skip to Main Content
CertifID Resources

Stay updated with the latest news in Cybersecurity.

Plant Your Flag Or Let A Fraudster Do It For You

Plant Your Flag or Let a Fraudster Do It For You

From GPS to banking to shopping and almost everything else, technology has made the most inconvenient parts of our lives…

Read More
What’s In A Number?

What’s In A Number?

Credit cards: what do those numbers really mean?
Read More
Public Wi-Fi Is More Public Than You Think

Public Wi-Fi Is More Public Than You Think

What’s a digitally-savvy person to do, especially one who happens to be addicted to working latte-in-hand? While you can never be 100 percent sure that a public unsecured wifi network is safe, here are a few strategies you can employ to make yourself less vulnerable to a hacker.
Read More
White Paper: When Minutes Matter

White Paper: When Minutes Matter

A step-by-step guide to wire fraud recovery.

Read More
Email Phishing, Part 3: Examples, Real-Life Scams, And Caveats

Email Phishing, Part 3: Examples, Real-Life Scams, and Caveats

Phishing attempts aren’t always so easy to catch: as technology becomes more advanced, so do scammers’ techniques. The once-obvious warning…

Read More
The Power Of Social Engineering To Decimate Your Security

The Power of Social Engineering to Decimate Your Security

Have you started tightening your security practices in the wake of online breaches and fraud schemes? Maybe you’re requiring identification,…

Read More
Are You Prepared For A Cyber Attack?

Are You Prepared for a Cyber Attack?

A recent security report from the British government revealed some shocking information: 10 percent of Britain’s biggest companies have no…

Read More
The Myth Of The Social Security Number And Why We Need A New Solution
Email Phishing, Part 2: Tests And Readiness

Email Phishing, Part 2: Tests and Readiness

Phishing—the practice of collecting sensitive and private data with false emails—is all too common, even with advanced server protection and…

Read More
Everyone Is A Target: No Firm Is Too Small For Cybercriminals

Everyone is a target: no firm is too small for cybercriminals

“Everybody’s a target. Everyone is... Small-to-medium-sized businesses, some say, ‘well, cybersecurity isn’t big for us - we’re a small company, nobody would hit us.’ Well, you know what? That approach now has to change.”
Read More
Email Phishing, Part 1: An Overview

Email Phishing, Part 1: An Overview

Every day, an estimated 30,000 Americans and 80,000 Canadians fall for an email phishing scam—and experts believe the number would…

Read More
Digital Security Meets… Game Of Thrones?

Digital Security Meets… Game Of Thrones?

The world of digital security just like Game of Thrones? It might sound a little far-fetched. After all, your data…

Read More
Equifax Breach – What This Means For Real Estate Transactions

Equifax Breach – What This Means For Real Estate Transactions

Our co-founder shares his take on the recent Equifax breach and its implications for real estate transactions. What Happened? The personal data of approximately…

Read More
50% Of Cyber Attacks Happen To Small Businesses: Are You Ready?

50% Of Cyber Attacks Happen To Small Businesses: Are You Ready?

In the ocean of business, you’re a relatively small fish. So when hackers are looking for a target for a cyber-attack, certainly there are bigger fish to fry, right? Wrong.
Read More
Avoiding Real Estate Fraud: Who Participates In A Real Estate Transaction?

Avoiding Real Estate Fraud: Who Participates In A Real Estate Transaction?

During a real estate transaction, homebuyers and sellers put a great deal of trust in the many people involved in…

Read More
“How I Hacked My Friend Without Her Noticing,” The Hacker Alex Tells All

“How I Hacked My Friend Without Her Noticing,” The Hacker Alex Tells All

A tale of espionage, close calls, daring maneuvers and… Luigi? The story of one amateur hacker as he (consensually) attempts…

Read More
The Four Pillars Of Fraud Protection, Part 4: People

The Four Pillars Of Fraud Protection, Part 4: People

You’ve probably heard the saying, “You’re only as good as the people around you,” and when it comes to digital…

Read More
Two-Factor Authentication: Why A Password Alone Is A Security Risk

Two-Factor Authentication: Why a Password Alone is a Security Risk

Passwords – they’re everywhere. Include a digit, a special character, a combiNatioN of loWEr  and uPpeR case, a symbol. Don’t…

Read More
The Four Pillars Of Fraud Prevention, Part 3 – Procedure

The Four Pillars Of Fraud Prevention, Part 3 – Procedure

It’s easy to think that digital security begins and ends with the IT department, but if that’s how your business…

Read More
Business Email Compromise And CEO Fraud: New Data Proves This Problem Is Getting Worse, Not Better

Business Email Compromise And CEO Fraud: New Data Proves This Problem Is Getting Worse, Not Better

As we covered in our previous post on Business Email Compromise (BEC), scammers have developed a much more elaborate—and thus, harder…

Read More
The Four Pillars Of Fraud Prevention, Part 2: Software

The Four Pillars Of Fraud Prevention, Part 2: Software

In our first pillar of digital security, we tackled the framework of your security system – hardware. Now it’s time…

Read More
The Four Pillars Of Fraud Protection, Part 1: Hardware

The Four Pillars Of Fraud Protection, Part 1: Hardware

You know online fraud exists. You see it in the headlines every day. But what can you do to protect…

Read More
Title Company, Real Estate Firm Hit With Lawsuit After Lost Life Savings To Wire Fraud

Title Company, Real Estate Firm Hit With Lawsuit After Lost Life Savings To Wire Fraud

It’s every home buyer’s nightmare. James and Candace Butcher wanted a new home, a bigger place that was closer to…

Read More
Make Your Customer The First Line Of Defense

Make Your Customer the First Line of Defense

Our co-founder Tom Cronkright provides an overview of his upcoming session for this year’s ALTA One conference. The following post…

Read More
5 Types Of Cyber Attacks And How To Prevent Them

5 Types Of Cyber Attacks And How To Prevent Them

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be…

Read More
Transaction Fraud Continues To Escalate – Protect Yourself And Your Client!

Transaction Fraud Continues To Escalate – Protect Yourself And Your Client!

Cyber fraud is unhinged and has hit an epic level in real estate transactions.  We saw a significant change in…

Read More
Back To Top