9jrtIqFZT-G9oO6LroharA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Augmented Reality</span></b></p><span style="font-size:20pt;">Transforming Our World with Digital Magic</span></div></h2></div>
<div data-element-id="elm_ui3CrxgXRFG6J318ytO2DQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ui3CrxgXRFG6J318ytO2DQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Augmented Reality (AR) is a technology that has gained immense popularity in recent years, offering a revolutionary way to seamlessly integrate digital information into the real world. AR technology superimposes digital information, such as images, videos, 3D models, or sound, on to the real world. Unlike Virtual Reality (VR), which immerses users in a completely digital environment, AR enhances the physical world by adding digital elements. This overlay can be achieved through various devices, such as smartphones, tablets, smart glasses, and headsets. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">You may be familiar with AR if you have recently purchased or looked at furniture online. Many retail websites/mobile apps offer Augmented Reality to show how a piece of furniture will look in the user’s living spaces – and all users need is their smartphone camera! Alternatively, you may have utilized AR if you have ever used social media to overlay filters, effects and interactive elements onto your photos or videos!</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">How Does AR Work?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">AR relies on a combination of hardware and software to function. The hardware includes cameras, sensors, and displays on devices such as smartphones, tablets, headsets or AR glasses. These devices capture the real-world environment, process the data, and then display digital content on the user's screen in real-time. Software plays a crucial role in recognizing the environment, tracking objects, and aligning digital content with the physical world.&nbsp;AR applications and platforms enable the creation and deployment of augmented reality experiences. These applications use computer vision algorithms to recognize and track real-world objects, allowing digital content to interact seamlessly with the environment.</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Impact on Industries</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">Augmented Reality is reshaping industries by improving efficiency, enhancing user experiences, and creating new opportunities for innovation. The potential for AR's impact is vast, and it continues to evolve and expand its reach. The following are examples of how AR can be and is already being used in different industries:</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Real Estate</span></b><span style="font-size:12pt;">: AR can potentially change the way that homes are previewed. Rather than using VR to tour a property on the computer from the comfort of your home, AR can create a new type of virtual experience for buyers when visiting a property. Potential buyers would be able to use their smart phone to scan a room in the house and with the help of AR, detect the objects and furniture in the room or obtain the room’s dimensions. Then, while standing in the room, they would be able to rearrange the furniture in the room, remove objects, or even replace objects with their own choice of furniture and décor. Such an experience can give potential buyers an idea of what the house could look like if they were to buy it. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Retail: </span></b><span style="font-size:12pt;">In the retail sector, AR is utilized for virtual try-on experiences or product visualizations, allowing customers to preview products before making a purchase. AR can also be used for interactive product demonstrations and in-store navigation. The Target App has a feature called “See it in Your Space” allows customers to digitally view how objects would appear in their home and the Walmart App lets you virtually try on certain clothing items to give users and idea of how the item will fit.&nbsp; Additionally, Treasury Wine Estates, the vineyard behind 19 Crimes wines have implemented AR into their Wine Labels. By downloading their app and scanning the wine bottle’s label, the face on the label comes to life, confessing their crime. The possibilities for AR in Retail are endless. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Healthcare</span></b><span style="font-size:12pt;">: AR has transformative applications in healthcare, from surgical training simulations to real-time augmented imaging during medical procedures. It enhances precision and improves patient outcomes, oftentimes with less invasive procedures. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Gaming and Entertainment</span></b><span style="font-size:12pt;">: AR gaming apps such as Pokémon GO have brought AR to the mainstream, allowing users to hunt virtual creatures in real world locations using their smartphones. Additionally, apps such as Snapchat and Instagram use AR to overlay filters, masks, or little dancing Bitmoji's over the user’s images. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Education</span></b><span style="font-size:12pt;">: AR is used in educational settings to enhance learning experiences. For example, students can use AR apps to explore anatomy in 3D, bring historical events to life through interactive AR simulations, or explore virtual reconstructions of ancient civilizations.</span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Challenges and Future Outlook</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">Despite its promising potential, AR faces challenges such as privacy concerns, technological limitations, and the need for widespread adoption. However, ongoing advancements in hardware, software, and increased investment suggest a bright future for augmented reality in various fields. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">In summary, augmented reality represents a groundbreaking technology that blurs the lines between the digital and physical realms. Its applications span various fields, and its impact on industries is profound. As AR continues to evolve, its applications across diverse industries are poised to transform the way we learn, work, and interact with the world around us.</span></p></div></div>
</div><div data-element-id="elm_m1KaJbk5DJDBzS2NM8K4Qg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_m1KaJbk5DJDBzS2NM8K4Qg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-size:10px;">References:&nbsp;</span></p><span style="font-size:10px;"><span></span><p><span style="color:inherit;">Gillis, Alexander S. (2022, Nov). Augmented Reality.&nbsp;</span><i style="color:inherit;">TechTarget: WhatIs.com.&nbsp;</i><span style="color:inherit;">Retrieved from https://www.techtarget.com/whatis/definition/</span><span style="color:inherit;">augmented-reality-AR. Nov 2023</span></p><p><span style="color:inherit;"><br></span></p><span></span><p><span>High, Spencer (2022, Nov 12). Augmented Reality and Generative AI Could Transform Future of Real Estate Marketing. <i>National Association of Realtors:&nbsp;</i></span><i style="color:inherit;"><span>Newsroom.</span></i><span style="color:inherit;"> Retrieved from https://www.nar.realtor/newsroom/augmented-reality-and-generative-ai-could-transform-future-of-real-estate-marketing. Nov 2023.</span></p><p><span style="color:inherit;"><br></span></p><span></span><p><span>The Fu Foundation School of Engineering and Applied Science (n.d.). Augmented Reality Examples: Use Augmented Reality Marketing in Your Business.&nbsp;</span><i style="color:inherit;"><span>Columbia Engineering; The Fu Foundation School of Engineering and Applied Science. </span></i><span style="color:inherit;">Retrieved from https://bootcamp.cvn.columbia.</span><span style="color:inherit;">ed u/blog/augmented-reality-examples/. Nov 2023.</span></p></span></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 29 Dec 2023 12:07:00 -0500</pubDate></item><item><title><![CDATA[Unlocking the Power of QR Codes]]></title><link>https://www.zwirentitle.com/blogs/post/Unlocking-the-Power-of-QR-Codes</link><description><![CDATA[QR Codes, short for "Quick Response code", have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format...]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SdX__yuSTUyJWTwNXBxbXw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WcqX3vwvR4iEwR6LvEpH-A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_D30ewmUqQ_6_x3121CL9UA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_D30ewmUqQ_6_x3121CL9UA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mhCFyBHvScammPdVK7hvfw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mhCFyBHvScammPdVK7hvfw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">Unlocking the Power of QR Codes:</span></b></span><br><span style="font-size:30pt;color:inherit;">​</span><b><span style="font-size:20pt;">A Comprehensive Guide</span></b><br></h2></div>
<div data-element-id="elm_7ybm0empQvaij_ublEU-gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7ybm0empQvaij_ublEU-gQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">QR Codes, short for &quot;Quick Response code&quot;, have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format. Standard barcodes can only be read in one direction (top to bottom) which means they can only store a small amount of information. Alternatively, QR Codes are read in two directions, top to bottom and left to right, and can be scanned in any direction. This makes them to be easier to capture and allows these codes to store significantly more data than a standard barcode. Additionally, QR codes have an error correction function that makes the code readable even if parts of the code are stained or damaged. QR codes can store a website URL, phone number, digital business card, shipping label, or up to 4,000 characters of text.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">History of QR Codes</span><br></p><p style="text-align:justify;">QR codes were first developed in Japan in 1994 by a company called Denso Wave, a subsidiary of the Toyota Group, as a means of tracking vehicle parts during the manufacturing process. The company declared they would not exercise patent rights, making their QR code technology available to the public. While they were slow to gain popularity, the first mobile devices with QR code readers were created in 2002.As smartphones gained popularity, QR codes became more common. In 2020, Denso Wave continued to improve their original design, adding traceability, brand protection and anti-forgery technology into QR codes.</p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Today, their use has expanded far beyond automotive manufacturing, with applications across various industries. Marketers started using QR codes in ad campaigns to direct consumers to product information or special offers by putting the codes on posters inside or outside of stores, billboards, and even in commercials. During the COVID-19 pandemic, many restaurants replaced hard copies of printed menus with QR codes to comply with CDC guidance and create a “touchless” environment. Interestingly, there is even a company based in the UK, called QR Memories, that creates QR codes for use on gravestones, allowing people to scan the code to read more about that deceased person’s life (typically linking to an obituary or news story relating to them online).</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">How QR Codes Work</span></p><p style="text-align:justify;">QR codes function as a bridge between the physical and digital worlds. They can store a variety of data, such as text, URLs, contact information, or even Wi-Fi network credentials. The patterns within QR codes represent binary codes that can be interpreted to reveal the codes data. A QR code reader can identify a standard QR code based on the three large squares within the code. Once it has identified these shapes, it knows that everything contained inside the square is a QR code. To analyze the code, the scanner breaks the code down into a grid looking at the individual grid squares. Each square in the grid is assigned one a value based on whether it is black or white. It then groups the grid squares to create larger patterns.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Are QR Codes Safe?</span></p><p style="text-align:justify;">While many people are aware that QR codes can open a website, they can be less aware of the other actions that QR codes are capable of initiating on a user’s device. Aside from opening a website, a QR code can be used to execute code. Therefore, it is possible for spammers to program QR codes with URL's that lead to phishing websites used for obtaining unsuspecting user’s personal information or login credentials. It is also possible for cybercriminals to program a QR code with custom malware which could be used to exfiltrate data from a mobile device when scanned, add contacts to your device or even compose emails. A typical “attack” would involve scammers placing malicious QR codes in public places, or even covering up legitimate QR codes. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">With all the possible malicious uses of QR codes and the fact that users cannot determine what a QR code will do just by looking at it, do the benefits outweigh the risks? As with most technology these days, it seems there is always a risk. If you know for sure that a QR code is from a trusted source, then it is probably safe to scan. However, if you are out in public and see a random QR code stuck to a pole on the side of the road, with no context, scanning that code may not be the best idea. Alternatively, there are secure QR code scanners that you can download to your smartphone. For example, Kaspersky QR Scanner instantly checks that a scanned link is safe before providing any information to the user and will alert the user of phishing scams and dangerous links. It also creates a log of past scans so, if necessary, users can look back to see where and when they were compromised. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Additionally, users may be concerned about QR Codes collecting personal data however, the only data that QR codes do collect (which is only available to the QR code’s creator) includes location, number of times the code has been scanned, the time of day the code was scanned and the operating system of the device that scanned the code.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Conclusion</span></p><p style="text-align:justify;">QR codes have evolved from their origin in the automotive industry to become versatile tools used in marketing, retail, healthcare, and more. Understanding how QR codes work and implementing best practices in their use can enhance customer engagement and convenience. As technology continues to advance, QR codes are likely to remain a valuable asset in bridging the physical and digital realms.</p></div>
</div></div><div data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:8pt;">Kaspersky (n.d.) <i>QR Code Security: What are QR Codes and are they safe to use</i>. Kaspersky. Retrieved from&nbsp;https://usa.kaspersky.com/resource-</span><span style="font-size:8pt;color:inherit;">center/definitions/what-is-a-qr-code-how-to-scan. Accessed 2023.</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Nov 2023 11:26:00 -0400</pubDate></item><item><title><![CDATA[The Dark Side of Generative A.I.]]></title><link>https://www.zwirentitle.com/blogs/post/The-Dark-Side-of-Generative-A.I.</link><description><![CDATA[Generative AI is a powerful tool capable of creating remarkably authentic text, images and even videos. While this technology holds immense potential for positive applications, if used by malicious actors, can pose an additional threat to both businesses and individuals.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_GJ2cfrOkROeDLCplJriqLA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xROVL2RKTzmtbT5dnFF8RA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HQu99iiyRaWouYJODTZ5JA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_M6jAgbUoTnK-fBE4qLzpRA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M6jAgbUoTnK-fBE4qLzpRA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">The Dark Side of Generative A.I.</span></b></span></h2></div>
<div data-element-id="elm__JnP6zgjRLWE3Ews1O8dvw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__JnP6zgjRLWE3Ews1O8dvw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Generative AI, also known as generative adversarial networks (GANs), is a powerful tool that uses artificial intelligence technology and machine learning to create text, images and even videos that appear remarkably authentic. For example, the platform ChatGPT is an AI powered Chatbot that responds to text input and generates responses accordingly. The platform Dall-E is a platform that generates images in multiple styles based on a text description.&nbsp;While this technology holds immense potential for positive applications, there is a growing concern about its potential misuse in the wrong hands. When it comes to cybersecurity for businesses and individuals alike, it is important to be aware of the potential threats. Generative AI, if used by malicious actors, can pose an additional threat to both businesses and individuals. In this article, we explore the dark side of generative AI and the ways it could potentially be used maliciously.</span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">1. Phishing Attacks: </span></b><span style="font-size:12pt;">Generative AI can be employed to generate highly convincing phishing emails or messages. These messages could mimic the writing style and tone of trusted colleagues, clients, or even executives, making it challenging to detect them as fraudulent. For example, the AI could be used to generate convincing fake emails or websites that appear to be from a legitimate and trusted parties, but are actually designed to spread malware, steal personal information, or steal login credentials.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">2. Deepfake Threat: </span></b><span style="font-size:12pt;">One of the most alarming misuses of generative AI is the creation of deepfake content. Deepfakes are highly realistic manipulated videos or audios that can deceive viewers into believing false information or witnessing events that never occurred. Malicious actors could create deepfake audio clips or videos of politicians, business leaders, public figures, or any random person to damage reputations, spread false narratives, or manipulate public opinion. This poses a significant threat to individuals, organizations, and society at large. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">3. Content Generation and Plagiarism: </span></b><span style="font-size:12pt;">Generative AI models can produce human-like text, making it easier for malicious actors to create large volumes of content quickly. This can lead to an influx of plagiarized articles, blog posts, or social media content, negatively impacting original content creators and diluting the quality of information available online. Business professionals who rely on such content may unknowingly promote stolen intellectual property or expose themselves to legal liabilities.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">4. Fake Reviews and Testimonials: </span></b><span style="font-size:12pt;">Online reviews and testimonials play a crucial role in shaping consumers' perceptions and influencing their purchasing decisions. Generative AI can be used to generate large volumes of fake positive reviews or testimonials, artificially boosting the reputation of a product or service. Those who rely on such reviews may make ill-informed decisions, leading to wasted resources or partnerships with untrustworthy entities.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">5. Social Engineering and Identity Theft: </span></b><span style="font-size:12pt;">Generative AI can assist in creating highly believable fake identities, social media profiles, or online personas. Malicious actors may use these fabricated identities for social engineering attacks, tricking unsuspecting business professionals into sharing sensitive information or granting unauthorized access. Any individual could find it challenging to distinguish between genuine and fake identities, putting their businesses at risk.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Since real estate transactions are a high-value target for scammers, it is crucial to be aware of phishing emails. Many people, when examining an email to determine its legitimacy, look for incorrect grammar or misspelled words; However, if&nbsp; scammers use Generative A.I. to write their phishing emails, it is possible there will be fewer obvious grammatical errors within the emails. While this can make identifying a phishing email more difficult, it is important to remember what to look for to signify a phishing email. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">1.&nbsp;Lack of personalization:</span></b><span style="font-size:12pt;"> While Generative AI can be trained to create personalized content, such as using a recipient’s name or other personal/transaction details, it may not always do so. If an email appears to be a generic message that could have been sent to anyone, it could be a sign that is a phishing email. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">2. Inconsistent Language or Unusual Sentence Structure</span></b><span style="font-size:12pt;">: Because Generative AI models are trained on large datasets of text, they may generate text that is inconsistent or incoherent. If an email appears to switch between different tones or uses language that is grammatically incorrect, or otherwise inconsistent, it could be a sign that it is a phishing email. Generative AI Models may also produce sentences with unusual structures or patterns that are typically not used in email correspondence. For example, an AI generated phishing email might use overly complex sentence structures or include multiple clauses that are not logically related. Since many scammers don’t have a good grasp on the English language, they may not realize the inconsistencies, complexities or grammatical errors within the text that the AI generated.&nbsp; </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">3.&nbsp;Suspicious attachments or links:</span></b><span style="font-size:12pt;"> As with regular phishing emails, AI Generated emails may include suspicious links or attachments that can be used to spread malware or steal personal information or login credentials. If an email includes an attachment or link that you were not expecting or seems suspicious, it is important to exercise caution and verify its authenticity before opening or clicking.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">4.&nbsp;Unknown or Unclear Sender</span></b><span style="font-size:12pt;">: As with regular phishing emails, it remains crucial to check who is sending the email. When the sender is unknown, not part of the transaction they are discussing, or if it is unclear who the sender actually is, it is likely that the email is a phishing email. </span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">There is no foolproof way to determine whether an email is legitimate or not; however, being aware of the indicators can help individuals become more vigilant and protect against potential threats. Overall, when evaluating the legitimacy of an email, it is important to exercise critical thinking skills and consider all of the above factors to determine its authenticity. Furthermore, when in doubt of the legitimacy of an email, it never hurts to get the sender on the phone, using a trusted phone number, to confirm whether they sent the email in question. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Generative AI is still in such an early stage of development and there has been rumors of Generative AI companies implementing regulations for their platforms to monitor and prevent malicious use of the AI. While Generative AI presents both an immense potential for positive transformation, it can also be exploited by those with ill intentions. By staying informed, implementing robust security measures, and promoting cyber awareness within your organization, you can mitigate the risks associated with AI generated phishing emails and keep the real estate transactions secure.&nbsp;</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Jul 2023 16:59:00 -0400</pubDate></item><item><title><![CDATA[Generative A.I.]]></title><link>https://www.zwirentitle.com/blogs/post/Generative-AI-What-is-it</link><description><![CDATA[Generative AI, also known as generative adversarial networks (GANs), is a type of artificial intelligence technology that uses machine learning to create new and unique content. This can include everything from text and images to videos to music. For example, the platform ChatGPT]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_9YLMDVnvTzeCtcfo5z2_fA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_99U8oaNlQO-W0kuMShDpDg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_dwoW9SK-Rg2Uc7MgNHjhHg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_nOoEmBAQSQ2Naxwp7uG-xw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_nOoEmBAQSQ2Naxwp7uG-xw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:16pt;">What is It, How does it Work, and How Can You Use It?</span></b></span></h2></div>
<div data-element-id="elm_yY_7Mn_mSLe2T51wQrJ2Zw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yY_7Mn_mSLe2T51wQrJ2Zw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div style="line-height:1.2;"><p style="text-align:left;"><span style="font-size:12pt;">Generative AI, also known as generative adversarial networks (GANs), is a type of artificial intelligence technology that uses machine learning to create new and unique content. This can include everything from text and images to videos to music. For example, the platform ChatGPT is an AI powered Chatbot that responds to text input and generates responses accordingly. The platform Dall-E is a platform that generates images in multiple styles based on a text description. But how does Generative AI work, and why is it important?</span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">How Generative AI Works</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">At its most basic level, generative AI involves two separate neural networks that work together to create new content. One of the neural networks, known as the generator, creates content based on a set of inputs or parameters. The other network, known as the discriminator, evaluates the content created by the generator and provides feedback on its quality. Over time, the Generative AI platform learns from the feedback provided by the discriminator and becomes better at creating high-quality content. This process is known as training, and it can take a lot of time and computing power to get right.</span></p><h2 style="text-align:left;"><span style="font-size:12pt;font-weight:bold;color:rgb(89, 129, 169);">What is a Neural Network?</span></h2><p style="text-align:left;"><span style="font-size:12pt;">A neural network is a type of computer system that is designed to mimic how the human brain works.&nbsp; The human braincells, called neurons, form a complex, highly interconnected network and send electrical signals to each other to help humans process information. Similarly, a neural network is made up of interconnected nodes, also known as artificial neurons, that work together to perform complex computations and make predictions based on input data. In the development of neural networks, they go through a process called training&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;">Neural networks can be used for a variety of tasks, such as image recognition, natural language processing, and predictive modeling. For example, a neural network could be trained to recognize images of cats by uploading thousands of images labeled&nbsp;cats and non-cats. Once the neural network processes the images, it learns how to accurately classify new images as either cat or non-cat.&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">&nbsp;</span></b></p><p style="text-align:left;"><b><span style="font-size:12pt;">The Creator Neural Network</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">The training given to the generator neural network for creating content depend on the specific task or domain that the generative AI is being used for. Here are some examples of the types of models used for different generative tasks:</span></p><ol start="1"><ol><li style="text-align:left;"><b><span style="font-size:12pt;">Text generation:</span></b><span style="font-size:12pt;"> The generator neural network is often trained on a body of text, such as books, articles, or other written material &nbsp;to train a language model, l, which can then generate new text by predicting the most likely next word or sequence of words based on the input it has received. For example, Microsoft Outlook or Gmail use Natural Language&nbsp;Processing to predict user's sentences when replying to an email. It uses machine learning algorithms to suggest responses to emails based on the email content&nbsp;and the user's history of email interactions.&nbsp;</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Image generation:</span></b><span style="font-size:12pt;"> The generator neural network is often trained on a dataset of images. These models learn to encode and decode images, and can generate new images by sampling from the latent space of the model.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Music generation:</span></b><span style="font-size:12pt;"> The generator neural network can be trained on a dataset of MIDI files or other musical notation, which aren’t actually music files, but files that indicate which notes are played during a song, when and how long they are played and how loud they should be played. The neural network learns how to predict the next note or sequence of notes in a musical piece. Using that data, it then can be used to generate new compositions based on the input they receive.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Video generation: </span></b><span style="font-size:12pt;">The generator neural network can be trained on a dataset of videos, and learn to generate new video frames or entire videos based on the input they receive.</span></li></ol></ol><p></p><div style="text-align:left;"><b><span style="font-size:12pt;"><br></span></b></div><div style="text-align:left;"><b><span style="font-size:12pt;">The Discriminator Neural Network</span></b></div><span style="font-size:12pt;"><div style="text-align:left;"><span style="font-size:12pt;">In a Generative Adversarial Network (GAN), the discriminator neural network is trained to distinguish between real and fake data. The goal of the discriminator is to accurately classify the data as real or fake, while the generator's goal is to generate fake data that is convincing enough to fool the discriminator.</span></div></span><span style="font-size:12pt;"><div style="text-align:left;"><span style="text-align:center;font-size:15px;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">Overall, the discriminator plays a key role in the GAN architecture, as it provides the feedback signal that drives the generator to generate more realistic data. By optimizing the interplay between the generator and discriminator, GANs have been able to achieve impressive results in a wide range of generative tasks.</span></div></span><p></p><h2 style="text-align:left;"><span style="font-size:16px;font-weight:bold;color:rgb(89, 129, 169);">How is it being Used?</span></h2><p style="text-align:left;"><span style="font-size:12pt;">Generative AI is being used in a variety of industries, ranging from creative arts to engineering and finance. Here are a few examples of industries that have already implemented generative AI:</span></p><ol start="1"><ol><li style="text-align:left;"><b><span style="font-size:12pt;">Fashion:</span></b><span style="font-size:12pt;"> Generative AI is being used to create new fashion designs and to generate personalized recommendations for customers. For example, H&amp;M, Zara and Old Navy use generative AI predict the next trends of fashion to stay ahead of the curve using social media platforms like Instagram to identify what influencers are posting as their Outfits of the Day to develop their fashion lines.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Healthcare:</span></b><span style="font-size:12pt;"> Generative AI is being used to create 3D models of organs and to simulate the effects of different drugs on the body. For example, the company Insilico Medicine uses generative AI platform, called Chemistry 42, to design new drugs which has cut the time and money involved in drug development process as much as 90%.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Finance: </span></b><span style="font-size:12pt;">Generative AI is being used to generate financial forecasts and to optimize trading strategies. For example, the company Kensho uses generative AI to analyze financial markets data and predict how different events might impact them. For example, if a hurricane hit a particular region, the platform can analyze the data to predict how it will impact insurance stocks or the housing markets. Using the predictive models, they are able to provide investment advice to their clients.</span></li></ol></ol><h2 style="text-align:left;"><span style="font-size:12pt;font-weight:bold;color:rgb(89, 129, 169);">Generative AI and the Legal Industry</span></h2><p style="text-align:left;"><span style="font-size:12pt;">The legal industry has implemented generative AI in a number of ways to improve efficiency, reduce costs, and increase accuracy in various legal processes. Here are some examples:</span></p><ol start="1"><ol><li style="text-align:left;"><b><span style="font-size:12pt;">Contract Review: </span></b><span style="font-size:12pt;">Generative AI is being used to review and analyze contracts, to help lawyers to identify key clauses, risks, and obligations in a fraction of the time it would take to review them manually. For example, the company LawGeex uses generative AI to review contracts with low-to-medium complexity such as non-disclosure agreements, service-level agreements, statement of Work contracts, and others to provide an assessment of the legal risks and obligations.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Document Analysis:</span></b><span style="font-size:12pt;"> Generative AI is being used to analyze legal documents and to extract relevant information, such as case citations and legal arguments. This helps lawyers to conduct legal research more efficiently and to identify relevant case law more quickly. For example, the company Ross Intelligence uses generative AI to analyze legal documents and to provide legal research to its clients.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">E-Discovery:</span></b><span style="font-size:12pt;"> Generative AI is being used to assist with e-discovery, which is the process of identifying and collecting electronic documents for use in legal proceedings. Generative AI can be used to review large volumes of data and to identify relevant documents more quickly and accurately than manual review. For example, the company Relativity uses generative AI to assist with e-discovery in litigation and investigations by uploading all the discovery materials into one place, organizing communications to see who someone talked to, what they said and when, and streamlining the redaction process to protect client PII.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Case Prediction:</span></b><span style="font-size:12pt;"> Generative AI is being used to predict the outcome of legal cases based on historical case data and other relevant factors. This can help lawyers to make more informed decisions about whether to take on a case and how to approach it. For example, the company Premonition uses generative AI to analyze historical case data and to provide predictions about the likely outcome of a case. It can also provide in-depth analytics on an attorney’s performance and litigation experience which can be used to gather information on opposing counsel or identify prospective attorneys to recruit.</span></li></ol></ol><p style="text-align:left;"><span style="font-size:12pt;"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;">These are just a few examples of how the legal industry has implemented generative AI to improve efficiency and accuracy in various legal processes. As generative AI continues to develop, it is likely that its use in the legal industry will become even more widespread.</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:bold;text-align:justify;"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:bold;text-align:justify;">Will Generative AI Replace Jobs?</span><br></p><div><p style="text-align:justify;"><span style="font-size:12pt;">Generative AI has the potential to automate certain tasks that were previously performed by humans, which could lead to job displacement in some industries. For example, generative AI can be used to create art, music, and writing, which could potentially reduce the demand for human artists and writers. However, it's important to note that generative AI is not a substitute for human creativity, and it is unlikely to completely replace the need for human workers in many fields. In fact, in many cases, generative AI is designed to work alongside humans, augmenting their abilities and improving their productivity.</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;">Therefore, the deployment of generative AI is likely to create new jobs in fields such as data science, machine learning engineering, and AI ethics. Additionally, as generative AI reduces the cost of certain goods and services, it could increase demand and create new jobs in related areas. Generative AI it is likely to transform the nature of work and create new opportunities for human workers to collaborate with and benefit from this technology.&nbsp; &nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;">Why Generative AI important?</span></p><p style="text-align:left;"><span style="font-size:12pt;">Generative AI has the potential to revolutionize the way we create and consume content. With generative AI, it's possible to create new and unique content that would be impossible for humans to produce on their own. This can lead to new forms of art, music, and literature that push the boundaries of what we thought was possible.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;">But generative AI isn't just limited to the creative arts. It also has practical applications in fields like medicine, finance, and engineering. For example, generative AI can be used to simulate complex systems and predict how they will behave under different conditions. This can help researchers develop new drugs, optimize financial investments, and design more efficient buildings and vehicles.</span></p><p style="text-align:left;line-height:1.2;"><span style="font-size:12pt;"><br></span></p><p style="text-align:left;line-height:1.2;"><span style="font-size:12pt;">While the idea of Generative AI may seem like a science fiction movie that could end terribly, there are many benefits to AI that we will continue to see as the technology advances.&nbsp;</span></p></div></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 28 Apr 2023 11:10:00 -0400</pubDate></item><item><title><![CDATA[Bluetooth Technology]]></title><link>https://www.zwirentitle.com/blogs/post/Bluetooth-Technology</link><description><![CDATA[Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_5hKn-LHFRpe8YsYXToqjNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BN8x8sn1QTm4FeD1kxeYRQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fdF4FV5iQWqAM8NDzxqiGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Bluetooth Technology</span></b></p><div style="font-size:30pt;color:inherit;"><span style="color:inherit;"><b><span style="font-size:16pt;">Is there a Privacy or Security Concern to be aware of?</span></b></span><br></div></div></h2></div>
<div data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance (for most devices, the range is about 30 feet when there are no walls or other obstacles present). Devices that contain Bluetooth technology include smart phones, laptops and desktop computers, vehicles, wireless headphones or speakers, smart watches, and even internet connected devices. Therefore, a user can connect their smartphone to their wireless headphones or speakers to play music or connect their phone to their vehicle to talk on the phone “hands free” while driving. Users can even use Bluetooth technology to share images with another Bluetooth-connected device (on Apple devices, this is commonly referred to as “Air Dropping” and on Samsung phones it is called “Quick Share”). While there are many benefits to utilizing Bluetooth technology, there have been a lot of articles noting security and privacy concerns to be aware of when Bluetooth is left on (or enabled) after a user has ended the connection between devices.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUETOOTH HACKING – IS YOUR SOFTWARE UP TO DATE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Security researchers are constantly finding new threats to device security. &nbsp;For example, in 2017 Armis, a security research firm, discovered a Bluetooth vulnerability known as “BlueBorne”. When hackers used the “BlueBorne” to attack a device, they were able to control Bluetooth-enabled devices remotely, which gave them the opportunity to steal data from the device. Additionally, the “BlueBorne” could spread from one phone to another phone, like a virus. This gave hackers the ability to infect more phones without having to physically be within the 30-foot range of each device. &nbsp;Fortunately, the security research firm was able to create a security patch for devices to prevent the “BlueBorne” attack. A security patch is code for the operating system that fills in the vulnerability to prevent hackers from exploiting the vulnerability. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;As cybersecurity firms identify new vulnerabilities in the Bluetooth software, they create new security patches which are rolled out in updates to the software or devices; however, they are only helpful when users update their software. Therefore, updating the software on Bluetooth enabled devices is crucial to eliminate any known vulnerabilities from being exploited and keep your devices secure. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUEJACKING – ARE YOU RECEIVING UNSOLICITED OR PHISHING MESSAGES VIA BLUETOOTH?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;On smart phones and laptops, the Bluetooth setting has the option of being enabled or disabled. When an individual leaves their Bluetooth enabled on their smart phone, they open themselves up to “Bluejacking”. “Bluejacking” is when someone uses a device’s enabled Bluetooth connection to send unsolicited messages. Messages may be a harmless prank from a teenager but could also be a phishing attack. Many people are aware of Phishing emails; however, Phishing messages can be sent via Bluetooth connection. A malicious actor may use “Bluejacking” to send a phishing message to a smart phone or laptop, pretending to be a trusted source, such as a bank, phone company or social media application. The message typically entices the user to click a link that leads either to a website that automatically downloads malware to a device or a fake website designed to look similar to well-known companies and requests the user provide login credentials or other sensitive information. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;To avoid any “Bluejacking” pranks or Phishing messages shared through Bluetooth connection, it is advised that users disable the Bluetooth setting when they have finished using the connection. However, if a user is connecting to Bluetooth devices multiple times per day, it may be tedious to enable and disable the Bluetooth setting before and after using. Alternatively, a user can adjust their device settings to prevent unknown contacts from sharing messages via Bluetooth connection. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">IS YOUR DEVICE PAIRED TO A VEHICLE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;If you connect your smartphone to a vehicle, your phone’s data may be shared with the car. If it is your personal car, it may not be an issue; however, if you connect to a rental car, you want to be aware of the data your phone is sharing with the rental car. Major car-rental companies have no policies to delete sensitive information collected during the trip after you return the car. Your name and navigation history are considered valuable personal information. Using such data, combined with information publicly available on the internet and social media platforms, a malicious actor could track down an individual. Data that could be collected by a vehicle includes your email address, GPS history, phone book, call log and text messages (if hands-free calling and messaging is used), music streaming login, and more. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Interestingly, thus far, data collected on vehicles has been used to fight crime. One man was able to track down teenagers that took his car for a joy ride, using the phone usernames that were stored in the car’s device list. Alternatively, people with malicious intentions can also use data to track people down. To protect yourself, before returning a rented car AND before selling or trading in your personal car, take the time to delete your personal data from the vehicle. This can be done by going into the system settings or Bluetooth settings and deleting your device from the “paired phones” list; or by restoring the vehicle to the factory settings. If you are having difficulty, the car manual can guide users through unpairing a phone and deleting information. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">SHOULD YOU BE CONCERNED ABOUT BLUETOOTH HACKING?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Generally, most people should not be concerned about Bluetooth hacking. Cybercriminals typically target people with high level security clearance. However, it does not hurt to be extra cautious. IT professionals recommend the following:&nbsp;</span></p><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;">Turn off “discoverable mode”, except when pairing new devices.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">If you’re always using the same peripheral devices, such as Bluetooth headphones, Bluetooth keyboard or mouse, or even Bluetooth connection in the car, “discoverable mode” does not need to be turned on because your device will remember the Bluetooth device’s unique identifier. </span></li></ul></ul><ul><li style="text-align:justify;"><span style="font-size:12pt;">Disable the Bluetooth setting when it is not in use.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">For those who connect to Bluetooth devices multiple times per day, instead of&nbsp; disabling and re-enabling Bluetooth on the device, update the device’s settings to prevent unknown contacts from sharing messages through Bluetooth connection will prevent unsolicited messages or images from being “Air Dropped” or “Quick Shared” to your phone. </span></li><li style="text-align:justify;"><span style="font-size:12pt;">For those who do not want to disable or update their device’s Bluetooth settings, &nbsp;only accept paring and messages requests that are shared via Bluetooth connection from known contacts. </span></li></ul><li style="text-align:justify;"><span style="font-size:12pt;">Deleting personal and device information from rented vehicles that remains saved in the car’s settings after using the Bluetooth connection.&nbsp;&nbsp;</span></li></ul><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;">Furthermore, as with all technology today, it is recommended that Bluetooth devices are updated regularly. This ensures the devices are running the latest software which includes security patches for newly identified vulnerabilities.</span></p><p style="text-align:right;"><span style="color:inherit;"><span style="font-size:8pt;">-Emily Comora</span></span><span style="font-size:12pt;"><br></span></p></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 12:18:00 -0400</pubDate></item><item><title><![CDATA[Lawyer Well-Being]]></title><link>https://www.zwirentitle.com/blogs/post/lawyer-well-being</link><description><![CDATA[Well-being is a priority for lawyers that can no longer be ignored. The National Task Force on Lawyer Well-Being acts on behalf of the lawyers who are functioning below their ability and for those suffering due to substance use or mental health disorders and the Task Force urges people to act.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_tsfAvC0rRvWuDeUKPhfBDw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zm6BpgHyQv2cMTH_KNsBdQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_SElef6qBS_i-6tW3ufP3Yg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_SElef6qBS_i-6tW3ufP3Yg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vanyuZr2T0-KeqbBwPFWjA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vanyuZr2T0-KeqbBwPFWjA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Lawyer Well-Being</span></b></p><b><span style="font-size:22pt;">&amp; the Necessity for A Legal Industry Culture Change</span></b></div></h2></div>
<div data-element-id="elm_5Z7AxnfIRZa7UfKxMIvfOg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5Z7AxnfIRZa7UfKxMIvfOg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Well-being is a priority for lawyers that can no longer be ignored. The National Task Force on Lawyer Well-Being acts on behalf of the lawyers who are functioning below their ability and for those suffering due to substance use or mental health disorders and the Task Force urges people to act.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">It has been estimated that the average person will spend one third of their life at work. The American Bar Association (ABA) published a study of nearly 13,000 currently practicing lawyers that found between 21-36% qualify as problem drinkers and 28% are struggling with some level of depression, 19% struggle with anxiety and 23% struggle with stress. Notably, the study found that young lawyers in the first 10 years of practice and those working in private firms experience the highest rates of problem drinking and depression. Too many individuals face less productive, less satisfying and more troubled career paths. The result of the study signals an elevated risk in the legal community for mental health and while the study reflects the majority of lawyers do not have a mental health or substance use disorder, it does not mean the lawyers unaffected are thriving.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">What is Well-Being?</span></b></p><p style="text-align:justify;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);"><br></span></b></p><p style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Well-being is not solely defined by the absence of illness; it includes a positive state of wellness. Social science research emphasizes that well-being is not defined by an absence of disfunction or illness but is also not limited to feeling happy or filled with positive emotions. The concept of well-being is multi-dimensional and includes, for example, engagement in interesting activities, having close relationships and a sense of belonging, developing confidence through mastery, achieving goals, meaning and purpose, a sense of autonomy and control, self-acceptance, and personal growth. </span></p><p style="text-align:justify;"><span style="text-align:center;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Lawyer well-being can be further defined as a continuous process whereby lawyers seek to thrive in each of the following areas: emotional health, occupational pursuits, creative or intellectual endeavors, sense of spirituality or greater purpose in life, physical health and social connections with others. It is a continuous process towards thriving across all life dimensions. Lawyer well-being is part of the lawyer’s ethical duty of competence. It provides a lawyer the ability to make healthy, positive work/life choices and assure not only a quality of live within their families and communities but also to help them make responsible decisions for their clients.</span></p><p style="text-align:justify;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Reasons to Take Action: </span></b></p><p style="text-align:justify;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);"><br></span></b></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="text-align:justify;"><span style="color:rgb(34, 67, 86);"><b><span style="font-size:12pt;">1.</span></b><span style="font-size:12pt;">&nbsp; Lawyer well-being impacts the cognitive function and contributes to organizational success in law firms, corporations and government entities. When cognitive function is impaired, legal professionals are unable to do their best work. For law firms and corporations, lawyer health is form of human capital that provides a competitive advantage. The Gallup Corporation did years of research showing that worker well-being in the form of engagement is linked to a host of organizational success factors, including low turnover, high client satisfaction and higher productivity and profitability. The research also shows that 68% of employees are not engaged at work, which means organizations are not benefiting from their human capital.&nbsp; A 2016 survey by Law360 found that over 40% of lawyers reported they were likely to leave their current law firms within the next year. The high turnover rate for law firms is expensive; however, could be mitigated by improving employee well-being in an engaging way.&nbsp; </span></span></p></div></blockquote><div><p style="text-align:justify;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="text-align:justify;"><span style="color:rgb(34, 67, 86);"><b><span style="font-size:12pt;">2. &nbsp;</span></b><span style="font-size:12pt;">Lawyer well-being influences ethics and professionalism. The ABA Model Rules of Professional conduct have several rules that are relevant to lawyer wellness. Rule 1.1, “provide competent representation” Rule 1.3 requiring diligence in client representation, Rules 4.1 through 4.4 regulate working with people other than clients. Minimum competence is critical to protecting clients and allows lawyers to avoid discipline but will not enable them to live up the aspirational goal articulated in the ABA’s Model Rules of Professional Conduct’s Preamble, which calls lawyers to “strive to attain the highest level of skill to improve the law and legal profession and to exemplify the legal profession’s ideals of public service. A lack of well-being causes lawyers to struggle with even minimum competence. D. B. Marlowe, author of “Stress Management for Lawyers”, suggests that 40-70% of disciplinary proceedings and malpractice claims against lawyers involve substance use or depression, often both. </span></span></p></div><div><p style="text-align:justify;"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;color:rgb(34, 67, 86);">Major depression is associated with impaired executive functioning, including diminished memory, attention and problem-solving. Well-functioning executive capabilities are a necessity for making good decisions, evaluating risks, planning for the future, and coping with new situations. Further, some cognitive impairment persists in up to 60% of individuals with depression even after mood symptoms have diminished. For alcohol abuse, up to 80% experience mild severe cognitive impairment in executive functions, especially when problem solving, abstraction, planning, organizing, and working memory, core features of a competent lawyer. </span></p></div></blockquote><div><p style="text-align:justify;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="text-align:justify;"><span style="color:rgb(34, 67, 86);"><b><span style="font-size:12pt;">3. </span></b><span style="font-size:12pt;">&nbsp;Promoting well-being is the right thing to do. Untreated mental health issues and substance use disorders ruin lives and careers. They affect too many lawyers and it is clear the collective legal culture is toxic or sustaining is up to the individual. The interdependence creates a joint responsibility for solutions. </span></span></p></div></blockquote><div><p style="text-align:justify;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Recommendations</span></b></p><p style="text-align:justify;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);"><br></span></b></p><p style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">The Task Force for Lawyer Well-Being has published their recommendations for minimizing lawyer dysfunction, boosting well-being, and reinforcing the importance of well-being to competence and excellence in practicing law. The report is split into two main parts, Part 1 provides general recommendations for all stakeholders in the legal community and part 2 provides recommendations tailored to specific stakeholders, such as judges, regulators, legal employers, bar associations, etc. Some of the recommendations include:</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><ul><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Leaders demonstrate personal commitment to well-being. Broadscale change requires a buy-in role modeling from top leadership.</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Facilitate, destigmatize, and encourage help seeking behaviors.</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Build relationships with Lawyer Well-Being experts,</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Foster collegiality and respectful engagement throughout the profession.</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Provide high-quality educational programs about lawyer distress and well-being.</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Guide and support the transition of older lawyers.</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">De-emphasize alcohol at social events,</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Utilize monitoring to support recovery from substance use disorders.</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Take actions to meaningfully communicate that Lawyer Well-Being is a priority.</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">And many more!</span></li></ul></div></blockquote></blockquote><div><p style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="color:rgb(34, 67, 86);"><span style="font-size:12pt;">The Task Forces’ report and recommendations make a compelling case that the legal profession is due for some new ideals. Depression, anxiety, chronic stress, burnout and substance use disorders among lawyers exceed those of many other professions. To preserve the public’s trust and maintain the status of a self-regulating profession, the legal industry must come together with the commitment to care for the well-being of one another. Regardless of the position each individual holds in the legal industry, everyone can contribute towards making a difference in the culture change by considering their own well-being and that of one another. The legal profession has the capacity to face these challenges and create a better future for lawyers that is sustainable in pursuit of the highest professional standards, business practices and ethical ideals.</span><br></span></p><p style="text-align:justify;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">More information on how you can contribute can be found in the National Task Force on Lawyer Well-Being’s report, “The Path to Lawyer Well Being: Practical Recommendations for a Positive Change”, which can be found on the American Bar Association’s website or on Google. </span></p><p style="text-align:justify;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Here is our message to you -&nbsp;</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;color:rgb(34, 67, 86);">If you need our help, just call and let us know, no questions asked. We cannot take over a file for a lawyer, but we can and have been there for our clients when they are out on a family emergency, or are on vacation. Even if you are overwhelmed for any number of reasons or really need some extra support on your transactions to allow you some space to relax, just let us know. We can talk and figure out how our office can help keep the transaction moving forward and/or support you and/or the transaction in other ways.&nbsp;</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 28 Feb 2023 13:05:00 -0500</pubDate></item><item><title><![CDATA[NATIONAL DATA PRIVACY DAY]]></title><link>https://www.zwirentitle.com/blogs/post/NATIONAL-DATA-PRIVACY-DAY</link><description><![CDATA[Data Privacy Day began in the US in 2008, commemorating the signing of Convention 108 - the first legally binding treaty dealing with privacy and data protection. In 2014, the US Congress adopted S. Res. 337, a non-binding resolution designating January 28 National Data Privacy Day.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_JbRCrXDDTciu8tSOFvKSLw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BNPOSeFSQsCe0UnBiI3zcA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FKv76nNwSjGcvtDKuSkMqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZaLAmKlGRxyezcBy1jh-FA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZaLAmKlGRxyezcBy1jh-FA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1>NATIONAL DATA PRIVACY DAY</h1><div style="color:inherit;">January 28, 2023</div></div></h2></div>
<div data-element-id="elm_OClFFzJITVGAfqUIbKGbug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OClFFzJITVGAfqUIbKGbug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Companies collect personal information from users each time they visit a website, set up an online account, or use internet connected devices; however, most people do not know what kind of personal data is collected.&nbsp;According to Pew Research Center, 79% of Americans believe that have no control over what personal data is collected by companies. While it may seem that way, companies are obligated to explain how they collect and use people's data within their Privacy Policy. Additionally, account privacy and security settings often allow users to choose how their data is collected and used.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">For example, when you talk to Amazon's Alexa from your phone, Amazon Echo, or any other smart device, your voice is recorded and saved on Amazon's Cloud until manually deleted and the stored recordings are available for Amazon employees to listen to. Fortunately, Amazon's account privacy settings allow users to delete voice recordings automatically, after a set time period, and prohibit Amazon employees from listening to the saved recordings. All the user has to do is login to their account and change the settings to what they are comfortable with.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Unfortunately, there are online accounts and mobile applications that require certain personal information in order to access their services. For those companies, the personal information collected is of tremendous value; however, it is up to each individual to decide whether the service they are getting in return is worth the data they must hand over, even when the service is free.&nbsp; </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">DATA PRIVACY DAY</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Data Privacy Day began in the US in 2008, commemorating the signing of Convention 108 - the first legally binding treaty dealing with privacy and data protection. In 2014, the US Congress adopted S. Res. 337, a non-binding resolution expressing support for designating January 28 &quot;National Data Privacy Day.&quot;&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The National Cyber Security Alliance (NCSA) encourages everyone to learn about and understand how to protect their online data. They advise everyone to check the privacy and security settings on every app, account or device and adjust the settings to a level of privacy and security they are comfortable with. It doesn't have to be all at once. They advise starting with the accounts that are used the most frequently, then make a habit of updating one account per week until all of your accounts are updated with the privacy settings of your choice. On the NCSA website there is an in-depth list of common websites and apps with direct links to the account privacy and security settings or to read the company's privacy policy.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The NCSA also recommends reading a company's Privacy Policy before signing up for an account to get a better understanding of what data is collected and what&nbsp; they will do with that data. While many people are worried about their privacy online, few will actually read the privacy policies to learn how companies are using their personal information. A survey performed by Deloitte revealed that 90% of consumers accept legal terms and conditions without reading them. The survey also found that more than 81% of consumers feel they have lost control over the way their personal data are collected and used; however, only 13% of consumers said they never share personal information online. In order for users to understand and control how their data is being collected and used, they must learn what they can do to protect their personal information.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Privacy Awareness for Small Businesses&nbsp;</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">For businesses that collect consumer's data, trust is crucial to the consumer relationship. Consumers trust that the personal information they share is protected. While businesses may never knowingly put their consumer's data at risk, lax security practices can jeopardize a company's sensitive data and expose them to threats. Any company that has a website, communicates electronically via email, or stores customer information in an electronic database has a potential risk of getting hacked if the right precautions are not in place.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Data Privacy Day is an excellent reminder to create, what the NCSA calls a, &quot;Culture of Privacy&quot; at work by teaching all employees what privacy means to your company and the role each person plays in making sure that client and customer's privacy is achieved and maintained.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The NCSA's website provides a list of resources for small businesses, including:&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">A list of Free Online Security Checkups and Tools that will scan company devices for known malware and identify if any devices are vulnerable to cyber-attacks</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Tips for protecting Consumer Information</span></li><li style="text-align:justify;"><span style="color:inherit;">Informative videos and workshops to advise Small Business Owners how they can implement cybersecurity into their business using the frameworks and standards from the Cybersecurity&nbsp;and Infrastructure Security&nbsp;Agency (CISA), National Institute of Standards and Technology (NIST), Center for Internet Security (CIS), Federal Communications Commission (FCC), Federal Trade Commission (FTC), Payment Card Industry Security Standards Council and more.</span></li></ul></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Privacy Awareness for Parents:&nbsp;</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Today, kids are growing up in a world that is completely different from the world their parents grew up in. Not only is it important to teach kids to be safe by looking both ways before crossing the street and not talking to strangers, in today's world kids should also learn online safety and privacy. While there are parental controls that can be implemented on kid's devices and online accounts to protect them online, it is also important for them to learn about data privacy and security and the consequences of not making their personal information private.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">A great way to introduce kids to online safety is by using the &quot;Stop. Think. Connect.&quot; awareness campaign. Stop. Think. Connect. is an online initiative led by the NCSA that encourages all internet users to be more vigilant about practicing safe online habits. Stop. Think. Connect. is also the rule that can be taught to kids to ensure their using the internet safely and securely.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;color:inherit;"><br></span></p></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Stop, before accessing the internet, and make sure safety and security measures are in place</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Think about the potential consequences of your online actions; and</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Connect to the internet knowing you are protecting yourself and personal data.</span></li></ul></div></div></blockquote><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Additional lessons for kids in security and privacy include the importance of protecting personal information, checking privacy settings on all online accounts, learning to identify safe and trusted websites or mobile applications, and understanding that what happens on social media can stay online forever.&nbsp;</span></p></div><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Stop. Think. Connect.</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The Stop. Think. Connect. website is a great source that provides tips and advice for protecting personal information, accessing secure websites, maintaining device&nbsp;security and more. There are also resources available which are great references when having a &quot;tech talk&quot; with kids and teenagers. Resources are even available for adults regarding cybercrimes, cyber safety, digital decluttering, event specific privacy tips (such as when planning a wedding, vacation, or when holiday shopping), and more.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">While Data Privacy Day may only come once a year, the ultimate goal is to spread awareness so everyone can live a privacy-aware lifestyle. Feel free to contact us and let us know how you are taking control of your online privacy at home and creating a Privacy-Aware environment in the workplace.&nbsp;</span></p></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 27 Jan 2023 12:08:00 -0500</pubDate></item><item><title><![CDATA[Identifying Spoofed Emails]]></title><link>https://www.zwirentitle.com/blogs/post/Identifying-Spoofed-Emails</link><description><![CDATA[Spoofed emails are more challenging to spot because the messages look like they are actually coming from a known, trusted party. In real estate transactions, scammers will use transaction specific information gained from studying prior emails, to craft spoofed emails that are difficult to identify.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_88vI7Q0TTXymJKkjxnWHhA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZoI-ty0pRVqQkeKfEIxP-Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_G-aqIdYlROGPKRGKc6JFMQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_MN2-Ln6tSXqrB80UO18wfA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MN2-Ln6tSXqrB80UO18wfA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:24pt;">Identifying Spoofed Emails</span></b></span></h2></div>
<div data-element-id="elm_mqdsA5IxThKNyex2fDw89g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mqdsA5IxThKNyex2fDw89g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">A fraudster's income is largely based on defrauding innocent individuals, so like most other careers, the more proficient they become at their &quot;job&quot;, the more they earn. Real estate transactions are a huge target because it means a bigger pay day. This is simply a reminder that they are working relentlessly to defraud individuals because their livelihood relies on it.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Individuals can pay for and implement many forms of cybersecurity defenses such as security software and email spam filters; however, phishing and spoofed emails often get past the defenses and make it to the Inbox. Therefore, it is each person's job to be alert for suspicious activity to keep from becoming the scammer's next victim.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Spoofed Emails in Real Estate Transactions</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">In real estate transactions, scammers use phishing emails to compromise an email account of someone involved in a deal to gain access to that person's emails. Once they have access, they can read all of the emails related to&nbsp;the transaction and learn specific details that only those included in the emails would know (i.e. loan amount, closing date, funds needed to close, other parties involved in the transaction, etc.). Next, they will try to impersonate someone in the email thread by creating a similar email address or by forging the &quot;email from&quot; address. This is a process known as spoofing. Spoofed emails are emails from scammers that&nbsp;are made to appear like they are coming from a real person.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Spoofed emails are more challenging to spot because the messages look like they are actually coming from a known, trusted party. In real estate transactions, scammers will use transaction specific information gained from studying prior emails, to craft spoofed emails that are difficult to identify. When scammers choose who, within the transaction, they want to impersonate, they will study the prior emails written by that person and note any key words and phrases often used. Then, when crafting a spoofed email, they use those same key words and phrases, along with transaction specific details and will even copy that person's email signature to make it seem more legitimate.&nbsp;The scammer's ultimate goal, when sending spoofed emails, is to send fake wire instructions so funds are sent to their account, instead of the account of whomever is handling the settlement.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When reading about real estate wire fraud victims, many of them have said they had sent a few emails, back and forth with the scammer spoofing emails before receiving fake wire instructions, and they had no idea they were not communicating with the actual person. This is a clear indication that scammers are skilled at spoofing emails and impersonating people. Hence, learning to identify spoofed emails is critical for preventing wire fraud.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">The following are some examples of how you can identify a spoofed email.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">1. Look at the sender's actual email address.</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When sending their spoofed emails, scammers often create an email address that is similar to the person they are trying to impersonate&nbsp;by changing a few characters, or using a different domain extensions (such as “.net” or “.org” instead of “.com”)&nbsp;to trick users into thinking the email has&nbsp;come from a friend, colleague, vendor, client or other known party . They may even create a new email account&nbsp;at a public domain (i.e. Gmail, AOL, etc.) by copying the person's full email address (domain and extension included) to make it appear legitimate. The unsuspecting&nbsp;user won't see any spelling errors in the email address and may overlook the domain.&nbsp;Additionally, scammers often&nbsp;add a Display Name to their email which distracts the user from their spoofed email address.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">For example, in the below image, labeled Image #1, the display name says the email is coming from John Smith and it is addressed to you and your co-worker. Not very suspicious at first glance; however, if you look at the sender's actual email address (within the angle brackets) the spelling of &quot;John&quot; and &quot;Smith&quot; are not correct. The &quot;N&quot; in John was replaced with an &quot;M&quot; and the &quot;M&quot; in Smith was replaced with an &quot;N&quot;. Plus, in this example, the full email address, domain and extension were used to create a new Gmail account. At first glance, an unsuspecting user sees this email and doesn't think twice because it looks like John Smith's actual email address.&nbsp;</span></div></span></div>
</div></div><div data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width: 647px !important ; height: 145px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width:647px ; height:145px ; } } @media (max-width: 767px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width:647px ; height:145px ; } } [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-SendersAddress.png" width="647" height="145" loading="lazy" size="original" alt="Image #1" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #1: Check the sender's actual email address</span></figcaption></figure></div>
</div><div data-element-id="elm_SDtBzeWijuEmhh3nx1F0Fw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SDtBzeWijuEmhh3nx1F0Fw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Therefore, if you receive an email from someone you know, but the content of the email seems suspicious, out of character, or request’s sensitive information, double check the sender’s email address to ensure it is spelled correctly and has the correct domain and domain extension.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">2. Check where the email response will go.</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Some scammers will send spoofed emails that appear to come from the actual email address of whomever they are impersonating. Since the email looks like it came from a legitimate source, checking the sender's email address is not an effective method of identifying a spoofed email.&nbsp;Scammers who spoof emails like this can easily trick users into reading their emails;&nbsp;however, since their goal is to correspond with the user, the scammer needs to receive the user's email reply.&nbsp;They accomplish this by manipulating the email's &quot;Reply-to&quot; settings, which are email settings that allow the sender to program where a reply email is sent. The scammer will program the email so the reply is sent to themselves and not sent to email address of the person they have spoofed.</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">For example, in the below email header (Image #2), the email address is correct, leading the user to believe the email is legitimate.&nbsp; Upon clicking &quot;Reply&quot;, the response message automatically populates an email address into the &quot;To&quot; field, based on sender's &quot;Reply-To&quot; settings.&nbsp;In Image #3 below, the email address that populated in the &quot;To&quot; field is clearly not the same email address that sent the initial email (from image #2).&nbsp;</span></div></span></div>
</div></div></div><div data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width: 621px !important ; height: 141px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width:621px ; height:141px ; } } @media (max-width: 767px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width:621px ; height:141px ; } } [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-SendersAddress-Correct.png" width="621" height="141" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #2: Sender's email address is correct, so check the Reply-To email address</span></figcaption></figure></div>
</div><div data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width: 623px !important ; height: 163px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width:623px ; height:163px ; } } @media (max-width: 767px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width:623px ; height:163px ; } } [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-ReplyAddress.png" width="623" height="163" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #3: Reply-To email address doesn't match the sender's address</span></figcaption></figure></div>
</div><div data-element-id="elm_oeM7keib4_BZ3PQxUOOjpQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oeM7keib4_BZ3PQxUOOjpQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When an email from someone you know seems out of character or requests sensitive information that is unnecessary for the sender to have, you may have a suspicion that something isn't right, so you check the sender's email address, to make sure it is correct.&nbsp;When the email address is spelled correctly and the domain extension is also correct, check who the Reply Email will be sent to by simply clicking the &quot;Reply&quot; button. Also, if you have any questions as to the validity of the email it may be a good idea to forward the email to the actual person's known trusted email address instead of replying to the suspicious email.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">3. Look at the phone number in the email signature</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">In real estate transactions, parties are typically advised to call and confirm wire instructions before sending wires. Therefore, when scammers send fake wire instructions, they will copy and paste the email signature of the individual they are impersonating; however, they often&nbsp;replace the phone number in the email signature with their own phone number. This ensures the party who received fake wire instructions will call the scammer to confirm the fake wire instructions. When the scammer confirms the fake wire instructions are correct, the unsuspecting user ends up sending their funds to the scammer's account and by the time anyone realizes, the funds are no longer traceable.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Image #4 below, shows John Smith's actual email signature and the scammer's spoofed email signature. At first glance, they look identical, and any unsuspecting reader could be fooled; however, when you look at the phone number in the scammer's spoofed email signature, it is not the same as John's actual phone number. Not only is it different, but it also has an area code for a different state.&nbsp;</span></div></span></div>
</div></div></div></div><div data-element-id="elm_ALNfMeyCAof62FioNE9Auw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width: 636px !important ; height: 192px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width:636px ; height:192px ; } } @media (max-width: 767px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width:636px ; height:192px ; } } [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-Email%20Signature.png" width="636" height="192" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #4: John Smith’s email signature vs. the Scammer’s email signature in Spoofed Email</span></figcaption></figure></div>
</div><div data-element-id="elm__u4Jc-1gRMPWL3exZQTyaQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__u4Jc-1gRMPWL3exZQTyaQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Checking the area code can be a helpful indicator of whether the email is spoofed. If you know a company is based out of New Jersey, but the phone number area code is from South Carolina, a warning&nbsp;signal should go off in your head. However, even if the area code was from the same state as the company and the email seems suspicious, you could compare the phone number to another email from that person, but the easiest solution is find a company's phone number online, either on Google (or any other trusted search browser) or by visiting the company website. Especially when it comes to confirming wire instructions, it is recommended that the phone number is either confirmed prior to receiving the wire instructions via email or from a known trusted source (like the company's website).&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Always to be On-The-Lookout for Spoofed Emails</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Remember to keep these tips in mind when reading emails. Scammers are always looking for ways to infiltrate real estate transactions and exploit individuals for their own personal gain That is why it is important to always remain vigilant when receiving emails, whether it is from an unknown sender, an organization you are familiar with, or even someone you know.</span></p></div>
</div></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 19 Dec 2022 15:55:01 -0500</pubDate></item><item><title><![CDATA[Cybersecurity Awareness Month]]></title><link>https://www.zwirentitle.com/blogs/post/Cybersecurity-Awareness-Month</link><description><![CDATA[In 2004, the US Government declared October as Cybersecurity Awareness Month to help individuals protect themselves online as threats to technology and confidential data became more common.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_YjnmQHcCREGWsnoo0pB7zQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_vw6hXEaHQGCFTpKOQ_HgPA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_MU515GIuTyu9KBqNDkTxqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_MU515GIuTyu9KBqNDkTxqQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6wxmrKr2SVSLYhZSKL-A4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6wxmrKr2SVSLYhZSKL-A4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:24pt;">Cybersecurity Awareness Month</span></b></p><div style="font-size:24pt;color:inherit;">​<b style="color:inherit;font-size:30px;"><span style="font-size:18pt;">2022 Theme: &quot;See Yourself in Cyber&quot;</span></b></div></div></h2></div>
<div data-element-id="elm_JDapgLQ1Tzy3F4z5yKQPBw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JDapgLQ1Tzy3F4z5yKQPBw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:left;"><span style="font-size:12pt;">In 2004, the US Government declared October as Cybersecurity Awareness Month to help individuals protect themselves online as threats to technology and confidential data became more common. A national campaign is lead by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA). This year’s theme is “See Yourself in Cyber”, focusing on each individual’s part in maintaining data security. For individuals and families, this means taking action to maintain basic cyber hygiene such as updating software on devices, utilizing strong unique passwords for each account, and enabling multifactor authentication on every account that offers it and remembering to “think before you click” on links received via email. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">As a personal note, I agree that maintaining basic cyber hygiene is crucial to keeping devices secure; however, I also believe it is important to understand why each of these tasks is effective. Understanding why, means learning about how cybercriminals work to compromise your security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Cybercriminals: Hackers vs. Scammers</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">There are cybercriminals who focus on hacking and cybercriminals who focus on scamming. Both types of cybercriminals typically work 24-7 to accomplish their goals. Hackers are skilled coders who spend their time scanning through device software looking for potential weaknesses that they can exploit. When they find weaknesses in the software, they develop malware or viruses that exploit those weaknesses to gain access to devices. Alternatively, scammers are those who focus on the exploiting the people who use the devices. They develop phishing emails and fake login websites that look almost identical to legitimate websites, to trick people into providing their login credentials. Using those login credentials, they can access those people’s accounts. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Significance of Updating Software</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">When hackers successfully find a way to hack into software and computers, it is typically through a weakness they have find in the software. When the security teams are alerted of the weakness that is being exploited by hackers, they issue a security patch, which patches up the weakness in the software. These security patches are included in software updates that are sent to the devices. Therefore, it is crucial to update your device software to maintain the device security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Many devices offer an “Automatic Software Update” option in the settings. For example, on iPhones, the automatic iOS updates can be turned on in the iPhone Settings. When the setting is enabled, the iPhone will download the iOS update as soon as it is available and send a notification advising that the updates are ready. Then, the installation of the iOS update will occur overnight, but only if the iPhone is charging and connected to Wi-Fi. Enabling the automatic software update option is an efficient way of keeping your devices up to date. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Significance of Strong Passwords</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">Scammers send phishing emails to try and lure people into providing their login credentials; however, they have other methods of gaining access to user accounts as well. Many people use personal information in their passwords, such as birthday, children’s names, pet’s names, and even favorite sports teams. When finds a scammer finds a target with personal information as a password, they could use a basic Google search to find out personal information and guess the person’s password. Therefore, utilizing a strong password is crucial. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">A strong password consists of at least one upper- and lower-case letter, number, and special character, however, a strong password may not be sufficient if the same strong password was used for multiple accounts. If a scammer were to find someone's strong password, the scammer would be able to gain access to each account that utilizes that same password. Thus, a unique password for every account is also essential to maintaining account security. It may be exhausting to have to come up with new, strong passwords for every account, but if you value your account security, it is necessary. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Multifactor Authentication</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">While strong unique passwords are essential and very helpful in preventing scammers from accessing accounts, multifactor authentication adds a second layer of security. Examples of Multifactor Authentication are biometric scanning (i.e., fingerprint, face scan, eye scan, etc.), would require the scammer to have a copy of your fingerprint. Another multifactor authentication method is entering a code that is provided through another method, such as texted to your phone, sent via email or recited during a phone call, and even sent to a second device or application, etc. These types of multifactor authentication would require the scammer to physically have your cell phone to receive the text message or open the security app or would need access to your email account to obtain the code. Therefore, if for some reason an account password is compromised, the user has the second layer of security protecting their account from the scammer. Not all accounts offer multifactor authentication, but when they do, it is a good idea to enable that extra level of security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">“Think Before you Click”</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">Many scammers who send phishing emails are skilled at building websites. They are capable of building a fake website that looks almost identical to a real website. Many phishing emails include a link to change your password or update your account settings. When people click the link, they are brought to the scammer’s fake website and prompted to enter their account login credentials. If they proceed by entering their username and password, when the click the “Login” button, they will be given a login error message. However, by clicking the “login” button, they are actually sending the login credentials to the scammer. Additionally, some scammers will buy viruses on the “dark web” and by clicking the link in the email or clicking the “login” button on the fake website, or even downloading a file attached to a scammer’s email, will trigger the virus to download onto your computer</span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><span style="font-size:12pt;"><div style="text-align:left;"><span style="font-size:12pt;color:inherit;">There are many things to look for that indicate an email is from a scammer. The most commonly known indicator is grammatical errors and typos, however, as scammers have become more advanced, their emails have fewer grammatical errors so it is important to look for other signs. Many scam emails are a template email, with no personalizing information. Typically, when receiving a legitimate email about your account security, the email will include some type of personalizing information, but most scammers won’t personalize the email template at all. Additionally, Try looking at the sender’s actual email address – a scammer will create a fake email account that may look similar to whoever they are trying to impersonate. For example, a scammer may try to impersonate Amazon.com by sending an email stating your account security has been compromised and then requesting the user to click the link to change their password. They may use an email domain such as @amazon-security.net; however, real Amazon security alerts come from the email domain @amazon.com. Checking the sender's actual email address may be a clear sign of a phishing email. Scammers also like to add a sense of urgency to their emails, to trick people into acting quickly, without thinking. They may say something along the lines of, &quot;If you don't act immediately, your account will be suspended&quot; (or deleted). Don't fall for their tricks! If you feel like you're being pressured to click the link, take a second and remember to look for any indication of a phishing email. If you don't see any, then to be safe, open a new web browser, type in the website URL and login from there (in a legitimate email the links are just a quicker way of getting to that login page).&nbsp;</span></div></span></div><div style="text-align:left;color:inherit;"><span style="font-size:12pt;"><br></span></div><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:left;"><span style="font-size:12pt;">While security software is available to help prevent scammer’s emails or identify potential malware and block it from downloading on devices, the security systems are only as good as the individuals using them. Therefore, it is crucial for an individual’s data security that they update software whenever it is available, utilize strong unique passwords, implement multifactor authentication whenever possible and remain vigilant when reading their emails by thinking before you click. Feel free to visit the Cybersecurity and Infrastructure Security Agency's Website for more information on how to be secure online.&nbsp;<i>(If I left the link, would you think before clicking it?)</i></span></p></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 05 Oct 2022 12:21:00 -0400</pubDate></item></channel></rss>