• To protect yourself, change the admin password and hide the SSID. Instructions for doing both are easy to find through a simple Google search.
  • You can encrypt all of your inbound and outbound data, so it's unreadable to any hacker who is able to steal it through an unsecured wireless network.
  • Never reveal your password, Social Security number, credit card number or any other piece of vital information to someone who contacts you. Instead, when you receive a suspicious request, call or email the main support line for the company they are representing, and ask if the request is valid.

It seems like every week there’s a big security breach in the news. Although Ashley Madison and Target might get all the headlines, more than half of all attacks are against small business owners.

We recently sat down with cyber security expert Scott Krawitz to discuss his common-sense approach to securing technical systems within the real estate industry. Here’s what we learned:

 1. Your wireless router is your biggest liability.

At DEF CON (the world’s longest running and largest underground hacking conference), it was demonstrated that just about every Wi-Fi router can be hacked immediately by even a novice hacker because most people never take the time to change the factory admin password on their router.

This is not the same as the actual network password, but it allows the hacker to change your password, install malicious software on your computer — or even log every single key you type.

In other words, a hacker can basically ruin your life if they can get within 100 yards of your home or business. To protect yourself, change the admin password and hide the SSID. Instructions for doing both are easy to find through a simple Google search.

2. Mobile hacking is the new frontier

Mobile hacks are the fastest-emerging trend in the cyber security world. Many smartphones have very good factory-installed security measures that most users fail to utilize.

You can encrypt all of your inbound and outbound data, so it’s unreadable to any hacker who is able to steal it through an unsecured wireless network. The data will be unencrypted when it reaches its intended destination, so it won’t inconvenience you in any way.

This takes just a few minutes to set up on most iPhones and Android devices. Again, a quick Google search can show you how.

3. Technical attacks aren’t always technical

Much of what we consider “hacking” is actually just psychological manipulation. Hackers call or email and pretend to be someone they’re not, requesting some small piece of information that grants them access to previously secured data.

Never reveal your password, Social Security number, credit card number or any other piece of vital information to someone who contacts you. Instead, when you receive a suspicious request, call or email the main support line for the company they are representing, and ask if the request is valid.

4. Last Pass is essential

Last Pass is a paid software tool that allows you to keep all of your passwords stored in the cloud and automatically log you into accounts without actually seeing or typing the passwords. This allows you to create much more complicated passwords because you don’t have to remember them.

LastPassScreenshot

Better yet, you can create a multi-factor root password (a password that requires you to type in a code sent to your phone in addition to the root password), so no one can gain access to your passwords unless they had your phone and your root password at the same time.

If they realize you have a multi-factor password, 99 percent of hackers will give up immediately.

5. Macs are vulnerable, too

There’s a myth that Apple devices don’t get targeted like PCs. That might have been true several years ago when PCs represented 95 percent of the computer market; but now that Macs are more common, hackers are targeting them, too.

Macs need antivirus software, smart password protection and secured networks to be safe. None of this comes pre-installed on your Mac, which can make them even more vulnerable than PCs.

6. One weak link jeopardizes the whole team

It only takes a single access point to infiltrate an entire network. So, if you have a single team member who hasn’t updated to the newest antivirus software, it doesn’t matter if everyone else on your team has — you’re still vulnerable.

Sergey Yechikov / Shutterstock.com

Sergey Yechikov / Shutterstock.com

As an example, the famous Target attack had little to do with Target. Target’s systems were secure, but one of their vendors who had access to Target’s network was not secure. Once the hackers penetrated the vendor’s network, they were able to gain access to all of Target’s data.

To prevent against these asymmetrical attacks, create a team policy for cyber security that is adhered to by everyone, and have regular audits to ensure there are no weak links.

Take these tips, and protect yourself, your business and your clients. Remember that no one is immune, but you can take precautions to stay safe.

Casey Wright is the Founder and CEO of Wright Brothers, Inc., a Web development company dedicated to the residential real estate industry. Reach Casey on Twitter or LinkedIn.

Email Casey Wright.

Show Comments Hide Comments
Sign up for Inman’s Morning Headlines
What you need to know to start your day with all the latest industry developments
By submitting your email address, you agree to receive marketing emails from Inman.
Success!
Thank you for subscribing to Morning Headlines.
Back to top
Only 3 days left to register for Inman Connect Las Vegas before prices go up! Don't miss the premier event for real estate pros.Register Now ×
Limited Time Offer: Get 1 year of Inman Select for $199SUBSCRIBE×
Log in
If you created your account with Google or Facebook
Don't have an account?
Forgot your password?
No Problem

Simply enter the email address you used to create your account and click "Reset Password". You will receive additional instructions via email.

Forgot your username? If so please contact customer support at (510) 658-9252

Password Reset Confirmation

Password Reset Instructions have been sent to

Subscribe to The Weekender
Get the week's leading headlines delivered straight to your inbox.
Top headlines from around the real estate industry. Breaking news as it happens.
15 stories covering tech, special reports, video and opinion.
Unique features from hacker profiles to portal watch and video interviews.
Unique features from hacker profiles to portal watch and video interviews.
It looks like you’re already a Select Member!
To subscribe to exclusive newsletters, visit your email preferences in the account settings.
Up-to-the-minute news and interviews in your inbox, ticket discounts for Inman events and more
1-Step CheckoutPay with a credit card
By continuing, you agree to Inman’s Terms of Use and Privacy Policy.

You will be charged . Your subscription will automatically renew for on . For more details on our payment terms and how to cancel, click here.

Interested in a group subscription?
Finish setting up your subscription
×