Category: Resources


Stick Around For Our Countdown!

Blog Header

The industry’s much anticipated delay to implement the TILA-RESPA Integrated Disclosure (TRID) was announced last week. The new regulation had the initial launch date set to be August 1, 2015 but has now been pushed back later this year to October 1.

The Consumer Financial Protection Bureau’s Director, Richard Cordray stated, “We made this decision to correct an administrative error that we just discovered in meeting the requirements under federal law, which would have delayed the effective date of the rule by two weeks.” Whatever the reason the industry as a whole seems to have let out a huge sigh of relief.

These new documents are meant to be more consumer friendly by consolidating the TILA-RESPA forms and making them easier to understand. The new regulations give the consumer more time to review the total costs of their mortgage and to ask any questions they may have in regards to their loan terms. The Loan Estimate is due to consumers three days after they apply for a loan, and the Closing Disclosure is due three days before closing. These two requirements along with software compliance and security issues have thrown the industry into a frenzy as they try to comply by the deadline.

The best thing you can do to prepare yourself is to join the conversation. In an ever changing industry it is important to partner up with a title agency that has aligned and complied with the new regulations. Agencies powered by the Florida Agency Network (FAN) are prepped and ready to lead the way during this immense industry change. Tuesday, June 23, 2015 will mark the 100 day countdown until the CFPB’s implementation of the TRID.

 It’s going down  —  10.01.15  —  Stick around for our countdown!  

Please Note: Since posting the CFPB has submitted an amendment to their proposal further delaying the effective date to October 3.


It’s Goin’ Down!

Dirt Graphic Final copy

Due to lack of preparedness in the industry, CFPB has delayed implementation of the TILA-RESPA Integrated Disclosure (TRID).

It’s important to partner up with a title agency that is ready for the up coming industry changes. Title agencies powered by the Florida Agency Network are compliant, trained and ready to take on these industry changes.

It’s going down on Oct. 1, stick around for our countdown!

Find out more about partnering up with a title agency powered by the the network : Max Jackson at max@FLagency.net

Please Note: Since posting, the CFPB has submitted an amendment to their proposal further delaying the effective date to October 3.


Breaking News from Bank of America

Excerpted from Bank of America memo to Settlement Industry

 

CFPB Integrated Mortgage Disclosures – The Closing Disclosure & Closing Insight™

To: Settlement Agents

Bank of America continues to prepare for the Consumer Financial Protection Bureau’s (CFPB) Integrated Mortgage Disclosures rule under the Real Estate Settlement Procedures Act (Regulation X) and the Truth In Lending Act (Regulation Z) that go into effect August 1, 2015. With less than a year before the implementation date, we have started to share information with the settlement agent community about the rule and will now begin to share how the rule will change the way you work with us.

Bank of America will use Closing Insight™, an industry tool developed by RealEC® Technologies, to support the implementation of the CFPB’s Integrated Mortgage Disclosures rule.

What is changing with how you work with Bank of America?

  • All documents, data, and information will be exchanged through Closing Insight™. This will discontinue the use of email, fax, and other document delivery methods to ensure that non-public personal information (NPPI) is always protected.
  • After working with the settlement agent to finalize and confirm all fees, Bank of America will generate the buyer/borrower Closing Disclosure. For purchase transactions, settlement agents will continue to generate the seller’s Closing Disclosure.
  • To ensure receipt three business days prior to loan closing, Bank of America will take responsibility for delivering the buyer/borrower Closing Disclosure. In addition, a copy of the final Closing Disclosure will be included with the loan documents to be presented to the buyer/borrower at closing.  For purchase transactions, settlement agents will continue to deliver the seller’s Closing Disclosure.
  • The requirement for the buyer/borrower to receive the Closing Disclosure three business days prior to loan closing will intensify the need for Bank of America to work very closely with the settlement agent to schedule the details of the signing/closing.

Bank of America will continue to work through all that is needed to meet both the requirements of the regulation and continue to deliver an exquisite experience for our mutual customers. We will share more information in the coming months as it becomes available. In the meantime, please submit any questions or feedback you may have regarding how Bank of America will expect you to handle transactions after August 1, 2015 to  Integrated.Disclosures.Feedback@bankofamerica.com.

For more information about RealEC® Technologies or Closing Insight™, please visit their website at www.bkfs.com/realec. In addition, many Title & Escrow production systems are working with RealEC® Technologies to enhance current integrations in support of Closing Insight™. For more information about how or if they plan to support Closing Insight™, reach out to your provider directly.

Thank you for your partnership.


How To Keep Your Email Safe And Secure

Your email is your business’s lifeblood these days. Most clients like the convenience of reading their updates on their home, on their title commitment, and everything else through the convenience of email. And, while they may or may not be following safe procedures, it should be one of your primary concerns.

After all, your clients private information is in those emails. Financial records, account numbers, names, and other forms of sensitive data that shouldn’t be released to the public. What if someone guesses your password or otherwise gets access?

There are some very good tips you can follow to keep your email safe. Most of these solutions are simpler than some recipes you’ve been dying to try or some driving maneuvers you perform daily. If you add these layers of security, you can be confident in your email’s safety.

Password Security

The first line of defense against people who’d like your information is to create strong, unique, and unguessable passwords to your accounts. Many people tend to use passwords like “pa$$word1! “ when that’s one of the most easily guessed passwords. Below is a list pulled from CBS News of the 10 most common passwords last year:

 

  1. 123456
  2. password
  3. 12345678
  4. qwerty
  5. abc123
  6. 123456789
  7. 111111
  8. 1234567
  9. iloveyou
  10. adobe123

 

If you see any of your passwords on here, you should be changing them right now. Those are the most common and they are also the most easily guessed.

Best practice for passwords is to use a random string of letters (upper and lower case), numbers, and symbols of significant length (8 or more characters). It should look more like “1dfGHt#2” than “password.”

If you’re worried about remembering passwords, use a password manager app or sync tool like iCloud Keychain or 1Password. That way, you can generate extremely secure passwords that your phone and/or computer will put in automatically for you while still maintaining the security that you need.

Phishing Attempts

But, a good password isn’t worth anything if you give it away willingly. We’ve all been warned about phishing and spam, and never to click links in emails where you (a) weren’t expecting an email or (b) don’t know the sender. Those maxims are still true but there’s even more to be worried about now.

Phishing is, specifically, the act of imitating a legitimate company’s login screen to get your password. They’re getting good at replicating the official website, too. Here are some common traits of phishing emails, pulled from Microsoft:

  • Threats
    • An email might claim your account will be shut down or important documents will be lost if you don’t take action through their links. This is usually false. If it isn’t, you’ll be notified when you log in to the real service through a link you’re familiar with.
  • Grammar errors
    • Most spam artists are not well known for having good grammar and punctuation. If the email reads choppy or wrong, it’s most likely a fake.
  • Email is “from” a big company
    • Phishers generally don’t want information for smaller, niche websites, so be especially suspicious of emails from the big guys: Google, Facebook, Twitter, and so on.

Follow this rule of thumb if you don’t want to get caught by a phishing scam: if you receive an email from anyone asking you to login, give them your password, or otherwise give up information, do not use their links or give them that information. Instead, if you’re concerned, go to the website they’re claiming to be from yourself by hand-typing the URL into your browser. That way, you can be sure you’re at the right place.

A problem that faces real estate and title professionals in particular are schemes to get you to transfer funds to a dummy account. The emails in question will look almost exactly like real requests for transfers and if you’re not careful, you might end up sending large amounts of money to fake accounts. When in doubt, verify the transaction request with the sender if you know them, or take steps to find out if they’re legit. Use the tips above to recognize and avoid emails intended to steal passwords or cash and delete the offending messages as soon as you can.

Security Questions

Recovery options are also difficult because if you’re vigilant about setting a good password and avoiding/ignoring phishing but make your security questions easy to answer or easily researched, you’ve done a lot of hard work for nothing. When you set up your security questions, make sure they’re:

  • Obscure
  • Not public information
  • Instantly memorable

If you’ve ever revealed your security question’s answer anywhere, ever, don’t use it. Instead, if you’re given the option, make up your own question about something you don’t tell others, or use the question that you’ve never told anyone. Be aware, too, that some image memes that are commonly shared on Facebook are looking for information commonly found in these questions. If you know you use certain details for these questions, don’t publish them on any social media network or tell anyone you don’t trust.

2-Factor Authentication

Some websites (like Google, Facebook, and Twitter) have introduced what’s known as 2-factor authentication. It may sound complex but it’s actually rather simple: they require any password input to have another, smaller password generated by another device. The services I mentioned earlier all use apps on iPhones/Androids to generate the code. If you activate this system, you’ll be asked for a code each time you log in that only you, on your device, can make. That way, even if someone else has your password, the only way anyone’s getting in is if they have your code generator—and they’d need to steal your phone for that.

Stay Safe

The only way that you’re going to lose your data and your email account if you use these tips would be to hand it to them directly. Staying safe has never been easier thanks to the basic tools that we’ve been given from the email providers themselves and the basic tips to maintaining a safe, secure email system earlier in the email: make a good password, give it to no one, don’t log in through links but rather through the sites themselves, and just practice good email management, and you’ll be fine!

 

Actionable Tips

Follow these basic tips to stay safe through your email:

  • Trust no one
    • Any email coming from anyone you don’t know or any company from whom you’re not expecting an email is suspect. Don’t click those links.
    • Any legitimate web service or company can verify those requests. Call them or send an email directly to your contact, not by “reply.”
  • Use good passwords
    • Get rid of simple passwords and those “123456” codes—they will get you into trouble.
    • Passwords should contain:
      • At least 8 characters (the more the better)
      • Symbols, numbers, and both upper and lower case letters
      • A jumble of letters that can’t be found in a dictionary
  • Use additional account protection
    • Services like Google’s Authenticator and other forms of two-factor security make it harder for phishing and brute-force password hacking. Use those services.
    • Don’t make your security answers public information—if it’s used to secure an account, keep it to yourself.
  • Use good judgement
    • If an email feels wrong or is unexpected, confirm and verify it. It’s usually too good to be true.

Monitoring Your Brand Image

As professionals, it can be difficult to keep track of what’s going on in the world we live in. From the vast social networks that we must keep track of to the niche sites where our businesses might be talked about without our knowledge, how can you keep your eyes on what’s being said—and how can you use that information to make your business better? reputation poster

Google Alerts

One popular way of monitoring your image is to use Google Alerts to ensure that you’re always on top of what Google sees—and we all know that Google sees just about everything. Put your name into the box, set your email to receive the alerts, and you’ll be on your way. If there’s something new that Google finds, you’ll hear about it as often as you like. That way, if something happens in one of the remote corners of the web, you’ll know about it.

Social Media

You can track your image on social media channels mostly by making sure you maintain a solid presence online. The internet is not shy about telling you exactly what it thinks, good or bad. If you give people an outlet to pour out their experiences, good or bad, you’ll hear about it. In fact, some companies have taken to proactively diagnosing and fixing the problems while engaging entirely through social media channels. Listening to social media for your name or business name can be as simple as searching through Twitter, Facebook, or your preferred network’s search function, but you might consider using a solution like Hootsuite to set up search terms on each network that it will monitor and create a dashboard for. It might make it simpler for you to be listening for what people are saying about you.

Location Websites

A big one that people don’t generally think of is to be monitoring sites like Yelp, Google+ Local, and other map-based sites where people might be tempted to leave bad reviews or say bad things. Make sure that in your search of the internet that you keep sites like these in mind. It’ll help you in the long run because not only is it good to claim your locations and keep the info up-to-date, you’ll be able to head off customers who didn’t use the proper support channels to let you know about the problem.

Overall, monitoring your online image is easy once you get the hang of it. In fact, most of it is automated thanks to tools like Alerts and Hootsuite. Don’t let it distract you from the goal of providing the best client service that you can.


Beware That Free WiFi

We’re sure that you’re all familiar with data caps as members of the RE industry. After all, with cell phones becoming increasingly common (91% of adults have one), usage is at an all time high—which might explain why companies such as AT&T and Verizon put data caps in place, to make more money and to reduce network congestion. And you, as professionals, use apps like Maps and services like Evernote to keep everything up to date with your services. When your data cap is looming large over you, free WiFi might seem like a godsend. Use your services without adding to your data cap—the perfect combination!

But, before you connect to just any network, we have a warning for you: while WiFi from businesses and private providers like Brighthouse or AT&T is everywhere, it’s also dangerous.

Unsecured Networks

Free WiFi feels great, but certain providers of free WiFi prefer to use managed systems rather than password-secured hotspots like businesses use—usually to ensure that the public can connect and increase their awareness. But the problem here is that on an unsecured network like this—even if there’s a login screen for your personal credentials—none of your data is properly encrypted, meaning that anyone can get on the network and, with a little bit of knowledge and work, can get your personal information from what you’re broadcasting over the air.

While some apps and websites do use encrpytion to connect (such as Facebook and most banks), care should be taken because other sites and apps have not adopted the standard. Responsible use of WiFi can and will make your life better but it only takes one irresponsible person to ruin your accounts or your work. Be safe when connecting!

Fake Hotspots

We’ve also been receiving reports of thieves using fake hotspots to lure you into trusting them. They follow the same system as phishing attempts through your email: recreating websites to look official to get you to give up your credentials. It’s worse when you realize that most cell phones (regardless of operating system) are set up to automatically connect to their provider’s hotspots automatically—but they put no controls in place to prevent fakes from replacing them.

Here’s a scenario: let’s say your WiFi is toggled on your iPhone and you’re walking to a showing. If someone in the area has named their WiFi “attwifi,” the normal name for AT&T’s hotspots, you’ll automatically connect whether the hotspot’s legitimate or not. Then the thief can go to work sniffing out your data. If you’re not expecting a free WiFi hotspot, you might not notice and then you’ll be compromised.

Securing Your Data

There are steps you can take to help prevent this problem. For one thing, every modern smartphone has an indicator showing that a website is secured and encrypted (meaning it’s far harder to read what you’re sending). On iPhone, there will be a grey lock next to the name of the site you’re on. This means that the connection is secured and the identity of the site is verified by a third party. On Android, it depends on browser, but the Chrome browser displays a green lock. Look for these symbols when doing any transaction with your data! Without them, you are at risk.

iPhone Safari Secured Website
What a secured website looks like on Safari

 

Mobile Chrome Secured Website
What a secured website looks like on Chrome

Secondly, you should turn off auto-login to any and all WiFi hotspots that they’re currently enabled for. While it’s a bit more work to do, it’s not all that difficult to do. On iPhone, it’s in Settings > WiFi > (Network Name — click the circled “i” symbol) > Auto-Join.

These tips will make your life more secure and protect your contacts, leads, and business from being spied upon—or worse!


Troubleshooting Tips For Your Computer

Troubleshooting: Everyone’s had a bad experience with a computer at some point: either a program crashing, a slowdown, a virus, or even just computer age. Well, while manufacturers would like you to upgrade often, there’s a better way to keep your computer running for a while longer—especially if you don’t want to move to new equipment or if you’re waiting on a certain feature to come to market. We’ve got the tips you need to do some troubleshooting to your computer!

troubleshooting diagram snippet

Troubleshooting Tips

Every computer system has its fair share of problems but there are always ways to fix those or improve how they work—and slowdowns are no different. Here are a few things we think are useful to help you keep your system running the way it should:

  • Reboot!
    • Rebooting is the number 1 biggest fix to a lot of problems you might have. Rebooting resets a lot of systems and frees up your system memory to be completely reallocated. While it might sound trite, your first troubleshooting task should always be to reboot.
  • Keep your machine free of applications you don’t use
    • The problem with applications is that they bog down your hard drive and can make things run slower than they need to—especially if your hard drive is short on space. Keep it simple: delete and uninstall programs you don’t need so your computer has less to look through.
  • Don’t install programs you’re not entirely sure of
    • This is basic virus safety but it applies to other applications, too. Windows apps have historically been feature-rich but this can lead to bloated programs that do 5,000 things when you only need 3 of those features. Install the right programs—and don’t let your PC bloat.
  • Defragment your disks regularly
    • All systems are subject to fragmentation and fragmentation means that your computer is struggling to find all the data it needs to start a program or open a file. You should be running regular defragmentation on your PC to ensure that it can find those files easier.
  • Clean out the insides of your computer
    • Heat and dust are big issues for computers. Besides the obvious issue of cleanliness, dust, debris, and other obstructions can hold moisture and even bugs that can short out a circuit. Even if those aren’t a problem, dust can make your system run extra hot and that heat can cause slowdowns and cause components of your computer to fail. Keep the inside of your computer clean!

Viruses

While we’re sure you’ve heard more than your fair share about viruses, it bears repeating: viruses are dangerous to your security and can cause your system to run slow, incorrectly, or even destructively. Somewhere around 32% of computers have some sort of infection on them. Keep your virus scanners up to date and keep malware and adware protection on your computer. That will help solve most of the problems resulting from viruses.

Troubleshooting First, Replacement Later

Don’t buy into the idea that you need a whole new system if you’re experiencing slowdowns. The above tips can help you avoid replacement, but there’s something else you should consider: if your PC is more than 5 years old, slowdowns are not only common, they’re inevitable. The rate that hardware is improving means that 5 years is the difference between bleeding-edge and dinosaur. This doesn’t mean your PC is useless, just that it might take a little longer to run the new versions of software or to boot up. This is normal and expected, and shouldn’t cut into your workflow too much.

Either way, using these tips, you should be able to milk a little more life out of your computer, regardless of operating system. Troubleshooting can save you a lot of time and money, and it doesn’t have to be difficult.


Blogging Effectively

Blogging is the thing to be doing in online marketing. The trends in marketing are all heading towards online marketing. While hand shaking and grinning at events is always effective (and word of mouth is still king), an online presence is becoming more and more important. While mobile technology is 7 years old, it’s still in its infancy—meaning that now is the time to get in on the game.

blogging effectively depicted at desk

Blogging is the key to getting into this space. Blogs are well-equipped to do three things for your agency:

  1. Promote your ideas and thoughts on the market
  2. Allow others to join in a conversation about those ideas
  3. Encourage sharing of that content and make word-of-mouth easier to get.

It’s not just a hobbyist thing anymore, nor is it just for revolutionary ideas. You’ll never know the reaction you’ll get from your ideas if you don’t put them out there.

Promote Your Ideas Through Blogging

Blogging is for ideas. You have ideas. Big ones. Whether it’s about how the market is flawed (and your great solution to that flaw) or how someone can make the market work for them rather than working the market, you’ve got something to say about the market somehow. Start saying something big, develop those ideas.

Some of the biggest internet successes all started by seeing a great idea and developing those ideas into bigger things. Their sense of entrepreneurship and intelligence moved them from people with ideas into people with products. Elon Musk moved from having a simple web company into helping found SpaceX and Tesla Motor Company. Larry Page started Google on an idea and some knowledge. So can you!

While you might not quite make that level, there’s room in the market for your ideas on real estate. Blog about them, talk about them, get them on paper and into the public. The thing all of these folks have in common is that they made websites that primarily assist others in achieving their goals. Do the same yourself, and see the results grow.

Start Conversations By Blogging

When it comes to the internet, you need to understand that it’s a primarily social medium. Blogs don’t exist just to detail ideas, they’re made to discuss them and make them better. Every big, successful blog has methods of creating conversations around them. WordPress has implemented a system where you can find content on their site and engage using your account. Twitter, Facebook, and Tumblr all have their own conventions on how to share and respond to content.

The key here is that no matter the medium, the form exists to talk to others. Comment sections and conversations on Twitter are important. Invent a hashtag, get people talking, ask for responses. People talking about your idea, especially if you can get your name or your hashtag attached to the conversation, means that you’re getting free press and association with your idea.

Encourage Sharing of Your Blogging

Even if people don’t want to be part of your conversation—say, people are already impressed or just want others opinions for their consideration—at least make it easy and simple for people to share those ideas and articles with others. Promote the ideas on Facebook, Twitter, Quora, wherever you have a social media presence.

Remember when we said earlier that word-of-mouth was the best form of advertising? As the world moves more and more to mobile technology and consumption of media, social sharing and commentary is the new word-of-mouth. In fact, search engines like Google are starting to use social shares through sites like Google+ and other social media to help rank sites in their results—a big factor in getting found online.

Make Your Ideas Live

There are many forms of blogging. Twitter, technically, is a micro-blogging app, which amounts to a series of small posts of ideas you could put up during a lunch break or between appointments. If you find your ideas don’t fit, WordPress.com has a longer form that you can flesh out your ideas on. If answering questions is your thing, Quora is the place to go.

The one thing you shouldn’t do, however, is let your ideas live in your head alone. We live in a big, beautiful world with people who could use them—and who could amplify your idea to your next client.


Home Automation Systems, Apple, and Your Listings

We’ve recently discussed the “Internet of Things” and smart homes, but now there’s some big news from Apple that might shake some things up.

Apple's home automation tech "HomeKit"

What Is Home Automation And The “Internet of Things”?

If you need a quick refresher as to what the internet of things are, it’s a series of gadgets that have been given the ability to connect to the internet for your convenience.

This means that your fridge might have a screen where you log your food levels so you know when to go to the store—and how much to buy. Or, your thermostat could detect if you were home and adjust itself accordingly to save you energy. These features are gaining ground and making sure homes are equipped (or at least ready) for these appliances is a big deal.

The News

Apple announced yesterday during their WWDC keynote presentation that they’re working with some of the biggest names in home technology to get most (if not all) devices onto a single standard of communication. This is a welcome change as the current market is filled with apps for each device, making managing a smart home a little complex.

The list of companies on-screen at the keynote are:

  • iDevices
  • iHome
  • Sylvania
  • Texas Instruments
  • Cree
  • Skybell
  • August
  • Honeywell
  • Haier
  • Schlage
  • Philips
  • Kwikset
  • Broadcom
  • NetAtmo
  • Withings

Now, with the addition of these standards, Siri can control the home with certain commands. The keynote itself used the example of telling Siri “I’m going to bed” to initiate the doors locking, lights going out, and other actions.

There will also be an app (most likely) that will allow you to control all of your devices at once—smoke alarms, thermostats, door locks, and others to start.

If you’re a real estate agent of any kind advising your clients or assessing market value of a home, home automation systems are still valuable, but stay tuned to find out which systems will follow these new standards—and to see how Apple’s new developments will help push the smart home into more common acceptance. This could be big news for the real estate market as well as the consumer market.


The Social Media Cheat Sheet

All of the social media outlets are recommended for your business. They’ve become a force that’s not just for sharing your personal life with your friends but for sharing your professional life with your clients.

Facebook on computer screen
This is how our Facebook looks.

Images, too, have become key to interacting on the social web. As our devices have grown more powerful and visually stunning, the use of images has risen too—to the point of being a necessity.

We don’t need to convince you that you need images, we’re sure—the numbers bear that out. Engagement on photo posts is far, far higher than on text posts. The Internet is a visual medium. But how do you use the images in a way that promotes your business and shows that you know your tools?

Part of it is knowing the image size you’ll need. Below we have a list of image sizes (in pixels) that show the optimal size for images to be seen, clicked, and responded to. All dimensions are listed Width X Height. 

The Big List For Social Media Image Sizes

  • Facebook
    • Cover Photo: 851×315
    • Profile Photo: 180×180
    • Link Image: 1200×627
    • Regular Image: 1200×1200
    • Milestone Image: 1200×717
  • Twitter
    • Header Image (new profile): 1500×1500
    • Profile Photo: 400×400
    • Image for Tweets (recommended size): 880×440
  • Google+
    • Profile Photo: 250×250
    • Cover Photo: 2120×1192
    • Shared Photos: 800×600
  • LinkedIn
    • Profile Photo: 200×200
    • Cover Photo: 646×220
  • Instagram
    • Profile Photo: 161×161
    • Image (Desktop Lightbox): 612×612
    • Feed Photo: 510×510
  • Pinterest
    • Profile Photo: 600×600
    • Pins: 600xinfinite (photos can be as long as you like, but width is fixed at 600px)
    • Pinboard Thumbnail: 220×150
  • YouTube
    • Profile Photo: 800×800
    • Channel Art: 2560×1224
    • Video Thumbnail: 1280×720 (720p resolution if using a screenshot from your video)

Using these guidelines can and will help you to promote your business because you’ll quickly improve your social media prowess and make your business look more beautiful and appealing to the average social user.

Feel free to bookmark this guide to the social media recommended image sizes in case you need the numbers again. Happy marketing!