In real estate, the highest-cost attacks aren’t exotic exploits — they’re identity fraud, phishing, and wire redirection. That’s why our security program is built around the threats that actually impact sellers, with layered controls, verification-first workflows, and continuous improvement.
What this page is: a transparent view of how we reduce risk, protect information, and help sellers stay safe.
What it isn’t: a consumer “security platform” with live threat dashboards or account monitoring.
We keep this page educational and policy-driven by design — because publishing operational specifics can increase attack surface.
This page complements our Privacy Policy and Terms of Use. No system is 100% immune to risk, but we design for resilience and continuous improvement.
We prioritize defenses against the threats that cause real damage in this space: impersonation, phishing, deed fraud signals, and payment diversion. We also build for reliability — access control, auditability, and operational resiliency.
We don’t do security theatre. We define scope, publish principles, and build defenses that match the threats that matter most in real estate.
In many industries, “security pages” are generic legal text. In real estate, that’s not enough — because fraud happens in human workflows: emails, documents, signatures, and payment instructions.
A security center at a company like Google or Microsoft can include live service status dashboards, active account alerts, and published security research — built for global consumer platforms with millions of authenticated accounts.
Bottom line: we aim to be world-class for the threats that matter in this industry, and honest about what we do and do not provide.
We commit to operating by these principles:
This page provides security information and educational tools. It does not create a guarantee that unauthorized access will never occur. No online service can eliminate all risk. Our goal is to reduce the likelihood and impact of incidents through layered safeguards and continuous improvement.
A defense-in-depth approach: layered controls that reduce the chance of an incident and reduce impact if something slips through. For safety, we do not publish detailed configurations.
We restrict internal access to sensitive data based on job function (least privilege) and review access as roles change.
We minimize the data we collect, store it only as long as needed for legitimate purposes, and apply safeguards throughout the lifecycle.
We use secure transport protections (encryption in transit) and apply secure configuration practices to reduce attack surface. We continuously improve based on internal reviews, vendor guidance, and emerging threats.
We intentionally avoid listing vendor-specific implementations, headers, or configurations on this page.
Real estate attracts fraud. We focus on identity verification, document integrity, and payment safety — and we teach sellers the “stop and verify” rule.
Fraudsters may pretend to be a company rep, title company, or buyer to redirect you or extract sensitive info.
One of the highest-risk scenarios is fraudulent instructions to redirect funds. Always validate payment instructions using a trusted channel.
We may use verification steps to confirm identity, ownership, and authorization — especially when fraud indicators are present. This can include matching information, requesting supporting documentation, and validating with third-party sources where appropriate.
We request only what’s needed to protect legitimate sellers and support compliant closings.
If something goes wrong, we act fast: triage, containment, remediation, and prevention of recurrence — with transparency consistent with law and obligations.
We quickly determine scope, impact, and severity to prioritize response.
We isolate the issue, revoke access if necessary, and prevent further exposure.
We fix root causes and strengthen controls to reduce recurrence.
If we determine a security incident materially affects personal information, we will notify impacted individuals consistent with applicable law and our obligations. We also use lessons learned to improve.
Interactive checklist + safety score. This runs locally in your browser (client-side) to help sellers follow safe practices.
These steps reduce the most common fraud risks. Toggle what you’ve verified and we’ll generate a personalized safety summary.
This Security Center is educational. It doesn’t replace advice from your title company, attorney, or financial institution.
Generated from your toggles above (local + client-side).
A realistic “what-if” tool. Flip common scenarios and watch how risk changes. Runs locally in your browser; nothing is sent anywhere.
If someone pressures you to act fast — especially around identity, documents, or payment instructions — pause. Verify using a trusted channel and a known number.
This models common risk factors. It’s not a guarantee — it’s a practical decision aid designed for real estate transactions.
Tip: use this simulator to train VAs and acquisitions reps on what “red flags” look like.
Summary + recommended next steps. If risk is elevated, the best move is to pause and verify.
If payment instructions change, do not proceed until you verify by calling the title company using a known number. Email alone is not verification.
If you think you’ve received a suspicious message, saw a fake profile, or believe your information may be at risk, report it promptly.
Please include (when safe): screenshots, sender info, URLs, phone numbers used, and a short description of what happened. Do not send sensitive account credentials or one-time codes.
Use official contact methods published on our main website. Avoid replying to suspicious messages directly.
Fast clarity on common questions.