-
Security
Security should always be a top consideration when evaluating software and cloud services. Once you go paperless, you're entrusting your documents — and the sensitive client information they contain — to that product and provider. You want assurance that your records are encrypted and...
MORE >
-
Despite significant advancements in security and data protection, hackers and cyber criminals linger around to pounce on open vulnerabilities.
A stray password scribbled on paper or free-for-all public computer are any hacker's playground and too often people make the mistake of letting their...
MORE >
-
At the peak of the information age, we find ourselves faced with a paradox of convenience and security. On one hand, we are producing, transmitting and storing a historically unprecedented amount of information. On the other, much of this information is never physically archived. Security...
MORE >
-
Clareity Security is staging the release of their best Single Sign-On dashboard ever. As a quick primer, Clareity Security was born to prevent password sharing and other unauthorized access to the MLS system. The MLS has confidential fields that must be protected and Clareity's software also...
MORE >
-
Patch security vulnerabilities in your devices. Install operating system updates to patch security vulnerabilities and enhance the performance of your computers and devices. Cybercriminals can exploit vulnerabilities in your devices to obtain your personal and financial information. Don't allow it.
MORE >
-
This often involves somebody claiming you owe taxes or penalties and if you don't pay quickly, you'll be faced with punitive measures—including jail.
What's insidious about this is that the scammers can have legitimate information about you including your name, address or Social Security...
MORE >
-
But beware, eSignature solutions are not all created equal.
Solutions can range from low end – what I like to refer to as "ScribbleSign," which simply pastse an image of a signature into a document – to highly developed and secure electronic signature platforms like DocuSign, that offer...
MORE >
-
If an audit is required, the process for the broker will be much smoother.
Brokers, agents, and clients can rest easy with the safety protocols for eSign, which features bank-grade security.
By automating the tracking of your transactions with Form Simplicity, brokers can reduce the amount of...
MORE >
-
Future technological breakthroughs will be made in the cloud, so adopting cloud technology now will make your business more receptive to future innovation and more resilient in the face of change.
Availability
With the cloud, your systems will rarely (if ever) go offline, you can work from...
MORE >
-
The number one reason is that the agent did not stay in touch.
About CompassAI on OpenAI Privacy and Security
Whenever any brokerage firm initiates an AI strategy, they need to begin with privacy and security. For Compass, all agent and company data is secured and not shared.
Compass...
MORE >
-
We are going to explain what is happening in layman's terms and help you get through it.
Right before Christmas, researchers discovered that there is a security vulnerability (like an open door) that exposes computers built after 1995 to risk. Google found it (nod in reverence to Jann Horn of...
MORE >
-
TREB, in conjunction with Clareity, will deploy new two-factor authentication (2FA) tools to all of the TREB members in 2017 and also implement Clareity’s industry leading RISK analytics solution.
“Data security is one of our most important responsibilities and we continue to recognize Clareity...
MORE >
-
It has been my preferred browser because it is nearly impervious to hackers, unlike Microsoft Explorer which is riddled with hundreds of known security breaches.
Some clever programmers built a program called Firesheep that can be installed as an extension in Firefox to take advantage of a widely...
MORE >
-
The two went head-to-head in a discussion on the security and privacy issues behind C.A.R.'s recent refusal to license its forms to dotloop.
We took to Twitter today to watch all the action unfold. It's our favorite way to monitor real time updates from the conference. Below, we've compiled a few...
MORE >
-
With the sharing and exchange of so much listing data online today, agents know that exposure for their listings is normally a great asset when it comes to getting a property sold.
Savvy agents also understand that while exposure is great, there may be some security issues to be mindful of when...
MORE >
-
Be it a simple pin or swipe code, this extra level of security will keep most people off your device if it's found or stolen.
A laptop was stolen in 2007 from a Home Depot employee that contained the personal information of over 10,000 employees. Thankfully, the data was not the target of the...
MORE >
-
The two companies settled on a mutual definition to "provide a clear and unified designation to keep up with rapidly evolving technology."
To start, a home must have a reliable internet connection and one of two base "smart" systems: 1) security features that control access via smart locks or...
MORE >
-
And for many top producers, it is a highly profitable one.
A guaranteed sale is attention-grabbing, providing an immediate sense of security for the seller. At face value, as an agent, it gives you a leg up on the competition. It shows the seller, "Look, I'm so confident that I can sell your...
MORE >
-
Your clients value privacy, cleanliness, flexible schedules, and security. When considering your real estate marketing plan now and in the future, you need to re-consider how you provide your services while giving your seller a safety net.
1. Trust
The seller trusts that when they take the leap...
MORE >
-
Cyberattacks can result in disruption of business, financial loss and damage to reputation.
Today, we are going to speak about the real estate cybersecurity practices that should become your second nature.
Real estate agents are responsible for keeping their clients' information safe....
MORE >