Flyers, Handouts and Video

To help keep you, your company and your customers safe, TLTA has created the following handouts on cyber fraud prevention. Please share them with the following audiences:

Title Industry Professionals
Real Estate Professionals


ALTA has created a helpful video titled "Protect Your Money from Wire Fraud Schemes When Buying a Home" that you can share with your customers and industry partners.

On-Demand TLTA Webinars

Cyber Crime Prevention Update – Scams, Schemes and Your Security (Recorded Dec. 6, 2017)
Cyber Crime Attacks: How To Prevent and Recover
False Sense of Cyber Security

Already Victimized?

The CFPB has provided the following instructions on what to do if you are the victim of wire fraud:
  • Contact your bank or the money transfer company immediately upon discovering that funds have been transferred to the wrong account. Ask the bank or money transfer company to attempt a wire recall.
  • Contact your local FBI and state Attorney General office.
  • File a complaint, regardless of the dollar amount, with the FBI’s Internet Crime Complaint Center at Part of the mission of ic3 is to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity. Information is analyzed and used for investigative and intelligence law enforcement purposes and for public awareness.
  • Report the phishing scam to the FTC.
The U.S. Department of Justice has a page on reporting computer hacking, fraud and other internet-related crime, which has additional resources on reporting computer hacking, password trafficking, Internet fraud and harassment and more.
This information is being provided by TLTA for reference purposes only and is not intended to represent a standard best practice or the only approach to any particular issue. This information should not be construed as legal or business advice from or on behalf of TLTA. Users should consult their own legal counsel if necessary to ensure that any policies adopted or actions taken meet the unique security requirements of their company.