Podcasts about Efax

  • 21PODCASTS
  • 23EPISODES
  • 26mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 17, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Efax

Latest podcast episodes about Efax

Mortgage101
USDA Home Loan Program in Nevada

Mortgage101

Play Episode Listen Later Jan 17, 2023 15:07


How to buy a house with no money for the down payment. USDA Rural Development offers a qualified borrower to buy a house in the approved lending area at 100% financing. Who does the USDA home loan purchase program in Nevada? here is the link to view with video https://youtu.be/rBYnxcWGhdk Learn more about the USDA purchase program in Nevada by watching the full video. There are approved lending areas in Nevada where the USDA home loan Rural Development program will lend on an existing property with no money for the down payment. here is the link to verify the property is in the approved lending area - https://eligibility.sc.egov.usda.gov/eligibility/welcomeAction.do?pageAction=sfp check today's USDA home loan rate here - www.FastandEasyQuote.com   I Welcome the Opportunity to Assist you with an FHA, VA, USDA, Conventional or a Jumbo Purchase or Refinance Home Loan. I look forward in hearing from you, Nathan Rufty Mortgage Loan Originator Call or Text: 909-503-5600 eFax: 888-837-2861 NMLS #292056 - AZ - CA - NV - UT Nathan@NathanRufty.com www.NathanRufty.com www.FastandEasyQuote.com

AutomationTown
For When You Go Back In Time

AutomationTown

Play Episode Listen Later Jul 2, 2022 21:52


Sometimes the old ways are the best. This isn't one of those times, but in this case we didn't have a choice. We talk through how to put a new-age spin on an old-age technology, and built automations around that crusty ole fax machine.SHOW NOTES:—------------------------------------------History of the fax machine (don't click on this please): https://jo.my/faxmachineHelloFax: https://jo.my/hellofax mFax: https://jo.my/mfax eFax: https://jo.my/efax MyFax: https://jo.my/myfax Phaxio (very promising): https://jo.my/phaxio  Clicksend: https://jo.my/clicksend Integromat/Make: https://t.jo.my/integromat-make PDF.co: https://t.jo.my/pdfcoAUTOMATIONTOWN SOCIALS:—------------------------------------------Twitter: https://t.jo.my/twitterWeb: https://t.jo.my/automationtownRSS Feed: https://t.jo.my/rssABOUT HOSTS:—------------------------------------------Chad DavisTwitter: https://t.jo.my/chad-twitterLinkedIn: https://t.jo.my/chad-linkedinJason StaatsTwitter: https://t.jo.my/jstaats-twitterYoutube: https://t.jo.my/jason-youtubeAUDIO PRODUCTION:—------------------------------------------Paul O'Mara - https://t.jo.my/paulomaraSPONSORS:—------------------------------------------Want to sponsor an episode? Contact us at https://t.jo.my/sponsorcontact 

Title Now
Cyber Fraud 2022: Protect Yourself

Title Now

Play Episode Listen Later Apr 15, 2022 45:49


Learn the latest on sophisticated schemes targeting businesses like yours and what you can do to protect yourself. Melissa Jay Murphy 00:06 Hello, everyone, welcome to the Title Now Pop-up webinar. I'm Melissa Murphy with The Fund and I am relaunching these webinars after taking a fairly significant break. So, thank you for tuning in. Because it's been several months since I hosted a webinar, I thought that I would make sure that all of you know we also have a podcast I feel very modern and with it. The podcast is also called Title Now and I generally push the audio from these webinars to the podcast and will be doing that with today's presentation. The podcast is available through all of the typical channels so sign up and take advantage of all the great content that we have in the podcast. So, what are we talking about today? We're talking about cyber fraud and why cyber fraud because it is the number one threat to our industry. It's the number one threat to your business. Despite that reality I fear that so many people in the closing business have heard about cyber fraud over and over and over again and I know I nag about cyber fraud over and over again. You've become sort of resigned to it. You've made minimal gestures toward protecting yourself perhaps setting up some procedures you've made minimal efforts to really keep up to date with what's going on out there in the world of cyber fraud. You're basically rolling the dice on whether you will be the next victim and honestly in today's market, unless you have $400,000 or $500,000 set aside in your rainy-day fund, you are really taking a chance. So, I feel like because this threat to our industry has evolved over the past year. Things have changed and in who's behind this and how they're, what their business plan is, what their workflow model is. And those changes are not good for us. The criminals have figured out that preying on our industry is pretty darn lucrative and apparently not that hard. So, I thought it was a great time to revisit this topic give you an opportunity to learn more about who is behind this crime, how they view our industry and how they have identified our weak points and how they can get in. We have two gentlemen with us today that are on the frontlines of this war and yes, it's a war. They're going to share their knowledge, expertise, and advice on what the industry and you need to understand and what you need to do to address this threat. So first, I have with me, Tom Cronkright. Tom's an attorney in Michigan, but much more importantly than that Tom is in a closing business. He has a title agency Sun Title, it's a high-volume agency, and he also has a company CertifID, that's in the business of safeguarding money in real estate deals and through this process through this life experience, Tom has become one of the real estate industry's leading experts on cyber fraud and he is committed to solving the largest problem in real estate. And he's so good at this, that the Secret Service has partnered with him. We have Steven Dougherty here from the Secret Service. And as you can see from his impressive background, he's with the Global Investigations Operation Center for the Secret Service. Tom and Steven, let's get started. What's happening in the world of cyber fraud, business email fraud? What do we need to know? Tom Cronkright 4:28 Steven, I'll let you take this but Melissa, thanks for taking the time and just spreading more and more awareness on this topic. You do such a nice job, appreciate the tee up. But Steven, why don't we read you in we've had a very very active year and a half together and as far as combating BEC, or business email compromise and wire fraud. But as Melissa mentioned, a little bit more background but I'm a wire fraud victim as well. So as an attorney, title agent, I've been through this process. Unfortunately, in 2015, it cost me nearly $200,000 and ended up in a high-profile federal trial down in Tampa. So, when Melissa mentioned that I've become a subject matter expert, I just paid a lot of tuition in this realm that these are courses I did not want to take. As a title agent or lawyer, I don't remember a cyber fraud and money laundering class in law school. I remember tax and corporations secure transactions, but that's it. Steven, you could be read the group into what we're seeing at a high level and how that starts to work its way down into the real estate. Steven Dougherty 05:40 Yes, where I sit in a very unique position here. I'm at Secret Service headquarters in Washington DC. I'm in a desk here called our business email compromised mission desk, in which my unit gets in pretty much real time aggregative incidences cyber enabled financial fraud affecting every industry. These guys are threat actors are targeting every industry out there where financial transactions are taking place. You know, every industry has it, but where's it most visible? It's most visible in the real estate sector. So, they've really turned their sights on the real estate sector for the past several years and they continue to focus on it because there's so many different transactions involved in real estate transactions. You have your closing, you have your mortgage payoff, you have your earnest money deposit. All of these things are being targeted by our threat actors, and it is driven by one thing. The intersection of what I call contemporaneous and privileged information between your buyer and seller, your real estate and closing attorney they will be the only the ones you would think would have the information like the Closing Disclosure, mortgage payoff documents, anything involving the transaction, but that gets intercepted by our bad actors. And then they weaponize that against you. To get you to redirect transfers of funds, send a payment somewhere you shouldn't stuff like that. Tom Cronkright 7:03 Steven when you say that they're visible. What do you mean that real estate transactions are uniquely visible? Steven Dougherty 07:10 Just the information is out there, due to the real estate sector types of reporting information. Tom, you know, you and I have talked about this a lot about how much of open-source information is available for us to go get or for our threat actors to go find. They can use that, piece it together and then uses that to do a very, very targeted attack. That's so specific that fools even the most complex or educated individuals to spend their money. Tom Cronkright 7:38 Yeah, what we've seen I want to layer on it mostly, if you don't mind. I went two minutes on this because I think the framework of where we are right now creates unique vulnerabilities than when I was hit in 2015 as an agent. So, if we think about the multiple listing service, all of our real estate partners that feed us deals that we're codependent on have an obligation to post up activity on the MLS. That MLS has contracts with Zillow and Trulia and a realtor typically for money to syndicate or buy that data in real time. So, what's interesting is real estate, being now the largest asset of people's lives, and there's not a close second given appreciation. I don't know if you guys saw the NICU from ALTA this morning, but home prices went up another 15% last year. That not only is that the largest asset of people's lives, it's the most visible transaction that we have in the United States. Car purchasing and other high value assets those are happening between, you know, kind of behind the curtain but not real estate. Because of the open market process that a listing agent has to conduct to get highest best use or highest best value for a property and then the fraudster just mine these deal boards. Say “Oh, looks like Norma is listing her house” and “Steve is listing his house” and listing you know, my whatever it happens to be. And then through phishing strategies, these real estate agents have the security of a dumpster essentially, on a super warm day. And they're just exposing us and I'm just going to say it because look, not every time but let's just say in most cases, and then we don't know that all the information that Steven is saying contemporaneous and privileged is being scraped and analyzed overseas, to then trick a homebuyer. And again, let's talk about homeownership right now. There is no inventory. We fell below 1 million listings last month there are more licensed real estate agents in the country than there are homes for sale for the first time that they've been tracking inventory levels. Run the math. By about a few 100,000, we have 3,800 licensed real estate agents in Greater Grand Rapids. This morning we had 900 listings. So, what does it take to buy a parked property? I've got an employee right now at CertifID. She missed out on three offers. She's been through 12 homes she was high fiving me last night almost crying in a text. “Oh my gosh, we got one right.” They’re going to do anything they can to close that. When they get to the end three weeks from now and are asked to transfer money, if they're not set up for success, that buyer anxiety and that buyer fatigue, at a time when we need them more protected, I would argue creates more vulnerability because look I'm not going through that process again. So, I'm going to do whatever you need. If you're saying I don't need to bring a check anymore and I’ve got a wire funds. Tell me where to send that wire. Steven, I think you'll agree we saw that over and over and over and continue to every week that we're involved in recovery efforts. Steven Dougherty 10:56 Yes. Talking to you touch on some really good points. So, let's talk about how these compromises are actually occurring. How are they actually getting in and getting this information out? What they do is through multiple different means either through already having your password for your email account that's already on the dark web through a data breach compromise. You guys actually go to a website Have I been pwned? https://haveibeenpwned.com They've been your email address and see if that email address was involved in any of the large-scale data breach compromises. They'll take that information, find your old password, try to use that to log into your account. That's one way to do it. Another way they'll attack is through a targeted phishing email, where they'll send you an email with a document to click on for some reason. You click on it because you think you're supposed it brings you to a web page. You type in your email address and password and boom are bad actors now your email address and password. And once they have that information, they go in and they log into your email account. They only log in one time. Generally, what they do is they'll go to your settings, and they'll set up an email rule to auto forward out any email you receive. So, you get an email from your client or homebuyer saying, “Hey, I've been told to close yeah, these are the details I have. What do you have?” Now our threat actor has all that information. That's how they get it. They only log in once, they setup the email rule, and the emails are built around that. Melissa Jay Murphy 12:29 Steven, I'd had a question on the chat for you. Oh, Tom already responded to the question. He is spot on. So, we have put in the chat the website that you go to see whether or not your email has been compromised and is out there on the dark web. https://haveibeenpwned.com So that's all. Steven Dougherty 12:50 Yeah, essentially, essentially, it's a website that conglomerates a bunch of different data breaches, and you know, going back for years, so your email address was involved in one of these. It will ping that and show you. That's why it's important to really keep your passwords updated, use new passwords, and don't repeat passwords. These threat actors, they just see that information, and they just start trying it in different places and they get lucky. Tom Cronkright 13:20 Steven let's stay on email accounts because they just seem to be the genesis of all things bad when they're compromised. Not only complex password, but can you speak a little bit about the importance of email settings and analyzing email settings. I think if this industry is ever going to set up Lunch and Learns this year is training our referral partners to identify whether their email accounts have been breached. This is one way but within the email account have rules been set up where their email account is being monitored in real time. They just don't know it and how you prevent it. Steven Dougherty 13:58 So essentially, like I said, these guys log into your email account just once, they go into your settings and they set up a setting or filter to auto forward out of all your emails that way and it’s not only that, they're deleting everything that gets auto forwarded out. They can tailor it to be very specific that you'd have it say you know, any email that uses the word “wire” or “account” or “payment”. I want you to filter that out to another email account and then delete it. So, it is very targeted with that. What we recommend and what you really should be doing along with changing your passwords very regularly, as you change your password every time go in and check those settings and make sure no unauthorized settings have been set up. You can also actually automate that through different your IT groups if you have them. Your IT groups can even, especially if you're using suite like Office 365, can be set up a way to monitor all email rules that are set up on your system to prevent unauthorized roles being set up. So that's one thing is very important. You guys got to check on that just as much as you can get your password. If you do review your rules, you will be able to see the rules set up. Most of the time, these are set out as user generated rules that you can see in those settings. Pretty easy to do. Particularly in Outlook go up to the gear on the right, click that drop it down, go to Settings, go to rules and alerts if anything's been set up there. Tom Cronkright 15:56 Yeah, I mean specifically any forwarding rules, any autodelete rules, any rules that scan for keywords in emails, all of those you can see either in Outlook 365 version or a desktop or native environment. Also in Google, Yahoo. All the different platforms have essentially these rule settings. The challenge is if the rule is set up, you could change your password every single day. The fraudster is still moving that communication into other accounts. So, you just got to make sure you kick him out of that. Then you reset the password and then you enable two factor or what's called multifactor authentication. Multifactor authentication is an additional security setting. So, you have your username, you have your password. We use a complex password manager here at our all of our organizations. That is LastPass. (https://www.lastpass.com) In a complex password manager you create this super secure master password and then for every site that you link for your email accounts, they create some ridiculous password that like you'd never know it. When you enable multifactor, multifactor is one more layer of security that provides a unique code each and every time that you send in a request to access the account. This adds a little bit more friction. But again, we're balancing friction with user security and data security. As attorneys the bar for us is always higher. There's no difference in court when we're standing up and someone's on the other side saying “Let me get this straight. You didn't check a box of multifactor that could have prevented this whole thing because this seems to be the proximate cause of where we're landing here.” Either your IOLTA account or escrow account was drained. Or I've got a consumer facing the loss of life savings. So that's just the brutal truth of it guys. Then using secure email, judges really don't understand secure email, but secure email is essentially a rail that provides security layer between one server and another server. So, you're sending the email on more secure basis. What we're talking about is making sure that that destination point isn't compromised. Because if the destination point is compromised, secured email doesn't do any good at all. Okay, the secure email secures it in transit, not what they call “at rest.” So, you got to do both. Melissa Jay Murphy 18:03 So, it seems to me that these additional safeguards and procedures are all a result of the increasing sophistication and increasing numbers of attempts. So, you know, I just don't think this is somebody in a gray hoodie in a Starbucks anymore. So, who is it that's behind this now because hasn't that change? Steven Dougherty 19:13 She's stole my line or she stole our favorite line. The line is that these are not your lone wolf hackers sitting in their grandma's basement drinking Mountain Dew and eating Cheetos, their favorite lives. That's what people think when they think you know, computer hackers, cyber fraud. But no, it's definitely not these guys operate what I refer to as the enterprise business model. It's a top-down business with a C suite and all set up with people below them to work these very complex organizations. They are transnational organized crime organizations. With the C suite you have your CEOs, then they call themselves that Mr. CEO, Mr. Chairman, and they're the ones that are kind of dictate how they want to do their attacks. Then they realize okay, I need somebody to pull off my phishing attack. So, they'll go hire somebody to do that. Then they're gonna be like, “Alright, cool, the phishing attacks good. I have the good information. I know when this transaction is going to be done, and I'm going to redirect it.” So now it's redirecting to another bank account. So now they need the launder that money. They need to get that money to themselves to do that they go and set up a sort of financial director wing. That is this expansive network of global money mules that just constantly are transmitting money back and forth. This problem has gotten really bad. We're seeing a lot of money mules actually be picked from some romance scams prior. So, they are unwitting money mules. They don't know what they're doing. They're just told by someone they met online, that they're going to receive money and help them for construction project or something like that. Then afford those funds on. It is a sprawling network of money mules here. It gets even more granular you have sort of an admin team that helps maintain spoof domains that they need to carry out their attacks or monitor, maintain email addresses or pull off other types of fraud such as unemployment, insurance fraud, even ransomware is tied into this now to kind of bolster up the organization. So, you really have a robust organization you're dealing with here, and they're very complex. They're very efficient, and as they make more money from these frauds, they only get better. Now they can afford more money mules. They get afford better malware. So, it's just momentum that they've developed and it's a momentous problem. Melissa Jay Murphy 20:51 I know that they're targeting title agents because title agents are receiving and sending money, but the source of most wire diversions and claims that I am seeing amongst Fund Members involve that mortgage payoff and they're intercepting the mortgage payoff when it's being sent to the title agent? Are they sort of hoping that there's an easier way that they can get to that mortgage information and scale it up? Do you think that that's on the horizon? Steven Dougherty 21:37 Yes. Or it may have already happened, in some instances where they're getting in and they're getting pure information fed to them before it reaches its destination. Tom and I are seeing something very similar. We can't speak about specifics, but Tom if you want to touch on it. Tom Cronkright 21:55 You're exactly right. Melissa, I ran a statistic. The average open mortgage balance at the beginning of this month was just over $299,000 across the country. Okay, we haven't seen those levels ever. Again, that's because of the accelerated increase in home prices. So, a few years ago, mortgage payoff fraud really was I'm sitting in the real estate agent’s account. I'm seeing the closing attorney send over the mortgage payoff between the client they're sitting somewhere and they're obtaining the original copy of the mortgage payoff. They're taking that PDF, they're using software to doctor that up and then spoofing typically, the loan servicer or the lender saying, “Hey, we had to make a correction. Here's an updated payoff.” So, they're we're using it as kind of an updated payoff scam. But what they're realizing now is to say, “Wait a second, what if we could distribute your original payoff into the email system of the party requesting it, and it's fraudulent from the beginning, like the first one has been tampered with?” So, we saw this early on in the Nashville area mid-summer. And then we just saw in the state of Texas, where the fraudsters again appear to have compromised the electronic fax account of the title company or title companies using the fax to receive mortgage paths. Look, I'm in the industry, 98% of these come over by “fax”, but it's not the fax of days passed because that was a machine that telephonically printed out something on a piece of paper. We said we can't do that anymore. We need the fax to be converted to a PDF and an email and then have that sent into our general stream of communication. So, they figured out I call it the note of distribution. They figured out that to your point well that's that's a great phrasing. We can compromise these at scale. If we could get access to the eFax, GFI FaxMaker. It doesn't matter guys, but if they get in there, they can reroute traffic from the originating servicer where the payoffs being sent from, doctor that up, and push it right through the same rail down in the email. Fascinating scam, and we've seen them do it unfortunately at scale as recently as a couple of weeks ago. Melissa Jay Murphy 24:44 What I hear you saying is that in those situations, it doesn't matter if the criminal has put email forwarding rules in my account, or not, because they're in there before it even gets to me. So, they're not even diverting any information from my account. They, you know, they've moved on to a much more sophisticated scheme. Tom Cronkright 25:16 That's 100%, right. If you look at what 80% by definition of our disbursement obligations, sit at the mortgage payoff. We can't adequately insure it. The most insurance you're going to get is 250,000 per and that's assuming you did 15 things and a COVID test and a blood test to show them that you did everything to mitigate the insurance company's risk, which if you did that, you wouldn't have the fraud. And I think the other thing that we're seeing is, you just simply can't trust mortgage payoffs that are coming from in either direction from the fax right now, from a closing attorney that you relied upon to gather that because you're the dispersing agent, not the rep representing the seller. And if you don't mind, I'll touch on this. It comes down to essentially three things. One you have codified somewhere a trusted list of mortgage payoff information. Treasury templates are the best way to do it. That's stored on your bank server wall. So, you start to set up the wire. You type in Bank of America and all of a sudden, a bunch of known trusted accounts pop up, you compare it to what you have, you release the wire. Some people do that on spreadsheets. I've seen people that have had folders of PDFs that check, check and date. However, you do it, history can be a very, very good guide on what is true versus things that are not true. When it comes to mortgage payoffs. Calling to verify any new account information is even harder than it was before. It’s hard enough to get them to initiate the payoff. It's even harder right now to confirm just general bank account information for a wire but you have to do it or you just send a check, add some per diem, send a check but that's why it's important to get the mortgage payoff early in the process. Let's just think about mortgage payoff risk. Unless I'm sorry, this is going to breach some underwriting standard. The risk only goes down because the worst case is they made another payment. So, let's just get it out in the open. Let's get it before the fraudster has visibility to it. We can always ask for an update or they'll settle that out with the borrower at the end if for some reason they're radio silent on the verification. Know that we're in the process and we will be launching at CertifID an insured mortgage payoff database for spring market. So, we're in the process of analyzing over 300,000 trusted mortgage payoff records right now. We'll be piloting this in the next two weeks with a group and then we'll be launching this out. This is the number one threat. This is the threat guy that keeps me up at night. Because I know that any loan, commercial, there the table stakes could get large very quick where I'm out of business as a Title Agency in one single wire. We were involved last year in a 22 and a half million dollar, about $21 million commercial payoff wire recovery that landed in the money mule’s account. One wire that would have been lights out. Steven Dougherty 28:28 So, if these do happen to you, and there's a very good chance that it may just due to the threat landscape that's out there. The one thing that's extremely important here, time is money. If you discover this, you need to report it as quickly as you possibly can. There are numerous ways to report it. You can report it through any secret service field office, you can just Google “secretservice.gov and field offices.” You guys I believe are all in Florida, right for the most part. So, while our Orlando Tampa and Miami offices are all very active, very good offices, you can reach out directly to them. Or you can also go to FBI’s IC3, the IC3.gov. www.ic3.gov It’s the Internet Crime Complaint Center. You can also report it there. I'll put the link to the Secret Service field offices in the chat here in a second. But time is money, Tom, I mean, you know you get live streams of victims to you, and you get them to me and how fast have you seen money move within hours. So, we need to stress that time is money. Tom Cronkright 29:27 Yeah, what used to be touted as you know, 72 to 96 hours with the advent of cryptocurrency and just the sophistication. So, what happens in most cases is that when fraudulent wiring instructions are sent, they are typically sent from somewhere overseas. They're sent from the syndicate running the fraud play, but domestically, they have a series of money mules that either know what they're doing or wrapped up in something they're not even aware of that take money in and then quickly move it out. They can withdraw it in cashier's checks. They can withdraw it in cash. They can buy gift cards. Most insidious is that they move into crypto wallets. Then those wallets move and then they move out into other fiat currencies in different countries, and they can move those funds while the Federal Reserve is closed. So, as we're trying to digitize and make it more convenient, these rails of moving money, that are we would look at as kind of nontraditional, it's just a superhighway for them to launder funds and almost completely avoid detection. So, if you're two or three days in, and you haven't triggered a response from federal law enforcement and notified the banks, I mean the to your points Steven we've seen money move within hours. But we've also had instances where the money was in the bank branch. We notified the bank through our efforts, and they were stopped cold. I love stories like that. But it's harder. It's harder to reclaim the money after it's been stolen because they understand the gravity of how quickly they have to move the funds. Melissa Jay Murphy 31:13 So let me go back and let's try to make this really clear to our audience. The moment that you realize that either a mortgage payoff has been diverted or perhaps the sellers’ proceeds have been diverted. You contact a secret service field office, you email the IC3 website and file a notification. You must I assume contact your sending bank and the receiving bank and who do you ask to speak to at both the sending bank and the receiving bank? Tom Cronkright 31:59 So, before you answer, Steven, here's the point of this. What he's about to say needs to be done in advance. These relationships in this pathway needs to be groomed before you have an incident because what we found is that when crisis hits, people freeze and you're burning daylight, that could mean the difference between something coming back and everything being lost. So, I didn't need to step on you there Steven, but what we're about to say is do not wait. This playbook should be set in the organization before there's an incident. Steven Dougherty 32:41 The way I prioritize it is first you should actually contact your financial institution that sent the wire. They generally will on your behalf send a wire recall or a swift message that it was due to a fraudulent means or compromise. If you contact the receiving bank directly if you're not a client for them, oftentimes they won't help you because you're not their client or customer. That's just a caveat. But immediately contact your financial institution and tell them what happens and see if they can put a wire recall in. The next step is to contact federal law enforcement or local law enforcement really whatever you're comfortable with. But what Tom's point was great is you need to have an incident response plan in place before these happen. You need to know who to call to help you. Local law enforcement can help with this. State law enforcement to help and federal law enforcement. So, it's whoever you're comfortable with who you developed a relationship with. You can just Google obviously I provide the Secret Service field offices link you can also Google FBI field offices. HSI Homeland Security also plays in this space. IC3.gov is just a place to report that these happened. Even if there's an attempt, report and attempt. Even if you stop it, please report it to the IC3.gov because what that does is it now gives us meat to go after because there's still the bank account that was used to divert the funds, or the spoofed emails used to send the attack email. We can go add to that as well. So please, the biggest steps are to have an instant response plan in place where you know who to contact and how, and two report everything you can wherever you see because not only does it protect yourself it protects the entire community. Tom Cronkright 34:24 Yeah, well, what I've what I've been most surprised by when I'm most surprised, but one of the surprising things Steven I've involved in well over 100 recoveries last year for 35 to 36 million victims. And I say that because each one has a little uniqueness to it. One thing that seems to be bubbling up is if you're banking with a credit union or a community bank, maybe a smaller regional bank. You might be surprised, and you don't want to be surprised when you're going through it, that they don't have a fraud desk, they don't have somebody that understands how to send an alert through the Fed wire system or notify the receiving bank which is typically a money center bank. So, it's leaving a small bank. I mean, 9 times out of 10 it's hitting one of the big guys, because of the coordination they have globally. So, if they don't have their own incident wire fraud communication, all those channels. I mean, I had to educate bank presidents on what an indemnification and hold harmless looks like going to a money center bank, to allow the funds to come back to a victim. It's surprises me as a lawyer. So just don't be surprised. You run this. Sit down with your banker and make sure you know exactly who to call and the information that they will that will require. If they in turn, have the rails set up to protect you and get the documentation that the receiving bank is going to need to put a suspension on the account, freeze the movement of money, and hopefully work that back to you or your customer. And Melissa, it's worth noting it's not just the disbursement wires, yes, those were a direct hit to the closing attorneys. But it's the risks that buyers face when the closing attorney is spoofed. They haven't been educated. They haven't been engaged on this issue. They haven't received wiring instructions. And all of a sudden at the closing table we realize that there's no certified check in hand because their life savings was wired a few days ago. And I'm going to say this it does not matter to tell the people we don't receive wired we only receive certified checks. We have seen time and time again. The fraudster redirecting through communication the requirement that “Nope, can't have a check now because I've got an OMICRON outbreak or something's going on. I need your wire and I need your wire today.” It's just we've seen it unfortunately. Melissa Jay Murphy 37:05 It does seem to me that reverting to what we call the old-fashioned way of conducting business has some role here, has some advantages here. Some of the questions on the chat or have to deal with these new fax systems that do come straight to your computer versus more of a phone line that's sitting on the desk behind you. But is it better to use an old-fashioned fax machine to send and receive things? The problem is a buyer, the normal consumer, out there doesn’t have a fax machine sitting on their desk if they have a fax number? It's something tied to their computer, but certainly for the purpose of receiving a payoff from a lender. An old-fashioned fax machine seems like it might give you some level of protection. Then in dealing with for example, buyers that need information about where to send their cash due at closing. I don't know what the average homeownership is now, but you know, it's five to seven years, maybe. People don't do this on a daily basis the way we do and so they're not sophisticated and educated about this cyber fraud and rather than communicating with them via email it seems like a reliable form of communication is the good old-fashioned phone. Do you agree? Is that something real practical piece of advice? Steven Dougherty 39:01 You know for customers; this is not a muscle memory transaction for them. Just to put it out there, everybody puts disclaimers at the bottom of their email saying, “wire fraud is real.” Well, guess what? People don't read anything below your signature line in your email. They read the content. That's it, they're not reading and paying attention to that. So, you really have to engage your clients and customers on a very sort of vigorous basis. Tom, you agree that you should do it upfront and throughout the entire process. Let them know, this is the process, and fraud exists, this is how we combat it. Tom Cronkright 39:44 We didn't create this threat. The threat is not going away. It's only getting worse. So, what do we do in response? My argument has been to the industry, to my staff, to our community here in West Michigan primarily is that this isn't going to happen on our watch. And if it does happen, we as transaction participants as advisors, lending, real estate, title and closing that we've done everything we could. We met the standard of care as is being defined in the courts, unfortunately, federal and state as to what success looks like for a consumer to be protected. The challenge is we're not driving them to the bank. We're not over their shoulder when they're opening online banking. A lot of them are banking with an eBank and there's no bank branches. That's the other realization with this economy we're in. We're not in a good fun state. So, I don't have to take wires and if I put my title owner hat on, I don't have to take wires in for cash to close. Now don't have to send wires out, pursuant to the state of Michigan. But what I need to do is educate the consumer that this thread is out there. They can strike at any point and we're going to set you up for success. So, the first thing we do is when we issue the title commitment, we send our wiring instructions along with a wire fraud notice to every consumer. We send it through CertifID. You may even say I'm going to send it through secure email; however, you send it just make sure that you have confirmation that they're the ones that actually received it. Because in a vacuum you can say “Look, no wires only checks. Got it great. We'll see you at closing” and then they get tricked after and it's simply not enough. The other thing that we've done is educate them of the closing scheduled. “Hey, remember if you are going to wire only those instructions that were sent earlier can be trusted.” With regard to enrolling the real estate agents and the referral partners. This is the key. This is where you can multiply the message and multiply this yourself in this conversation because guess who they trust? They trust the real estate agent because they're typically the one driving the traffic. You're being fed off them. Everyone is kind of beholden or codependent on the real estate agent. There's an opportunity there that at the agency formation, this knowledge transfer takes place. So, through notices, we've provided what we call a “day zero document” that our real estate agents put in Dotloop and DocuSign that we have the customer sign because they might start working with a buyer six weeks ago trying to find houses. We've been involved in wire fraud recoveries where the purchase agreement wasn't even countersigned by the seller in the entire cash to close amount was wired to a fraudster by the buyer. Purchase Agreement wasn't even consummated yet. That's how early they can get approached. So, educating the real estate agent, you know, showing them what you're doing to protect the consumer to protect them, and then getting them as part of the lexicon of how they do their business. Wire fraud becomes this conversational piece, not something that we hide behind or act like it's not happening. That in my opinion, is how you drive sustainable engagement. You can't do it all yourself. Melissa Jay Murphy 43:16 Interesting. I think thiss has been an incredible source of information. So, thank you to Tom and Steven. I think that we might have raised some questions that we have not been able to answer and those have been reflected in the chat. So, what I am going to try to do along with my team is look at the issues and questions created by the chat. Review the information that Tom and Steven have shared with us. Try to make some organizational sense to it and try to push something out to Fund Members to update them on the best way to deal with this. Nothing about what you do when you realize there's been a crime is really different than what's on our website right now, Fund Members. We have the IC3 website. The Secret Service connection is something that's a little bit new. And so, we're definitely going to add that kind of information to our webpage. https://www.thefund.com/information-center/information-security.aspx Steven, so thank you for that. Steven Dougherty 44:35 On that website, you can actually go back to do investigations. And there's actually numerous pieces, there's PDFs, there's documents that help prepare for a cyber incident and give updated information on cyber stuff that you can definitely pull down and link to on your website. www.ic3.gov Melissa Jay Murphy 44:54 We will definitely look into that. So, with that I am going to thank Tom and Steven again. I'm going to thank all of you 190 people that participated in this webinar. Thank you so much for your time and attention. Don't forget we're going to push this out on the podcast. And so that's another way you can listen to this webinar again in the information. We will make sense of the comments and information that has been posted in the chats and push that out to you. And as I always do when I wrap up one of these is thank you above all, thank you for your support of The Fund.

Living African
045: Financial Literacy & Life Insurance – W/ Dr. Martin Kwende & Mr. Mark Stewart

Living African

Play Episode Listen Later Jan 19, 2022 89:12


A New Year always signifies a new start. That usually means new year resolutions and promises to cultivate new habits. Being financially stable always falls amongst the most popular New Year resolutions and that shouldn't be surprising. Financial freedom is typically the ultimate goal in everyone's life but not many people know how to achieve this goal; especially not in our African community. You will be surprised at how much information is being made available to us to help sort out our finances, but we tend to not take advantage of that.   As a new parent, I have grown very fond of making sure that the finances of me and mine are set for life. They say knowledge is power, and that is why I have here with me Dr. Martin Kwende (featuring Mr. Mark Stewart) to provide us with helpful information on how to attain generational wealth and financial freedom.   GUEST BIO:   Dr. Martin Kwende, PhD, MBA is a visionary, business owner, entrepreneur and financial professional.  Dr. Kwende was a medical device industry executive, and spent over twenty years in the design and manufacturing of products that go into people.  Dr. Kwende has spent over 7 years in the financial services industry, and has built a fast-growing multi-million dollar business.  He is a God-fearing father and husband, and lives in Silicon Valley, CA. Things You Will Learn in This Episode:  [00:01 – 08:00] Introduction Introducing the guest - Dr. Martin Kwende & Mr. Mark Stewart [08:00 – 17:00] Our Guests History with Wealth Mr. Mark Stewart history with wealth  Dr. Martin Kwende's gives his history with wealth The definition of wealth and what it means [17:00 – 35:00] What is Financial Literacy Understanding financial literacy What we need to do to build wealth Having assets and multiple streams of income Dr. Martin Kwende shares a personal story [35:00 – 50:00] Talking about Generational Wealth Options to building generational wealth How to invest in assets you can transfer to the next generation How to prepare for a better retirement Understanding 4O1K and Retirement Plans [50:00 – 1:11:00] Let's Talk About Life Insurance Understanding life insurance The types of life insurance How much life insurance do you need? Life Insurance in Africa [1:11:00 – 1:23:00] The Importance of Writing a Will Understanding will & you need one Protecting your family and loved ones The popularity of GoFundMe's for funerals [1:23:00 – 1:29:00] Final Discussions Action steps to wealth creation Let's get involved in our finances Dr. Martin Kwende talks about the impact of the Living African Podcast Final words from Dr. Martin Kwende Final words from Anyoh   Tweetable Quotes: “The way I define wealth is by the “5 F's” - Faith, Family, Finance, Fitness and Fun. If you are wealthy, then you have a good balance in those five key areas of life.” - Dr. Martin Kwende “Growing up in Africa, our ideology of “wealth” is if you have a nice car or a big house and I believe a lot of Africans bring that ideology to the diaspora and end up living above their means.” - Anyoh Fombad   LEAVE A REVIEW and tell us what you think about the episode so we can continue putting out the best content just for you! Connect with Dr. Martin Kwende, PhD, MBA: Chief Executive Officer (CEO) - World Financial Group 2221 Oakland Road, Suite 100 / San Jose, CA 95131 Cell: 707-235-6439 / eFax: 408-824-1440 Email: tino4k@gmail.com / Instagram: @DrMKwende Connect with Living African Podcast You can connect with us on Facebook, Instagram, YouTube, Twitter, or send us an email at hello@livingafricanpodcast.com. Check out our website www.livingafricanpodcast.com for more resources and to learn more. You can connect with Anyoh on Facebook (@anyohf), Instagram (@anyohfombad), and Twitter (@anyohfombad).

The Marketing Secrets Show
ROR - It's Not Who You Know, It's Who Knows You (2 of 3)

The Marketing Secrets Show

Play Episode Listen Later Dec 1, 2021 22:55


In part 2 of this special 3 part series, you get to hear more of Russell's presentation at the ROR (Return on Relationships) Symposium! In this half, Russell explains how you should provide value to people before you ask them for anything. Enjoy the second half of this keynote presentation, and don't forget to check out RORUniversity.com to learn more! Hit me up on IG! @russellbrunson Text Me! 208-231-3797 Join my newsletter at marketingsecrets.com ClubHouseWithRussell.com ---Transcript--- Russell Brunson: Hey, what's up everybody? This is Russell. Welcome back to the Marketing Seekers Podcast. I hope you enjoyed the last episode for my keynote presentation at Christopher Vos' ROR Symposium. So far, in the episode number one, I had a chance to talk us through some of the history and the background of how we started building our business and I'm excited this next episode's going to be the second half of my keynote presentation. I hope you enjoy. And then afterwards, the third episode, we're actually going to, I opened up some Q & A and we had a really good time doing some of that as well. That'll be the third episode, so this episode would be the last half of my keynote presentation. I hope you enjoy it. Again, if you want to go deeper with Christopher Vos, make sure you go to roruniversity.com and get on his list, read his stuff, listen to what he is doing because he is helping a lot of people to build businesses by using relationships and really understanding how to do the stuff we talk about. I talked about Dream 100 in the Traffic Secrets book. This is what he's talking at a much deeper, much more powerful level. With that said, I'm going to cue up the theme song and when we come back, you'll have a chance to listen to second half of my keynote from the ROR Symposium. Okay. Now, I'll tell a side story because it popped in my head right now and that's what I do, right? About the time, it was after Joe Vitale promoted me, I had a list with certain sites and then I got a phone call from a guy named Tellman Knudson. Anybody here know who Tellman is? Tellman used to be big at our space. He shifted it over to more hypnosis, personal development space. But Tellman messaged me on the phone. He was like, "Hey, Russell, I had this idea. I'm building or I'm interviewing all these people and," I can't remember, "I'm going to interview you for an hour about a topic and then I'm going to put it behind the squeeze page and then everyone's going to promote the squeeze page. People are going to join my list, they'll get your interview and all the other interviews." And I was like, Uh, okay, I think that's the worst idea ever." He's like, "What do you mean?" I'm like, "I'm not going to email my list to your squeeze page so they can opt in and join your list to get my free interview. I'll just give them my free interview. Why would I do that? It does it make any logical sense." He's like, "Well, everyone's going to promote it and that way, everybody, everybody's lists, people from other lists will see you as well and it's going to be the huge thing for you." I was like, "Dude, that's the stupidest idea ever. No. No." I told him no, flat out, I was like, "This is never going to work, but good luck in your future," and I hung up, right? I was nice because on my DISC profile, I'm a high S, so I can't be mean to people. So I was like, "Okay, well, sorry." Anyway, so that happens and then fast forward three months later, all of a sudden, in one day, I get emails from everybody, Joe Vitale, the Nitro Marketing guys, all the people who are the biggest of the time, emails from everybody and I open up and it's like, "There's this guy named Tellman Knutson, the interview is on his ListBuilder and you should go check it out." And I clicked on it and went to, it was called listcrusade.com, it was his site, I went to listcrusade.com and sure enough, there's an opt-in to get all these interviews and I opted in and there's all these people's interviews. I was like, "What? How do you pull it off? You got the biggest names in the world to go and do this." And I was just perplexed, like how? I'm like, "This is the dumbest idea ever. I should have done it. If it worked, this is crazy. So I found his number, I messaged him, "Okay, tell me, I'm so confused. Can I ask you a question?" So he jumped on a call with me and I was like, "Okay. I just saw yesterday 50 people all promoted your squeeze page." He's like, "Yeah, I've added 120,000, 130,000 people to my list and the last 48 hours." And I was like, "How did you do that?" And it was so fascinating. He said, "You know what, Russell? I called 49 people and I got 49 nos in a row. First one said no, no, no, no, no. You said no. Someone said, everyone said no." And he's like, "But guess what? The 50th person," he said it was Kevin and Matt from Nitro. He said, "I called Kevin and Matt and for some reason, they said yes. And after they said yes, I was like, "Cool, do you know else would be a good fit?" And then Kevin and Matt were like, "Oh, yeah, you should get so and so and so," and then they emailed the Nitro like, "Hey, you should meet so and so and so and so," they jumped over there. Those people said yes as well." And he's like, "The next 37 people in the row all said yes." Oh, he even had Jay Abraham on the list. Anyway, he said, "The next 37 people all said yes and here we are." And I was like, "Oh, my gosh, how many of us, including me, would've stopped at the first no or the second or the third? But as soon as he got one cool kid to think he was cool, he was in. Okay? So you start thinking about this, actually, this is probably more for the women. This is embarrassing, I'm going to say this. How many you guys ever seen the movie Never Been Kissed? Drew Barrymore. Okay. Macaulay, can you act this out while I explain? Just kidding. Okay. Here's the story from Never Been Kissed. Drew Barrymore, in the movie, she's never been kissed, she graduates high school and now she's a columnist at a newspaper. She's a big columnist and her brother was the cool kid. He was the jock and the coolest kid and he graduated now he's this loser because he's graduated from high school. Anyway, she's in her day job as a columnist and they're like, "We want article from what are the high school kids doing so we need you to go undercover back to high school and find out about the cool parties and all the cool stuff." So Josie, drew Barrymore's, character goes back to high school and within five seconds, she slides back into the nerd group which they're doing chess club and all these kind of things and she's writing articles about chess club and her editor's like, "No, we don't want these articles. I want the cool kids, the drugs and all this stuff, what's happening. We want the underground dirt, that's the article we're looking for." So she tries to get in and she's like, no one will, the cool kids club will not let her in. So she's home and she's frustrated and then her brother's there and her brother's played by David Arquette and so David Arquette is jealous. He's like, "I want to go back to high school, I was the coolest kid in high school." And, and Josie's like, "There's no way, you don't understand, it's harder, it's not the same thing. If you went back to school, you wouldn't be cool." And it gives the idea for him. He's like, "No, I'm going back to school." So he somehow, and Tammy says it isn't on Netflix, I'm sure it's on Netflix. Anyway, this is your homework. Everyone go watch it. So Drew Barrymore or David Arquette's character goes back and gets in high high school somehow and she sees him in the hallway, she's like, "You can't do this. It's not going to be like, you're not going to be cool like you were before." He's like, "Watch this." So he goes into the lunch room, this is the greatest scene of all film. He's in the lunch room, he's standing up on the table and he's got this huge bucket of cole slaw and he's trying to eat the entire thing, shove it in his mouth and the whole high school's cheering him on like, "Oh," and he's eating the stuff he slams the thing down. He's like, "Oh," and that fast, he's the coolest kid in high school, everybody loves him and he's the man. And then, the next day, he's like, "Okay, I'm going to show you, Josie. I'm going to make you cool." So he goes with Josie, his sister and one of the cool kids sees him and he's like, "Oh, why are you hanging out with her?" And he's like," "Her? She's the coolest girl. She actually broke up with me, she's so cool." All this stuff. And he starts talking about how cool she is and all of a sudden, everyone's like, "Oh," and then all of a sudden the cool kids are like, "Oh, she's cool." And all of a sudden, boom, she gets sucked in. And then one cool kid thinks she's cool, the next, the next and eventually, that fast, she's cool. Okay? That was a very long story to tell you that the secret is, as soon as one kid thinks you're cool, as soon as one cool kid thinks you're cool, you're in. So Tellman Knudson, same thing. He was going back here. No, no, no, no, and he got one cool kid, Kevin and Matt from Nitro who thought he was cool and then opened up everything else. So if you guys are on this ROR thing again, a couple things that I was hoping to get through to you guys, number one is, we're shooting for the stars, that'd be amazing, but don't start there because it's going to be really hard to get in. Build your thing. Find people who are around you who are doing the same, in the same business, same industry and start building from there and start growing. As you do that, it's going to start opening more doors for you. Someone's going to introduce you to somebody else, someone else is going to introduce you and you start building this network of people and you start doing it collectively. If you do it collectively, all, what's the saying? High tide rises all boats. So it starts getting bigger and bigger and bigger and eventually, it gets easier to open the next door and the next door. And eventually, what happens is, I had this group of people, Mike Filsaime and Gary Ambrose, Brad Callen and Brad Fallon, all these people, all my friends at the time, Frank Kern, all of us who are this level and eventually, at that point, we're at the level of all these other people. But guess what? There's always a next level. And there was this guy that, oh, I looked up at this guy, crazy. He's a giant, he's got big old teeth. Anyone guess who it is? It's Tony Robbins. And Tony's the next level up here. And Tony's up there and we're all down here. And one day, somehow, one of my cool kid friends got into Tony. I don't know how or who it was or anything, but somehow, one of them got into Tony. He had a meeting with Tony and blew Tony's mind and then my friend, I actually I know, it was Mike Koenigs. Mike Koenigs got into Tony somehow, blew his mind and then, so one cool guy, cool with Tony. And then Mike Koenigs introduced him to me like, "Hey, you should meet Russell." He's so and so, and suddenly Tony, I get a, and this is the craziest experience ever, Saturday morning with my kids getting ready and the phone rings, I pick it up and it's Tony Robbins' assistant. "Hey, Tony Robbins wants to see if you can meet him today?" I'm like, "Okay, who is this?" I thought it was my friends messing with me and they're like, "No, my name's Jay Garrity, I'm Tony Robbins assistant. He's in Salt Lake City, he wants to meet with you." I'm like, "I live in Boise." They're like, "Yeah, well, he knows who you are and he meet with you. Can you get to Salt Lake?" And I'm like, "Well, it's a five hour drive. I can jump in my car." He's like, "Oh, we're flying out in three hours." He's like, "How about next week? Can you meet Tony in Toronto? He's your UPW, you can show up, go to the event, walk on fire and then he'll have a private meeting with you." I was like, "What's your name again? Is this a real person?" I'm like, "Heck yes, I'll be in Toronto next week." So the next week, I'm flying to Toronto. Again, I've never been to a Tony Robbins event so I show up with my backpack, my computer, I'm going to sit back and take notes like the internet nerd that I am. And I walk in and people are jumping and screaming and we're sitting there dancing and rubbing people shoulders and I'm so confused what's even happening. And then, we walk on fire and the first time I met Tony actually was the fire walk. He had me in a VIP section, so imagine there's 2000 people in the event and then right next to the stage, he has these two VIP sections and I actually stood next to Chuck Liddell. I didn't know who Chuck Liddell was at the time, I'm like, "That guy looks scary," big old mustache and big old muscles and I was like, but he was there. Anyway, I saw him when he went to UFC and I'm like, "That was my partner at UPW, I know everything was messed up in his life. This is so weird." Anyway. He's probably offended I had no idea who actually was. Anyway, we're in this little group so we could have a chance, to go back, the first time I met Tony is, after everyone leaves the fire walk, we walked through the front thing and they opened the curtain and Tony's standing there and he was like, "Russell, I heard so much about you," he gives me this huge hug and then we walk with him and I did the fire walk with Tony and that's my first impression. But check it out, it wasn't because I emailed Tony and tried to get to know him. I probably emailed him a lot and it never made it to the gatekeepers. But it was because one cool kid got in there and told him I was cool. And after that, it was open. Doors were open. So this is in, in my mind, this is the stuff I want you guys thinking through. Sometimes, with Dream 100, we're going to turn the relationship, we're going to give a list and we're going to send it to mailboxes and that's going to be how we grow our company. There's a place and a time for that, but that's not how it really works. It's this organic thing where it's building actual relationships, getting to know people, finding out about them and their families and how can I serve them and back here, when we're all at this level, it's like me trying to help them like, "Oh, I tried this in my business and it worked. You should try that." We're having these back and forth and it builds these relationships. And then, together, we all collectively rise up to the next level and the next level and the next level to eventually, we are the top level and that's when it gets more and more fun. So that's what I was hoping to really share with you guys, especially because I think, for some of you guys, as I'm sure for many, you look at someone who, like me, who's been doing this now for 20 years, oh, it's easy for us. Anyone will take this call. Yeah, but it's 20 years I've been playing this game. 20 years I've been putting the coins in the deposit box over and over and over and over and over again. When I found out who Dan Kennedy was, I'm like, "Okay, I want to get to know that person, but I don't know how to get there and it was like, well, there's two ways I can get into Dan Kennedy's world. I can work my way in or I can buy my way in. I'm like, working my way could take a decade or two, so I'm going to buy my way in. So I was like, "Okay, I've joined the mastermind group, I'm getting in there." And then I didn't go. I have people, oh, people that joined my mastermind group this last time around, amazing group, but there's different, everyone's got a different mindset and I have people coming in initially and they're like, "Russell, this is so cool. Can I make a testimony with my video? Hey, can I get a picture?" And they were trying to take, take, take, take, I'm like, "Ah." When I went to Dan Kennedy's group, guess what I didn't do? I didn't take from Dan. First off, because I'm scared of him. Number two, I was like, all right, I'm going to serve these guys because I want Dan to know who my name is. I don't want me to message Dan, I want people telling Dan who I am. If I can do that, that's the secret. So I'm in Bill Grazer's group, I'm serving the group, I'm trying to help as much as possible. I'm helping these offline people in this group to launch online businesses. I'm helping them get funnels. I'm helping them do the launch, I'm doing coordination. All this stuff to serve Bill Grazer's group. And Bill's like, "Oh, my gosh, Russell's really helpful." And he tells Dan, "Dude, this guy in our group, he loves you, he loves everything, he's helping our group." And I always wanted to speak at Dan's event, but I'm like, I'm not going to ask him because I don't want to do it, but I'm just going to keep serving and eventually, he's going to have to, because I do so much stuff for so many people, they're going to want to put me on stage. So I get in that group and I'm serving like crazy. In fact, after, I think it was three years in, I wanted to, anyway, I had to fly to Baltimore three times a year and it's not just flying to Baltimore, Bill was in Baltimore. You'd fly to Baltimore and then you'd drive in a taxi for an hour to get to the hotel that Bill would have it at, and after three years I was like, "I can't do this anymore." So literally, I messaged Bill, I'm like, "Hey, I'm not going to re-up this next year because I just can't keep coming to Baltimore." And he literally was like, "This is the deal, Russell, you have to be in the room so you're not going to have to pay anymore, but you're still coming." I was like, "Okay." And for the next three years, I didn't pay but I kept showing up because I provided so much value, he's like, "You have to be in this room because you're facilitating all these things." And then he had me on stage, had me on stage again and then eventually, I remember the last event I spoke at, I spoke on stage four times. I was on stage longer than Dan Kennedy was. Do you think Dan Kennedy knew my name? Yes, he did. He was like, "There's this internet nerd who keeps showing up and helping everybody, he's never asked for anything. We should get to know him," and that's how I built a relationship with Dan and then with Bill and with all these kind of things. And now, fast forward a couple years later, the opportunity to buy Dan's company's there and I'm like, what if he hates me? Because he's not going to approve ... And I literally, I faxed him because you can't email Dan, he has no email, you have to fax him. So I had to open an eFax account, write it on a piece of paper, send it, it's this whole thing. So I faxed him, I was like, "Hey, there's an opportunity to buy your company, but I just want to make sure that you don't hate me or I'm not ... We're going to be working together so I want to make sure this is going to be a good fit." And he faxes me back, he was like, "Dude, every time I've heard about you, it's you on stage talking about how good I am, you always praise my name, all these kind of things. Of course, I would love to work with you," because he knew who I was. I had been trying to serve him for all this time and I'd never asked him for something so because of that, he said yes. And now we're have this partnership and we're 30 days away from watching the new magnetic marketing and you guys are going to die when you see this, it's the most exciting thing ever, but it all came off of that, building these relationships over the long term. If you guys haven't, on YouTube, there's a video, if you type in "Russell Brunson Tony Robbins Dream 100," there's a video documenting my Dream 100 process with Tony, which was over a decade and a half to do this thing, the very first time he actually promoted me. But it wasn't me coming in like, "Tony promote, Tony, promote." If I would've done that, I would've had one meeting with Tony and that would've been the last. It was a decade of me just, every meeting with Tony, "How can I help? How can I help?" People from this company would call like, "Hey, can you consult us on this thing?" I'm like, "Yes." "How much does it cost?" I'm like, "For Tony, it's free." "I'm sure your time's valuable, we're willing to pay you." "No, tell Tony, your money's no good with Russell," because I wanted the relationship. And fast forward now, I'm going to get emotional. Oh. This isn't a story that we've publicly told, but you guys know Funnel Hacking Live, Dave had his cancer, if you know the real story, it's literally the worst kind of cancer you have, they give them like a 6% survival rate past eight months, 10 months, something like that. So we were so scared and after Funnel Hacking Live, after Tony off stage, went backstage with him and Tony was like, "How can I serve? What else, what can I do for you guys?" And Todd had the impression, "Hey Tony, this is our friend and partner Dave. He's dying. Is there anything you can do?" And Tony says, "Yes, these are the people. Call this person, call this person. In fact, I'll connect you. Here's the people." Two weeks later, Dave's flying to Dallas, he's with this doctor who does things the opposite of what every other cancer doctor does, Dave spends two weeks down there with him. I won't get too deep into the details, but discovers there's a root canal that causes the tumor, pulls his tooth out, throws the oxygen in there, oxygens his body, does a bunch of things. Two days later, Dave goes back for his MRI where they're supposed to tell him how long he's got left so he can plan with his family. They do an MRI, the doctor looks inside and says, "There's not a bit of cancer inside you. What did you do the last two weeks?" And because of my relationship with Tony, I had access to this guy who saved Dave's life. And Dave's going to be here for the next 20, 30 years because I was willing to put in, for a decade and a half, this relationship with Tony and Tony had a relationship with these other guys and man ... So is it worth it? Yes. Is it worth financially? Yes. Is it worth it from so many more things? Yes. It is. So I'm forever grateful that I didn't ask Tony to promote my thing on day one. I'm forever grateful that I didn't try to figure out what I could take. I'm forever grateful that when they asked for help, I just gave it because I love Tony and because that opened all these doors where, yeah, so whew, not planning going there, but that's the power of this stuff. So when Christopher's talking about this, I'm sure he is told his story. He had a very similar situation where, because of the relationship, his life was saved. So you never know, it's coming into these things not looking for something, but coming in as a servant. And as you have that servant feeling and you're going into it, it's amazing what doors open and you never know what door you're going to need or when you're going to need it or what the thing is or what the, you know what I mean? It's crazy. Whew. I don't know how I wrap that up or how to- Don Mamone: Do you need a minute? Do you need a minute? I mean, I'm going to step in and just say, take a drip of water. That's probably one of the most amazing stories and I have to say that you, unknowingly maybe, and the reason you needed to tell that story was because we had an ongoing over-under bet on how long it takes a speaker to cry on Christopher's stage because so many people have come up and told stories from the depths of their heart and soul. So, hey, I want to thank you for joining those of us that have joined Christopher's stage in which you have an over-under on telling an emotional story, so thanks for that, Russell. Russell: No worries. You set a environment where it was there. Anyway. Yeah, I hope that this was helpful for you guys. Again, I was like, I could go and give you guys the foundation and step one and step two and step three, stuff we talked about here, but I was like, I don't want to do that. I want to be real as possible because it's real in so many aspects of your life. And now's the time, wherever you are, is to start planting those seeds and starting looking at who can you serve, who can you serve and the more you do that, the more doors open and the more things. And it's okay eventually because I think sometimes, people are scared to ask and I would tease Christopher about this. He's been building a relationship with me for now, I don't even know, three or four years and we used to have a joke inside of the office, "What's he going to ask?" Somebody's going to ask something. "I don't know. Maybe he's just going to keep serving and serving and never ask." And then when he finally is like, "Hey, I'm doing this thing, would you be willing?" "Finally, thank you for asking." Because we know, there's always, all of us, when I was dating my wife, I was asking her on a date and she knows my intentions. If I already came date number one, "Hey, can we get a picture just in case if we get married, we'll have the ... " Whatever. If I'd done these weird things along the way, it wouldn't have worked, but like everyone knows, we're in business, we're in things like that, we know what the goal is, but we're trying to feel people out to see if they're genuine or not. It's interesting. I heard Adam Sandler talk about it one time and he was like, "I don't have very many friends." He said the reason why is because, he's like, "Earlier in my career, as I started having more success, everyone wanted be my friend. I realized really quickly they didn't want to be my friend, they wanted something from me." And the higher tier you get, you'll find out that happens. For me, I don't have a whole bunch of friends because I don't know who my friends are a lot of times. It's interesting because there was a time in my life where I thought everyone who was coming was my friend and I started giving people jobs and some of you have heard the story, I built a huge company of over a hundred people and I thought they were my friends and were here because of the mission, because of the vision. And when we had a hiccup and things kind of crashed, they all went away. And it was interesting because thought that they were coming for that. I can't remember exactly where I was trying to go with this train of thought, but ... Oh, yeah. At the higher levels, just Understand that their guards are up because they've been burned in the past and it's like, who's true friends? And if you show up as a true friend where you're giving, you're serving, they know you want to do something with them eventually anyway, that's in the back of their mind, but they're testing, is this person the person who's coming because they're trying to get something from me or someone who genuinely wants to be a friend or genuinely wants to help, genuinely wants to do something? So it's just consistently showing up for a long time and maybe it's not as fast to turning on a Facebook ad, but for the long term stability, what you're trying to do, it's the best thing. Anyway, I hope that helps. I hope that gave somebody something today.

The Post Podcast
eFax's Scott Wilson on digital transformation

The Post Podcast

Play Episode Listen Later Dec 2, 2020 24:41


Scott Wilson, director of sales and service at eFax, joins Business Post tech editor Emmet Ryan to discuss hybrid working and the impact it is having on digital transformation based on recent research carried out by eFax.

Content Creators Chat
Email Marketing Tips for Influencers with Hank Hoffmeier

Content Creators Chat

Play Episode Play 30 sec Highlight Listen Later Dec 1, 2020 29:14


If you're not using email to get in front of your audience and followers, you are missing out on a HUGE opportunity to increase your visibility and your sales! Hank Hoffmeier is an author, speaker, podcast host, and Sr. Manager of Client Success at iContact, a j2 Global company (Efax, PCMag, Mashable, IGN, Ziff Davis, Campaigner, and more). With a passion for all things digital and social, combined with more than 20 years of experience in sales and marketing, he has been dubbed the Digital Marketing Infotainer because he makes marketing fun and successful. A few of the things you'll learn in this 30-minute episode:Tips to make your email marketing betterWhat does KLT stand for?When and how to use a lead capture/pop-up on your siteHow to turn people off and lose an opportunity (spoiler: you do NOT want to do this)What kind of content should you include in your emails?How important are subject lines and preheaders?You can follow Hank in the following places:WebLinkedInYouTubeTwitterFacebookInstagramYou can find all the details for the upcoming "Foundations" virtual summit happening on January 16, 2021, on our site www.contentcreatorsconference.com!

The Irish Tech News Podcast
Scott Wilson on digital transformation and why the fax Is not dead

The Irish Tech News Podcast

Play Episode Listen Later Oct 13, 2020 40:51


Ronan talks to Scott Wilson, Director of Customer Experience, eFax. Scott talks about what eFax does, their recent research on digital transformation. Scott also talks about the challenges businesses face when undergoing digital transformation, the hybrid model of home and office working,  and why the fax is not dead.

Irish Tech News Audio Articles
A catalyst for change – the pandemic and the acceleration of digital transformation

Irish Tech News Audio Articles

Play Episode Listen Later Sep 16, 2020 7:28


Great guest post by Scott Wilson, Director of Customer Experience, eFax Businesses have been wrestling with digital transformation for a number of years. As one report put it “with 90 percent of the world’s data having been produced in the last two years and more than 26 billion smart devices in circulation, we are living in an era of unprecedented technological innovation.” To be able to take advantage of the opportunities this era is generating means, for many organisations, radically overhauling their existing operations to compete with newer, more agile companies to serve educated, demanding customers. Yet for many, all the talk of digitalisation being an imperative, not a nice to have, had yet to translate into direct action. Decisions on new initiatives would take many months, if not years, as committees discussed and considered, and business units had to make the case for new investment in digital tools and projects. The pandemic as a transformation catalyst That all changed in March 2020. As the coronavirus pandemic upended the way we worked and lived, businesses had to scramble fast to keep operational. Those that had reached a degree of digital maturity were able to react faster than those that had been unconvinced of the merits of transforming, and even businesses with established eCommerce operations, for instance, struggled to cope with the upswell in demand. Amazon went on a global hiring spree to cope with the burst in locked-down consumers switching all their shopping online overnight; supermarkets struggled to offer delivery and click and collect slots to customers. For some, even getting on to a website was a challenge – a number of operations had to install queuing systems to keep their digital shopfronts from toppling over. These examples are simply the tangible proof of what happens when businesses had yet to bring their organisations into the digital era. For those that championed transformation projects it could be frustrating but looked at positively, the pandemic was a clear catalyst for change. In our latest eFax survey, 77% of IT decision-makers would have accelerated digital transformation sooner if they were aware of the full impact it could make on their organisation in just a few months. What’s more, 60% of respondents are, as we speak, accelerating the speed of their transformation projects as a direct result of the disruption the pandemic wrought on their workforces. But what stopped them before? Based on the survey, there are five key factors: A lack of budget: Slightly over half (51%) of respondents believed that if more budget had been available for transformation projects their organisations would have been encouraged to accelerate digital transformation sooner. A lack of leadership buy-in: Two-in-five IT decision-makers also felt that more buy-in from leadership teams would have encouraged a sooner acceleration of projects. Siloed departments: The third highest factor was a lack of coordination between departments and functions, with 34% suggesting more cooperation would have helped. Restrictive vendor services: Being held back from what they could get from technology suppliers was another issue, with 30% highlighting more flexible services as being helpful. Move on from legacy: Just behind was the challenge of wrestling with old systems and applications, with slightly less than a third (29%) believing that with less focus on trying to make legacy processes work they could have accelerated more. Overcoming obstacles to futureproofed transformation So, does this mean that the coronavirus came along and swept all those problems away? Hardly. Budgets will still need to be justified, particularly as cash becomes tighter in an economic downturn. That said, when looked at objectively, those top five factors are, at their heart, symptomatic of cultural obstacles. As IT decision-makers and their employers look forward, part of their post-pandemic plans needs to consi...

The ALPS In Brief Podcast
ALPS In Brief — Episode 49: Would You Send All Your Money to a Scammer? Maybe You Just Did.

The ALPS In Brief Podcast

Play Episode Listen Later Aug 6, 2020 16:52


A lawyer was waiting on a fax with all the information she needed to complete a wire transfer. Fax received, money sent. What she didn't know? Her email had been hacked. Cybercriminals had intercepted the fax and edited the wire transfer details before sending it. The money was gone. The worst part? This new cybersecurity scam is really easy to execute and happening everywhere. ALPS Risk Manager Mark Bassingthwaighte lays out the details and how to spot the breadcrumbs so you and your firm's employees won't be caught off guard. Transcript:  Hello, and welcome to ALPS In Brief, the podcast that comes to you from the historic Florence Building in beautiful downtown Missoula, Montana. I'm Mark Bassingthwaighte, the Risk Manager here without ALPS. Today, I'm going to do a little solo performance, and thought it would be really worthwhile to talk about how to avoid cybercrime, being a victim of cybercrime. And I am particularly going to focus on wire fraud, business email compromise. We have had a number of lawyers impacted by this with literally millions of dollars, in total together, stolen. And certainly, this problem is not limited to lawyers, but there is one very easy way to avoid falling victim to these types of attacks. And I'd really like to explore that a little bit. And what I'm going to get to is simply do... Explain and describe the process of an out-of-band communication, and actually this process can be valuable in other ways as well. But I thought the best way to try to share what an out-of-band communication is and explain the whole process, is through sharing two stories and then talking about how it could have been handled differently through the use of an out-of-band communication. So here are two stories that also, I guess, for some of you may underscore how sophisticated cybercrime is becoming. The first is not a law firm situation but an excellent example, and it has to do with what we call deepfake audio. And I think some people are becoming more and more aware that they're deepfake audios and deepfake videos exist. But let me explain what that is. A deepfake video is when you take a person and you might be... I've seen some really good ones with Mark Zuckerberg and President Obama over the years, and it just... You see these individuals talking, but they are saying something in their voice and it sounds perfect that they never said. And so, these are deepfakes, it's just altered. And these things can be done, not only with video but with audio. So, sort of with that understanding, here's what happened. A CEO at a corporation was out of the office on... Just traveling on business. And the CFO at the corporation received a phone call during this time away. And later on, he reported that this call or, I should say, the voice on the call, was absolutely perfect. He was utterly convinced he was speaking with the CEO, the way the CEO used the language, the way he... Just the way he spoke, it was just spot on. So, believing that he was speaking with the CEO, he was instructed and followed through on wiring around $275,000 out of the country. Because of the success of that, a little bit later another call came in, again to the CFO, purportedly from the CFO, and there are some other discussions in sharing and there are some other reasons he needs some more money moved. And it's only by happenstance that as the CFO was talking on the phone, he could see... He just glanced at his phone and saw that the number, the originating number, was a New Zealand phone number. And he knew that the CEO was not in New Zealand, and terminated the call, and really started to say, "Oh my gosh, this is fake. And we've been scammed." Unfortunately, the initial funds that were transferred were not recovered, but at least no more money was taken. So with that, that's an example of a deepfake audio cybercrime. Now, here's a second story that did involve a law firm. And, many lawyers are aware of phishing tax, fake emails, spoofed emails, and all kinds of things, but here's an attack that was very sophisticated. In short, the law firm worked with company that provides eFax services. And they set up a dedicated email account for these fax as to come into the firm, eFax in order to come into the firm. And unbeknownst to anyone at the firm, the firm's email accounts, all of them, were breached and someone was monitoring what was going on. And this is not uncommon in terms of having someone monitor your email and those kinds of things. It often will go easily, maybe a couple of weeks to several months. And what they are doing is, as their monitoring offices, they're looking for opportunity, of course, but they are also learning who talks, who the players are, how they communicate in writing and just understand sort of the business model, what's going on. Because, when they make their move and there are a variety of ways they'll make their move, they're going to look and have it appear to be really accurate and legitimate. But anyway... So, here's what happened with this situation. The bad guy, if you will, was monitoring and very interested in the eFax account because these lawyers happen to do real estate. And there were a lot of instructions coming through via fax. If a fax had... Was of no interest it would kind of be forwarded along really quickly so no one was aware that these emails were being intercepted and looked at. At one point, a fax came through authorizing... Wiring instructions or whatnot, for a significant amount of money on the sale of a home. And all the hacker had to do was just take that fax and change the routing number, the wiring instructions here on this document. Made that change, set it on. So, please understand what happened here. A lawyer is expecting a fax with all the information he or she needs to complete this transfer or to follow through [inaudible 00:07:27] moving the money, it's an expected email, an expected fax coming in via email. It is from a known and trusted source. No one knows, however, that it has been intercepted and the routing information changed. So, based on a belief that everything is absolutely fine, a substantial amount of funds were wired. And of course, to the wrong bank, the wrong individual, and there was a substantial loss there. So, those are two stories about... Just giving examples of how crazy cybercrime has gotten. But, how could you have prevented this from happening? And it really is quite easy. And it's done through the use of an out-of-band communication. And it simply means we're going to change the communication channel to verify. So for instance, in the first example where we had a deepfake audio. What could have been happened, right? Perhaps I should say, should have happened, is the company would have a policy that says whenever we're moving any substantial amount of money... And we can define what that is, 5,000, 25,000, whatever works for your own situation, but let's say it's $5,000. So, anytime we're going to move $5,000 or more, you're going to have an out-of-band communication to verify. And so, with that policy in place, the CFO has received a phone call from someone that he believes is the CEO authorizing or providing instructions to move money. He should hang up. And after that call, he knows what the CEO's phone number is, he doesn't have to look it up, he's not looking at... Just returning the call or anything like that. He texts the CEO, Hey, boss, in accordance with our policy, I'm just confirming that you called me and have asked me to wire 275,000 to Germany or whatever it might be. And if the boss texts back, yes, thank you, please take care of it. Fine, wire the money. The boss is, "I don't know what you're talking about, it seems like there's a scam going on here." Stop, don't wire the money. In the second situation, again, we have this fax coming in from another lawyer, a realtor, I don't know where it originated and doesn't really matter. But, it's coming. And I would guess in this situation more than one... This is a known... The fax is going between probably a realtor and the lawyer on a fair to regular basis. And so, all the lawyer needed to do was, again, pick up his phone because he knows and has the accurate, known, correct number on his cell phone. And if he doesn't he'll look it up or even in... If... At the beginning of representation, you verify with all the parties, what is the trusted contact information? What is your real email? What is your phone number? What is your address? And then, you go back and you look that up so that you know you're using the correct phone number. You don't want to look at a phone number that's in an email coming to you and use that, because the scammer will give you a fake email... I'm sorry, a fake phone number. But... So, you just... You call in and you say, "Susan, yeah, just received the fax. You know the routine here, just want to confirm. Is the routing number that you've given us the accurate number?" And you read it off, "It's [inaudible 00:11:31] 223..." On and on. And if she says, "Yep, that's right." Go ahead and move the money. If she says, "No, that's wrong." Somebody is breached. So, stop. You obviously can get the accurate information and continue on with the transaction, but you also now know that you're breached, somebody is breached, and we need to figure out who and clean these systems up, restore and get whoever's in the system out. It may be as simple as just changing passwords on all the emails. You're going to need some help from somebody that really knows what they're doing here, can determine how far... What does the attacker have access to? But, you know you're breached and you need to stop. So, that's an example of how out-of-band communications can really prevent your becoming a victim of a crime. I have talked, obviously, with our claims attorneys over the years many times, I mean we all get along quite well and interact and keep each other up to speed on what's going on. And I have yet to hear about any situation, both externally and just other stories with peers and internally from all of our claims lawyers, that if an out-of-band communication would have occurred, that would have prevented every single theft that we have seen. And please understand the vast majority of malpractice polices, I can't say all of them because I have not seen all of them, but the vast majority of malpractice policies do not cover theft of funds. So, that should also catch your attention as to the value of implementing a firm wide policy, with a little training here, that says, no one, I don't care if it's the most senior attorney down to the new bookkeeper, is authorized to move any money under any circumstances unless an out-of-band communication has occurred, so that we know we are sending the money to the correct legitimate recipient. So that's an out-of-band communication. I hope that you have found some value. And let me... I [inaudible 00:14:06] you can take this a little further. At times people receive email that looks legitimate, and it has nothing to do with wiring money and that kind of stuff. But, we're being tricked into opening an email or opening an attachment, and doing so can unintentionally allow the installation of a malicious program, a malicious app of some sort. And that might be even the pathway in, so that somebody can now start monitoring your email to look for an opportunity to try to commit wire fraud. So, think about the value too, of training employees and having everyone at the firm be aware that, Hey, if we have some questions about an email that has come in, what is this bill that... Don't open it yet. Don't click, don't look, don't investigate, because it just feels odd, it feels off. Reach out to the legitimate company or legitimate individual that purportedly sent this to you and say, "We're not... This doesn't make sense. I don't recall authorizing new folks to provide some service [inaudible 00:00:15:30], we don't have any account with you, we don't know what you're talking about. Thank you for letting us know. Somebody apparently might be using our email address or our company name in a fraudulent way and..." But... Again, you just confirm, you figure out in advance, okay, that's not trustworthy and I don't want to open that. So, out-of-band communications can be used in a variety of ways to really thwart the efforts of what cyber criminals are trying to do. So, that's it. I hope you found something of value in all of this. And as always, if you have any questions, concerns on risk, ethics, cyber security, and whatnot, please don't hesitate to reach out to me anytime, and you do not need to be an absent short. My email address is mbass@alpsinsurance.com. Thanks for listening folks, have a good one. Bye-bye.  

TechtalkRadio
Episode 269 - A Flock of Ducks

TechtalkRadio

Play Episode Listen Later Jun 6, 2020 52:31


In this Weeks TechtalkRadio Show, The guys are hoping everything getting back to normal soon. Shawn has been dealing with an abundance of Zoom Meetings and Calls. Justin talks about his Son loving to break into the middles of those sessions. Shawn talks about coordinating a Zoom Meeting with ESPN talks about remembering all the fine details. The guys share some tips still for those that should be using Zoom which doesn't require you to have a camera, it can be voice only. The guys share how employers have been looking at Social Media platforms for hiring decisions and recommend users that don't want to have Social Media accounts still have one but maintain it as a Private Account but to often post public post to still show you aren't keeping everything private. Andy talks about his daughter needing an Old School Fax solution, while you can go and pay for a page at a Fax Center like a FedEx/Kinkos office but offers a reminder for EFax which can allow even faxing from your Smart Phone. A new documentary is in the works about the history of Attack of the Show and is being crowd funded. The guys talk about G4 Tech TV and some of the great shows and wonder why there isn't a Network dedicated to Tech. To help in the Crowd Funding check out @attackofthedoc on Twitter. The guys talk about Hacks that have been done on Tractors of all things. Why has this become something people have been looking for? Shawn talks about an update to the Black Magic Design ATEM Mini and what the Pro Version will offer end users. Will Shawn sell his ATEM Mini for the new updated Pro Version? Justin screws up the guys Google Feed, he drops a link to everybody in Chat and because it was an Ad, the Creepy Ad for Secret Labs keeps popping up. Justin talks about his RTX Graphics card which can now take out background noise utilizing RTX Voice. The guys talk about the Nintendo Switch and Animal Crossing and Justin has been playing it. It has been a driving factor in the absence of the Switch on the Store Shelves. Shawn talks about Final Fantasy and Doom titles which are also now available. Justin shares the game Star Citizen and brushing off his Saitek controller. He tells us a story of hitting the Wrong Button and Ejecting into Space. It can be found at https://www.robertsspaceindustries.com Shawn shares a story about iRacing and how it grew to popularity during lock down. Denny Hamlin was racing and posted a video of his reason for DNF, (Did Not Finish) when his daughter came into his office and turned off his monitors while he was racing. Facebook @techtalkers Twitter @TechtalkRadio Instagram techtalkradio Web: TechtalkRadio.Com

Mortgage101
What is the Debt to Income Ratio Qualifications for a Mortgage Home Loan?

Mortgage101

Play Episode Listen Later May 2, 2020 15:28


Buying or Refinancing a house you will need to qualify with income and debt, known as your debt to income ratio, what income comes in that can be verified versus what debt is going out. FHA, Conventional, VA, and USDA have different qualify debt ratios for the front in which is total monthly house expense and back end debt ratio which is monthly house expense along with monthly debt obligation such as but limited to credit card debt, student loans, auto loan, and other installment obligations Please call, text or email me with any questions, Nathan Rufty Mortgage Loan Originator CA Call or Text: 909-503-5600 AZ Call or Text: 623-850-1210 eFax: 888-837-2861 CA & AZ NMLS #292056 Nathan@NathanRufty.com www.NathanRufty.com Check Out Our Rates Privacy: This e-mail may contain information that is privileged or confidential. If you are not the intended recipient, please delete the e-mail and any attachments and notify the sender immediately, and do not use, copy, or disclose to anyone any of the contents hereof. State Licenses

The LI Law Podcast
Ep 46: Kenneth C. Henry, Jr., Esq. discusses foreclosures, short sales, and tips for buyers of residential and commercial properties.

The LI Law Podcast

Play Episode Listen Later Apr 29, 2020 17:46


Welcome to the LI Law Podcast.  We feature legal issues and developments which affect Long Island residents and business owners.  The podcast focuses on Long Island law topics and includes greater New York court and legislative happenings.  If you are one of the approximate 8 million residents of Long Island (Nassau, Suffolk, Queens, and Kings counties), or want to enjoy all law-related matters on Long Island, this podcast is for you! Our guest on this 46th episode is Kenneth C. Henry, Jr., Esq., an attorney with an office in Westbury and solo practitioner since 2004 who concentrates his practice in real estate, litigation, and estate administration. Ken graduated from Yale University with a Bachelor of Arts degree in Economics.  After working at Jefferies & Company in New York City, Kenhen attended Hofstra University School of Law k/n/a Maurice A. Deane School of Law, Hofstra Law, and graduated in 1993.  Ken is admitted to the Bars of New York and Connecticut, as well as the United States District Court, Southern District of New York, and Eastern District of New York. Kenneth C. Henry, Jr., Esq.'s contact information: KENNETH C. HENRY, JR., P.C. Attorney and Counselor at Law 900 Merchants Concourse, Suite 303, Westbury, New York 11590 ____ Tel (516) 227-2200 | EFax (866) 277-8938 | E-mail: ken@kenhenrylaw.com Thank you, Ken, and welcome to the podcast! Please contact us with your general questions or comments at LILawPodcast@gmail.com.    Zehava Schechter, Esq. specializes in estate planning, administration and litigation; real estate law; and contracts and business law. Her law practice is located on Long Island. No podcast is a substitute for competent legal advice.  Please consult with the attorney of your choice concerning specific legal questions you may have.  

PopHealth Week
Jeffrey Sullivan Chief Technology Officer @j2Global on @HITrust Certification

PopHealth Week

Play Episode Listen Later Dec 11, 2019 29:00


On PopHealth Week our special guest is Jeffrey Sullivan, Chief Technology Officer, Cloud Fax, J2 Global, Inc. The Cloud Fax business unit at J2 Global (NASDAQ: JCOM) is an industry leader in secure document exchange solutions featuring the eFax Corporate, Sfax, and MyFax product lines. Jeffrey is responsible for all technology and product development for the unit. He has over 25 years of experience growing small- to mid-sized companies that fuel their success with the innovative use of technology. He has an uncommon background that melds deep technical, creative, and business experience with the proven ability to execute at both the strategic and tactical levels. This breadth of background and flexibility of focus are vital to success in entrepreneurial and high-growth businesses. His past 15+ years have been spent as a C-level executive (CIO, COO, CTO) in fast-growth e-commerce SaaS and ERP companies in the real estate, financial services, and healthcare industries. Follow via @j2Global and @eFaxCorporate   ==##==    

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Latest Emotet News https://isc.sans.edu/forums/diary/A+recent+example+of+Emotet+malspam/25378/ SANS Ouch! Newsletter https://www.sans.org/security-awareness-training/resources/four-simple-steps-staying-secure XPdf and Foxit Updates https://www.foxitsoftware.com/support/security-bulletins.php https://forum.xpdfreader.com/viewtopic.php?f=3&t=41885 eFax Malspam https://www.heise.de/security/meldung/Achtung-Angebliches-eFax-birgt-Trojaner-4544386.html Office 365 Idle Timeout https://docs.microsoft.com/en-us/sharepoint/sign-out-inactive-users https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=&searchterms=55183

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Latest Emotet News https://isc.sans.edu/forums/diary/A+recent+example+of+Emotet+malspam/25378/ SANS Ouch! Newsletter https://www.sans.org/security-awareness-training/resources/four-simple-steps-staying-secure XPdf and Foxit Updates https://www.foxitsoftware.com/support/security-bulletins.php https://forum.xpdfreader.com/viewtopic.php?f=3&t=41885 eFax Malspam https://www.heise.de/security/meldung/Achtung-Angebliches-eFax-birgt-Trojaner-4544386.html Office 365 Idle Timeout https://docs.microsoft.com/en-us/sharepoint/sign-out-inactive-users https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=&searchterms=55183

Kurz informiert – die IT-News des Tages von heise online
Breitband, Netzneutralität, eFax-Trojaner, HateAid | Kurz informiert vom 02.10.2019

Kurz informiert – die IT-News des Tages von heise online

Play Episode Listen Later Oct 2, 2019


Mehr regionales Wachstum dank Breitband-Internet US-Berufungsgerichtsurteil zur Netzneutralität Angebliches eFax birgt Trojaner Künast geht gegen Gerichtsbeschluss zu Beschimpfungen im Netz vor Die Einführung von Breitband-Internetangeboten hat messbare Auswirkungen auf die lokale Wirtschaft. Eine aktuelle Analyse des Leibniz-Zentrums für Europäische Wirtschaftsforschung in Mannheim kommt zum Schluss: Steigt die Verfügbarkeit des Breitband-Internets um einen Prozentpunkt an, steigt die regionale Wirtschaftsleistung um 0,04 bis 0,09 Prozent. Die Vorteile der Wirtschaft überwiegen gegenüber den Kosten für Förderprogramme, schließen die Autoren. Die US-Regulierungsbehörde FCC muss sich erneut mit der Netzneutralität und den Auswirkungen ihrer Abschaffung befassen. Und die Behörde darf US-Staaten und Kommunen nicht generell untersagen, eigene Vorschriften für Netzneutralität zu erlassen, solange die FCC es nicht tut. Das hat ein US-Bundesberufungsgericht entschieden. Grundsätzlich lässt das Gericht die Aufhebung der Netzneutralität bestehen. Allerdings hebt es jenen Teil auf, mit dem die FCC Staaten und Kommunen daran hindern wollte, eigene Netzneutralitätsregeln aufzustellen. Mehrere heise-Security-Leser berichten von E-Mails, die sie über ein angebliches eFax informieren. Wer auf diese Trojaner-Mail reinfällt, fängt sich einen Erpressungs-Trojaner ein. Bei der angeblichen eFax-Mail kommt der Erpressungs-Trojaner Buran zum Einsatz. Der wurde bisher vor allem über Drive-By-Downloads auf speziell präparierten Websites verteilt und verschlüsselt Daten, die er dann erst nach Zahlung eines Lösegelds wieder freigibt. Bei eFax handelt es sich eigentlich um einen legitimen Dienst, dessen Logo hier missbraucht wird. Die Grünen-Bundestagsabgeordnete Renate Künast will gegen eine Entscheidung des Berliner Landgerichts zu Beschimpfungen auf Facebook gegen sie vorgehen. Unterstützt wird sie bei ihrer Beschwerde von der Initiative HateAid, die Opfern von Hasskommentaren im Internet hilft. "Zudem hatte Renate Künast zusammen mit anderen Frauen einen Aufruf initiiert, der sich gegen digitale Gewalt und Hassrede im Netz wendet. Vor allem Frauen seien derzeit Zielscheibe derartiger Hetze und sexualisierter Verbalausfälle, heißt es auf frauengegendigitalegewalt.de. Diese und weitere aktuelle Nachrichten finden Sie ausführlich auf heise.de Kurz informiert wird Ihnen präsentiert vom IT-Job Summit am 11. und 12. Oktober im MVG Museum München. Hier präsentieren sich 40 Arbeitgeber mit Jobs und Entwicklungsmöglichkeiten für IT-Fachkräfte. Infos und Registrierung auf www.it-job-summit.de/.

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More

Host Jim Tate's guest is John Nebergall the Senior Vice President and General Manager of eFax, a division of J2 Global. He has a deep background in healthcare technology and deployment and is one of the leaders in real world interoperability of healthcare data. Want to stream our station live? Visit www.HealthcareNOWRadio.com. Find all of our show podcasts on your favorite podcast channel and of course on Apple Podcasts in your iTunes store or here: https://podcasts.apple.com/us/podcast/healthcarenow-radio/id1301407966?mt=2

InfoSec Overnights - Daily Security News
GE Aviation leak, eFax faker, kick in the Asteroth, and more.

InfoSec Overnights - Daily Security News

Play Episode Listen Later Jul 9, 2019 2:46


A daily look at the relevant information security news from overnight.Episode 104 - 09 July 2019GE Aviation leak - https://threatpost.com/ge-aviation-passwords-jenkins-server/146302/eFax faker - https://www.bleepingcomputer.com/news/security/dridex-banking-trojan-rms-rat-dropped-via-fake-efax-messages/Back-door Ruby - https://www.zdnet.com/article/backdoor-found-in-ruby-library-for-checking-for-strong-passwords/Korean bot maker - https://threatpost.com/gobotkr-pirate-torrents-ddos-botnet/146285/Kick in the Asteroth - https://www.theregister.co.uk/2019/07/08/microsoft_astaroth_examination/

TecnoCasters
Como Crear tu Oficina Movil - Breve TecnoCasters - Ferriz

TecnoCasters

Play Episode Listen Later Apr 15, 2015 3:10


¿Como Crear tu Oficina Móvil? - Breve TecnoCasters - Ferriz Con: Juan D. Guevara Torres

The Cash-Based Practice Podcast
CBP 017: Determining if your Cash Practice is a HIPAA Covered Entity and How HIPAA may Open the Door to Cash Paying Medicare Beneficiaries

The Cash-Based Practice Podcast

Play Episode Listen Later Oct 16, 2014 73:26


Click here to download this episode This episode is an interview of Nancy Beckley of Nancy Beckley and Associates, a rehab compliance consulting firm. We get into the nitty-gritty of HIPAA (and also Medicare) as it relates to a cash-based practice. She fields my questions for over an hour and absolutely fills us with the info we need to protect ourselves and our practices. In this episode, you'll learn about: What exactly is HIPAA and why does it exist How to determine if your practice is a “Covered Entity” and must comply with all the laws and regulations of HIPAA If you are a covered entity, and what to use an eFax, some important considerations for finding the right HIPAA-compliant system. HIPAA-compliant texting software, and when something like this is necessary if you are texting/emailing about patients with other providers. The HIPAA Omnibus changes and how they may have opened the door (in some scenarios) to provide covered services to a Medicare Beneficiary on a cash-pay basis. The Jimmo vs Sebelius case on “Medical Necessity” and how it affects our ability to see Medicare Beneficiaries on a cash-pay basis for certain types of services. Resources and Links mentioned in this episode: Aaron Lebauer's Guest post at this site on HIPAA and determining your  Practice's Covered Entity Status The HHS Flow Charts and Info Sheet for Determining your Covered Entity Status Attorney (and PT) Specializing in HIPAA: Paul Welk Esq., PT PT specializing in HIPAA Policies and Procedures: Angie Phillips, PT S-Fax My article on the HIPAA law changes and seeing Medicare Beneficiaries on a Cash-Pay Basis. Connect with Nancy at her website: www.nancybeckley.com and at Twitter: @NancyBeckley Click Here to learn how to start your own Cash-Based Practice . Let us know if you enjoyed the show: [Click to Tweet] Thank you @NancyBeckley for being an awesome guest on the Cash-Based Practice Podcast w/ @DrJarodCarter Some parting notes: Definitely have a look at the HHS Info Sheet. As I re-listened to this podcast and reviewed that info sheet, I came across a few things that I wanted to point out or re-highlight: Determining if your practice is a HIPAA Covered Entity comes down to whether or not you transmit any “covered transactions” “in electronic form” “covered transactions” are defined in detail on pages 7 – 9 at the above info sheet. Take a very careful look at all the different things that could be considered covered transactions. It does NOT ONLY include transactions/transmissions of payment/billing-related information. Although I don't directly bill any third-party payers for my services, there are still “covered transactions” that I do occasionally transmit. I therefore have to make sure that I only transmit such things in non-electric format. “In Electric Form” is defined on page 9 of the above info sheet. Essentially, Fax is NOT considered “electronic format” so I, and practices like mine that want to avoid being a “covered entity,” need to make sure that the sending of any information is only done by fax. I'm guessing many of you may have questions for Nancy. Please type them in the comments below, and make sure to give as much detail as possible on all factors and components surrounding your question so she has the best possibility to give a clear answer.

ProdPod, a Productivity Podcast
ProdPod: Episode 26 -- Technology and Simplicity

ProdPod, a Productivity Podcast

Play Episode Listen Later Dec 6, 2011 2:00


For those of you who suffer from carrying too much with you on a regular basis, or feeling the clutter of technology accumulate on your desk or around the house over time, think about these three questions to see if you can simplify your technology infrastructure.1- How often do you use each of the devices you own? Like with your wardrobe, if you haven't worn it this year, it's likely you won't use it next year. 2- Can you consolidate functionality? If you've had a printer, scanner and fax machine sitting around your office or home office for several years, now might be the time to think about consolidating to a wireless, network multi-function printer/scanner/copier and getting a service such as MyFax or eFax that allows you to send/receive faxes by email. This will reduce the devices, clutter and gives you more telecommunications options.3- Are there new Cloud-based technologies that help you become more device-independent? For example, if you carry a smartphone and an MP3 player, you may want to try out Google Music (the new Web-based music player hosts up to 20,000 of your songs for free so you can access them anywhere) by going to music.google.com and phasing out the extra device. The beauty of living in an age of advanced technology is that you can also streamline, so why not take advantage!  I HOPE YOU ENJOYED THIS EPISODE OF PRODPOD. THIS IS RAY SIDNEY-SMITH AND THANKS FOR LISTENING! HERE'S TO YOUR PRODUCTIVITY SUCCESS...IN TWO MINUTES OR LESS.  

Your Home -Your Money Mortgage Radio

Please go here on Monday, March 19th, as Bill and I host our one-hour of this this important Talk-a-Thon between 8 and 9 AM (CDT) on Monday. Thanks. 24-Hour Talkcast for Microlending and www.kiva.org - Sunday March 18th Hello Art, A 24-hour live interactive podcast charity event for Kiva (http://www.kiva.org) is being held starting Sunday, March 18th at noon on TalkShoe (http://www.talkshoe.com). The event will raise awareness and money for Kiva, web-based microfinancing organization which enables individuals to lend money to people in developing countries for starting small businesses. Below is more detailed information about the event and Kiva. Please help us spread the word. Find more information at http://www.Talkathon.org. Thanks. Dave Nelsen Founder and CEO 724.935.TALK (office) 412.779.2788 (mobile) 413.677.9117 (eFax) daven@talkshoe.com Live Interactive Podcasting! TalkShoe 12300 Perry Highway, Suite 306 Wexford, PA 15090 PODCASTERS TO HOST 24 HOUR LIVE PODCAST TO BENEFIT KIVA, A WEB-BASED MICROFINANCING CHARITY Talk-a-thon to Begin at Noon on March 18th, 2007 Podcasters will unite to raise money and awareness for Kiva.org, (www.kiva.org) a web-based microfinancing charity that enables individuals to lend money to people in developing countries for starting small businesses. "Microlending is a way for those of us who have benefited from the Internet and the prosperity of the Western world to give something back," commented Dave Nelsen , CEO of TalkShoe. The 24 hour Talk-a-thon will start at noon (US Eastern Time) on Sunday March 18th 2007 on TalkShoe (www.talkshoe.com). Anyone and everyone can join in the live interactive podcast to listen, talk and text-chat. During the Talk-a-thon (www.talkathon.org) podcast hosts will raise awareness about Kiva and microlending, and ask listeners who are so inclined to contribute money to a dedicated PayPal account. TalkShoe will administer lending of this money to developing nations' entrepreneurs thru Kiva, a website that has been implemented as an efficient and effective microlending program. 100% of the funds raised, including $500 contributed by Dave Nelsen of TalkShoe, will be perpetually reinvested thru Kiva. Periodic progress reports will be given on TalkShoe’s blog. "We feel that those of us who get so much information, entertainment and community from the Internet should also explore its use to make the world a better place for all its peoples", says Randolph Resnick, who had the idea during a live TalkShoe podcast about aging and retirement. Kiva has receive accolades throughout the world from organizations including NPR, the New York Times, the BBC, PBS, ABC News, Business Week, the Wall Street Journal, CNN, The Village Voice, and the general blogosphere. The following quotes are from the Kiva website. Vinod Khosla, founding CEO of Sun Microsystems and a partner at the venture capital firm Kleiner Perkins, has called microlending "one of the most important economic phenomena since the advent of capitalism and Adam Smith." The New York Times, in its article Web-Based Microfinancing, December 10, 2006 said, “At Kiva.org, a schoolteacher in Kansas can partner with an expert seamstress in countries like Kenya, Mexico and Ecuador to jump-start a tailor shop.” “Friends and neighbors have been lending one another money forever, but as the Web makes virtual neighbors of strangers, Kiva, which is Swahili for ‘agreement’ or ‘unity,’ is harnessing the power of social networking to support micro-enterprise in the developing world,” said Business Week in A Little Money Goes a Long Way, July 31, 2006. Kiva is “…revolutionizing how donors and lenders in the US are connecting with small entrepreneurs in developing countries,” commented BBC News, March 1, 2006. About Kiva (from Kiva’s website) Kiva lets you connect with and loan money to unique small businesses in the developing world. By choosing a business on Kiva.org, you can "sponsor a business" and help the world's working poor make great strides towards economic independence. Throughout the course of the loan (usually 6-12 months), you can receive email journal updates from the business you've sponsored. As loans are repaid, you get your loan money back. Kiva partners with existing microfinance institutions. In doing so, we gain access to outstanding entrepreneurs from impoverished communities world-wide. Our partners are experts in choosing qualified borrowers. That said, they are usually short on funds. Through Kiva.org, our partners upload their borrower profiles directly to the site so you can lend to them. To unsubscribe click here. -- Listen to "Your Home-Your Money Mortgage Talk Radio" about the things that matter "second most" in your life. www.YourHome-YourMoney.com Saturday mornings at 9 on Madison 1670 - the Pulse. Co-hosted by Bill Quigley and Art Blanchet, The Mortgage Experts. Have you heard our Internet Radio Show? Check it out at http://www.talkshoe.com/talkshoe/web/talkCast.jsp?masterId=1009