<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.zwirentitle.com/blogs/tag/news-you-can-use/feed" rel="self" type="application/rss+xml"/><title>Zwiren Title Agency, Inc - ZTA Blog #News You Can Use</title><description>Zwiren Title Agency, Inc - ZTA Blog #News You Can Use</description><link>https://www.zwirentitle.com/blogs/tag/news-you-can-use</link><lastBuildDate>Sat, 04 Apr 2026 09:31:40 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Even with MFA Enabled, Password Security Still Matters! ]]></title><link>https://www.zwirentitle.com/blogs/post/how-hackers-are-bypassing-mfa</link><description><![CDATA[Multifactor authentication is an incredibly effective security measure to add to accounts. However, we are now learning of hackers being able to bypass multifactor authentication using social engineering methods, such as fake websites. Learn how you can stay secure.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cJ2NvhlxSHqL1LHPmu0QDQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MwbBNeyyRBervbVCbXUS0w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VcVyPe1HToqPSxOixZmoUA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dCaV2OweR5uf1xkozqIvTA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:26px;">Even with Multifactor Authentication (MFA) Enabled, Password Security Still Matters</span><br/><span style="font-size:18px;">​How Hackers are Bypassing MFA</span></h2></div>
<div data-element-id="elm_9YA4UcMVSEKQCahryV1toQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p></p></div>
<p></p><span style="text-align:left;"><div style="text-align:justify;"> Setting up security measures does not mean you’re off the hook for being vigilant. It seems that every time a new security measure is introduced, it isn’t long before hackers find a way to circumvent those measures. Multifactor authentication (MFA) is an incredibly effective security measure to add to accounts. However, we are now learning of hackers being able to bypass multifactor authentication using social engineering methods, such as fake websites. </div></span><blockquote style="margin-left:40px;border:none;"><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;">&nbsp;</p></div>
</blockquote><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">1.&nbsp;Adversary in the middle (AITM) Attack</span></b></p></div>
</blockquote><div><p style="text-align:left;">AiTM attacks are similar to what we’ve seen from hackers in the past, with a unique new spin. Hackers are creating fake websites that look almost identical to legitimate websites. These fake websites are used to deceive users into believing they are logging into a real account. Users will enter in their login credentials into the hacker’s fake website, and as soon as hackers see the credentials are entered, they use those credentials to log in to the actual website, which will trigger the multifactor authentication email or text message or phone alert to get sent to the user. The user then enters in the code on the fake website, which the hackers then use as the code to log in to the actual website</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Prevention</b>: These fake websites are typically sent out via phishing emails, or spear phishing emails. Spear phishing is a form of phishing that targets specific individuals or organizations. The most basic solution for preventing yourself from falling victim to this form of an AiTM attack is not clicking the link in the email. When users receive emails with a link to view or sign into an account, don’t use the link in the email to get to the log in page. Open up a new tab or window in the browser and type in the URL, or Google search the company to find the login page, or even open up the mobile application to sign in.&nbsp;</p><p style="text-align:left;">Just DON’T CLICK THE LINK!</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">2.&nbsp;MFA Prompt Bombing / MFA Fatigue Attack</span></b></p></div>
</blockquote></div><div><p style="text-align:left;">Some mobile applications offer multifactor authentication in the form of a notification being sent to a smartphone, which opens the mobile application and gives the user the option to approve or deny the login attempt. MFA Prompt Bombing is a tactic hackers have started using after compromising a password (through the usual methods of phishing emails, etc). The hacker will attempt to log in to a user’s account, which sends the user’s phone the notification for approval. The user may find it rather unexpected, so they deny the notification. The hacker will then attempt to log in again, sending a second notification to the user’s phone. The user denies it again.&nbsp; The hacker will continually attempt to log in, spamming the user with MFA notifications, hoping that eventually, the user will either click approve by accident or get so fed up with the notifications, that they click approve to make it stop.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Example:</b>&nbsp;In one instance, when Uber was hacked in 2022, an external contractor was on the receiving end of the MFA Prompt Bombing received a message on WhatsApp from the attacker, pretending to be Tech Support. The message advised the user to accept the MFA prompt. This message is what caused the attack to be successful.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Prevention</b>: If a user finds themselves in the middle of an MFA Prompt Bombing attack, it is likely that the hacker already knows the user’s password – if they didn’t have the correct password, they wouldn’t progress to the MFA screen. Rather than just denying the login attempt over and over again, hoping it will stop, try logging into that account and changing the password. Ideally, that would stop the prompt bombing because the hacker would no longer have the correct password.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">3.&nbsp;Service Desk Attacks</span></b></p></div>
</blockquote></div><div><p style="text-align:left;">Hackers have learned they can bypass MFA by making phone calls to a help desk phone number, pretending to be a user who has forgotten their password. If the service representative on the phone does not enforce the proper verification procedures, they may grant access to hackers.</p></div>
</blockquote><div><div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
</div><div><blockquote style="margin-left:40px;border:none;"><span style="font-size:18px;"><p></p></span></blockquote><p></p></div>
<div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
<div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><p></p></div>
<div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
<div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><p></p><p style="text-align:left;"></p><p></p><p></p></div>
<div><p style="text-align:left;">&nbsp;</p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="text-align:left;"><b>Example:</b>&nbsp;The hackers behind the recent MGM Resorts attack used this method, calling to reset a password. The representative unknowingly gave the hackers access to their network, where they were able to upload malware to launch a ransomware attack.</p></div>
</blockquote><div><p style="text-align:left;">&nbsp;</p><p style="text-align:justify;">It is abundantly clear that users MUST continue to pay attention to their security, even with all of their security measures in place. There are several ways for hackers to bypass security measures, so staying vigilant is key (and doesn’t take too much effort). Avoid clicking the links in emails, especially links to login accounts. If for some reason you do click the link in the email, pay attention to the URL – is it the real website? Additionally, password security is still important, even will all the additional security procedures in place. Make the effort to regularly change your passwords and when you do change them, make them unique for each account, with a mix of upper- and lower-case letters, numbers, and special characters. Implementing a strong, unique password for each account makes guessing passwords more difficult for hackers and spammers.</p><p style="text-align:right;"><span style="font-size:8px;">-Emily Comora</span></p></div>
<p></p></div></div><div data-element-id="elm_QiREneI2LnR4QZQyXE75WA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:10px;">The Hacker News (2024, Feb 24) 4 Ways Hackers use Social Engineering to Bypass MFA.&nbsp;<i>The Hacker News.&nbsp;</i>Retrieved from&nbsp;</span><span style="font-size:10px;">https: //thehackernews</span><span style="font-size:10px;">. com/ 2024/ 02/4-ways-hackers-use -social-engineering.html</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 30 Apr 2025 14:28:00 -0400</pubDate></item><item><title><![CDATA[Augmented Reality]]></title><link>https://www.zwirentitle.com/blogs/post/augmented-reality</link><description><![CDATA[Augmented Reality (AR) is a technology that has gained immense popularity in recent years, offering a revolutionary way to seamlessly integrate digital information into the real world. AR technology superimposes digital information, such as images, videos, 3D models, or sound, on to the real world.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yCsg76EjT5i-GqPu5UN2pQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-96rdWQURnKFd57UaqLvSg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_CbZKvHq8RBWgK-yfElhKDw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9jrtIqFZT-G9oO6LroharA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9jrtIqFZT-G9oO6LroharA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Augmented Reality</span></b></p><span style="font-size:20pt;">Transforming Our World with Digital Magic</span></div></h2></div>
<div data-element-id="elm_ui3CrxgXRFG6J318ytO2DQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ui3CrxgXRFG6J318ytO2DQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Augmented Reality (AR) is a technology that has gained immense popularity in recent years, offering a revolutionary way to seamlessly integrate digital information into the real world. AR technology superimposes digital information, such as images, videos, 3D models, or sound, on to the real world. Unlike Virtual Reality (VR), which immerses users in a completely digital environment, AR enhances the physical world by adding digital elements. This overlay can be achieved through various devices, such as smartphones, tablets, smart glasses, and headsets. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">You may be familiar with AR if you have recently purchased or looked at furniture online. Many retail websites/mobile apps offer Augmented Reality to show how a piece of furniture will look in the user’s living spaces – and all users need is their smartphone camera! Alternatively, you may have utilized AR if you have ever used social media to overlay filters, effects and interactive elements onto your photos or videos!</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">How Does AR Work?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">AR relies on a combination of hardware and software to function. The hardware includes cameras, sensors, and displays on devices such as smartphones, tablets, headsets or AR glasses. These devices capture the real-world environment, process the data, and then display digital content on the user's screen in real-time. Software plays a crucial role in recognizing the environment, tracking objects, and aligning digital content with the physical world.&nbsp;AR applications and platforms enable the creation and deployment of augmented reality experiences. These applications use computer vision algorithms to recognize and track real-world objects, allowing digital content to interact seamlessly with the environment.</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Impact on Industries</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">Augmented Reality is reshaping industries by improving efficiency, enhancing user experiences, and creating new opportunities for innovation. The potential for AR's impact is vast, and it continues to evolve and expand its reach. The following are examples of how AR can be and is already being used in different industries:</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Real Estate</span></b><span style="font-size:12pt;">: AR can potentially change the way that homes are previewed. Rather than using VR to tour a property on the computer from the comfort of your home, AR can create a new type of virtual experience for buyers when visiting a property. Potential buyers would be able to use their smart phone to scan a room in the house and with the help of AR, detect the objects and furniture in the room or obtain the room’s dimensions. Then, while standing in the room, they would be able to rearrange the furniture in the room, remove objects, or even replace objects with their own choice of furniture and décor. Such an experience can give potential buyers an idea of what the house could look like if they were to buy it. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Retail: </span></b><span style="font-size:12pt;">In the retail sector, AR is utilized for virtual try-on experiences or product visualizations, allowing customers to preview products before making a purchase. AR can also be used for interactive product demonstrations and in-store navigation. The Target App has a feature called “See it in Your Space” allows customers to digitally view how objects would appear in their home and the Walmart App lets you virtually try on certain clothing items to give users and idea of how the item will fit.&nbsp; Additionally, Treasury Wine Estates, the vineyard behind 19 Crimes wines have implemented AR into their Wine Labels. By downloading their app and scanning the wine bottle’s label, the face on the label comes to life, confessing their crime. The possibilities for AR in Retail are endless. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Healthcare</span></b><span style="font-size:12pt;">: AR has transformative applications in healthcare, from surgical training simulations to real-time augmented imaging during medical procedures. It enhances precision and improves patient outcomes, oftentimes with less invasive procedures. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Gaming and Entertainment</span></b><span style="font-size:12pt;">: AR gaming apps such as Pokémon GO have brought AR to the mainstream, allowing users to hunt virtual creatures in real world locations using their smartphones. Additionally, apps such as Snapchat and Instagram use AR to overlay filters, masks, or little dancing Bitmoji's over the user’s images. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Education</span></b><span style="font-size:12pt;">: AR is used in educational settings to enhance learning experiences. For example, students can use AR apps to explore anatomy in 3D, bring historical events to life through interactive AR simulations, or explore virtual reconstructions of ancient civilizations.</span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Challenges and Future Outlook</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">Despite its promising potential, AR faces challenges such as privacy concerns, technological limitations, and the need for widespread adoption. However, ongoing advancements in hardware, software, and increased investment suggest a bright future for augmented reality in various fields. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">In summary, augmented reality represents a groundbreaking technology that blurs the lines between the digital and physical realms. Its applications span various fields, and its impact on industries is profound. As AR continues to evolve, its applications across diverse industries are poised to transform the way we learn, work, and interact with the world around us.</span></p></div></div>
</div><div data-element-id="elm_m1KaJbk5DJDBzS2NM8K4Qg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_m1KaJbk5DJDBzS2NM8K4Qg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-size:10px;">References:&nbsp;</span></p><span style="font-size:10px;"><span></span><p><span style="color:inherit;">Gillis, Alexander S. (2022, Nov). Augmented Reality.&nbsp;</span><i style="color:inherit;">TechTarget: WhatIs.com.&nbsp;</i><span style="color:inherit;">Retrieved from https://www.techtarget.com/whatis/definition/</span><span style="color:inherit;">augmented-reality-AR. Nov 2023</span></p><p><span style="color:inherit;"><br></span></p><span></span><p><span>High, Spencer (2022, Nov 12). Augmented Reality and Generative AI Could Transform Future of Real Estate Marketing. <i>National Association of Realtors:&nbsp;</i></span><i style="color:inherit;"><span>Newsroom.</span></i><span style="color:inherit;"> Retrieved from https://www.nar.realtor/newsroom/augmented-reality-and-generative-ai-could-transform-future-of-real-estate-marketing. Nov 2023.</span></p><p><span style="color:inherit;"><br></span></p><span></span><p><span>The Fu Foundation School of Engineering and Applied Science (n.d.). Augmented Reality Examples: Use Augmented Reality Marketing in Your Business.&nbsp;</span><i style="color:inherit;"><span>Columbia Engineering; The Fu Foundation School of Engineering and Applied Science. </span></i><span style="color:inherit;">Retrieved from https://bootcamp.cvn.columbia.</span><span style="color:inherit;">ed u/blog/augmented-reality-examples/. Nov 2023.</span></p></span></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 29 Dec 2023 12:07:00 -0500</pubDate></item><item><title><![CDATA[Unlocking the Power of QR Codes]]></title><link>https://www.zwirentitle.com/blogs/post/Unlocking-the-Power-of-QR-Codes</link><description><![CDATA[QR Codes, short for "Quick Response code", have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format...]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SdX__yuSTUyJWTwNXBxbXw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WcqX3vwvR4iEwR6LvEpH-A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_D30ewmUqQ_6_x3121CL9UA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_D30ewmUqQ_6_x3121CL9UA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mhCFyBHvScammPdVK7hvfw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mhCFyBHvScammPdVK7hvfw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">Unlocking the Power of QR Codes:</span></b></span><br><span style="font-size:30pt;color:inherit;">​</span><b><span style="font-size:20pt;">A Comprehensive Guide</span></b><br></h2></div>
<div data-element-id="elm_7ybm0empQvaij_ublEU-gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7ybm0empQvaij_ublEU-gQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">QR Codes, short for &quot;Quick Response code&quot;, have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format. Standard barcodes can only be read in one direction (top to bottom) which means they can only store a small amount of information. Alternatively, QR Codes are read in two directions, top to bottom and left to right, and can be scanned in any direction. This makes them to be easier to capture and allows these codes to store significantly more data than a standard barcode. Additionally, QR codes have an error correction function that makes the code readable even if parts of the code are stained or damaged. QR codes can store a website URL, phone number, digital business card, shipping label, or up to 4,000 characters of text.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">History of QR Codes</span><br></p><p style="text-align:justify;">QR codes were first developed in Japan in 1994 by a company called Denso Wave, a subsidiary of the Toyota Group, as a means of tracking vehicle parts during the manufacturing process. The company declared they would not exercise patent rights, making their QR code technology available to the public. While they were slow to gain popularity, the first mobile devices with QR code readers were created in 2002.As smartphones gained popularity, QR codes became more common. In 2020, Denso Wave continued to improve their original design, adding traceability, brand protection and anti-forgery technology into QR codes.</p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Today, their use has expanded far beyond automotive manufacturing, with applications across various industries. Marketers started using QR codes in ad campaigns to direct consumers to product information or special offers by putting the codes on posters inside or outside of stores, billboards, and even in commercials. During the COVID-19 pandemic, many restaurants replaced hard copies of printed menus with QR codes to comply with CDC guidance and create a “touchless” environment. Interestingly, there is even a company based in the UK, called QR Memories, that creates QR codes for use on gravestones, allowing people to scan the code to read more about that deceased person’s life (typically linking to an obituary or news story relating to them online).</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">How QR Codes Work</span></p><p style="text-align:justify;">QR codes function as a bridge between the physical and digital worlds. They can store a variety of data, such as text, URLs, contact information, or even Wi-Fi network credentials. The patterns within QR codes represent binary codes that can be interpreted to reveal the codes data. A QR code reader can identify a standard QR code based on the three large squares within the code. Once it has identified these shapes, it knows that everything contained inside the square is a QR code. To analyze the code, the scanner breaks the code down into a grid looking at the individual grid squares. Each square in the grid is assigned one a value based on whether it is black or white. It then groups the grid squares to create larger patterns.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Are QR Codes Safe?</span></p><p style="text-align:justify;">While many people are aware that QR codes can open a website, they can be less aware of the other actions that QR codes are capable of initiating on a user’s device. Aside from opening a website, a QR code can be used to execute code. Therefore, it is possible for spammers to program QR codes with URL's that lead to phishing websites used for obtaining unsuspecting user’s personal information or login credentials. It is also possible for cybercriminals to program a QR code with custom malware which could be used to exfiltrate data from a mobile device when scanned, add contacts to your device or even compose emails. A typical “attack” would involve scammers placing malicious QR codes in public places, or even covering up legitimate QR codes. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">With all the possible malicious uses of QR codes and the fact that users cannot determine what a QR code will do just by looking at it, do the benefits outweigh the risks? As with most technology these days, it seems there is always a risk. If you know for sure that a QR code is from a trusted source, then it is probably safe to scan. However, if you are out in public and see a random QR code stuck to a pole on the side of the road, with no context, scanning that code may not be the best idea. Alternatively, there are secure QR code scanners that you can download to your smartphone. For example, Kaspersky QR Scanner instantly checks that a scanned link is safe before providing any information to the user and will alert the user of phishing scams and dangerous links. It also creates a log of past scans so, if necessary, users can look back to see where and when they were compromised. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Additionally, users may be concerned about QR Codes collecting personal data however, the only data that QR codes do collect (which is only available to the QR code’s creator) includes location, number of times the code has been scanned, the time of day the code was scanned and the operating system of the device that scanned the code.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Conclusion</span></p><p style="text-align:justify;">QR codes have evolved from their origin in the automotive industry to become versatile tools used in marketing, retail, healthcare, and more. Understanding how QR codes work and implementing best practices in their use can enhance customer engagement and convenience. As technology continues to advance, QR codes are likely to remain a valuable asset in bridging the physical and digital realms.</p></div>
</div></div><div data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:8pt;">Kaspersky (n.d.) <i>QR Code Security: What are QR Codes and are they safe to use</i>. Kaspersky. Retrieved from&nbsp;https://usa.kaspersky.com/resource-</span><span style="font-size:8pt;color:inherit;">center/definitions/what-is-a-qr-code-how-to-scan. Accessed 2023.</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Nov 2023 11:26:00 -0400</pubDate></item><item><title><![CDATA[Bluetooth Technology]]></title><link>https://www.zwirentitle.com/blogs/post/Bluetooth-Technology</link><description><![CDATA[Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_5hKn-LHFRpe8YsYXToqjNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BN8x8sn1QTm4FeD1kxeYRQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fdF4FV5iQWqAM8NDzxqiGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Bluetooth Technology</span></b></p><div style="font-size:30pt;color:inherit;"><span style="color:inherit;"><b><span style="font-size:16pt;">Is there a Privacy or Security Concern to be aware of?</span></b></span><br></div></div></h2></div>
<div data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance (for most devices, the range is about 30 feet when there are no walls or other obstacles present). Devices that contain Bluetooth technology include smart phones, laptops and desktop computers, vehicles, wireless headphones or speakers, smart watches, and even internet connected devices. Therefore, a user can connect their smartphone to their wireless headphones or speakers to play music or connect their phone to their vehicle to talk on the phone “hands free” while driving. Users can even use Bluetooth technology to share images with another Bluetooth-connected device (on Apple devices, this is commonly referred to as “Air Dropping” and on Samsung phones it is called “Quick Share”). While there are many benefits to utilizing Bluetooth technology, there have been a lot of articles noting security and privacy concerns to be aware of when Bluetooth is left on (or enabled) after a user has ended the connection between devices.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUETOOTH HACKING – IS YOUR SOFTWARE UP TO DATE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Security researchers are constantly finding new threats to device security. &nbsp;For example, in 2017 Armis, a security research firm, discovered a Bluetooth vulnerability known as “BlueBorne”. When hackers used the “BlueBorne” to attack a device, they were able to control Bluetooth-enabled devices remotely, which gave them the opportunity to steal data from the device. Additionally, the “BlueBorne” could spread from one phone to another phone, like a virus. This gave hackers the ability to infect more phones without having to physically be within the 30-foot range of each device. &nbsp;Fortunately, the security research firm was able to create a security patch for devices to prevent the “BlueBorne” attack. A security patch is code for the operating system that fills in the vulnerability to prevent hackers from exploiting the vulnerability. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;As cybersecurity firms identify new vulnerabilities in the Bluetooth software, they create new security patches which are rolled out in updates to the software or devices; however, they are only helpful when users update their software. Therefore, updating the software on Bluetooth enabled devices is crucial to eliminate any known vulnerabilities from being exploited and keep your devices secure. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUEJACKING – ARE YOU RECEIVING UNSOLICITED OR PHISHING MESSAGES VIA BLUETOOTH?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;On smart phones and laptops, the Bluetooth setting has the option of being enabled or disabled. When an individual leaves their Bluetooth enabled on their smart phone, they open themselves up to “Bluejacking”. “Bluejacking” is when someone uses a device’s enabled Bluetooth connection to send unsolicited messages. Messages may be a harmless prank from a teenager but could also be a phishing attack. Many people are aware of Phishing emails; however, Phishing messages can be sent via Bluetooth connection. A malicious actor may use “Bluejacking” to send a phishing message to a smart phone or laptop, pretending to be a trusted source, such as a bank, phone company or social media application. The message typically entices the user to click a link that leads either to a website that automatically downloads malware to a device or a fake website designed to look similar to well-known companies and requests the user provide login credentials or other sensitive information. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;To avoid any “Bluejacking” pranks or Phishing messages shared through Bluetooth connection, it is advised that users disable the Bluetooth setting when they have finished using the connection. However, if a user is connecting to Bluetooth devices multiple times per day, it may be tedious to enable and disable the Bluetooth setting before and after using. Alternatively, a user can adjust their device settings to prevent unknown contacts from sharing messages via Bluetooth connection. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">IS YOUR DEVICE PAIRED TO A VEHICLE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;If you connect your smartphone to a vehicle, your phone’s data may be shared with the car. If it is your personal car, it may not be an issue; however, if you connect to a rental car, you want to be aware of the data your phone is sharing with the rental car. Major car-rental companies have no policies to delete sensitive information collected during the trip after you return the car. Your name and navigation history are considered valuable personal information. Using such data, combined with information publicly available on the internet and social media platforms, a malicious actor could track down an individual. Data that could be collected by a vehicle includes your email address, GPS history, phone book, call log and text messages (if hands-free calling and messaging is used), music streaming login, and more. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Interestingly, thus far, data collected on vehicles has been used to fight crime. One man was able to track down teenagers that took his car for a joy ride, using the phone usernames that were stored in the car’s device list. Alternatively, people with malicious intentions can also use data to track people down. To protect yourself, before returning a rented car AND before selling or trading in your personal car, take the time to delete your personal data from the vehicle. This can be done by going into the system settings or Bluetooth settings and deleting your device from the “paired phones” list; or by restoring the vehicle to the factory settings. If you are having difficulty, the car manual can guide users through unpairing a phone and deleting information. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">SHOULD YOU BE CONCERNED ABOUT BLUETOOTH HACKING?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Generally, most people should not be concerned about Bluetooth hacking. Cybercriminals typically target people with high level security clearance. However, it does not hurt to be extra cautious. IT professionals recommend the following:&nbsp;</span></p><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;">Turn off “discoverable mode”, except when pairing new devices.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">If you’re always using the same peripheral devices, such as Bluetooth headphones, Bluetooth keyboard or mouse, or even Bluetooth connection in the car, “discoverable mode” does not need to be turned on because your device will remember the Bluetooth device’s unique identifier. </span></li></ul></ul><ul><li style="text-align:justify;"><span style="font-size:12pt;">Disable the Bluetooth setting when it is not in use.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">For those who connect to Bluetooth devices multiple times per day, instead of&nbsp; disabling and re-enabling Bluetooth on the device, update the device’s settings to prevent unknown contacts from sharing messages through Bluetooth connection will prevent unsolicited messages or images from being “Air Dropped” or “Quick Shared” to your phone. </span></li><li style="text-align:justify;"><span style="font-size:12pt;">For those who do not want to disable or update their device’s Bluetooth settings, &nbsp;only accept paring and messages requests that are shared via Bluetooth connection from known contacts. </span></li></ul><li style="text-align:justify;"><span style="font-size:12pt;">Deleting personal and device information from rented vehicles that remains saved in the car’s settings after using the Bluetooth connection.&nbsp;&nbsp;</span></li></ul><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;">Furthermore, as with all technology today, it is recommended that Bluetooth devices are updated regularly. This ensures the devices are running the latest software which includes security patches for newly identified vulnerabilities.</span></p><p style="text-align:right;"><span style="color:inherit;"><span style="font-size:8pt;">-Emily Comora</span></span><span style="font-size:12pt;"><br></span></p></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 12:18:00 -0400</pubDate></item><item><title><![CDATA[NATIONAL DATA PRIVACY DAY]]></title><link>https://www.zwirentitle.com/blogs/post/NATIONAL-DATA-PRIVACY-DAY</link><description><![CDATA[Data Privacy Day began in the US in 2008, commemorating the signing of Convention 108 - the first legally binding treaty dealing with privacy and data protection. In 2014, the US Congress adopted S. Res. 337, a non-binding resolution designating January 28 National Data Privacy Day.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_JbRCrXDDTciu8tSOFvKSLw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BNPOSeFSQsCe0UnBiI3zcA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FKv76nNwSjGcvtDKuSkMqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZaLAmKlGRxyezcBy1jh-FA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZaLAmKlGRxyezcBy1jh-FA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1>NATIONAL DATA PRIVACY DAY</h1><div style="color:inherit;">January 28, 2023</div></div></h2></div>
<div data-element-id="elm_OClFFzJITVGAfqUIbKGbug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OClFFzJITVGAfqUIbKGbug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Companies collect personal information from users each time they visit a website, set up an online account, or use internet connected devices; however, most people do not know what kind of personal data is collected.&nbsp;According to Pew Research Center, 79% of Americans believe that have no control over what personal data is collected by companies. While it may seem that way, companies are obligated to explain how they collect and use people's data within their Privacy Policy. Additionally, account privacy and security settings often allow users to choose how their data is collected and used.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">For example, when you talk to Amazon's Alexa from your phone, Amazon Echo, or any other smart device, your voice is recorded and saved on Amazon's Cloud until manually deleted and the stored recordings are available for Amazon employees to listen to. Fortunately, Amazon's account privacy settings allow users to delete voice recordings automatically, after a set time period, and prohibit Amazon employees from listening to the saved recordings. All the user has to do is login to their account and change the settings to what they are comfortable with.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Unfortunately, there are online accounts and mobile applications that require certain personal information in order to access their services. For those companies, the personal information collected is of tremendous value; however, it is up to each individual to decide whether the service they are getting in return is worth the data they must hand over, even when the service is free.&nbsp; </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">DATA PRIVACY DAY</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Data Privacy Day began in the US in 2008, commemorating the signing of Convention 108 - the first legally binding treaty dealing with privacy and data protection. In 2014, the US Congress adopted S. Res. 337, a non-binding resolution expressing support for designating January 28 &quot;National Data Privacy Day.&quot;&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The National Cyber Security Alliance (NCSA) encourages everyone to learn about and understand how to protect their online data. They advise everyone to check the privacy and security settings on every app, account or device and adjust the settings to a level of privacy and security they are comfortable with. It doesn't have to be all at once. They advise starting with the accounts that are used the most frequently, then make a habit of updating one account per week until all of your accounts are updated with the privacy settings of your choice. On the NCSA website there is an in-depth list of common websites and apps with direct links to the account privacy and security settings or to read the company's privacy policy.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The NCSA also recommends reading a company's Privacy Policy before signing up for an account to get a better understanding of what data is collected and what&nbsp; they will do with that data. While many people are worried about their privacy online, few will actually read the privacy policies to learn how companies are using their personal information. A survey performed by Deloitte revealed that 90% of consumers accept legal terms and conditions without reading them. The survey also found that more than 81% of consumers feel they have lost control over the way their personal data are collected and used; however, only 13% of consumers said they never share personal information online. In order for users to understand and control how their data is being collected and used, they must learn what they can do to protect their personal information.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Privacy Awareness for Small Businesses&nbsp;</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">For businesses that collect consumer's data, trust is crucial to the consumer relationship. Consumers trust that the personal information they share is protected. While businesses may never knowingly put their consumer's data at risk, lax security practices can jeopardize a company's sensitive data and expose them to threats. Any company that has a website, communicates electronically via email, or stores customer information in an electronic database has a potential risk of getting hacked if the right precautions are not in place.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Data Privacy Day is an excellent reminder to create, what the NCSA calls a, &quot;Culture of Privacy&quot; at work by teaching all employees what privacy means to your company and the role each person plays in making sure that client and customer's privacy is achieved and maintained.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The NCSA's website provides a list of resources for small businesses, including:&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">A list of Free Online Security Checkups and Tools that will scan company devices for known malware and identify if any devices are vulnerable to cyber-attacks</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Tips for protecting Consumer Information</span></li><li style="text-align:justify;"><span style="color:inherit;">Informative videos and workshops to advise Small Business Owners how they can implement cybersecurity into their business using the frameworks and standards from the Cybersecurity&nbsp;and Infrastructure Security&nbsp;Agency (CISA), National Institute of Standards and Technology (NIST), Center for Internet Security (CIS), Federal Communications Commission (FCC), Federal Trade Commission (FTC), Payment Card Industry Security Standards Council and more.</span></li></ul></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Privacy Awareness for Parents:&nbsp;</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Today, kids are growing up in a world that is completely different from the world their parents grew up in. Not only is it important to teach kids to be safe by looking both ways before crossing the street and not talking to strangers, in today's world kids should also learn online safety and privacy. While there are parental controls that can be implemented on kid's devices and online accounts to protect them online, it is also important for them to learn about data privacy and security and the consequences of not making their personal information private.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">A great way to introduce kids to online safety is by using the &quot;Stop. Think. Connect.&quot; awareness campaign. Stop. Think. Connect. is an online initiative led by the NCSA that encourages all internet users to be more vigilant about practicing safe online habits. Stop. Think. Connect. is also the rule that can be taught to kids to ensure their using the internet safely and securely.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;color:inherit;"><br></span></p></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Stop, before accessing the internet, and make sure safety and security measures are in place</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Think about the potential consequences of your online actions; and</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Connect to the internet knowing you are protecting yourself and personal data.</span></li></ul></div></div></blockquote><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Additional lessons for kids in security and privacy include the importance of protecting personal information, checking privacy settings on all online accounts, learning to identify safe and trusted websites or mobile applications, and understanding that what happens on social media can stay online forever.&nbsp;</span></p></div><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Stop. Think. Connect.</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The Stop. Think. Connect. website is a great source that provides tips and advice for protecting personal information, accessing secure websites, maintaining device&nbsp;security and more. There are also resources available which are great references when having a &quot;tech talk&quot; with kids and teenagers. Resources are even available for adults regarding cybercrimes, cyber safety, digital decluttering, event specific privacy tips (such as when planning a wedding, vacation, or when holiday shopping), and more.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">While Data Privacy Day may only come once a year, the ultimate goal is to spread awareness so everyone can live a privacy-aware lifestyle. Feel free to contact us and let us know how you are taking control of your online privacy at home and creating a Privacy-Aware environment in the workplace.&nbsp;</span></p></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 27 Jan 2023 12:08:00 -0500</pubDate></item><item><title><![CDATA[Identifying Spoofed Emails]]></title><link>https://www.zwirentitle.com/blogs/post/Identifying-Spoofed-Emails</link><description><![CDATA[Spoofed emails are more challenging to spot because the messages look like they are actually coming from a known, trusted party. In real estate transactions, scammers will use transaction specific information gained from studying prior emails, to craft spoofed emails that are difficult to identify.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_88vI7Q0TTXymJKkjxnWHhA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZoI-ty0pRVqQkeKfEIxP-Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_G-aqIdYlROGPKRGKc6JFMQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_MN2-Ln6tSXqrB80UO18wfA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MN2-Ln6tSXqrB80UO18wfA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:24pt;">Identifying Spoofed Emails</span></b></span></h2></div>
<div data-element-id="elm_mqdsA5IxThKNyex2fDw89g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mqdsA5IxThKNyex2fDw89g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">A fraudster's income is largely based on defrauding innocent individuals, so like most other careers, the more proficient they become at their &quot;job&quot;, the more they earn. Real estate transactions are a huge target because it means a bigger pay day. This is simply a reminder that they are working relentlessly to defraud individuals because their livelihood relies on it.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Individuals can pay for and implement many forms of cybersecurity defenses such as security software and email spam filters; however, phishing and spoofed emails often get past the defenses and make it to the Inbox. Therefore, it is each person's job to be alert for suspicious activity to keep from becoming the scammer's next victim.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Spoofed Emails in Real Estate Transactions</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">In real estate transactions, scammers use phishing emails to compromise an email account of someone involved in a deal to gain access to that person's emails. Once they have access, they can read all of the emails related to&nbsp;the transaction and learn specific details that only those included in the emails would know (i.e. loan amount, closing date, funds needed to close, other parties involved in the transaction, etc.). Next, they will try to impersonate someone in the email thread by creating a similar email address or by forging the &quot;email from&quot; address. This is a process known as spoofing. Spoofed emails are emails from scammers that&nbsp;are made to appear like they are coming from a real person.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Spoofed emails are more challenging to spot because the messages look like they are actually coming from a known, trusted party. In real estate transactions, scammers will use transaction specific information gained from studying prior emails, to craft spoofed emails that are difficult to identify. When scammers choose who, within the transaction, they want to impersonate, they will study the prior emails written by that person and note any key words and phrases often used. Then, when crafting a spoofed email, they use those same key words and phrases, along with transaction specific details and will even copy that person's email signature to make it seem more legitimate.&nbsp;The scammer's ultimate goal, when sending spoofed emails, is to send fake wire instructions so funds are sent to their account, instead of the account of whomever is handling the settlement.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When reading about real estate wire fraud victims, many of them have said they had sent a few emails, back and forth with the scammer spoofing emails before receiving fake wire instructions, and they had no idea they were not communicating with the actual person. This is a clear indication that scammers are skilled at spoofing emails and impersonating people. Hence, learning to identify spoofed emails is critical for preventing wire fraud.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">The following are some examples of how you can identify a spoofed email.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">1. Look at the sender's actual email address.</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When sending their spoofed emails, scammers often create an email address that is similar to the person they are trying to impersonate&nbsp;by changing a few characters, or using a different domain extensions (such as “.net” or “.org” instead of “.com”)&nbsp;to trick users into thinking the email has&nbsp;come from a friend, colleague, vendor, client or other known party . They may even create a new email account&nbsp;at a public domain (i.e. Gmail, AOL, etc.) by copying the person's full email address (domain and extension included) to make it appear legitimate. The unsuspecting&nbsp;user won't see any spelling errors in the email address and may overlook the domain.&nbsp;Additionally, scammers often&nbsp;add a Display Name to their email which distracts the user from their spoofed email address.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">For example, in the below image, labeled Image #1, the display name says the email is coming from John Smith and it is addressed to you and your co-worker. Not very suspicious at first glance; however, if you look at the sender's actual email address (within the angle brackets) the spelling of &quot;John&quot; and &quot;Smith&quot; are not correct. The &quot;N&quot; in John was replaced with an &quot;M&quot; and the &quot;M&quot; in Smith was replaced with an &quot;N&quot;. Plus, in this example, the full email address, domain and extension were used to create a new Gmail account. At first glance, an unsuspecting user sees this email and doesn't think twice because it looks like John Smith's actual email address.&nbsp;</span></div></span></div>
</div></div><div data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width: 647px !important ; height: 145px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width:647px ; height:145px ; } } @media (max-width: 767px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width:647px ; height:145px ; } } [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-SendersAddress.png" width="647" height="145" loading="lazy" size="original" alt="Image #1" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #1: Check the sender's actual email address</span></figcaption></figure></div>
</div><div data-element-id="elm_SDtBzeWijuEmhh3nx1F0Fw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SDtBzeWijuEmhh3nx1F0Fw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Therefore, if you receive an email from someone you know, but the content of the email seems suspicious, out of character, or request’s sensitive information, double check the sender’s email address to ensure it is spelled correctly and has the correct domain and domain extension.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">2. Check where the email response will go.</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Some scammers will send spoofed emails that appear to come from the actual email address of whomever they are impersonating. Since the email looks like it came from a legitimate source, checking the sender's email address is not an effective method of identifying a spoofed email.&nbsp;Scammers who spoof emails like this can easily trick users into reading their emails;&nbsp;however, since their goal is to correspond with the user, the scammer needs to receive the user's email reply.&nbsp;They accomplish this by manipulating the email's &quot;Reply-to&quot; settings, which are email settings that allow the sender to program where a reply email is sent. The scammer will program the email so the reply is sent to themselves and not sent to email address of the person they have spoofed.</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">For example, in the below email header (Image #2), the email address is correct, leading the user to believe the email is legitimate.&nbsp; Upon clicking &quot;Reply&quot;, the response message automatically populates an email address into the &quot;To&quot; field, based on sender's &quot;Reply-To&quot; settings.&nbsp;In Image #3 below, the email address that populated in the &quot;To&quot; field is clearly not the same email address that sent the initial email (from image #2).&nbsp;</span></div></span></div>
</div></div></div><div data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width: 621px !important ; height: 141px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width:621px ; height:141px ; } } @media (max-width: 767px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width:621px ; height:141px ; } } [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-SendersAddress-Correct.png" width="621" height="141" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #2: Sender's email address is correct, so check the Reply-To email address</span></figcaption></figure></div>
</div><div data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width: 623px !important ; height: 163px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width:623px ; height:163px ; } } @media (max-width: 767px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width:623px ; height:163px ; } } [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-ReplyAddress.png" width="623" height="163" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #3: Reply-To email address doesn't match the sender's address</span></figcaption></figure></div>
</div><div data-element-id="elm_oeM7keib4_BZ3PQxUOOjpQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oeM7keib4_BZ3PQxUOOjpQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When an email from someone you know seems out of character or requests sensitive information that is unnecessary for the sender to have, you may have a suspicion that something isn't right, so you check the sender's email address, to make sure it is correct.&nbsp;When the email address is spelled correctly and the domain extension is also correct, check who the Reply Email will be sent to by simply clicking the &quot;Reply&quot; button. Also, if you have any questions as to the validity of the email it may be a good idea to forward the email to the actual person's known trusted email address instead of replying to the suspicious email.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">3. Look at the phone number in the email signature</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">In real estate transactions, parties are typically advised to call and confirm wire instructions before sending wires. Therefore, when scammers send fake wire instructions, they will copy and paste the email signature of the individual they are impersonating; however, they often&nbsp;replace the phone number in the email signature with their own phone number. This ensures the party who received fake wire instructions will call the scammer to confirm the fake wire instructions. When the scammer confirms the fake wire instructions are correct, the unsuspecting user ends up sending their funds to the scammer's account and by the time anyone realizes, the funds are no longer traceable.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Image #4 below, shows John Smith's actual email signature and the scammer's spoofed email signature. At first glance, they look identical, and any unsuspecting reader could be fooled; however, when you look at the phone number in the scammer's spoofed email signature, it is not the same as John's actual phone number. Not only is it different, but it also has an area code for a different state.&nbsp;</span></div></span></div>
</div></div></div></div><div data-element-id="elm_ALNfMeyCAof62FioNE9Auw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width: 636px !important ; height: 192px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width:636px ; height:192px ; } } @media (max-width: 767px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width:636px ; height:192px ; } } [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-Email%20Signature.png" width="636" height="192" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #4: John Smith’s email signature vs. the Scammer’s email signature in Spoofed Email</span></figcaption></figure></div>
</div><div data-element-id="elm__u4Jc-1gRMPWL3exZQTyaQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__u4Jc-1gRMPWL3exZQTyaQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Checking the area code can be a helpful indicator of whether the email is spoofed. If you know a company is based out of New Jersey, but the phone number area code is from South Carolina, a warning&nbsp;signal should go off in your head. However, even if the area code was from the same state as the company and the email seems suspicious, you could compare the phone number to another email from that person, but the easiest solution is find a company's phone number online, either on Google (or any other trusted search browser) or by visiting the company website. Especially when it comes to confirming wire instructions, it is recommended that the phone number is either confirmed prior to receiving the wire instructions via email or from a known trusted source (like the company's website).&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Always to be On-The-Lookout for Spoofed Emails</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Remember to keep these tips in mind when reading emails. Scammers are always looking for ways to infiltrate real estate transactions and exploit individuals for their own personal gain That is why it is important to always remain vigilant when receiving emails, whether it is from an unknown sender, an organization you are familiar with, or even someone you know.</span></p></div>
</div></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 19 Dec 2022 15:55:01 -0500</pubDate></item><item><title><![CDATA[Cybersecurity Awareness Month]]></title><link>https://www.zwirentitle.com/blogs/post/Cybersecurity-Awareness-Month</link><description><![CDATA[In 2004, the US Government declared October as Cybersecurity Awareness Month to help individuals protect themselves online as threats to technology and confidential data became more common.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_YjnmQHcCREGWsnoo0pB7zQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_vw6hXEaHQGCFTpKOQ_HgPA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_MU515GIuTyu9KBqNDkTxqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_MU515GIuTyu9KBqNDkTxqQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6wxmrKr2SVSLYhZSKL-A4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6wxmrKr2SVSLYhZSKL-A4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:24pt;">Cybersecurity Awareness Month</span></b></p><div style="font-size:24pt;color:inherit;">​<b style="color:inherit;font-size:30px;"><span style="font-size:18pt;">2022 Theme: &quot;See Yourself in Cyber&quot;</span></b></div></div></h2></div>
<div data-element-id="elm_JDapgLQ1Tzy3F4z5yKQPBw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JDapgLQ1Tzy3F4z5yKQPBw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:left;"><span style="font-size:12pt;">In 2004, the US Government declared October as Cybersecurity Awareness Month to help individuals protect themselves online as threats to technology and confidential data became more common. A national campaign is lead by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA). This year’s theme is “See Yourself in Cyber”, focusing on each individual’s part in maintaining data security. For individuals and families, this means taking action to maintain basic cyber hygiene such as updating software on devices, utilizing strong unique passwords for each account, and enabling multifactor authentication on every account that offers it and remembering to “think before you click” on links received via email. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">As a personal note, I agree that maintaining basic cyber hygiene is crucial to keeping devices secure; however, I also believe it is important to understand why each of these tasks is effective. Understanding why, means learning about how cybercriminals work to compromise your security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Cybercriminals: Hackers vs. Scammers</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">There are cybercriminals who focus on hacking and cybercriminals who focus on scamming. Both types of cybercriminals typically work 24-7 to accomplish their goals. Hackers are skilled coders who spend their time scanning through device software looking for potential weaknesses that they can exploit. When they find weaknesses in the software, they develop malware or viruses that exploit those weaknesses to gain access to devices. Alternatively, scammers are those who focus on the exploiting the people who use the devices. They develop phishing emails and fake login websites that look almost identical to legitimate websites, to trick people into providing their login credentials. Using those login credentials, they can access those people’s accounts. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Significance of Updating Software</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">When hackers successfully find a way to hack into software and computers, it is typically through a weakness they have find in the software. When the security teams are alerted of the weakness that is being exploited by hackers, they issue a security patch, which patches up the weakness in the software. These security patches are included in software updates that are sent to the devices. Therefore, it is crucial to update your device software to maintain the device security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Many devices offer an “Automatic Software Update” option in the settings. For example, on iPhones, the automatic iOS updates can be turned on in the iPhone Settings. When the setting is enabled, the iPhone will download the iOS update as soon as it is available and send a notification advising that the updates are ready. Then, the installation of the iOS update will occur overnight, but only if the iPhone is charging and connected to Wi-Fi. Enabling the automatic software update option is an efficient way of keeping your devices up to date. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Significance of Strong Passwords</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">Scammers send phishing emails to try and lure people into providing their login credentials; however, they have other methods of gaining access to user accounts as well. Many people use personal information in their passwords, such as birthday, children’s names, pet’s names, and even favorite sports teams. When finds a scammer finds a target with personal information as a password, they could use a basic Google search to find out personal information and guess the person’s password. Therefore, utilizing a strong password is crucial. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">A strong password consists of at least one upper- and lower-case letter, number, and special character, however, a strong password may not be sufficient if the same strong password was used for multiple accounts. If a scammer were to find someone's strong password, the scammer would be able to gain access to each account that utilizes that same password. Thus, a unique password for every account is also essential to maintaining account security. It may be exhausting to have to come up with new, strong passwords for every account, but if you value your account security, it is necessary. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Multifactor Authentication</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">While strong unique passwords are essential and very helpful in preventing scammers from accessing accounts, multifactor authentication adds a second layer of security. Examples of Multifactor Authentication are biometric scanning (i.e., fingerprint, face scan, eye scan, etc.), would require the scammer to have a copy of your fingerprint. Another multifactor authentication method is entering a code that is provided through another method, such as texted to your phone, sent via email or recited during a phone call, and even sent to a second device or application, etc. These types of multifactor authentication would require the scammer to physically have your cell phone to receive the text message or open the security app or would need access to your email account to obtain the code. Therefore, if for some reason an account password is compromised, the user has the second layer of security protecting their account from the scammer. Not all accounts offer multifactor authentication, but when they do, it is a good idea to enable that extra level of security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">“Think Before you Click”</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">Many scammers who send phishing emails are skilled at building websites. They are capable of building a fake website that looks almost identical to a real website. Many phishing emails include a link to change your password or update your account settings. When people click the link, they are brought to the scammer’s fake website and prompted to enter their account login credentials. If they proceed by entering their username and password, when the click the “Login” button, they will be given a login error message. However, by clicking the “login” button, they are actually sending the login credentials to the scammer. Additionally, some scammers will buy viruses on the “dark web” and by clicking the link in the email or clicking the “login” button on the fake website, or even downloading a file attached to a scammer’s email, will trigger the virus to download onto your computer</span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><span style="font-size:12pt;"><div style="text-align:left;"><span style="font-size:12pt;color:inherit;">There are many things to look for that indicate an email is from a scammer. The most commonly known indicator is grammatical errors and typos, however, as scammers have become more advanced, their emails have fewer grammatical errors so it is important to look for other signs. Many scam emails are a template email, with no personalizing information. Typically, when receiving a legitimate email about your account security, the email will include some type of personalizing information, but most scammers won’t personalize the email template at all. Additionally, Try looking at the sender’s actual email address – a scammer will create a fake email account that may look similar to whoever they are trying to impersonate. For example, a scammer may try to impersonate Amazon.com by sending an email stating your account security has been compromised and then requesting the user to click the link to change their password. They may use an email domain such as @amazon-security.net; however, real Amazon security alerts come from the email domain @amazon.com. Checking the sender's actual email address may be a clear sign of a phishing email. Scammers also like to add a sense of urgency to their emails, to trick people into acting quickly, without thinking. They may say something along the lines of, &quot;If you don't act immediately, your account will be suspended&quot; (or deleted). Don't fall for their tricks! If you feel like you're being pressured to click the link, take a second and remember to look for any indication of a phishing email. If you don't see any, then to be safe, open a new web browser, type in the website URL and login from there (in a legitimate email the links are just a quicker way of getting to that login page).&nbsp;</span></div></span></div><div style="text-align:left;color:inherit;"><span style="font-size:12pt;"><br></span></div><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:left;"><span style="font-size:12pt;">While security software is available to help prevent scammer’s emails or identify potential malware and block it from downloading on devices, the security systems are only as good as the individuals using them. Therefore, it is crucial for an individual’s data security that they update software whenever it is available, utilize strong unique passwords, implement multifactor authentication whenever possible and remain vigilant when reading their emails by thinking before you click. Feel free to visit the Cybersecurity and Infrastructure Security Agency's Website for more information on how to be secure online.&nbsp;<i>(If I left the link, would you think before clicking it?)</i></span></p></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 05 Oct 2022 12:21:00 -0400</pubDate></item><item><title><![CDATA[The Internet of Things - Smart Fitness]]></title><link>https://www.zwirentitle.com/blogs/post/The-Internet-of-Things-Smart-Fitness</link><description><![CDATA[Some examples of fitness industry IoT devices include wearable devices, internet-connected cardio machines, and even virtual reality headsets. According to a Statista report, the number of connected wearable devices increased from 326 million in 2016 to 722 million in 2019.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_VLRBZOAySSKZTEl93J-_xg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_B2LAAK9wSf276H45FzEvXA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_JWsw3RGZTSKTz8n5HuBawA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBsn1PsGQmWKjHQJFJOI7A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YBsn1PsGQmWKjHQJFJOI7A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="font-size:11pt;text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that connect. Essentially, an IoT device is any device with an &quot;on/off switch&quot; that connects to the internet, or to another device that uses the internet. Examples include smart phones, smart light bulbs, kitchen appliances, security cameras, wearable devices, industrial manufacturing robots, cars, navigation systems, GPS trackers, and so much more. A February 2020 report found there are 30 billion connected IoT devices on the planet, which is projected to double over the next five years.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Some examples of fitness industry IoT devices include wearable devices, internet-connected cardio machines, and even virtual reality headsets. According to a Statista report, the number of connected wearable devices increased from 326 million in 2016 to 722 million in 2019.&nbsp; The development and mass production of such devices has changed where and how people get exercise with devices that allow people to get a &quot;gym-like&quot; workout from the comfort of their home and innovative methods that make physical activity fun and engaging.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Wearable Devices</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Modern wearable devices were first introduced in 1965, the Manpo-kei pedometer which translates to &quot;10,000 steps meter&quot; along with research that stated 10,000 steps per day along with the proper caloric intake, was the key to maintain a healthy body. In the 1980s, Polar watches introduced the wireless heart rate monitor.&nbsp; Today, wearable devices can track much more than just an individual's step count and heart rate. Some of the more advanced devices are able to detect body temperature, activity level, speed, calories burned, distance traveled, changes in elevation and sleep patterns. Sensors for collecting data have been added to various wearable objects transforming them into a data-tracking device, such as bracelets, rings, anklets, clip-on devices, and sneakers.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Wearable fitness tracking devices typically connect to a smart phone and share the collected data with its mobile application counterpart. Within the mobile application, the user can create an account where their data is stored and they can set personal goals for themselves. Mobile applications can include a journal of daily activity or charts of their collected data over a period of time, allowing users to identify when they are making progress towards their goals.&nbsp;Some wearable device’s mobile application allows users to share their fitness analytics with others, adding a social component that can be used to compete with friends and family. Data collected on wearable devices can also be shared with other applications such as apps that host virtual races or virtual fitness events and challenges.&nbsp;</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Smart Cardio Machines</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Cardio machines have progressively advanced into internet-connected machines with touch screens, interactive interfaces, and user accounts. By setting up an account on a smart machine, the user's data is collected by the machine's built in sensors and saved to their account. The user can then login to their account on any other machine, of that brand, and their data is always stored to their account. Some cardio machines with built in screens give the user the choice of viewing a scenic route as they workout, giving them the illusion of running or biking through different parts the world.&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Additionally, many companies have developed subscription based applications that utilize live streaming technology or on-demand streaming, allowing people to participate in a fitness class from the comfort of their home. While a streaming app is not an IoT device, companies have implemented their applications into devices that connect to the internet, including, stationary bikes, treadmills, ellipticals and even rowing machines.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Virtual&nbsp;Reality Workouts</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">With the rise of virtual reality (VR) technology, an individual can engage in physical activity with a VR gaming headset, such as the Sony's PlayStation&nbsp;VR or the Oculus Quest. Utilizing the VR headset and controls held in each hand, a person becomes immersed in a computer-generated world that responds to the movement of sensors located in the headset and hand controllers, allowing them to interact with&nbsp;their virtual&nbsp;environment. Some of the games created for VR technology include dancing, boxing, racquetball, and rock climbing, which require the user to dance or move around as if they were actually in the ring, on the court or scaling the side of a mountain.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">For the many people who enjoy gaming, the VR headset gets them off of the couch and into a simulated world, where they have to physically move around in order to progress through the game. Many of the games require the player to move laterally, jump or squat to avoid an object that is headed toward them, or swing their arms around, using motions comparable to a tennis swing, to engage with an object or another character in the game. While these types of games may not be considered “fitness” by a regular gym-goer, they certainly increase an individual’s&nbsp; physical activity, especially when the alternative for that individual is sitting on the couch and playing a video game.&nbsp;</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Privacy and Security</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);"><br></span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">IoT fitness devices have changed the fitness industry, empowering people to track their activity and find alternative ways to get active. However, as with any internet connected device, it is essential to be aware of the IoT device’s security and privacy settings.&nbsp;Wearable fitness tracking devices store basic personal health information.&nbsp;When such information is collected at a doctor’s office or hospital it is protected by the Health Insurance Portability and Accountability Act (HIPAA); however, HIPAA does not extend its protections to health data accumulated by personal fitness tracking devices. While basic health information may not seem like much of a privacy concern, when wearable devices are used for long periods of time, the information collected begins to paint accurate picture of an person’s health, lifestyle, habits, and identity.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Fortunately, companies are building strong security measures into the devices, making the actual device difficult to hack. However, security weaknesses typically occur when user profiles within the device's corresponding mobile applications are not secured with strong unique passwords. Easy-to-guess passwords give hackers the ability to compromise a user's account. Therefore, when creating a password for your health mobile application, it is imperative to make it unique from other account passwords, and utilize a combination of upper and lower case characters, a number, and special character (i.e. !, @, #, &amp;, *, ?, etc.). Additionally, enabling multi-factor authentication, if available, improves account security significantly.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Privacy is a major concern for a many people. While the IoT devices may be secure, and the user’s password may be strong and unique, to ensure the information stored within the account remains private, it is important to read the company’s privacy policy. While the data accumulated from fitness tracking devices alone pose no great risk to an individual’s privacy, when the data is associated with other information, there are greater privacy implications if the data is misused or shared with third parties.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">IoT devices in the fitness industry are innovative and offer people new approaches to work out, giving them the freedom to get active outside of a gym. Plus, detailed tracking of various metrics, keep people informed of their progress overtime. The benefits of such devices outweigh the risk of security and privacy, when the user is informed of the privacy policy and settings and&nbsp;actively securing their user accounts.</span></p></div></div>
</div><div data-element-id="elm_ugTYcdCxSb-y7XMPUZCAlw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 19 Jul 2022 16:40:44 -0400</pubDate></item><item><title><![CDATA[The Internet of Things - Smart Homes]]></title><link>https://www.zwirentitle.com/blogs/post/the-internet-of-things-smart-homes</link><description><![CDATA[&nbsp; &nbsp;&nbsp; The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that con ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_6c42IEpTRNOKbKSVVmKQ1Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zX_uIBhJQAOWvcns6rOWoA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QTD8fyLcSv2oiSNcxFgWsQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1F88KL3HTRq4pmKXwzKZBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1F88KL3HTRq4pmKXwzKZBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="line-height:1.2;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that connect with each other. Basically, an IoT device is any device with an on/off switch that is connected to the internet, or to another device using the internet. Examples include cell phones, smart light bulbs, kitchen appliances, security cameras, wearable devices, industrial manufacturing robots, cars, navigation systems, GPS trackers, and so much more. A February 2020 report found that there are 30 billion connected devices on the planet and that number is projected to double over the next five years.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">A smart home is defined as a home equipped with lighting, heating, appliances, and other electronic devices that are controlled remotely by phone or computer—basically a home filled with IoT devices.&nbsp;As of 2018, 130 million homes in the U.S. qualified as “smart”. &nbsp;Serving the same functionality of the regular device, smart devices are typically connected to your home’s wireless internet. Many of the devices have corresponding phone applications that allow you to receive mobile alerts and control the devices from your phone. Advancements in technology and artificial intelligence have allowed companies to produce devices that make life more convenient, save you time, and potentially, save you money.</span></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smarter Energy Consumption</span></b></p><p style="text-align:left;"><br></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">Smart Homes are designed to make the most out of available energy and are potentially saving homeowners money. Rather than restricting energy consumption, smart homes keep track of your lifestyle, find ways to conserve energy when possible and make the most out of available energy. Many devices will track the percentage of energy being used for each appliance and inform you of your consumption allowing you understand where you are wasting energy and adjust to conserve more energy. Smart thermostats, smart meters, smart power strips, smart lighting, all offer potential savings on your utility and electric bill.</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Thermostats</span></b><span style="font-size:14pt;">&nbsp;</span><span style="font-size:12pt;">can keep track of which rooms are being occupied and make sure the temperature is sufficient while you are in them and turned off when you aren’t. This prevents the house from unnecessarily heating or cooling itself while you are out. The app on your phone allows you to adjust the temperature settings remotely. Therefore, you can warm up or cool down the house on your way home from work or after being away, so when you arrive home, the house is already the perfect temperature.&nbsp;</span></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;Additionally, homes that have solar panels installed, smart homes can be programmed to only use the energy the panels are producing, allowing homeowners to be self-sustaining!</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:18px;">Smart Power Strips (outlets)</span></b><b><span style="font-size:18px;">:</span></b><span style="font-size:12pt;"> Some devices, such as TVs, laptops, and cable box, continue to consume energy when they are turned off. Smart power strips can detect when a device is off or in standby mode and cut the power to those devices allowing you to save energy. Some smart power strips can also monitor electricity consumption and report the percentage of energy being used for each smart outlet.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Lighting</span></b><span style="font-size:12pt;">&nbsp;allows you to control the lighting throughout the house from your phone. Bulbs are LED which are more energy efficient and don’t need to be replaced often. Most bulbs offer dimming features and some even change hue, giving you the option to have a range of colors or anything from yellow light to a white natural light. Since it's all controlled from your phone, you can turn the lights on and off from your phone while you are in the house and even when your not!</span></span></p></blockquote><p style="text-align:left;"></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smart Home Security</span></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br></span></b></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:16px;"><span style="font-size:18px;">Smart Locks</span>&nbsp;</span></b><span style="font-size:12pt;">offer a security as well as a solution for those who chronically&nbsp;misplace their keys, eliminating the need for spare keys hidden by the entrance or given to your neighbors. They are key-less&nbsp;door locks that allow you to lock and unlock your doors from your phone, whether you are there or not. You could unlock the door from the car so you don't have to fumble with your keys when your hands are full or even when you aren't home and need to let someone inside.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:18px;">Smart Smoke Detectors</span></b><span style="font-size:12pt;"><span style="font-size:18px;">&nbsp;</span>work as a connected system, so if one alarm is triggered, you will receive&nbsp;an alert on your phone. If it's a false alarm because you've burned something while cooking, you can easily shut the alarm off with your phone; however, if you're not home and receive a notification&nbsp;that is concerning, you can notify emergency services potentially avoid serious property damage<i>.</i> If you don't want to replace all of your smoke detectors, you can get a &quot;Listener&quot; which plugs into a standard wall outlet and listens for any alarms. If one goes off, the listener will sent a notification to your phone.&nbsp;</span></span></p></blockquote><p style="text-align:left;"><b><i><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;</span></i></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smart Kitchen</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">Smart kitchen appliances also offer great convenience, incredible features, and can be monitored, turned on or off all from your phone so if you've ever left the house and forgotten whether you've turned off the oven, or any other appliance, you would be able to check on your phone and turn it of if you did forget.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Fridge </span></b><span style="font-size:12pt;">allows you to monitor the inside temperature from your phone to ensure everything is working properly. Some even have cameras inside them can be viewed from your phone allowing you to see what you're low on when your out shopping.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Slow Cookers</span></b><span style="font-size:12pt;">&nbsp;offer settings that will ensure your food is ready by the time you get home by setting a time to finish. If you're delayed for some reason, you can use the app on your phone to adjust the time you'll be home and the slow cooker will adjust it's cooking settings to make sure your meal is not over cooked.&nbsp;<i>&nbsp;</i></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><i><br></i></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Coffee Makers</span></b><span style="font-size:12pt;"> can be controlled by your phone, allowing you to brew a cup or pot of coffee, just how you like. Plus, they can be programmed to brew your coffee at a specific time or when triggered by your morning alarm.&nbsp;</span></span></p></blockquote><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Privacy&nbsp;and Security</span></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br></span></b></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">While all of these smart home gadgets are convenient, cost-effective and offer so many interesting features, they also pose potential risk, if you are not secure.&nbsp;Keeping your smart home secure, starts with the&nbsp;WiFi&nbsp;router. This is the&nbsp;foundational&nbsp;item that all of the smart devices use to connect.&nbsp;Lack of security could mean that a hacker who gains access to your&nbsp;WiFi&nbsp;would be also be able to access your smart devices. This means having access to your security camera footage, thermostat, oven, etc.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">When securing your WiFi router is different from securing the connected devices — A simple firewall or security software is not the answer. You should begin with the router. It is advised to give your WiFi&nbsp;router a unique name and password. When you keep the factory given name and provided password, hackers will know the exact make and model of your router, and could potentially compromise your network.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">As you purchase smart devices, you can enhance their security by making a few modifications to their default settings.&nbsp;Many IoT devices come with default usernames and passwords that are the same for all devices.&nbsp;With each device, change the usernames and set unique passwords.&nbsp; Check each device's security settings because some device's default security settings benefit the manufacturer more than they benefit you. If you are not using some of the devices features, disable them. For example, if you have a smart appliance that you never plan to access remotely, disable the remote access option.&nbsp;Additionally, find out how the devices receive software updates and don't wait to update. When the company identifies any security flaws, they issue software updates that address those vulnerabilities. Neglecting to update the software makes your device vulnerable to cyber criminals who are looking to exploit that security flaw.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">The fear of potentially being hacked shouldn't keep you from purchasing smart devices. By simply being proactive about smart device security, you can prevent anything bad from happening.</span></span></p></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 09 Jun 2020 14:24:17 -0400</pubDate></item><item><title><![CDATA[Cookies! ]]></title><link>https://www.zwirentitle.com/blogs/post/cookies</link><description><![CDATA[&nbsp; &nbsp; No, not chocolate chip or sugar cookie, we're talking about HTTP cookies. These cookies, otherwise known as web cookies, are little bits ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_93oLo_AYR7GA1VbD_zeYyw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hWhwWIw1RsiOMI3l5DFdzA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_hWhwWIw1RsiOMI3l5DFdzA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dq025p6BRiyaQKwkjYfwnA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_dq025p6BRiyaQKwkjYfwnA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_-Ixz1LfvQeGOfHqUYIcLuQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-Ixz1LfvQeGOfHqUYIcLuQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;font-size:20px;">The ones that are good and the ones to avoid.&nbsp;</span><br></h2></div>
<div data-element-id="elm_EvEettRGTwSCqXjgvJXxWw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EvEettRGTwSCqXjgvJXxWw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp; &nbsp; No, not chocolate chip or sugar cookie, we're talking about HTTP cookies. These cookies, otherwise known as web cookies, are little bits of data that are collected by a website and saved in a tiny file on your computer and on the website’s server.&nbsp;Originally created in 1994 as a solution for making online shopping carts possible, the first application of cookies was on the Netscape website to determine whether a user had previously visited the website. Today, their purpose is to enhance your overall web browsing experience by remembering your recent activity, and tailoring your web experience to you.&nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Prior to the media’s exposé on web cookies in 1996, cookies were accepted by default and people had no idea of their existence.&nbsp; Once people became aware, web cookies became a major topic of discussion as a digital villain invading everyone's privacy.&nbsp;While <b>the fear of cookies invading privacy</b>&nbsp;is valid for some in some instances, some cookies actually benefit the user while browsing the internet.&nbsp;Some web cookies contribute to the User Experience (UX) making web browsing as easy as it is today. For example, cookies are the reason e-commerce websites will remember your shopping cart when you return to a site where you never checked out. Additionally, websites can use cookies to cross reference your activity with other users who had similar activity, allowing them to create recommendations such as &quot;Customers Also Viewed&quot; on e-commerce sites, &quot;Suggested Content&quot; on video streaming platforms, or &quot;Related Searches&quot; in search engine sites.&nbsp;</span></p><p><span style="font-size:9pt;color:rgb(0, 0, 0);">&nbsp;&nbsp;</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);">How Cookies Work</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Every time you connect to a website, the site will search their server for any existing cookie data.&nbsp;Your first time visiting a website, since there is no cookie data stored yet, your web browser connects to the website and a small file is created on the website's server to save your activity and preferences.&nbsp; That file is also saved within your web browser on your computer.&nbsp;</span><span style="font-size:12pt;color:rgb(0, 0, 0);">Typically a website creates a unique anonymous identifier to remember you rather than storing personal information on the server;&nbsp;</span><span style="color:rgb(0, 0, 0);font-size:12pt;">however, if you enter in personal information on the website, this information is typically encrypted and stored within the unique cookie id.&nbsp;</span></p><p></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">The next visit, and any future visits to that website, your cookie data will be found in the site's initial search of their server, allowing your preferences, unpaid items in a shopping cart or login information to load automatically. Any new activity or preferences set while visiting the site is then saved to your cookie file for the next time you visit.&nbsp;</span></p></div>
</div></div><div data-element-id="elm_E7uQu8Tpatagwh-zec_V9A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_E7uQu8Tpatagwh-zec_V9A"].zpelem-image { border-style:none; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/cookieprocess_Explanation.png" size="fit" data-lightbox="true" style="height:325px;width:496.48px;"/></picture></span></figure></div>
</div><div data-element-id="elm_e30EK4GJctFeDDjbV38oeA" data-element-type="text" class="zpelement zpelem-text zp-hidden-sm zp-hidden-xs "><style> [data-element-id="elm_e30EK4GJctFeDDjbV38oeA"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></div>
</div><div data-element-id="elm_ABWPP59iSUFIn2WoDtJGzg" data-element-type="text" class="zpelement zpelem-text zp-hidden-md zp-hidden-xs "><style> [data-element-id="elm_ABWPP59iSUFIn2WoDtJGzg"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></blockquote></blockquote></blockquote></div>
</div><div data-element-id="elm_C_nCuT_nP9ZlEW6vI6mGJg" data-element-type="text" class="zpelement zpelem-text zp-hidden-md zp-hidden-sm "><style> [data-element-id="elm_C_nCuT_nP9ZlEW6vI6mGJg"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></div>
</div><div data-element-id="elm_v_zZmftuWmx4dRvU1hNsug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_v_zZmftuWmx4dRvU1hNsug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Type of Cookies</span></b><br></span></p><p><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">There are two main types of web cookies: session cookies &amp; persistent cookies.&nbsp; &nbsp; &nbsp;</span>&nbsp; &nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">Session Cookies&nbsp;</span></b><b></b><span style="font-size:12pt;">are temporarily stored in the web browser’s memory and deleted when the web browser is closed. These types of cookies are typically used to power an e-commerce website by remembering the items in your shopping cart, even if you leave the website. Additionally, they will save any specific preferences you’ve set on a website such as language or location. These cookies are more helpful than harmful and upon closing your web browser, the cookie data is deleted.&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">Persistent Cookies</span></b><span style="font-size:12pt;"> are stored for longer time periods within the web browser and remain intact even if the browser is closed; however, they typically have an expiration date. These types of cookies are utilized every time the user visits that website. Typically, this type of cookie allows a website to remember a specific device and user login, making the login process a bit easier. For example, many banks include an option to remember your account when logging into an online banking account on a specific device. If the user checks this box, the bank will not require the tedious multi-factor authentication or answers to security questions every time the user logs in to their bank account on that one device.&nbsp;Below are three different banks that allow users to opt-in to using persistent cookies on their devices.&nbsp;</span><span style="font-size:12pt;"><br></span></span></p></div>
</div></div><div data-element-id="elm_SzgOpM0M6EDHy36wniYy9w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_SzgOpM0M6EDHy36wniYy9w"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1BJ0TQuBB2FhJkVZ1vPNzA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1BJ0TQuBB2FhJkVZ1vPNzA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uBNMKS_YA09BnrXhhvdQZA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_uBNMKS_YA09BnrXhhvdQZA"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/BOAPersistentCookie.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_WjN1v1pylEteuLu7ux0z0g" data-element-type="text" class="zpelement zpelem-text zp-hidden-sm zp-hidden-xs "><style> [data-element-id="elm_WjN1v1pylEteuLu7ux0z0g"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">Examples of frequently used persistent cookies</span></p></div>
</div></div><div data-element-id="elm_H2Hi881fQZOkfMm7QV8iVg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_H2Hi881fQZOkfMm7QV8iVg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Czvyb5DEsay_HfFqCuTRuA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Czvyb5DEsay_HfFqCuTRuA"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/CapOneLogin.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_gMgYAcp99fXkzdRf8vH3Ag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_gMgYAcp99fXkzdRf8vH3Ag"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_sSow-Qqv6iwQ6qVu3HcM9w" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_sSow-Qqv6iwQ6qVu3HcM9w"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/ChaseLogin.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_TLkuAckPiJbt2088fd6u2A" data-element-type="text" class="zpelement zpelem-text zp-hidden-md "><style> [data-element-id="elm_TLkuAckPiJbt2088fd6u2A"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">Examples of frequently used persistent cookies</span></p></div>
</div></div></div></div></div><div data-element-id="elm_Udu2QzBDTxYqwGq9ZWmoFQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Udu2QzBDTxYqwGq9ZWmoFQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_-OoHWeNCaDs2YWs4pAQ51g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-OoHWeNCaDs2YWs4pAQ51g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_7BqOZtDylhh6VcFBnljEKA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7BqOZtDylhh6VcFBnljEKA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Cookie Issuers</span></b><br></span></p><p><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">Cookies are either created by a first-party issuer or third-party issuer.&nbsp;&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">First-Party Cookies </span></b><span style="font-size:12pt;">are created by the website that you are currently visiting. Many websites offer a cookie preference tab that lets the user choose the cookies they want turned on. Some cookies are essential to utilizing the web page which cannot be turned off, while others like analytics or marketing cookies can be turned off. These types of cookies are used by the company to track the effectiveness of the site's user experience or of a marketing campaign and are typically separated from any personally identifiable information.&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<b style="color:rgb(0, 0, 0);"><span style="font-size:13pt;">Third-Party Cookies</span></b><span style="color:rgb(0, 0, 0);font-size:12pt;"> are cookies created by a website that you are not currently visiting—they&nbsp;typically come from online advertisements so companies can track what website a user was visiting when they clicked on the ad. If there is an ad on the website, it is likely that the ad owner and whoever else sells the digital ad space have cookies enabled for tracking the user's activity. These are typically persistent cookies that stay on the computer and track the user's long term activity. Since Google is one of the major digital advertisement providers, Google is tracking the long term activity on a user's web browser. While it may seem like an invasion of privacy, the reason for tracking a user's activity is to provide them with a tailored ad experience where ads the user sees are relevant to their searches and internet activity.&nbsp;</span><br></p><p><span style="font-size:9pt;color:rgb(0, 0, 0);">&nbsp;</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Cookie Stealing&nbsp;</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">There are a few different methods a hacker can utilize to steal a user’s cookie data; however, they are very complex and not frequently used.&nbsp;The best way to protect yourself from cookie fraud is to keep your web browser up to date.&nbsp;Most web browsers update automatically; however, if yours does not, make sure to be regularly checking for updates because in doing so,you are ensuring your web browser has the most up-to-date security.</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br> Privacy</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Typically, first-party and session cookies pose little risk to privacy concerns; however, persistent and third-party cookies are relatively invasive of individuals’ privacy. Since many advertisements on websites are powered by Google Adsense, Analytics, Maps, etc, the collected cookies provide Google with your internet activity. While marketing professionals will argue that the collected cookies help tailor advertisements to the user, the information collected by third-party cookies give people a justified concern about their privacy.</span></p> &nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Fortunately, browsers allow users to manage their cookie settings. On a desktop computer, Google Chrome, Firefox, Edge and Internet Explorer all offer cookie settings. Mobile devices also offer cookie settings within Apple iOS Safari, Chrome, Android's built in browsers and Blackberry's web browser. Since each browser is a little different there is not one process for turning the cookies off; however, a simple Google search of, &quot;[Your Browser] Manage Cookie Preferences&quot; will give you a list of articles explaining the process.&nbsp;Ultimately,there is no way around cookies, but managing the settings in your browser will help significantly with websites creating cookie files to collect your web activity, preferences or account information.&nbsp;</span></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 04 Feb 2020 15:42:41 -0500</pubDate></item></channel></rss>