- Why Southern Title?
- Info Center
- Regulatory Compliance
Sophisticated technology services are vital to the success of a title company today. Who would have thought technology would become such an integral part of your real estate closing? Now it is vital that title companies take wire fraud, information security, and hacking attempts very seriously.
In 2021, Southern Title successfully achieved a coveted milestone among title companies by earning a third-party certificate in both ALTA Best Practices Pillars 1-7 and the ALTA Cyber Information Security Pillar 3.
In addition to obtaining the Core Title and Settlement Information Security Program Certificate of Completion, the company achieved the Pillar 3 Certification, which includes the Gramm-Leach-Bliley Act (GLBA) Information Security Gap Analysis, and demonstrates compliance with regulatory authorities including the Consumer Financial Protection Bureau (CFPB), Federal Trade Commission (FTC), Office of the Comptroller of the Currency (OCC), Federal Financial Institutions Examination Council (FFEIC), and other federal regulatory agencies.
Our in-house technology team is dedicated to maintaining consistent and reliable network operations, detecting and preventing cyber-attacks, and denying fraudulent access attempts 24/7.
Under the leadership of Paul Noga, CISSP, CISM, Southern Title Technology has deployed next generation software to detect and prevent security breaches and has invested in the necessary software and hardware to expedite the search, document preparation, escrow management, and policy production process while maintaining maximum security and dependability.
The most expensive cybersecurity software in the world won't prevent hackers from efforts to infiltrate networks through seemingly harmless employee clicks. The greatest risk to a company's security comes from the human factor – a single employee click on a fraudulent email link can take down an entire multinational corporation. That's why as part of Southern Title's Best Practices, all employees are required to complete the series of security training classes every quarter through KnowBe4. The technology team even deploys “secret fake hacks” to test employees' abilities to detect and report breach attempts. You can count on our human firewall protecting your wired funds, account numbers and social security numbers, and other non-public personal information at Southern Title.
Our robust information security policies and procedures include regular testing and updating of all software and hardware. Failure to deploy proper updates and patches causes major data breach for national companies on a regular basis.
All communications that contain Non-Public Personal Information will be sent via encrypted email. All sensitive information is transmitted via Secure Socket Layer (SSL) with Transport Layer Security (TLS) and then encrypted into our customer database only to be accessible by those authorized with special access rights to such systems, and are required to keep the confidential information .
We protect our systems with Firewalls using Intrusion Detection & Prevention Systems (IDS & IPS) to ensure that only approved access is allowed through to our systems.
You can learn more about cybersecurity risks that might affect you by checking out our blog here .
Contact the Southern Title Cybersecurity & Technology Team by clicking here .