{"id":218,"date":"2012-04-05T00:00:00","date_gmt":"2012-04-05T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/"},"modified":"2024-06-23T23:09:36","modified_gmt":"2024-06-23T23:09:36","slug":"cybersecurity-for-real-estate-agents","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/","title":{"rendered":"Cybersecurity for Real Estate Agents"},"content":{"rendered":"<p><em>by Jane Ginn<\/em><br \/>\nRecently I\u2019ve been delivering short training sessions for real estate agents on how to harden their computer defenses against online computer crime.\u00a0 Real estate agents and brokers are especially vulnerable at this time because they often operate as small business people, each maintaining their own websites, mailing lists, contact lists, and prospect and client databases. \u00a0Through these cyber activities they are especially vulnerable to malware (viruses, Trojans, spyware, worms) and phishing attacks.\u00a0 They are also vulnerable to various scams like the Mr. Ding Lin scam (a supposed real estate investor from China), the various <a title=\"Nigerian 419 scam\" href=\"http:\/\/www.419eater.com\/html\/419faq.htm\" target=\"_blank\" rel=\"noopener\">419 scams<\/a> (modeled after the infamous Nigerian person who needs someone offshore to handle a large sum of money) and various eBay and Craig\u2019s list scams that target real estate agents, buyers and sellers. According to Scambusters.org\u00a0auction fraud accounts for roughly 48% of online fraud reports to the Federal Trade Commission (FTC).<\/p>\n<p>Real estate agents are also very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online.\u00a0 For this reason I\u2019ve been giving a series of in-person training sessions.\u00a0 My intent is to provide them with enough up-to-date information on the magnitude of the problem, how various activities they engage in during the day can make them vulnerable, and how to employ \u201ccountermeasures\u201d to avoid being victimized.<\/p>\n<p>I use a basic model to break down the various online exploits into bite-sized pieces for non-technical adult learners.\u00a0 I walk the class through each of the exploits that can happen at any stage of their business process.\u00a0 In addition, I show how the networks themselves can be penetrated which, in turn, can make them vulnerable.<\/p>\n<p>Importantly, I explain how people who are unprotected by a virus protection program and a personal firewall can have pieces of computer code planted on their computer that will connect them to a remote server for distributed denial of service attacks and other Internet-wide malfeasance.\u00a0 I jokingly call myself an \u201c<em><strong>Botnet Terminator Evangelist<\/strong><\/em>\u201d because I\u2019m trying to spread the word far and wide at the source of the problem, the uninformed user.<\/p>\n<p>At the end of my training I provide a collection of resources for small business people to use to help them harden their own security and learn more about the various exploits that are wrecking havoc in business due to cyber crime.<\/p>\n<p>If your real estate group would like to schedule an in-person or web-based training session, please contact me at: rjg (at) ctin.us.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online.  For this reason I\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.  <\/p>\n","protected":false},"author":2,"featured_media":472,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[14,55],"tags":[56,58,61,63,67,69,70,71,72],"class_list":["post-218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-training","tag-419-scams","tag-auction-fraud","tag-buyers-and-sellers","tag-computer-crime","tag-cybersecurity","tag-federal-trade-commission","tag-ftc","tag-real-estate-agents","tag-real-estate-investor"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Cybersecurity for Real Estate Agents - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2012-04-05T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-23T23:09:36+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Cybersecurity for Real Estate Agents - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#blogposting\",\"name\":\"Cybersecurity for Real Estate Agents - CTIN\",\"headline\":\"Cybersecurity for Real Estate Agents\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2012\\\/04\\\/iStock_000010339529Small.jpg\",\"width\":693,\"height\":693},\"datePublished\":\"2012-04-05T00:00:00+00:00\",\"dateModified\":\"2024-06-23T23:09:36+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#webpage\"},\"articleSection\":\"Business, Training, 419 scams, auction fraud, buyers and sellers, computer crime, cybersecurity, federal trade commission, ftc, real estate agents, real estate investor\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/training\\\/#listItem\",\"name\":\"Training\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/training\\\/#listItem\",\"position\":4,\"name\":\"Training\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/training\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#listItem\",\"name\":\"Cybersecurity for Real Estate Agents\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#listItem\",\"position\":5,\"name\":\"Cybersecurity for Real Estate Agents\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/training\\\/#listItem\",\"name\":\"Training\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/\",\"name\":\"Cybersecurity for Real Estate Agents - CTIN\",\"description\":\"Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I\\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2012\\\/04\\\/iStock_000010339529Small.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#mainImage\",\"width\":693,\"height\":693},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/04\\\/05\\\/cybersecurity-for-real-estate-agents\\\/#mainImage\"},\"datePublished\":\"2012-04-05T00:00:00+00:00\",\"dateModified\":\"2024-06-23T23:09:36+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Cybersecurity for Real Estate Agents - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Cybersecurity for Real Estate Agents - CTIN","description":"Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#blogposting","name":"Cybersecurity for Real Estate Agents - CTIN","headline":"Cybersecurity for Real Estate Agents","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2012\/04\/iStock_000010339529Small.jpg","width":693,"height":693},"datePublished":"2012-04-05T00:00:00+00:00","dateModified":"2024-06-23T23:09:36+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#webpage"},"articleSection":"Business, Training, 419 scams, auction fraud, buyers and sellers, computer crime, cybersecurity, federal trade commission, ftc, real estate agents, real estate investor"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/training\/#listItem","name":"Training"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/training\/#listItem","position":4,"name":"Training","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/training\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#listItem","name":"Cybersecurity for Real Estate Agents"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#listItem","position":5,"name":"Cybersecurity for Real Estate Agents","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/training\/#listItem","name":"Training"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/","name":"Cybersecurity for Real Estate Agents - CTIN","description":"Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2012\/04\/iStock_000010339529Small.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#mainImage","width":693,"height":693},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/#mainImage"},"datePublished":"2012-04-05T00:00:00+00:00","dateModified":"2024-06-23T23:09:36+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Cybersecurity for Real Estate Agents - CTIN","og:description":"Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2012-04-05T00:00:00+00:00","article:modified_time":"2024-06-23T23:09:36+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Cybersecurity for Real Estate Agents - CTIN","twitter:description":"Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I\u2019ve been giving a series of in-person training sessions to walk them through how to harden their computer and network security.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"218","title":null,"description":null,"keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:35:46","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2021-08-07 21:52:25","updated":"2025-08-25 22:35:46"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/training\/\" title=\"Training\">Training<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tCybersecurity for Real Estate Agents\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Training","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/training\/"},{"label":"Cybersecurity for Real Estate Agents","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/04\/05\/cybersecurity-for-real-estate-agents\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/218\/revisions"}],"predecessor-version":[{"id":4444,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/218\/revisions\/4444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/472"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}