{"id":13722,"date":"2024-01-16T14:36:24","date_gmt":"2024-01-16T14:36:24","guid":{"rendered":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/"},"modified":"2024-05-15T14:18:44","modified_gmt":"2024-05-15T14:18:44","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;tt-section-inner-pages ttfw-template-header&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_module=&#8221;13819&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; text_color=&#8221;light&#8221; module_class=&#8221;tt-home-hero&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; title_font_size=&#8221;50px&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(0,0,0,0.5) 0%|rgba(0,0,0,0.5) 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_color_gradient_start=&#8221;rgba(0,0,0,0.5)&#8221; background_color_gradient_end=&#8221;rgba(0,0,0,0.5)&#8221; background_image=&#8221;https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-content\/uploads\/sites\/7\/2021\/04\/slide-01-1.jpg&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;350px||250px||false|false&#8221; title_font_size_tablet=&#8221;40px&#8221; title_font_size_phone=&#8221;26px&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; specialty=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; padding_top_2=&#8221;0px&#8221; padding_bottom_2=&#8221;0px&#8221; padding_top_bottom_link_2=&#8221;false&#8221; padding_left_right_link_2=&#8221;false&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;70px||70px||true|false&#8221; custom_padding_tablet=&#8221;54px||54px||true|false&#8221; custom_padding_phone=&#8221;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; specialty_columns=&#8221;2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_row_inner admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column_inner saved_specialty_column_type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"tt-section-header\">Cyber Security<\/h2>\n<p><strong>Protect Yourself From Cyber Fraud<\/strong><br \/>\nWatch the video or read below to learn how to protect yourself from cyber fraud.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/ek4TwC9owwY?si=QdMZouOqJsEVU2YY\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<h3>How Your Money Gets Stolen<\/h3>\n<ol class=\"tt-section-list\">\n<li><strong>Hacked email \u2013<\/strong> Hackers get access to the email account of someone involved in the transaction \u2013 the buyer, seller, real estate agent, mortgage lender, title agent, or other.<\/li>\n<li><strong>Email from hacker \u2013<\/strong> The hacker then emails that person to change the wiring or payment instructions without knowledge from the other parties.<\/li>\n<li><strong>Consumer pays wrong account \u2013<\/strong> If not questioned, the wrong account gets the down payment or other funds and the criminal gets away.<\/li>\n<li><strong>Closing day \u2013<\/strong> By the time closing day arrives and the mistake is realized, often the funds are long gone.<\/li>\n<\/ol>\n<h3>How to Avoid Wire Fraud<\/h3>\n<p><strong>Rule 1: Always question emails that contain wiring instructions.<\/strong><br \/>\nHackers have learned to exploit the real estate closing process to steal millions of dollars from people buying or selling a home.<\/p>\n<p><strong>Rule 2: Always call before sending any money.<\/strong><br \/>\nWhen you do receive instructions on where to send money prior to closing, always call your contact person at the title company to verify. Then call your bank to verify as well.<\/p>\n<p><strong>Rule 3: Always call after sending money.<\/strong><br \/>\nIt\u2019s always a good idea to call right after money is sent. That way, you can verify that it was received by the correct recipient. <\/p>\n<p><strong>Rule 4: Act immediately if anything seems unusual.<\/strong><br \/>\nContact your bank, mortgage company, and title company immediately if anything is in question. If something is wrong, you may need to contact your local FBI office.<\/p>\n[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_sidebar orientation=&#8221;right&#8221; area=&#8221;sidebar-1&#8243; show_border=&#8221;off&#8221; admin_label=&#8221;TT &#8211; Sidebar&#8221; _builder_version=&#8221;4.16&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_sidebar][\/et_pb_column][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<h2 class=\"tt-section-header\">Cyber Security<\/h2>\n<p><strong>Protect Yourself From Cyber Fraud<\/strong><br \/>\nWatch the video or read below to learn how to protect yourself from cyber fraud.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/ek4TwC9owwY?si=QdMZouOqJsEVU2YY\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<h3>How Your Money Gets Stolen<\/h3>\n<ol class=\"tt-section-list\">\n<li><strong>Hacked email \u2013<\/strong> Hackers get access to the email account of someone involved in the transaction \u2013 the buyer, seller, real estate agent, mortgage lender, title agent, or other.<\/li>\n<li><strong>Email from hacker \u2013<\/strong> The hacker then emails that person to change the wiring or payment instructions without knowledge from the other parties.<\/li>\n<li><strong>Consumer pays wrong account \u2013<\/strong> If not questioned, the wrong account gets the down payment or other funds and the criminal gets away.<\/li>\n<li><strong>Closing day \u2013<\/strong> By the time closing day arrives and the mistake is realized, often the funds are long gone.<\/li>\n<\/ol>\n<h3>How to Avoid Wire Fraud<\/h3>\n<p><strong>Rule 1: Always question emails that contain wiring instructions.<\/strong><br \/>\nHackers have learned to exploit the real estate closing process to steal millions of dollars from people buying or selling a home.<\/p>\n<p><strong>Rule 2: Always call before sending any money.<\/strong><br \/>\nWhen you do receive instructions on where to send money prior to closing, always call your contact person at the title company to verify. Then call your bank to verify as well.<\/p>\n<p><strong>Rule 3: Always call after sending money.<\/strong><br \/>\nIt\u2019s always a good idea to call right after money is sent. That way, you can verify that it was received by the correct recipient. <\/p>\n<p><strong>Rule 4: Act immediately if anything seems unusual.<\/strong><br \/>\nContact your bank, mortgage company, and title company immediately if anything is in question. If something is wrong, you may need to contact your local FBI office.<\/p>\n\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-13722","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security - Example Company Five<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - Example Company Five\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Example Company Five\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T14:18:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"[titletap-framework page-data=&quot;cyber_security&quot;]\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/\",\"url\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/\",\"name\":\"Cyber Security - Example Company Five\",\"isPartOf\":{\"@id\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/#website\"},\"datePublished\":\"2024-01-16T14:36:24+00:00\",\"dateModified\":\"2024-05-15T14:18:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/#website\",\"url\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/\",\"name\":\"Example Company Five\",\"description\":\"New Design 5\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloud04.titletapsites.com\/newdesign5\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - Example Company Five","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - Example Company Five","og_url":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/","og_site_name":"Example Company Five","article_modified_time":"2024-05-15T14:18:44+00:00","twitter_card":"summary_large_image","twitter_description":"[titletap-framework page-data=\"cyber_security\"]","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/","url":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/","name":"Cyber Security - Example Company Five","isPartOf":{"@id":"https:\/\/cloud04.titletapsites.com\/newdesign5\/#website"},"datePublished":"2024-01-16T14:36:24+00:00","dateModified":"2024-05-15T14:18:44+00:00","breadcrumb":{"@id":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cloud04.titletapsites.com\/newdesign5\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloud04.titletapsites.com\/newdesign5\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/cloud04.titletapsites.com\/newdesign5\/#website","url":"https:\/\/cloud04.titletapsites.com\/newdesign5\/","name":"Example Company Five","description":"New Design 5","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloud04.titletapsites.com\/newdesign5\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-json\/wp\/v2\/pages\/13722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-json\/wp\/v2\/comments?post=13722"}],"version-history":[{"count":2,"href":"https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-json\/wp\/v2\/pages\/13722\/revisions"}],"predecessor-version":[{"id":13953,"href":"https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-json\/wp\/v2\/pages\/13722\/revisions\/13953"}],"wp:attachment":[{"href":"https:\/\/cloud04.titletapsites.com\/newdesign5\/wp-json\/wp\/v2\/media?parent=13722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}