Our website uses cookies to ensure a great experience. We also use third party cookies. To find out more about the cookies on our web site, please read our privacy policy. By continuing to use our website, you agree to the use of cookies. Continue
How Can We Help You? Request a Quote Today! Click Here

Blog


Articles in this category:

FirstBack23456NextLast31-40 of 103
New Notary Acknowledgement and Jurat Certificates Starting January 1
New Notary Acknowledgement and Jurat Certificates Starting January 1 Wed, Dec 18, 2019 It seems as if you can do most things online – except buy a house. That is changing in 2020 in Florida and Southern Title is keeping our eye on RON! Read More

KnowBe4 Security Tips - Personally Identifiable Information (PII)
KnowBe4 Security Tips - Personally Identifiable Information (PII) Tue, Dec 17, 2019 What is sensitive information? Sensitive information is privileged information which – if compromised through alteration, corruption, loss, misuse, or unauthorized disclosure – could cause serious harm to an individual or organization. You must alway... Read More

Beware! Bogus Performance Reviews Used as Phishbait
Beware! Bogus Performance Reviews Used as Phishbait Tue, Dec 10, 2019 Be warned. The bad guys are using fake job performance reviews as phishing bait so they can trick you into giving up your username and password. Read More

Why You Need Title Insurance on a Refinance Fri, Nov 08, 2019 Watch for the right opportunity, crunch the numbers, save more, consolidate debt or tap into your home equity with a refinance loan! Read More

News Brief for November 2019 Fri, Nov 08, 2019 Get the scoop on 2020 real estate trends, what trade wars are costing the housing marketing, and more in the latest News Brief from Southern Title! Read More

Lock Your Screen
Lock Your Screen Tue, Oct 15, 2019 Locking your screen when you get up from your desk is a security action that is often overlooked and can have dangerous consequences. Failing to lock your screen can open you up to several vulnerabilities--some more serious than others. Read More

Phish or Spam? No, it’s not what’s for dinner!
Phish or Spam? No, it’s not what’s for dinner! Tue, Oct 08, 2019 However, it could be a question you struggle with when deciding what types of email to report to your IT department. Potentially malicious emails make it to your inbox every day, so it’s important for you to understand the difference between a Phishi... Read More

Vishing
Vishing Tue, Oct 01, 2019 Cybercriminals not only use the internet and email to gain access to sensitive information, they use telephones to their unlawful advantage. Vishing is the term for criminal attempts to influence action or gain confidential information over the phone... Read More

Don't Trust Pop-ups
Don't Trust Pop-ups Tue, Sep 24, 2019 If you’re known to dabble in a little online browsing, odds are you’ve encountered a pop-up once or twice. There are times when a user may think, “Wow, that’s a great deal!” and click on a pop-up. To those users: put down the mouse. Why? That pop-up ... Read More

How Secure is Your Mobile Device?
How Secure is Your Mobile Device? Tue, Sep 17, 2019 Most of us have a smartphone, but how many of us really think about the security threats faced by these mobile devices? Mobile devices are vulnerable to many different types of threats. The bad guys are increasing attacks on mobile devices and target... Read More

FirstBack23456NextLast31-40 of 103