Wire Transfer And Online Safety
The Closing Agent is committed to keeping your privacy and financial information secure. We provide certain security features, policies, and procedures to provide you with multiple layers of protection when utilizing our services.
ALWAYS CALL 407-425-2400 TO VERIFY WIRE INSTRUCTIONS BEFORE INITIATING TRANSFER. Criminals use a variety of attacks to attempt to steal information, including those listed below.
In a social engineering attack, an attacker uses human interaction to manipulate a person into providing them information. People have a natural tendency to trust. Social engineering attacks attempt to exploit this tendency in order to steal your information. Once the information has been stolen it can be used to commit fraud or identity theft.
The act of creating a fake website to mislead individuals into sharing sensitive information. Spoof websites are typically made to look exactly like a legitimate website presented by a trusted organization.
- Pay attention to the web address (URL) of websites. A website may look legitimate, but the URL may have a variation in spelling or use a different domain (ie: .net, .org)
- If you are suspicious of a website, close it and contact the company directly.
- Do not click links on social networking sites, pop-up windows, or non-trusted websites. Links can take you to a different website than the link indicates. Typing an address in your browser is a safer alternative.
- Do not open attachments or download files from unfamiliar sources. Files can contain viruses or other software that can penetrate your computer’s security.
- Only give sensitive information to websites using a secure connection. Verify the web address begins with “https://” (the “s” is for secure) rather than just “http://”.
- Avoid using websites when your browser displays certificate errors or warnings.
Phishing is when an attacker attempts to acquire information by masquerading as a trustworthy source in an electronic communication. Phishing messages often direct the recipient to a spoof website. Phishing attacks are typically carried out through email, instant messaging, telephone calls, and text messages (SMS).
- Delete email and text messages that ask you to confirm or provide sensitive information. Legitimate companies don’t ask for sensitive information through email or text messages.
- Beware of visiting website addresses sent to you in an unsolicited message. Even if you feel the message is legitimate, type web addresses into your browser or use bookmarks instead of clicking links contained in messages.
- Install a Firewall via software or hardware. A firewall will prevent attacks on your computer through the internet be detecting if the connection is malicious.
- Keep your internet browser, anti-virus and anti-spyware update by visiting the manufacturer’s website regularly and checking for updates.
- Log off and/or lock your computer when not in use. Require a password to unlock.