Top Banner
Protecting Your Property Rights California CONSUMER REPORT CALIFORNIA TITLE COMPANY HAS A VESTED INTEREST IN THE CONSUMERS OF THE STATE OF CALIFORNIA. Protecting Your Property Rights California CONSUMER REPORT CALIFORNIA TITLE COMPANY HAS A VESTED INTEREST IN THE CONSUMERS OF THE STATE OF CALIFORNIA. JANUARY 2017 ISSUE The information contained herein is deemed to be reliable, but it is not guaranteed. California Title Company assumes no responsibility for errors or omissions. ©2016 California Title Company. CYBER SNIPERS ZERØ IN ØN INDUSTRY One morning earlier this year, Maureen Pfaff received a random email requesting her title company to wire nearly $11,000 to a TD Bank in Florida. The general manager and chief financial officer for Olympic Peninsula Title Co. immediately became suspicious be- cause the email came from her father. He wouldn’t make a request like this via email. “Additionally, the formality of the email and signing it the way they did was a dead giveaway,” Pfaff said. Realizing it was a scam, Pfaff strung the criminal along, eventually sending something encrypted so she could get an IP address to in- clude in the complaint filed with the FBI. Pfaff created a fake wire transfer notification in an encrypted email, which generated a report when opened. Pfaff said this was the third fraud attempt the company has experi- enced in the past six months. “They’ve all been different strategies,” she added. Pfaff isn’t alone. Title agents and lenders alike are seeing increased reports of attacks across the country. Signaling the growing threat, the Federal Trade Commission (FTC) issued a warning to homebuy- ers about email and money wiring scams. Hackers have been break- ing into some consumers’ and real estate professionals’ email ac- counts to get information about upcoming real estate transactions. After figuring out the closing dates, the hacker sends an email to the buyer, posing as the real estate or title company professional. The bogus email says there has been a last minute change to the wiring instructions, and tells the buyer to wire closing costs to a fraudulent account. The FTC warns consumers that email is not a secure way to send financial information. Email Fraud Schemes on the Rise Total losses due to account takeover schemes more than doubled in 2015 while losses related to fraudulent email attacks increased nearly threefold, according to a report from PricewaterhouseCoo- pers’ Financial Crimes Unit. An account takeover occurs when an attack either obtains an individual’s personal information—such as user name, password, account number, Social Security number—or impersonates a customer to gain access to bank accounts or pay- ment systems to make unauthorized transactions. According to PricewaterhouseCoopers, between October 2013 and August 2015 this type of fraud netted hackers over $1.2 billion. The report says the fastest growing form of account takeover scheme is business email compromise, which uses the hacked or spoofed email account of an employee or customer to initiate a fraudulent transaction. The report says that attackers often research a target’s schedule, waiting until the target is traveling or unavailable for im- mediate verification. An unsuspecting title or settlement agent re- ceives the email and carries out the wiring instructions, unaware that the email was not legitimate. The funds are then routed to an account controlled by the hacker. “Account takeover fraud results in reputational damage, loss of cli- ent confidence and significant financial liability,” the report said. Exploiting Human Nature Verizon’s latest Data Breach Investigations Report also shows phish- ing schemes picking up dramatically. According to the survey, 30 percent of phishing messages were opened—up from 23 percent in the 2015 report—and 13 percent of those clicked to open the mali- cious attachment or nefarious link. Adding to the list of human error are those caused by end users of an organization. Miscellaneous errors take the No. 1 spot for securi- ty incidents in this year’s report from Verizon. These can include im- proper disposal of company information, misconfiguration of IT sys- tems and lost and stolen assets such as laptops and smartphones. In fact, 26 percent of these errors involve people mistakenly sending sensitive information to the wrong person. “You might say our findings boil down to one common theme—the human element,” said Bryan Sartin, executive director of global se- curity services for Verizon Enterprise Solutions. “Despite advances in information security research and cyber detection solutions and tools, we continue to see many of the same errors we’ve known about for more than a decade now. How do you reconcile that?” An article published by American Land Title Association. September 13, 2016
4

California - Title Advantage SINGLE...Federal Trade Commission (FTC), and Consumer Financial Protec-tion Bureau (CFPB),” according to Ailes. Interestingly, a new report from SecurityScorecard

Jun 24, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: California - Title Advantage SINGLE...Federal Trade Commission (FTC), and Consumer Financial Protec-tion Bureau (CFPB),” according to Ailes. Interestingly, a new report from SecurityScorecard

Protecting Your Property Rights

Califor nia CONSUMER REPORT CALIFORNIA TITLE COMPANY HAS A VESTED INTEREST

IN THE CONSUMERS OF THE STATE OF CALIFORNIA.

Protecting Your Property Rights

Califor nia CONSUMER REPORT CALIFORNIA TITLE COMPANY HAS A VESTED INTEREST

IN THE CONSUMERS OF THE STATE OF CALIFORNIA.

JANUARY 2017 ISSUE

The information contained herein is deemed to be reliable, but it is not guaranteed. California Title Company assumes no responsibility for errors or omissions. ©2016 California Title Company.

CYBER SNIPERS ZERØ IN ØN INDUSTRYOne morning earlier this year, Maureen Pfaff received a random email requesting her title company to wire nearly $11,000 to a TD Bank in Florida. The general manager and chief financial officer for Olympic Peninsula Title Co. immediately became suspicious be-cause the email came from her father. He wouldn’t make a request like this via email.

“Additionally, the formality of the email and signing it the way they did was a dead giveaway,” Pfaff said.

Realizing it was a scam, Pfaff strung the criminal along, eventually sending something encrypted so she could get an IP address to in-clude in the complaint filed with the FBI.

Pfaff created a fake wire transfer notification in an encrypted email, which generated a report when opened.

Pfaff said this was the third fraud attempt the company has experi-enced in the past six months. “They’ve all been different strategies,” she added.

Pfaff isn’t alone. Title agents and lenders alike are seeing increased reports of attacks across the country. Signaling the growing threat, the Federal Trade Commission (FTC) issued a warning to homebuy-ers about email and money wiring scams. Hackers have been break-ing into some consumers’ and real estate professionals’ email ac-counts to get information about upcoming real estate transactions.

After figuring out the closing dates, the hacker sends an email to the buyer, posing as the real estate or title company professional. The bogus email says there has been a last minute change to the wiring instructions, and tells the buyer to wire closing costs to a fraudulent account. The FTC warns consumers that email is not a secure way to send financial information.

Email Fraud Schemes on the Rise Total losses due to account takeover schemes more than doubled in 2015 while losses related to fraudulent email attacks increased nearly threefold, according to a report from PricewaterhouseCoo-pers’ Financial Crimes Unit. An account takeover occurs when an attack either obtains an individual’s personal information—such as

user name, password, account number, Social Security number—or impersonates a customer to gain access to bank accounts or pay-ment systems to make unauthorized transactions. According to PricewaterhouseCoopers, between October 2013 and August 2015 this type of fraud netted hackers over $1.2 billion.

The report says the fastest growing form of account takeover scheme is business email compromise, which uses the hacked or spoofed email account of an employee or customer to initiate a fraudulent transaction. The report says that attackers often research a target’s schedule, waiting until the target is traveling or unavailable for im-mediate verification. An unsuspecting title or settlement agent re-ceives the email and carries out the wiring instructions, unaware that the email was not legitimate. The funds are then routed to an account controlled by the hacker.

“Account takeover fraud results in reputational damage, loss of cli-ent confidence and significant financial liability,” the report said.

Exploiting Human Nature Verizon’s latest Data Breach Investigations Report also shows phish-ing schemes picking up dramatically. According to the survey, 30 percent of phishing messages were opened—up from 23 percent in the 2015 report—and 13 percent of those clicked to open the mali-cious attachment or nefarious link.

Adding to the list of human error are those caused by end users of an organization. Miscellaneous errors take the No. 1 spot for securi-ty incidents in this year’s report from Verizon. These can include im-proper disposal of company information, misconfiguration of IT sys-tems and lost and stolen assets such as laptops and smartphones. In fact, 26 percent of these errors involve people mistakenly sending sensitive information to the wrong person.

“You might say our findings boil down to one common theme—the human element,” said Bryan Sartin, executive director of global se-curity services for Verizon Enterprise Solutions. “Despite advances in information security research and cyber detection solutions and tools, we continue to see many of the same errors we’ve known about for more than a decade now. How do you reconcile that?”

An article published by American Land Title Association. September 13, 2016

Page 2: California - Title Advantage SINGLE...Federal Trade Commission (FTC), and Consumer Financial Protec-tion Bureau (CFPB),” according to Ailes. Interestingly, a new report from SecurityScorecard

Don’t Rely on Email to Confirm Wire InstructionsEarlier this year, a new wrinkle in cyberattacks hit the title and set-tlement industry. An independent escrow company in Southern Cali-fornia received a “legitlooking” email from a lender confirming two wire instructions for a total of $650,000. Instead of verifying the wire confirmations through the lender’s website, the escrow com-pany trusted the email.

Escrow employees sent $650,000 to an account supposedly owned by a party that didn’t exit. Unfortunately, the email was a fake. One of the wires was recalled. The second wire was not and the con-sumer lost $133,000.

“Title and settlement agents need to know that this can happen to them,” said Bill Burding, general counsel for Orange Coast Title. “When you get a wire confirmation from a lender, don’t disburse off it until you verify it on their website. Companies need a formalized policy of confirming disbursements online.”

Burding said title agents should call their lender if confirming wires online is not an option.

“If your bank doesn’t offer online verification, you shouldn’t be bank-ing there,” he added.

Deliver What You SayThe rash of attacks supports the need for title and settlement com-panies to implement a system to protect customer data. Whatever system a company employs, it’s im-portant to accurately explain how data is protected. The FTC recently issued a consent order against Henry Schein Practice Solutions, a software provider for dental prac-tices, for allegedly marketing its software using deceptive asser-tions. The FTC fined Schein $250,000 for alleged false marketing advertisements related to the level of encryption the company pro-vided to protect patient health data.

Schein advertised that its software provided industry standard en-cryption methods to protect sensitive patient information as required by the Health Insurance Portability and Accountability Act (HIPAA). However, the FTC alleged that Schein was aware that its software did not comport to the Advanced Encryption Standard, which the National Institute of Standards and Technology (NIST) recognizes as meeting the regulatory data encryption obligations under HIPAA. By failing to meet the encryption standards identified by the NIST, Schein was found to have misled patients about the level of protec-tion its software provided.

The significant fine the FTC assessed for Schein’s deceptive market-ing correlates with the type of data Schein was encrypting. “Strong encryption is critical for companies dealing with sensitive health information,” said Jessica Rich, director of the FTC’s Bureau of Consumer Protection. “If a company promises strong encryption, it should deliver it.”

The primary lesson that title insurance and settlement companies should take from this consent order is the importance of clearly and accurately identifying encryption methods. The primary lesson that title insurance and settlement companies should take from this consent order is the importance of choosing secure encryption methods.

When choosing software to handle security, pay special attention to the actual encryption details rather than the marketing spin. Steer clear of products that might claim to be secure while not actually conforming to industry encryption standards. Implying that the ser-vices meet certain regulatory standards may be seen as deceptive, as Schein’s advertising was found by the FTC in this case.In another action by the FTC, Wyndham Hotels & Resorts in Decem-ber settled charges that its security practices unfairly exposed the payment card information of hundreds of thousands of consumers to hackers in three separate data breaches. Under the terms of the stipulated order, filed in the U.S. District Court for the District of New Jersey, Wyndham agreed to:• Implement a comprehensive data security program• Conduct a Payment Card Industry Data Security Standard eval-

uation and engage in yearly assessment of the handling of cus-tomer payment card information

• Comply with 20 years of compliance to the FTC on the settle-ment agreement requirements

According to Steve Gottheim, ALTA’s senior counsel, this decision suggests the FTC has authority to go after companies that were hacked, sanctioning them for unfair trade practices instead of the traditional Gramm-Leach-Bliley Act privacy law.

ALTA’s Title Insurance and Settlement Compa-ny Best Practices require that title insurance and settlement companies encrypt nonpublic personal information that is sent electroni-cally. The ALTA Best Practices also requires companies to provide a copy of their privacy policy to customers and to alert customers if a security breach occurs as required by law.

NAIC Gets InvolvedThe National Association of Insurance Commissioners (NAIC) and state insurance regulators are ramping up efforts to tackle cyber-security issues. The NAIC’s Cybersecurity Task Force adopted the Principles for Effective Cybersecurity Insurance Regulatory Guid-ance in April 2015. The 12 principles adopted direct insurers, pro-ducers and other regulated entities to join forces in identifying risks and adopting practical solutions to protect information entrusted to them. In addition, the NAIC is developing new reporting require-ments for insurers to better track cyber insurance policies issued in the marketplace.

Responding to feedback and pressure from ALTA and state regula-tors, the NAIC’s commissioner agreed to hold an extended in-person discussion to address concerns about the association’s proposed state model cybersecurity law.

In March, ALTA submitted a letter to the NAIC’s Cybersecurity Task Force outlining concerns with the group’s draft Insurance Data Se-curity Model Law. ALTA encouraged the NAIC to work with state at-torneys general and consider whether states will pass two differ-ent data security laws: one for insurance and a separate one for all other businesses. ALTA suggested that the NAIC host an open con-versation about data security that facilitates consensus about our shared goals and pain points. Finally, ALTA expressed concern that the proposal does not adequately take scalability into account. ALTA believes that an insurance-specific data security law could conflict with other state and federal data security laws, making it difficult for title and settlement agents to comply with all their legal and con-tractual obligations.

Page 3: California - Title Advantage SINGLE...Federal Trade Commission (FTC), and Consumer Financial Protec-tion Bureau (CFPB),” according to Ailes. Interestingly, a new report from SecurityScorecard

“We are concerned that the Preliminary Working and Discussion Draft would not establish a single standard for consumer protec-tion, which is likely to create confusion and conflict among various regulators, state attorneys general, courts, industry and consum-ers,” Justin Ailes, ALTA’s vice president of government and regula-tory affairs, wrote in the letter. “As currently written, the Preliminary Working and Discussion Draft appears to take the most severe pen-alties, adds an extensive additional regulatory burden and private rights of action under state regulation. No state today approaches data security in this manner.”As it continues to consider a standard for data security and inves-tigation and notification of a breach of data security, ALTA encour-ages the NAIC to consult existing state and federal requirements that licensees are already required to follow.

“It may also be prudent for the NAIC to engage with and solicit com-ment about the Preliminary Working and Discussion Draft from state and federal regulators including state attorneys general, the Federal Trade Commission (FTC), and Consumer Financial Protec-tion Bureau (CFPB),” according to Ailes.

Interestingly, a new report from SecurityScorecard shows that U.S. federal, state and local government agencies rank last in cyberse-curity when compared against 17 major private industries, including financial services, retail and health care.

The analysis measured the relative security health of government and industries across 10 categories, including vulnerability to mal-ware infections, exposure rates of passwords and susceptibility to social engineering, such as an employee using corporate account information on public social networks.

CFPB Licks Its ChopsSending a warning shot to the industry as to its expectations, the CFPB in March took action against online payment platform Dwolla for deceiving consumers about the safety of its online payment sys-tem. The CFPB ordered Dwol-la to pay a $100,000 penalty and fix its security practices.

The CFPB cited its authority under the DoddFrank Act to protect consumers against deceptive practices and false representations. This was the bureau’s first data secu-rity action, and builds upon advances made by several other agencies, including the FTC. The consent decree said Dwolla falsely claimed its data security practices “exceed” or “surpass” industry security standards and claimed information was “securely encrypted and stored.”

“Rather than setting ‘a new precedent for the payments industry’ as asserted, Dwolla’s data security practices in fact fell far short of its claims,” the CFPB stated in its action letter. “Such deception about security and security practices is illegal.”

In addition to paying the penalty, the bureau ordered Dwolla to train its employees on company data security policies and procedures, and on how to protect consumers’ sensitive personal information. Dwolla also was ordered to fix any security weaknesses found in its web and mobile applications, and to securely store and transmit consumer data.

Rajesh De, the former general counsel to the National Security Ad-ministration, now leads Mayer Brown’s cybersecurity practice. Ac-cording to De, the case highlights the standards that regulators are expecting from companies with regards to data security, such as the development of written security plans and risk assessments.

Stop and Take a BreathWhile many of the fraudsters target real estate agents or home-buyers involved in a purchase transaction, Lisa DeWolf, senior vice president and director of operations for Trident Land Transfer Co., shared details on a recent attack involving a seller’s mortgage pay-off.

The title company received a mortgage payoff statement via fax from an unfamiliar lender in Oregon. As was typical with payoff statements, the incoming document was three pages long and printed on company letterhead. The settlement was scheduled and the closer began communicating by email with the fraudster. The thief informed the closer that “the lender’s account was under up-grade and would she kindly respond to his email to receive the new wiring instructions.” The closer responded and eventually received a revised payoff with a few minor changes:• The amount the closer was required to collect from the seller

and wire to the bank increased by a little more than $500.• The bold, uppercase sentence informing the company to call

the lender to verify payoff information from the first page and replaced with new wire instructions. In addition, the lender sig-nature and phone number were not on the revised payoff state-ment.

• Page three, which included the breakdown of a fee totaled on page one, was typed in a different font. At a glance, this was the most noticeable red flag.

• The sender’s email address changed from [email protected] to [email protected]. This shift from a legitimate corporate email address to Google’s

free email service was another obvious area of concern.

Fortunately, the closing was postponed. The new closer assigned to the closing noticed the many, subtle red flags. Although Trident Land Transfer has many procedures in place—including secure email and a stringent policy around wires—it was the lender’s email that was hacked. DeWolf encourages stringent training on the different scenarios for everyone involved in closings. If it weren’t for the keen eyes of Trident’s closing team, this situation could have had a very differ-ent outcome for the company.

“Anyone moving too quickly may have followed through with the fraudulent instructions,” DeWolf

said. “These criminals are becoming very clever, cutting and pasting existing verbiage from legitimate correspondences into their com-munication to you.”

The moral of the story is that everyone needs to remember to slow down and pay attention to the details.

“How many people, and especially banks, do you know who change their bank account information at the last minute? Not many. Last-minute changes in wiring instructions are a huge red flag,” DeWolf said. “This illegal activity on our industry is very lucrative for these crime syndicates. Cyber criminals know that this is a very busy time of year for our industry and our teams are juggling many balls at once. They are counting on us to drop one.”

Page 4: California - Title Advantage SINGLE...Federal Trade Commission (FTC), and Consumer Financial Protec-tion Bureau (CFPB),” according to Ailes. Interestingly, a new report from SecurityScorecard

JANUARY 2017San Diego Events Calendar

San Diego Farmers Markets Ongoinghttp://sdfarmbureau.org/BuyLocal/Farmers-Markets.php

San Diego Food Trucks Ongoingwww.sdfoodtrucks.com

San Diego International Auto Show Dec 29 - Jan 2Where the cars are the stars! The San Diego International Auto Show features the widest variety of new vehicles under one roof.www.sdautoshow.com

San Diego Resolution Run 5K & 15K Jan 7Get ready to shed those holiday pounds and kick off your New Year’s Resolution by running along San Diego’s beautiful Mission Bay Park. 10K and 5K distances available for runners and walkers. We work hard to keep the Resolution Run’s impact low through earth-friendly race management practices. Plus, the Resolution Run benefits San Diego Roots Sustainable Food Project, a local, eco-friendly organization supporting a healthier San Diego food system. 619-269-7047.http://sandyfeetevents.com/san-diego-resolution-run-15k-5k/

San Diego Brew Fest Jan 7San Diego Brew Fest offers a fun-filled day of beer tastings, live music and food trucks. The festival offers a diverse assortment of beers from locally and around the world for attendees to taste, and proceeds from the event benefit an organization whose mission is to rescue dogs from shelters and help them find their forever homes.http://sandiegobeerfest.com

The Swoon Event Jan 7The Swoon Event is a unique occasion where couples who are planning their wedding can gain inspiration for their upcoming nuptials. Guests can peruse an assortment of non-traditional decor, flower arrangements and clothing options to gather ideas for their perfect day. The event also serves as a fantastic way for local businesses to display their collections and interact with their peers.http://theswoonevent.com

Carlsbad Marathon Jan 15Runners receive a finisher’s medal, mylar blanket, and refreshments (including chocolate milk). Cowboy Jack & the North County Cowboys are performing 7am-10:30am at 901 Palomar Airport Road.www.carlsbadmarathon.com

Martin Luther King Jr. Parade Jan 15Join us on Harbor Drive for the 37th Annual Martin Luther King Jr. Parade. This is one of the largest celebrations of its kind in the United States in honor of Dr. Martin Luther King Jr.. The parade is filled with dazzling floats, phenomenal High School Bands, Drill Teams, College, Fraternities & Sororities, Churches, Peace and Youth organizations.http://alpha-zsl.org/mlkdayparade.html

San Diego Restaurant Week Jan 15-22San Diego Restaurant Week participating restaurants team up with local distributors to bring diners an unforgettably fresh feast for the senses. Vegetables and fruits that travel only a handful of miles (as opposed to a handful of days) shine brightly in vibrant and flavorful cuisines carefully crafted by San Diego chefs who are eager to continue San Diego’s growing legacy of one of the United State’s hottest dining destinations. www.sandiegorestaurantweek.com

San Diego Comedy Festival Jan 23-29The San Diego Comedy Festival celebrates humor with all kinds of performances, events and special guest appearances. The festival, which lasts for more than a week, includes comedy shows, contests, presentations and more, plus prizes and giveaways. Guests include celebrity comedians, TV and radio personalities, speakers and various comedy industry professionals.www.sandiegocomedyfest.com

Farmers Insurance Open 2017 Jan 26-29The annual PGA Tour Farmers Insurance Open men’s golf tournament is played at the Torrey Pines Golf Course in La Jolla, home of the 2008 U.S. Open. Mark your calendars now, because one of golf’s biggest events of the year, the Farmers Insurance Open, returns to San Diego in 2017. www.farmersinsuranceopen.com

Disney on Ice: Worlds of Enchantment Jan 26-29See Lightning McQueen, Mater, and the Disney-Pixar’s Cars race across the ice. Dive into undersea fun with Ariel in The Little Mermaid’s kingdom. Experience the adventures of Buzz, Woody, and the Disney-Pixar Toy Story gang as they race for home. Join Anna, Elsa, Olaf, and Kristoff from Disney’s Frozen as they learn true love comes from within. Get warmed up for the show at Mickey’s Dance-Along Pre-Show. From wheels to waves, icy wonderlands to infinity and beyond, your family’s beloved Disney moments will come to life.http://valleyviewcasinocenter.com

Tet Festival Jan 27The 12th Annual San Diego Tet Festival is a one of a kind bonanza with free entertainment, lion dancing, music, ride.www.sdtet.com

Visit our website for more title related news and information! WWW.CALTITLE.COM