Settings
Language
Color Theme
Cybersecurity for real estate agents
For real estate agents, cybersecurity is about protecting clients, transactions, and your professional reputation. Property deals move quickly, involve large payments, and rely on trust between multiple parties.
Why real estate agents are targeted
Property transactions involve deposits, trust accounts, identity documents, and bank details. A single convincing message at the right moment can redirect large payments to a cybercriminal.
Which of the following BEST explains why real estate agents are targeted by cybercriminals?
Loading...
View Options Again
Property deals are too small to interest criminals
Real estate agents facilitate transactions that involve high-value payments and multiple parties
Only conveyancers are targeted
Only banks are responsible for payment security
Large financial transfers
Deposits and settlement payments often involve significant sums. Cybercriminals focus on the moment funds are about to move.
High trust relationships
Buyers and sellers rely heavily on guidance from real estate agents. If someone impersonates you, clients may follow fraudulent instructions without hesitation.
Time pressure creates opportunity
Offers, contracts, and settlements are time-sensitive. Cybercriminals use urgency to bypass verification and force rushed decisions.
Is the following statement True or False:
Real estate agents are rarely targeted because banks handle the transfers.
Loading...
View Options Again
True
False
Lookalike emails create high-impact fraud
A common tactic is using an email address that looks almost identical to a trusted contact. The message appears familiar, but payment instructions are altered.
Real email threads can be hijacked
If a cybercriminal compromises an email account of an involved party, they may insert fraudulent instructions into existing conversations to make them appear legitimate.
Is the following statement True or False:
Cybercriminals sometimes hijack real email threads to make fraudulent messages look authentic.
Loading...
View Options Again
True
False
Common real estate scam tactics
Property deals require coordination between agents, buyers, sellers, lenders, and conveyancers. Scammers exploit this complexity.
Common property scam
Payment redirection is one of the most common types of real estate scams.
Which moment carries the highest fraud risk during a property transaction?
Loading...
View Options Again
Advertising a listing
Scheduling a property viewing
Booking photography
Confirming or changing bank account details
Many parties, easy confusion
Multiple stakeholders communicating at once makes it easier for cybercriminals to impersonate someone or insert a believable update.
Why does transaction complexity increase fraud risk?
Loading...
View Options Again
Multiple stakeholders make impersonation easier
Agents stop checking messages
Banks control communications
Buyers ignore instructions
Verification means confirming the detail
Scams succeed when people confirm requests based on timing or familiarity. The safer habit is verifying the exact detail through a trusted source.
A seller emails you new bank details two days before settlement. What should you do?
Loading...
View Options Again
Trust the existing email thread
Verify using a known and trusted phone number
Wait and hope it resolves
Forward them immediately
Fake supplier invoices
Cybercriminals may impersonate photographers, staging companies, or service providers and send realistic invoices with malicious links or attachments to real estate agents.
Is the following statement True or False:
You should immediately forward any invoice to property sellers, without first verifying the authenticity of the invoice.
Loading...
View Options Again
True
False
Protecting client information
Agents collect identification documents, financial details, and contracts. This information is valuable to cybercriminals and must be handled securely.
Requests that bypass standard processes are a warning sign
If a message asks for secrecy, urgency, or a shortcut “just this once,” treat it as high risk and verify before acting.
Is the following statement True or False:
If a request involves money and pushes you to skip normal verification steps, it deserves extra scrutiny.
Loading...
View Options Again
True
False
Account security protects transactions
If your email account is compromised, cybercriminals can monitor conversations and alter payment instructions without your knowledge.
Educating clients reduces cyber risk
Property buyers and sellers may not understand what payment redirection scams are. Early guidance from you reduces the chance they follow fraudulent instructions.
When should clients be warned about payment redirection scams?
Loading...
View Options Again
After settlement
Early in the transaction process
Only after a breach
Never
Fraud can collapse a deal
A single misdirected payment can delay settlement, create legal disputes, and damage professional trust. Prevention protects both clients and the agent's reputation.
Wrapping up
By following the practices outlined in this training, you can keep your clients safe and ensure property transactions settle smoothly.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
I acknowledge
[89, "I acknowledge", "I acknowledge"],
Thank you for providing an acknowledgement
[90, "Thank you for providing an acknowledgement", "Thank you for providing an acknowledgement"],
Cybersecurity-For-Real-Estate
[91, "Cybersecurity-For-Real-Estate", "Cybersecurity-For-Real-Estate"],
Cybersecurity for real estate agents
[92, "Cybersecurity for real estate agents", "Cybersecurity for real estate agents"],
For real estate agents, cybersecurity is about protecting clients, transactions, and your professional reputation. Property deals move quickly, involve large payments, and rely on trust between multiple parties.
[93, "For real estate agents, cybersecurity is about protecting clients, transactions, and your professional reputation. Property deals move quickly, involve large payments, and rely on trust between multiple parties.", "For real estate agents, cybersecurity is about protecting clients, transactions, and your professional reputation. Property deals move quickly, involve large payments, and rely on trust between multiple parties."],
Why real estate agents are targeted
[94, "Why real estate agents are targeted", "Why real estate agents are targeted"],
Property transactions involve deposits, trust accounts, identity documents, and bank details. A single convincing message at the right moment can redirect large payments to a cybercriminal.
[95, "Property transactions involve deposits, trust accounts, identity documents, and bank details. A single convincing message at the right moment can redirect large payments to a cybercriminal.", "Property transactions involve deposits, trust accounts, identity documents, and bank details. A single convincing message at the right moment can redirect large payments to a cybercriminal."],
Which of the following BEST explains why real estate agents are targeted by cybercriminals?
[96, "Which of the following BEST explains why real estate agents are targeted by cybercriminals?", "Which of the following BEST explains why real estate agents are targeted by cybercriminals?"],
Real estate agents facilitate transactions that involve high-value payments and multiple parties
[97, "Real estate agents facilitate transactions that involve high-value payments and multiple parties", "Real estate agents facilitate transactions that involve high-value payments and multiple parties"],
Only banks are responsible for payment security
[98, "Only banks are responsible for payment security", "Only banks are responsible for payment security"],
Only conveyancers are targeted
[99, "Only conveyancers are targeted", "Only conveyancers are targeted"],
Property deals are too small to interest criminals
[100, "Property deals are too small to interest criminals", "Property deals are too small to interest criminals"],
Real estate agents facilitate high-value payments between multiple parties, which makes them ideal targets for cybercriminals.
[101, "Real estate agents facilitate high-value payments between multiple parties, which makes them ideal targets for cybercriminals.", "Real estate agents facilitate high-value payments between multiple parties, which makes them ideal targets for cybercriminals."],
Large financial transfers
[102, "Large financial transfers", "Large financial transfers"],
Deposits and settlement payments often involve significant sums. Cybercriminals focus on the moment funds are about to move.
[103, "Deposits and settlement payments often involve significant sums. Cybercriminals focus on the moment funds are about to move.", "Deposits and settlement payments often involve significant sums. Cybercriminals focus on the moment funds are about to move."],
High trust relationships
[104, "High trust relationships", "High trust relationships"],
Buyers and sellers rely heavily on guidance from real estate agents. If someone impersonates you, clients may follow fraudulent instructions without hesitation.
[105, "Buyers and sellers rely heavily on guidance from real estate agents. If someone impersonates you, clients may follow fraudulent instructions without hesitation.", "Buyers and sellers rely heavily on guidance from real estate agents. If someone impersonates you, clients may follow fraudulent instructions without hesitation."],
Time pressure creates opportunity
[106, "Time pressure creates opportunity", "Time pressure creates opportunity"],
Offers, contracts, and settlements are time-sensitive. Cybercriminals use urgency to bypass verification and force rushed decisions.
[107, "Offers, contracts, and settlements are time-sensitive. Cybercriminals use urgency to bypass verification and force rushed decisions.", "Offers, contracts, and settlements are time-sensitive. Cybercriminals use urgency to bypass verification and force rushed decisions."],
Real estate agents are rarely targeted because banks handle the transfers.
[108, "Real estate agents are rarely targeted because banks handle the transfers.", "Real estate agents are rarely targeted because banks handle the transfers."],
While banks process payments, scammers manipulate involved parties before the funds are sent.
[109, "While banks process payments, scammers manipulate involved parties before the funds are sent.", "While banks process payments, scammers manipulate involved parties before the funds are sent."],
Lookalike emails create high-impact fraud
[110, "Lookalike emails create high-impact fraud ", "Lookalike emails create high-impact fraud "],
A common tactic is using an email address that looks almost identical to a trusted contact. The message appears familiar, but payment instructions are altered.
[111, "A common tactic is using an email address that looks almost identical to a trusted contact. The message appears familiar, but payment instructions are altered.", "A common tactic is using an email address that looks almost identical to a trusted contact. The message appears familiar, but payment instructions are altered."],
Real email threads can be hijacked
[112, "Real email threads can be hijacked", "Real email threads can be hijacked"],
If a cybercriminal compromises an email account of an involved party, they may insert fraudulent instructions into existing conversations to make them appear legitimate.
[113, "If a cybercriminal compromises an email account of an involved party, they may insert fraudulent instructions into existing conversations to make them appear legitimate.", "If a cybercriminal compromises an email account of an involved party, they may insert fraudulent instructions into existing conversations to make them appear legitimate."],
Cybercriminals sometimes hijack real email threads to make fraudulent messages look authentic.
[114, "Cybercriminals sometimes hijack real email threads to make fraudulent messages look authentic.", "Cybercriminals sometimes hijack real email threads to make fraudulent messages look authentic."],
Using real conversations increases credibility and reduces suspicion.
[115, "Using real conversations increases credibility and reduces suspicion.", "Using real conversations increases credibility and reduces suspicion."],
Common real estate scam tactics
[116, "Common real estate scam tactics", "Common real estate scam tactics"],
Property deals require coordination between agents, buyers, sellers, lenders, and conveyancers. Scammers exploit this complexity.
[117, "Property deals require coordination between agents, buyers, sellers, lenders, and conveyancers. Scammers exploit this complexity.", "Property deals require coordination between agents, buyers, sellers, lenders, and conveyancers. Scammers exploit this complexity."],
Common property scam
[118, "Common property scam", "Common property scam"],
Payment redirection is one of the most common types of real estate scams.
[119, "Payment redirection is one of the most common types of real estate scams.", "Payment redirection is one of the most common types of real estate scams."],
Which moment carries the highest fraud risk during a property transaction?
[120, "Which moment carries the highest fraud risk during a property transaction?", "Which moment carries the highest fraud risk during a property transaction?"],
Scheduling a property viewing
[121, "Scheduling a property viewing ", "Scheduling a property viewing "],
Confirming or changing bank account details
[122, "Confirming or changing bank account details", "Confirming or changing bank account details"],
Advertising a listing
[123, "Advertising a listing ", "Advertising a listing "],
Booking photography
[124, "Booking photography", "Booking photography"],
Changes or confirmations of payment details are prime targets for fraud.
[125, "Changes or confirmations of payment details are prime targets for fraud.", "Changes or confirmations of payment details are prime targets for fraud."],
Many parties, easy confusion
[126, "Many parties, easy confusion", "Many parties, easy confusion"],
Multiple stakeholders communicating at once makes it easier for cybercriminals to impersonate someone or insert a believable update.
[127, "Multiple stakeholders communicating at once makes it easier for cybercriminals to impersonate someone or insert a believable update.", "Multiple stakeholders communicating at once makes it easier for cybercriminals to impersonate someone or insert a believable update."],
Why does transaction complexity increase fraud risk?
[128, "Why does transaction complexity increase fraud risk?", "Why does transaction complexity increase fraud risk?"],
Multiple stakeholders make impersonation easier
[129, "Multiple stakeholders make impersonation easier", "Multiple stakeholders make impersonation easier"],
Agents stop checking messages
[130, "Agents stop checking messages", "Agents stop checking messages"],
Banks control communications
[131, "Banks control communications", "Banks control communications"],
Buyers ignore instructions
[132, "Buyers ignore instructions", "Buyers ignore instructions"],
More participants create more opportunities for confusion and impersonation.
[133, "More participants create more opportunities for confusion and impersonation.", "More participants create more opportunities for confusion and impersonation."],
Verification means confirming the detail
[134, "Verification means confirming the detail ", "Verification means confirming the detail "],
Scams succeed when people confirm requests based on timing or familiarity. The safer habit is verifying the exact detail through a trusted source.
[135, "Scams succeed when people confirm requests based on timing or familiarity. The safer habit is verifying the exact detail through a trusted source.", "Scams succeed when people confirm requests based on timing or familiarity. The safer habit is verifying the exact detail through a trusted source."],
A seller emails you new bank details two days before settlement. What should you do?
[136, "A seller emails you new bank details two days before settlement. What should you do?", "A seller emails you new bank details two days before settlement. What should you do?"],
Forward them immediately
[137, "Forward them immediately", "Forward them immediately"],
Verify using a known and trusted phone number
[138, "Verify using a known and trusted phone number", "Verify using a known and trusted phone number"],
Trust the existing email thread
[139, "Trust the existing email thread", "Trust the existing email thread"],
Wait and hope it resolves
[140, "Wait and hope it resolves", "Wait and hope it resolves"],
Independent verification through multiple communication channels prevents payment redirection fraud. In extreme cases, face-to-face confirmation can be used to remove any doubt.
[141, "Independent verification through multiple communication channels prevents payment redirection fraud. In extreme cases, face-to-face confirmation can be used to remove any doubt.", "Independent verification through multiple communication channels prevents payment redirection fraud. In extreme cases, face-to-face confirmation can be used to remove any doubt."],
Fake supplier invoices
[142, "Fake supplier invoices", "Fake supplier invoices"],
Cybercriminals may impersonate photographers, staging companies, or service providers and send realistic invoices with malicious links or attachments to real estate agents.
[143, "Cybercriminals may impersonate photographers, staging companies, or service providers and send realistic invoices with malicious links or attachments to real estate agents.", "Cybercriminals may impersonate photographers, staging companies, or service providers and send realistic invoices with malicious links or attachments to real estate agents."],
You should immediately forward any invoice to property sellers, without first verifying the authenticity of the invoice.
[144, "You should immediately forward any invoice to property sellers, without first verifying the authenticity of the invoice.", "You should immediately forward any invoice to property sellers, without first verifying the authenticity of the invoice."],
Property sellers trust the judgment of real estate agents and rely on agents to verify the authenticity of invoices that they are forwarding from third parties.
[145, "Property sellers trust the judgment of real estate agents and rely on agents to verify the authenticity of invoices that they are forwarding from third parties.", "Property sellers trust the judgment of real estate agents and rely on agents to verify the authenticity of invoices that they are forwarding from third parties."],
Protecting client information
[146, "Protecting client information", "Protecting client information"],
Agents collect identification documents, financial details, and contracts. This information is valuable to cybercriminals and must be handled securely.
[147, "Agents collect identification documents, financial details, and contracts. This information is valuable to cybercriminals and must be handled securely.", "Agents collect identification documents, financial details, and contracts. This information is valuable to cybercriminals and must be handled securely."],
Requests that bypass standard processes are a warning sign
[148, "Requests that bypass standard processes are a warning sign", "Requests that bypass standard processes are a warning sign"],
If a message asks for secrecy, urgency, or a shortcut “just this once,” treat it as high risk and verify before acting.
[149, "If a message asks for secrecy, urgency, or a shortcut “just this once,” treat it as high risk and verify before acting.", "If a message asks for secrecy, urgency, or a shortcut “just this once,” treat it as high risk and verify before acting."],
If a request involves money and pushes you to skip normal verification steps, it deserves extra scrutiny.
[150, "If a request involves money and pushes you to skip normal verification steps, it deserves extra scrutiny.", "If a request involves money and pushes you to skip normal verification steps, it deserves extra scrutiny."],
Cybercriminals rely on speed and shortcuts to succeed. Always scrutinize requests asking you to bypass normal verification steps.
[151, "Cybercriminals rely on speed and shortcuts to succeed. Always scrutinize requests asking you to bypass normal verification steps.", "Cybercriminals rely on speed and shortcuts to succeed. Always scrutinize requests asking you to bypass normal verification steps."],
Account security protects transactions
[152, "Account security protects transactions", "Account security protects transactions"],
If your email account is compromised, cybercriminals can monitor conversations and alter payment instructions without your knowledge.
[153, "If your email account is compromised, cybercriminals can monitor conversations and alter payment instructions without your knowledge.", "If your email account is compromised, cybercriminals can monitor conversations and alter payment instructions without your knowledge."],
Educating clients reduces cyber risk
[154, "Educating clients reduces cyber risk", "Educating clients reduces cyber risk"],
Property buyers and sellers may not understand what payment redirection scams are. Early guidance from you reduces the chance they follow fraudulent instructions.
[155, "Property buyers and sellers may not understand what payment redirection scams are. Early guidance from you reduces the chance they follow fraudulent instructions.", "Property buyers and sellers may not understand what payment redirection scams are. Early guidance from you reduces the chance they follow fraudulent instructions."],
When should clients be warned about payment redirection scams?
[156, "When should clients be warned about payment redirection scams?", "When should clients be warned about payment redirection scams?"],
Only after a breach
[157, "Only after a breach", "Only after a breach"],
Early in the transaction process
[158, "Early in the transaction process ", "Early in the transaction process "],
Never
[159, "Never", "Never"],
After settlement
[160, "After settlement", "After settlement"],
Early awareness helps clients recognize and question suspicious requests.
[161, "Early awareness helps clients recognize and question suspicious requests.", "Early awareness helps clients recognize and question suspicious requests."],
Fraud can collapse a deal
[162, "Fraud can collapse a deal ", "Fraud can collapse a deal "],
A single misdirected payment can delay settlement, create legal disputes, and damage professional trust. Prevention protects both clients and the agent's reputation.
[163, "A single misdirected payment can delay settlement, create legal disputes, and damage professional trust. Prevention protects both clients and the agent's reputation. ", "A single misdirected payment can delay settlement, create legal disputes, and damage professional trust. Prevention protects both clients and the agent's reputation. "],
Wrapping up
[164, "Wrapping up ", "Wrapping up "],
By following the practices outlined in this training, you can keep your clients safe and ensure property transactions settle smoothly.
[165, "By following the practices outlined in this training, you can keep your clients safe and ensure property transactions settle smoothly.", "By following the practices outlined in this training, you can keep your clients safe and ensure property transactions settle smoothly."],
[166, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.