Our website uses cookies to ensure a great experience. We also use third party cookies. To find out more about the cookies on our web site, please read our privacy policy. By continuing to use our website, you agree to the use of cookies. Continue
How Can We Help You? Request a Quote Today! Click Here

Blog

FirstBack123456NextLast11-20 of 83

Why You Need Title Insurance on a Refinance Fri, Nov 08, 2019 Watch for the right opportunity, crunch the numbers, save more, consolidate debt or tap into your home equity with a refinance loan! Read More

News Brief for November 2019 Fri, Nov 08, 2019 Get the scoop on 2020 real estate trends, what trade wars are costing the housing marketing, and more in the latest News Brief from Southern Title! Read More

Preventing Insider Threats
Preventing Insider Threats Tue, Nov 05, 2019 What is an “insider threat”?An insider threat is a security threat which comes from within the company or organization being targeted for an attack. It could be a present or former employee, a board member, or anyone who has had access to... Read More

Wire Transfer Fraud
Wire Transfer Fraud Tue, Oct 29, 2019 What would you do if you received an email from your CEO or CFO asking you to make an immediate or urgent wire transfer of funds? If you are the person in your organization who is responsible for such tasks and receive requests like this regularly, y... Read More

Company Size Doesn't Matter
Company Size Doesn't Matter Tue, Oct 22, 2019 Think hackers are only trying to target large corporations for their cyberattacks? Think again! If you are an employee of a small to medium size business, you may have an even bigger bullseye placed on you by hackers. Read More

Lock Your Screen
Lock Your Screen Tue, Oct 15, 2019 Locking your screen when you get up from your desk is a security action that is often overlooked and can have dangerous consequences. Failing to lock your screen can open you up to several vulnerabilities--some more serious than others. Read More

Phish or Spam? No, it’s not what’s for dinner!
Phish or Spam? No, it’s not what’s for dinner! Tue, Oct 08, 2019 However, it could be a question you struggle with when deciding what types of email to report to your IT department. Potentially malicious emails make it to your inbox every day, so it’s important for you to understand the difference between a Phishi... Read More

Vishing
Vishing Tue, Oct 01, 2019 Cybercriminals not only use the internet and email to gain access to sensitive information, they use telephones to their unlawful advantage. Vishing is the term for criminal attempts to influence action or gain confidential information over the phone... Read More

Don't Trust Pop-ups
Don't Trust Pop-ups Tue, Sep 24, 2019 If you’re known to dabble in a little online browsing, odds are you’ve encountered a pop-up once or twice. There are times when a user may think, “Wow, that’s a great deal!” and click on a pop-up. To those users: put down the mouse. Why? That pop-up ... Read More

How Secure is Your Mobile Device?
How Secure is Your Mobile Device? Tue, Sep 17, 2019 Most of us have a smartphone, but how many of us really think about the security threats faced by these mobile devices? Mobile devices are vulnerable to many different types of threats. The bad guys are increasing attacks on mobile devices and target... Read More

FirstBack123456NextLast11-20 of 83