{"id":13722,"date":"2024-01-16T14:36:24","date_gmt":"2024-01-16T14:36:24","guid":{"rendered":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/"},"modified":"2024-06-19T19:00:49","modified_gmt":"2024-06-19T19:00:49","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;tt-section-inner-pages ttfw-template-header&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_module=&#8221;15014&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; text_color=&#8221;light&#8221; module_class=&#8221;tt-home-hero&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; title_font_size=&#8221;50px&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(0,0,0,0.5) 0%|rgba(0,0,0,0.5) 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_color_gradient_start=&#8221;rgba(0,0,0,0.5)&#8221; background_color_gradient_end=&#8221;rgba(0,0,0,0.5)&#8221; background_image=&#8221;https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-content\/uploads\/sites\/7\/2021\/04\/slide-01-1.jpg&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;350px||250px||false|false&#8221; title_font_size_tablet=&#8221;40px&#8221; title_font_size_phone=&#8221;26px&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; specialty=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; padding_top_2=&#8221;0px&#8221; padding_bottom_2=&#8221;0px&#8221; padding_top_bottom_link_2=&#8221;false&#8221; padding_left_right_link_2=&#8221;false&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;70px||70px||true|false&#8221; custom_padding_tablet=&#8221;54px||54px||true|false&#8221; custom_padding_phone=&#8221;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; specialty_columns=&#8221;2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_row_inner admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column_inner saved_specialty_column_type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"tt-section-header\">Cyber Security<\/h2>\n<p><strong>Protect Yourself From Cyber Fraud<\/strong><br \/>\nWatch the video or read below to learn how to protect yourself from cyber fraud.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/ek4TwC9owwY?si=QdMZouOqJsEVU2YY\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<h3>How Your Money Gets Stolen<\/h3>\n<ol class=\"tt-section-list\">\n<li><strong>Hacked email \u2013<\/strong> Hackers get access to the email account of someone involved in the transaction \u2013 the buyer, seller, real estate agent, mortgage lender, title agent, or other.<\/li>\n<li><strong>Email from hacker \u2013<\/strong> The hacker then emails that person to change the wiring or payment instructions without knowledge from the other parties.<\/li>\n<li><strong>Consumer pays wrong account \u2013<\/strong> If not questioned, the wrong account gets the down payment or other funds and the criminal gets away.<\/li>\n<li><strong>Closing day \u2013<\/strong> By the time closing day arrives and the mistake is realized, often the funds are long gone.<\/li>\n<\/ol>\n<h3>How to Avoid Wire Fraud<\/h3>\n<p><strong>Rule 1: Always question emails that contain wiring instructions.<\/strong><br \/>\nHackers have learned to exploit the real estate closing process to steal millions of dollars from people buying or selling a home.<\/p>\n<p><strong>Rule 2: Always call before sending any money.<\/strong><br \/>\nWhen you do receive instructions on where to send money prior to closing, always call your contact person at the title company to verify. Then call your bank to verify as well.<\/p>\n<p><strong>Rule 3: Always call after sending money.<\/strong><br \/>\nIt\u2019s always a good idea to call right after money is sent. That way, you can verify that it was received by the correct recipient. <\/p>\n<p><strong>Rule 4: Act immediately if anything seems unusual.<\/strong><br \/>\nContact your bank, mortgage company, and title company immediately if anything is in question. If something is wrong, you may need to contact your local FBI office.<\/p>\n[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_sidebar orientation=&#8221;right&#8221; area=&#8221;sidebar-1&#8243; show_border=&#8221;off&#8221; admin_label=&#8221;TT &#8211; Sidebar&#8221; _builder_version=&#8221;4.16&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_sidebar][\/et_pb_column][\/et_pb_section][et_pb_ ][\/et_pb_][et_pb_ ][\/et_pb_]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><h2 class=\"tt-section-header\">Cyber Security<\/h2>\n<p><strong>Protect Yourself From Cyber Fraud<\/strong><br \/>\nWatch the video or read below to learn how to protect yourself from cyber fraud.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/ek4TwC9owwY?si=QdMZouOqJsEVU2YY\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<h3>How Your Money Gets Stolen<\/h3>\n<ol class=\"tt-section-list\">\n<li><strong>Hacked email \u2013<\/strong> Hackers get access to the email account of someone involved in the transaction \u2013 the buyer, seller, real estate agent, mortgage lender, title agent, or other.<\/li>\n<li><strong>Email from hacker \u2013<\/strong> The hacker then emails that person to change the wiring or payment instructions without knowledge from the other parties.<\/li>\n<li><strong>Consumer pays wrong account \u2013<\/strong> If not questioned, the wrong account gets the down payment or other funds and the criminal gets away.<\/li>\n<li><strong>Closing day \u2013<\/strong> By the time closing day arrives and the mistake is realized, often the funds are long gone.<\/li>\n<\/ol>\n<h3>How to Avoid Wire Fraud<\/h3>\n<p><strong>Rule 1: Always question emails that contain wiring instructions.<\/strong><br \/>\nHackers have learned to exploit the real estate closing process to steal millions of dollars from people buying or selling a home.<\/p>\n<p><strong>Rule 2: Always call before sending any money.<\/strong><br \/>\nWhen you do receive instructions on where to send money prior to closing, always call your contact person at the title company to verify. Then call your bank to verify as well.<\/p>\n<p><strong>Rule 3: Always call after sending money.<\/strong><br \/>\nIt\u2019s always a good idea to call right after money is sent. That way, you can verify that it was received by the correct recipient. <\/p>\n<p><strong>Rule 4: Act immediately if anything seems unusual.<\/strong><br \/>\nContact your bank, mortgage company, and title company immediately if anything is in question. If something is wrong, you may need to contact your local FBI office.<\/p>\n[et_pb_ ][\/et_pb_][et_pb_ ][\/et_pb_]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-13722","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security - Design Switch Test<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - Design Switch Test\" \/>\n<meta property=\"og:description\" content=\"[et_pb_ ][\/et_pb_][et_pb_ ][\/et_pb_]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Design Switch Test\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-19T19:00:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/\",\"url\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/\",\"name\":\"Cyber Security - Design Switch Test\",\"isPartOf\":{\"@id\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/#website\"},\"datePublished\":\"2024-01-16T14:36:24+00:00\",\"dateModified\":\"2024-06-19T19:00:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/#website\",\"url\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/\",\"name\":\"Design Switch Test\",\"description\":\"New Design 5\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloud04.titletapsites.com\/designswitchtest\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - Design Switch Test","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - Design Switch Test","og_description":"[et_pb_ ][\/et_pb_][et_pb_ ][\/et_pb_]","og_url":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/","og_site_name":"Design Switch Test","article_modified_time":"2024-06-19T19:00:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/","url":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/","name":"Cyber Security - Design Switch Test","isPartOf":{"@id":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/#website"},"datePublished":"2024-01-16T14:36:24+00:00","dateModified":"2024-06-19T19:00:49+00:00","breadcrumb":{"@id":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/#website","url":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/","name":"Design Switch Test","description":"New Design 5","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/wp-json\/wp\/v2\/pages\/13722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/wp-json\/wp\/v2\/comments?post=13722"}],"version-history":[{"count":8,"href":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/wp-json\/wp\/v2\/pages\/13722\/revisions"}],"predecessor-version":[{"id":14064,"href":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/wp-json\/wp\/v2\/pages\/13722\/revisions\/14064"}],"wp:attachment":[{"href":"https:\/\/cloud04.titletapsites.com\/designswitchtest\/wp-json\/wp\/v2\/media?parent=13722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}