{"id":4186,"date":"2019-02-03T09:21:11","date_gmt":"2019-02-03T14:21:11","guid":{"rendered":"https:\/\/dankrell.com\/blog\/?p=4186"},"modified":"2021-11-23T17:24:54","modified_gmt":"2021-11-23T22:24:54","slug":"identity-protection-real-estate","status":"publish","type":"post","link":"https:\/\/dankrell.com\/blog\/2019\/02\/03\/identity-protection-real-estate\/","title":{"rendered":"Identity protection real estate"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><a href=\"https:\/\/web.archive.org\/web\/20201026051113\/https:\/\/www.nsa.gov\/News-Features\/News-Stories\/Article-View\/Article\/1625882\/infographic-of-the-week-protecting-your-digital-identity\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"4192\" data-permalink=\"https:\/\/dankrell.com\/blog\/2019\/02\/03\/identity-protection-real-estate\/prtectid\/\" data-orig-file=\"https:\/\/i0.wp.com\/dankrell.com\/blog\/wp-content\/uploads\/2019\/02\/prtectid.jpg?fit=1501%2C1001&amp;ssl=1\" data-orig-size=\"1501,1001\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"prtectid\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/dankrell.com\/blog\/wp-content\/uploads\/2019\/02\/prtectid.jpg?fit=525%2C350&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/dankrell.com\/blog\/wp-content\/uploads\/2019\/02\/prtectid.jpg?fit=525%2C350&amp;ssl=1\" alt=\"identity protection\" class=\"wp-image-4192\" width=\"263\" height=\"175\" srcset=\"https:\/\/i0.wp.com\/dankrell.com\/blog\/wp-content\/uploads\/2019\/02\/prtectid.jpg?w=1501&amp;ssl=1 1501w, https:\/\/i0.wp.com\/dankrell.com\/blog\/wp-content\/uploads\/2019\/02\/prtectid.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/dankrell.com\/blog\/wp-content\/uploads\/2019\/02\/prtectid.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/dankrell.com\/blog\/wp-content\/uploads\/2019\/02\/prtectid.jpg?resize=1024%2C683&amp;ssl=1 1024w\" sizes=\"auto, (max-width: 263px) 100vw, 263px\" \/><\/a><figcaption>Be proactive with identity protection (infographic from nsa.gov)<\/figcaption><\/figure><\/div>\n\n\n\n<p>Even with precautions and laws to protect your sensitive data while conducting financial transactions, there can still be a weak link in the chain that can put your personal data at risk.&nbsp; Y<strong>ou may not have heard about the latest data breach, but it involved the potential leaking of over 24 million mortgage documents<\/strong>. Identity Protection during the <a rel=\"noreferrer noopener\" aria-label=\"real estate process  (opens in a new tab)\" href=\"https:\/\/dankrell.com\/blog\/2015\/02\/11\/protect-your-identity-when-buying-a-home\/\" target=\"_blank\">real estate process <\/a>takes awareness and vigilance. However, what do you do after the transaction is over?<\/p>\n\n\n\n<p>The data breach to which I refer was discovered and reported by Bob Diachenko, Cyber Threat Intelligence Director of Security Discovery with the assistance of Zack Whitaker of Techcrunch.&nbsp; This data breach was discovered by Diachenko just by searching public search engines.&nbsp; According to<a href=\"https:\/\/securitydiscovery.com\/document-management-company-leaks-data-online\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" Diachenko\u2019s report (opens in a new tab)\"> Diachenko\u2019s report<\/a> (securitydiscovery.com\/document-management-company-leaks-data-online), the unprotected database contained about 51 GB of credit and mortgages information.&nbsp; The database potentially exposed more than 24 Million files. <\/p>\n\n\n\n<p>Essentially, the over 24 million unprotected records\n(24,349,524 according to Diachenko) that existed on the database were likely\nscanned (OCR) from original documents.&nbsp;\nDiachenko stated, \u201c<strong><em>These\ndocuments contained highly sensitive data, such as social security numbers,\nnames, phones, addresses, credit history, and other details which are usually\npart of a mortgage or credit report.<\/em><\/strong><em>\nThis information would be a gold mine for cyber criminals who would have\neverything they need to steal identities, file false tax returns, get loans or\ncredit cards.\u201d<\/em>&nbsp; <\/p>\n\n\n\n<p>Diachenko and Whitaker tracked down the owner of the database and found that the exposed database belonged to a third party.&nbsp; After the database was secured, however, Diachenko found a second vulnerable server that contained <strong><em>original documents<\/em><\/strong>.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How is consumer iinformation handled through through institutional real estate transactions? <\/h3>\n\n\n\n<p>According to Whitaker, the documents date as far\nback to 2008, possibly further.&nbsp; The\ndocuments concerned \u201ccorrespondence from several major financial and lending\ninstitutions\u201d including government entities such as HUD.&nbsp; Whitaker stated that not all data was\n\u201csensitive,\u201d however the database included: names, addresses, birth dates,\nSocial Security numbers, bank and checking account numbers.&nbsp; They also found some documents that contained\nother \u201csensitive financial information,\u201d such as bankruptcy and tax documents,\nincluding W-2 forms.&nbsp; <\/p>\n\n\n\n<p>To understand the broader implications of identity protection in a real estate transaction, read <a rel=\"noreferrer noopener\" aria-label=\"Diachenko  (opens in a new tab)\" href=\"https:\/\/securitydiscovery.com\/document-management-company-leaks-data-online\/\" target=\"_blank\">Diachenko <\/a>and Whitaker\u2019s first <a rel=\"noreferrer noopener\" aria-label=\"(techcrunch.com\/2019\/01\/23\/financial-files (opens in a new tab)\" href=\"https:\/\/techcrunch.com\/2019\/01\/23\/financial-files\/\" target=\"_blank\">(techcrunch.com\/2019\/01\/23\/financial-files<\/a>) and second (<a rel=\"noreferrer noopener\" aria-label=\"techcrunch.com\/2019\/01\/24\/mortgage-loan-leak-gets-worse (opens in a new tab)\" href=\"https:\/\/techcrunch.com\/2019\/01\/24\/mortgage-loan-leak-gets-worse\/\" target=\"_blank\">techcrunch.com\/2019\/01\/24\/mortgage-loan-leak-gets-worse<\/a>) report.   The reporting of Diachenko and Whitaker is significant because it exposes how your identity and sensitive information can be mishandled in the broader financial transactional process that occurs between entities.&nbsp; Even though direct correspondence with you may be encrypted and secure, security lapses can occur during the institutional transaction process (such selling and\/or transferring a mortgage)<\/p>\n\n\n\n<p>The moral of the story is that once your information is out of your hands, you cannot assume it\u2019s 100 percent secure.&nbsp; Even blockchain technology, which has been touted as a safe means of digital data management, has weaknesses.&nbsp; And as governments and financial institutions are looking to blockchain as the \u201canswer\u201d to data security, there are reports of \u201cattacks\u201d of increasing sophistication according to James Risberg (<em><a rel=\"noreferrer noopener\" aria-label=\"Yes, the Blockchain Can Be Hacked (opens in a new tab)\" href=\"https:\/\/coincentral.com\/blockchain-hacks\/\" target=\"_blank\"><strong>Yes, the Blockchain Can Be Hacked<\/strong><\/a><\/em>; coincentral.com; May 7, 2018).&nbsp; <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Take your identity protection seriously when buying and selling a home<\/h3>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\"Be vigilant and proactive (opens in a new tab)\" href=\"https:\/\/dankrell.com\/blog\/2008\/11\/05\/identity-theft-can-lead-to-a-stolen-home\/\" target=\"_blank\">Be vigilant and proactive<\/a> to <a href=\"https:\/\/dankrell.com\/blog\/2017\/10\/22\/title-fraud-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"protect your identity (opens in a new tab)\">protect your identity<\/a> and sensitive information.&nbsp; Be wary of unsolicited requests for information, even if it appears to be from someone with whom you are conducting business. Always make a call to confirm the request. Consider a credit freeze to prevent fraudsters from opening credit accounts in your name.&nbsp; Check your credit report regularly and dispute errors.&nbsp; If you\u2019ve been a victim of identity theft, the FTC\u2019s <a rel=\"noreferrer noopener\" aria-label=\"IdentityTheft.gov (opens in a new tab)\" href=\"http:\/\/IdentityTheft.gov\" target=\"_blank\">IdentityTheft.gov<\/a> site can help you report it and create a recovery plan.&nbsp; You can learn more about protecting yourself from identity theft from the FTC (<a rel=\"noreferrer noopener\" aria-label=\"consumer.ftc.gov (opens in a new tab)\" href=\"http:\/\/consumer.ftc.gov\" target=\"_blank\">consumer.ftc.gov<\/a>) and the Federal Reserve (<a rel=\"noreferrer noopener\" aria-label=\"federalreserveconsumerhelp.gov (opens in a new tab)\" href=\"http:\/\/federalreserveconsumerhelp.gov\" target=\"_blank\">federalreserveconsumerhelp.gov<\/a>).<\/p>\n\n\n\n<p>Original published at https:\/\/dankrell.com\/blog\/identity-protection-real-estate<\/p>\n\n\n\n<p>By <a rel=\"noreferrer noopener\" href=\"https:\/\/dankrell.com\/about-dan-krell-realtor\/\" target=\"_blank\">Dan Krell<\/a>.      Copyright \u00a9 2019. <\/p>\n\n\n\n<p>If you like this post, do not copy; instead please:<br \/> link to the<a href=\"https:\/\/dankrell.com\/blog\/identity-protection-real-estate\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" articl (opens in a new tab)\"> articl<\/a>e<br \/> <a rel=\"noreferrer noopener\" href=\"http:\/\/facebook.com\/dankrellrealtor\/\" target=\"_blank\">like it on facebook<\/a><br \/> or <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/dankrell\" target=\"_blank\">re-tweet<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"http:\/\/www.copyscape.com\/plagiarism-detector\/\"><img decoding=\"async\" src=\"https:\/\/i0.wp.com\/banners.copyscape.com\/images\/cs-bk-3d-234x16.gif?resize=234%2C16\" alt=\"Protected by Copyscape Web Plagiarism Detector\"\/><\/a><\/figure>\n\n\n\n<p><br \/>\n<a href=\"http:\/\/dankrell.com\/blog\/disclaimer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Disclaimer<\/a>.\n This article is not intended to provide nor should it be relied upon \nfor legal and financial advice. Readers should not rely solely on the \ninformation contained herein, as it does not purport to be comprehensive\n or render specific advice. Readers should consult with an attorney \nregarding local real estate laws and customs as they vary by state and \njurisdiction. Using this article without permission is a violation of \ncopyright laws.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even with precautions and laws to protect your sensitive data while conducting financial transactions, there can still be a weak link in the chain that can put your personal data at risk.&nbsp; You may not have heard about the latest data breach, but it involved the potential leaking of over 24 million mortgage documents. Identity &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/dankrell.com\/blog\/2019\/02\/03\/identity-protection-real-estate\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Identity protection real estate&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[270,419,382,405,180,55,99,13],"tags":[597,490,926,912,1191,640,821,845,797,1180],"class_list":["post-4186","post","type-post","status-publish","format-standard","hentry","category-home-buyer","category-home-owner","category-home-seller","category-homebuyer","category-identity-theft","category-mortgage","category-privacy","category-real-estate","tag-consumer-protection","tag-home-buyer-2","tag-home-owner","tag-home-seller","tag-identity-protection","tag-identity-theft-2","tag-mortgage","tag-privacy","tag-real-estate","tag-title-fraud"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1VZLf-15w","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/posts\/4186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/comments?post=4186"}],"version-history":[{"count":14,"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/posts\/4186\/revisions"}],"predecessor-version":[{"id":6274,"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/posts\/4186\/revisions\/6274"}],"wp:attachment":[{"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/media?parent=4186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/categories?post=4186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dankrell.com\/blog\/wp-json\/wp\/v2\/tags?post=4186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}