<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://community.pexa.com.au/t5/Security/ct-p/Security</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Tue, 23 Feb 2021 12:07:43 GMT</pubDate>
    <dc:creator>Security</dc:creator>
    <dc:date>2021-02-23T12:07:43Z</dc:date>
    <item>
      <title>Security Alert - Phishing Messages via PEXA Community</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Alert-Phishing-Messages-via-PEXA-Community/m-p/22049#M73</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In recent days, you may have seen spam messages posted on our Community forum. These have since been removed and the user accounts subsequently banned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, we have been advised that some members have received private messages containing spam content. An example that has been reported is a member receiving a message with an offer to make money via cryptocurrency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, if you receive a communication you believe to be suspicious, please:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the message/email&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or email PEXA’s security team at &lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you have any questions, please reach out to us.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;David Willett&lt;/P&gt;
&lt;P&gt;PEXA General Manager for Information Security&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2021 02:22:05 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Alert-Phishing-Messages-via-PEXA-Community/m-p/22049#M73</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2021-02-22T02:22:05Z</dc:date>
    </item>
    <item>
      <title>Security Alert  | WeTransfer Email Phishing</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Alert-WeTransfer-Email-Phishing/m-p/21961#M71</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA would like to advise that a previously identified scam, involving fraudulent&amp;nbsp;&lt;STRONG&gt;WeTransfer&amp;nbsp;&lt;/STRONG&gt;emails, has resurfaced in the market.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In these cases, emails are sent to a practitioner, purporting to be from PEXA via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WeTransfer&lt;/STRONG&gt;, asking the recipient to open/download files.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Malicious emails being sent via WeTransfer is an&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.auscert.org.au/blog/2018-06-20-malicious-emails-wetransfer#:~:text=This%20means%20that%20WeTransfer%20is,strength%20of%20their%20own%20brand.&amp;amp;text=Fill%20out%20a%20form%20and,be%20used%20to%20send%20spam" target="_blank" rel="nofollow noopener noreferrer"&gt;ongoing cyber-threat&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;affecting Australian organisations.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Please note PEXA does not use WeTransfer for any email correspondence or service&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you receive an email appearing to be sent from PEXA via WeTransfer, do not click any links and delete immediately.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, if you receive a similar phishing email or another communication you believe to be suspicious, please:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the e-mail&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or e-mail PEXA’s security team at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank" rel="nofollow noopener noreferrer"&gt;security@pexa.com.au&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA will never send you an email advising you to click a link to access the PEXA Exchange, and will always direct you to login to access your account via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Alert-WeTransfer-Email-Phishing/m-p/pexa.com.au" target="_blank" rel="nofollow noopener noreferrer"&gt;pexa.com.au&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about phishing e-mails&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.pexa.com.au/security/how-to-protect-your-business#identify-spam-and-phishing" target="_blank" rel="nofollow noopener noreferrer"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 01:50:57 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Alert-WeTransfer-Email-Phishing/m-p/21961#M71</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2021-02-10T01:50:57Z</dc:date>
    </item>
    <item>
      <title>Security alert | Scam calls being made to members</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Scam-calls-being-made-to-members/m-p/21906#M59</link>
      <description>&lt;P&gt;&lt;SPAN&gt;PEXA would like to advise it has identified multiple instances of scam phone calls targeting members at this time.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In the reported cases, callers using international phone numbers have falsely presented themselves as being from PEXA or a survey company, seeking information on “PEXA from a user’s perspective”.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There is no such survey being conducted by PEXA or a third party with members and we will never contact you from international phone numbers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As always, it’s vital to be certain that the communication you have received is from a legitimate source and if suspicious, please exercise caution.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;What PEXA will never do&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We’d like to remind you that PEXA&lt;STRONG&gt; will never:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Call&lt;/STRONG&gt; you from unverified phone numbers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ask&lt;/STRONG&gt; for your multi-factor authentication code.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reques&lt;/STRONG&gt;t files or information from you via a third-party service.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Email&lt;/STRONG&gt; you from unofficial addresses (emails that don’t end in @pexa.com.au).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Send&lt;/STRONG&gt; you an email advising you to click a link to log in to the platform.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please reach out to us if you have any questions or would like any assistance: &lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 04:54:49 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Scam-calls-being-made-to-members/m-p/21906#M59</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2021-01-29T04:54:49Z</dc:date>
    </item>
    <item>
      <title>Phone and email scammers impersonating the Australian Cyber Security Centre (ACSC)</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Phone-and-email-scammers-impersonating-the-Australian-Cyber/m-p/21743#M58</link>
      <description>&lt;P&gt;Dear Members,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have been notified scammers are purporting to be from the Australian Cyber Security Centre (ACSC) are calling and emailing the Australian public attempting to trick them into installing malicious software on your computer devices. ACSC is attached to the Australian Government Cyber Security Division.&lt;/P&gt;
&lt;P&gt;ACSC does not approach the Australian public for such activities hence any calls, emails, or text messages pretending to be coming from ACSC requesting to click on links should not be actioned. The recommendation is to delete them immediately and notify ACSC on&amp;nbsp; 1300 292 371 (1330 CYBER)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More on this can be found out on the ACSC website or through the URL below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cyber.gov.au/acsc/view-all-content/alerts/phone-and-email-scammers-impersonating-acsc" target="_blank"&gt;https://www.cyber.gov.au/acsc/view-all-content/alerts/phone-and-email-scammers-impersonating-acsc&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always verify the source before actioning on any information received via digital channels to make sure you are getting it from a verified reputed entity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA Security Team.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 00:36:02 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Phone-and-email-scammers-impersonating-the-Australian-Cyber/m-p/21743#M58</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2021-01-07T00:36:02Z</dc:date>
    </item>
    <item>
      <title>Stay safe during the holiday period with our best-practice guide</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Stay-safe-during-the-holiday-period-with-our-best-practice-guide/m-p/21679#M70</link>
      <description>&lt;P&gt;Cyber-security is a key priority at PEXA. In support of our members and the broader property industry, we continue to invest heavily in our infrastructure and educational resources.&lt;BR /&gt;&lt;BR /&gt;As we approach the busy end of year period, with a heightened volume of transactions to finalise, it's more important than ever to remain vigilant.&lt;BR /&gt;&lt;BR /&gt;Keeping settlements safe is a collaborative effort and our expert team is committed to supporting the network.&lt;BR /&gt;&lt;BR /&gt;In line with this, we're pleased to share our Security 101 resource with you.&lt;BR /&gt;&lt;BR /&gt;This contains an overview of the current industry security climate, how to navigate phishing scams, common scenarios identified by the community and general tips and tricks.&lt;BR /&gt;&lt;BR /&gt;Download this resource via the attachment below or view here:&amp;nbsp;&lt;A href="https://www.pexa.com.au/images/uploads/page_parts/Pdfs/PEXA_Security_update_December_2020.pdf" target="_blank"&gt;https://www.pexa.com.au/images/uploads/page_parts/Pdfs/PEXA_Security_update_December_2020.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As ever, please reach out to your PEXA representative or our friendly Security team if you require further assistance.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 03:11:29 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Stay-safe-during-the-holiday-period-with-our-best-practice-guide/m-p/21679#M70</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2020-12-17T03:11:29Z</dc:date>
    </item>
    <item>
      <title>Security alert | Automated or "robo" calls to clients</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-alert-Automated-or-quot-robo-quot-calls-to-clients/m-p/21443#M68</link>
      <description>&lt;P&gt;&lt;SPAN&gt;PEXA would like to advise members that it has identified phishing attacks directly targeting buyers and sellers.&lt;/SPAN&gt;&lt;SPAN&gt;In these instances, automated or “robo” calls are being made to consumers, with the aim of extracting information relating to settlement. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In some cases, these parties are falsely presenting as PEXA.&lt;/SPAN&gt;&lt;SPAN&gt;Scammers can often obtain client information through publicly available sources or&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;intercepted/compromised email accounts.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PEXA will never contact your clients directly – and we recommend you reinforce this message at this time.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We suggest that members take steps to ensure communication with your clients is secure. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We encourage you to make use of PEXA Key for the exchange of account details.&lt;/SPAN&gt;&lt;SPAN&gt;Additionally, please refrain from using email to distribute sensitive information.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please reach out to us if you have any questions or would like any assistance:&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link" href="mailto:security@pexa.com.au" target="_blank" rel="noopener noreferrer" data-stringify-link="mailto:security@pexa.com.au" data-sk="tooltip_parent"&gt;security@pexa.com.au&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;LI-USER uid="5851"&gt;&lt;/LI-USER&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 05:47:10 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-alert-Automated-or-quot-robo-quot-calls-to-clients/m-p/21443#M68</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2020-11-06T05:47:10Z</dc:date>
    </item>
    <item>
      <title>Data and data breaches | What you need to know</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Data-and-data-breaches-What-you-need-to-know/m-p/21270#M67</link>
      <description>&lt;P&gt;A data breach is a security incident in which information, such as usernames, email addresses and passwords, is accessed by unauthorised parties.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The &lt;A href="https://thenewdaily.com.au/life/tech/2019/07/23/cost-data-breach-australia/" target="_blank"&gt;average cost of a data breach&lt;/A&gt; to an Australian business is estimated at $3 million, as of 2018-19, per research sponsored by IBM Security and conducted by the Ponemon Institute.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Australia’s leading agency on national cyber security, the Australian Cyber Security Centre (ACSC), says credentials (usernames and passwords) are typically stolen when:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A user is tricked into entering their credentials into a page that mimics the legitimate site&lt;/LI&gt;
&lt;LI&gt;A brute-force (automated trial-and-error) attack on username and password combinations is performed against a service, if it doesn’t prevent such activity&lt;/LI&gt;
&lt;LI&gt;A service is compromised, and credentials are stolen and used to access the system or tested against other sites such as social media and email&lt;/LI&gt;
&lt;LI&gt;A user’s system is compromised by malware designed to steal credentials&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Steps to take&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It’s important to remain vigilant of potential threats to your data, namely email phishing attempts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, we recommend you conduct routine maintenance of your credentials. This includes:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Keeping your passwords and pin codes safe – use a password manager e.g. &lt;A href="https://www.lastpass.com/?ds_rl=1278224&amp;amp;ds_rl=1278224&amp;amp;gclid=Cj0KCQjwmdzzBRC7ARIsANdqRRmPaLwXEuCd4fRRBTR6vhzNEdBUMl7RgF3ZPQpiq4DauoyyDyqaMb8aAsj3EALw_wcB" target="_blank"&gt;LastPass&lt;/A&gt; and &lt;A href="https://1password.com/" target="_blank"&gt;1Password&lt;/A&gt; to ensure you have unique passwords for all your different accounts. This ensures that if one of your accounts is compromised, the others are protected, and the impact is minimised.&lt;/LI&gt;
&lt;LI&gt;Periodically changing your passwords.&lt;/LI&gt;
&lt;LI&gt;Checking the security and privacy settings of all your essential services and make sure they have 2FA/MFA available. This provides an additional layer of security when accessing accounts.&lt;/LI&gt;
&lt;LI&gt;Being aware of the ongoing scams so you know when something is not right (Scam Watch has a great list of ongoing scams in Australia and regularly updated).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;How to check your data&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://haveibeenpwned.com/" target="_blank"&gt;https://haveibeenpwned.com/&lt;/A&gt; is an excellent free resource which enables you to check if you have an email account that has been compromised in a data breach of an external party.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The tool will provide background on the details of any previous incident implicating your details. If a case is identified, considering reviewing your various login credentials and updating where possible&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, if you have any questions, please reach out to myself or one of the PEXA Security team. Additionally, you can now subscribe to updates from PEXA Security. Visit &lt;A href="https://community.pexa.com.au/t5/Security/ct-p/Security" target="_blank"&gt;https://community.pexa.com.au/t5/Security/ct-p/Security&lt;/A&gt; and click the options button in the top right corner.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 01:41:54 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Data-and-data-breaches-What-you-need-to-know/m-p/21270#M67</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2020-10-13T01:41:54Z</dc:date>
    </item>
    <item>
      <title>Security webinar | recording and FAQs</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-webinar-recording-and-FAQs/m-p/21215#M66</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you to everyone who attended our security webinar on Wednesday.&lt;/P&gt;
&lt;P&gt;For those who couldn’t attend or would like to re-watch the webinar, you can view the recording below.&lt;/P&gt;
&lt;P&gt;We received a lot of fantastic questions on the day, and unfortunately couldn’t answer all of them before the end of the webinar. Instead, we’ve posted the questions and answers below - underneath the webinar recording.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Attached, you’ll also find some additional resources provided by our fantastic panellist, Laura Hartley, Head of Public/Private Partnerships, Enterprise Security, NAB:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Top tips for business customers; and&lt;/LI&gt;
&lt;LI&gt;NAB security toolkit.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/ryan-janosevic/" target="_blank" rel="noopener"&gt;Ryan Janosevic&lt;/A&gt;, COO &amp;amp; Co-founder of RetrospectLabs, has also shared this &lt;A href="https://www.linkedin.com/posts/cynchsec_cyberfitness-smallbusiness-passwords-activity-6719713022316818433-bFym/" target="_blank" rel="noopener"&gt;interesting read&lt;/A&gt; about password complexity after some great questions from attendees about password protection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any further questions, please don’t hesitate to ask PEXA’s security team here or contact us at &lt;A href="mailto:security@pexa.com.au" target="_blank" rel="noopener"&gt;security@pexa.com.au&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;And don’t forget the &lt;A href="https://community.pexa.com.au/t5/Raise-a-Security-Concern/Five-things-PEXA-will-never-do-Cyber-security/m-p/21177" target="_blank" rel="noopener"&gt;five things PEXA will never do&lt;/A&gt;, regarding you and your security:&lt;/P&gt;
&lt;P&gt;PEXA will never:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Call &lt;/STRONG&gt;you from unverified phone numbers&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Ask&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; for your MFA code&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Request &lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;files or information from you via a third-party service&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Email&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; you from unofficial addresses&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Send&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; you an email advising you to click a link to log in to the platform&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Do you have a security question? Ask the experts&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-VIDEO vid="https://www.youtube.com/watch?v=DEVGlSwsJ3o&amp;amp;t=12s" align="center" size="large" width="600" height="338" uploading="false" thumbnail="https://i.ytimg.com/vi/DEVGlSwsJ3o/hqdefault.jpg" external="url"&gt;&lt;/LI-VIDEO&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Q&amp;amp;A&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How safe are pin passwords?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;PINs (Personal Identification Numbers) usually consist of a series of randomly generated numbers, via an app or sent via SMS. They are very secure and commonly used as a second factor of authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Is Google password saver secure?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We always recommend using a reputable password manager when selecting a service. Remember to read the terms and conditions to make sure it meets your requirements before making your decision.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Is PEXA looking at extending its residential settlement guarantee (PRSG) to cover the same risk that is associated with commercial property transactions as well?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The PRSG does not apply where the seller is a commercial vendor, such as a developer. The reason for this is that a commercial vendor would not be made homeless as a result of a fraud which the PRSG is intended to cover. For more information, visit our &lt;A href="https://community.pexa.com.au/t5/Announcements-Outages-Service/PEXA-Residential-Seller-Guarantee-FAQs/ba-p/11400" target="_blank" rel="noopener"&gt;PRSG FAQs&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;When we send a form to a client to complete via email, the client completes and sends it back, can we trust that information?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Email phishing or business email compromise (BEC) is one of the most common ways for cybercriminals to procure sensitive information.&lt;/P&gt;
&lt;P&gt;Where possible, don’t use email and avoid this channel for the exchange of sensitive material. Instead, use apps like PEXA Key that is purposely built to protect the communication of bank and trust account information.&lt;/P&gt;
&lt;P&gt;If you have no other option than to communicate information via email, always validate the details verbally before taking any action.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;When you get "oops try again" when trying to log into PEXA, is it okay to press try again?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, it is.&amp;nbsp; Always check the URL after you refresh and make sure a &lt;A href="https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Shorts-Confirming-a-website-is-secure/m-p/20105" target="_blank" rel="noopener"&gt;green padlock&lt;/A&gt; sign is in place before inserting confidential information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can password managers be hacked and in that case are all passwords at risk?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Password managers are a great way of keeping all of your passwords safe. Make sure to use a reputable service which has robust security measures built into the application and read the terms and conditions before proceeding.&lt;/P&gt;
&lt;P&gt;There are no reports of data breaches attributed to well-known password managers in market.&lt;/P&gt;
&lt;P&gt;In Cybersecurity we often say that there are no 100% risk free applications. There is always a portion of unknown. The important thing is to make sure these risks are minimised by following the instructions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PEXA checklists require us to confirm a DocuSign ID and unique number. What are some concerns PEXA has regarding electronic signing such as DocuSign?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Digital signing should be approached with the same protective measures and rigour as physically applying your wet signature on paper documents. As with any method of signing, to mitigate risk, make sure to:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Verify the request, any information exchanged, the involved parties and documentation being signed; and&lt;/LI&gt;
&lt;LI&gt;Ensure the appropriate, authorised person signs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can you please advise why I keep getting asked if I want to update my password when I enter a payment in PEXA?&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This prompt occurs if you have selected to save your password on the web browser. We do not recommend saving passwords to browsers. Instead, remember your password or use a password manager, and only save your user ID if required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Are apps safer than websites?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;For both, it’s important to always validate the source. For a website, always type the address instead of clicking on links from emails and other websites.&lt;/P&gt;
&lt;P&gt;For apps, make sure to download them from the Google Play Store or Apple App Store. Check the ratings and the developer information before you download.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is the best "internet cyber security" firm?&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Cybersecurity needs are different from one firm to another. These needs and requirements must be assessed before selecting a provider.&amp;nbsp; The Australian Cyber Security Centre (ACSC) website has great recommendations for individuals and businesses to gain more information.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cyber.gov.au/acsc/small-and-medium-businesses" target="_blank" rel="noopener"&gt;https://www.cyber.gov.au/acsc/small-and-medium-businesses&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cyber.gov.au/acsc/individuals-and-families" target="_blank" rel="noopener"&gt;https://www.cyber.gov.au/acsc/individuals-and-families&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is the best anti-virus software on the market? &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The &lt;A href="https://www.pexa.com.au/images/uploads/page_parts/Pdfs/PEXA_Subscriber_Security_Policy_v4.pdf" target="_blank" rel="noopener"&gt;PEXA Subscriber Security Policy&lt;/A&gt;, section 4.2.3, refers to some leading providers of anti-virus software.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Does PEXA have a firewall integrated within its software to prevent cyber fraudsters gaining access?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;PEXA is protected with multiple layers of security. We maintain the highest standard of security measures to safeguard our members and their clients’ property transactions.&lt;/P&gt;
&lt;P&gt;Our security portfolio is aligned with international standards and we continue to operate by complying with the requirements set by the e-Conveyancing regulator, Australian Registrars National Electronic Conveyancing Council (ARNECC).&lt;/P&gt;
&lt;P&gt;Today, more than six million transactions, with a total value of more than $1 trillion, have safely been processed by PEXA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;When will Secure-messages and E-signable documents be able to be sent via PEXA-secure portal maybe even build into PEXA Key app?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We are always working with our members and industry to evolve our services. All enhancements will be communicated with our members before they are launched, and we’ll continue to keep you up-to-date with our security developments.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is your strategy for a zero-day vulnerability?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A &lt;A href="https://us.norton.com/internetsecurity-emerging-threats-how-do-zero-day-vulnerabilities-work-30sectech.html" target="_blank" rel="noopener"&gt;zero-day vulnerability&lt;/A&gt; refers to a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix it yet. PEXA works with the best cyber security organisations in the industry to mitigate this sort of a risk by taking proactive and advanced measurements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Does PEXA retain the information given by clients on PEXA KEY? &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, personal information is collected when clients use PEXA Key.&lt;/P&gt;
&lt;P&gt;PEXA will not disclose your client’s personal information to any third party without their express consent. To read the Terms and Conditions in full, &lt;A href="https://community.pexa.com.au/t5/Help-Centre/Introducing-PEXA-Key/ba-p/17263" target="_blank" rel="noopener"&gt;click here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can PEXA help small businesses to look at their computer system to see if they are fully equipped, at a small fee?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This type of service is currently not available through PEXA. However, the ACSC has some great resources to assist &lt;A href="https://www.cyber.gov.au/acsc/small-and-medium-businesses" target="_blank" rel="noopener"&gt;small-to-medium sized businesses&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Will you use blockchain technology for its immutable nature and security? What would be some of the disadvantages?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Blockchain is transformational, but not always the only solution. In Australia, we benefit from mature technology systems, with property transactions clearly supported by sound regulation. Therefore, blockchain may not necessarily create additional value.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How soon will you let your customers know if a security breach occurred?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;PEXA will promptly notify subscribers upon being made aware of any security breach that PEXA considers material to the security and integrity of the PEXA system or relates to unauthorised disclosure, use, access or loss of PEXA System Data.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 01:05:39 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-webinar-recording-and-FAQs/m-p/21215#M66</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2020-10-09T01:05:39Z</dc:date>
    </item>
    <item>
      <title>PEXA Security Awareness Week – webinar, daily tips and five things PEXA will never do</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/PEXA-Security-Awareness-Week-webinar-daily-tips-and-five-things/m-p/21181#M62</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At PEXA, safeguarding Australia’s property transactions is our highest priority. With cybercrime costing Australian businesses &lt;A href="https://www.greenlight-itc.com/cyber-crime-security-statistics-australia/" target="_blank" rel="noopener"&gt;$29 billion&lt;/A&gt; each year and email phishing &lt;A href="https://www.techrepublic.com/article/667-spike-in-email-phishing-attacks-due-to-coronavirus-fears/" target="_blank" rel="noopener"&gt;attempts&lt;/A&gt; increasing exponentially since the onset of COVID-19, we are dedicated to supporting our members however we can to combat this threat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Join our security webinar&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;On 7 October 2020 at 12pm AEDT, as part of PEXA’s Security Awareness Week, I’ll be hosting a security webinar with Security Advisory and Awareness Manager at NAB, &lt;A href="https://www.linkedin.com/in/laurahartley1/" target="_blank" rel="noopener"&gt;Laura Hartley&lt;/A&gt; and COO and Co-founder, Retrospect Labs, &lt;A href="https://www.linkedin.com/in/ryan-janosevic/" target="_blank" rel="noopener"&gt;Ryan Janosevic&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Together, we will share our insights into the cyber-security landscape, tips on how to protect your business and finally, answer your questions. &lt;STRONG&gt;&lt;A href="https://customer.pexa.com.au/2020.10.07_RSVPPage.html" target="_blank" rel="noopener"&gt;Click here to RSVP&lt;/A&gt;&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Our socials will also be live with daily security tips and, for everyone who can’t wait, our new resource ‘&lt;A href="https://community.pexa.com.au/t5/Raise-a-Security-Concern/Five-things-PEXA-will-never-do-Cyber-security/m-p/21177" target="_blank" rel="noopener"&gt;Five things PEXA won’t do&lt;/A&gt;” is now live.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See you at the webinar!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;David Willett&lt;/P&gt;
&lt;P&gt;PEXA, GM IT Security&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2020 02:57:48 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/PEXA-Security-Awareness-Week-webinar-daily-tips-and-five-things/m-p/21181#M62</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2020-10-02T02:57:48Z</dc:date>
    </item>
    <item>
      <title>Five things PEXA will never do | Cyber-security</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Five-things-PEXA-will-never-do-Cyber-security/m-p/21177#M61</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At PEXA, we endeavour to provide you with the latest cyber-security updates and guidance. PEXA’s Security team is home to industry experts with more than 50 years of combined experience, committed to the security of property transactions facilitated by our members.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generally, our advice is focused on what you should or shouldn’t do in certain scenarios, such as when encountering attempted email phishing, maintaining your technology and more.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But what about PEXA and what we do and don’t do? Cyber-criminals are using sophisticated means to target members and clients – sometimes falsely presenting as PEXA to extract information or facilitate malicious activity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To help you combat this threat, re five things PEXA will &lt;STRONG&gt;never do&lt;/STRONG&gt;, regarding you and your security.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;PEXA will never email you from unofficial addresses&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whether it’s a message from our Support Centre, a PEXA Direct Specialist/Partner or another member of our team, our official correspondence will only ever be delivered from email addresses ending in &lt;STRONG&gt;“@pexa.com.au”&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you receive an email you believe to be suspicious, please:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the email&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or reach out to &lt;A href="mailto:security@pexa.com.au" target="_blank" rel="noopener"&gt;PEXA’s Security team&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt;PEXA will never send you an email advising you to click a link to log in to the platform&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you receive an email with a link prompting you to login to PEXA, please disregard. After your initial PEXA account creation, we will never directly email you with a link to our login page or request your login credentials.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt;PEXA will never request files or information from you via a third-party service&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recently, we’ve observed malicious emails being sent to practitioners, purporting to be from PEXA via third-party file services, asking the recipient to open/download files.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Such scams are an ongoing cyber-threat affecting Australian organisations. Please note, PEXA does not use third parties to source files or information from you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;STRONG&gt;PEXA will never ask for your MFA code&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you receive a text message, phone call or email requesting your MFA code, please ignore this. Never share your MFA code with anyone – and we’ll never ask for it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;&lt;STRONG&gt;PEXA will never call you from unverified phone numbers&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please be mindful of taking phone calls related to Workspaces from unknown sources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For those with an account manager, their contact should be saved in your records.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 10:24:20 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Five-things-PEXA-will-never-do-Cyber-security/m-p/21177#M61</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2020-09-30T10:24:20Z</dc:date>
    </item>
    <item>
      <title>Security Alert | Fraudulent calls related to PEXA Key</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Alert-Fraudulent-calls-related-to-PEXA-Key/m-p/21103#M50</link>
      <description>&lt;P&gt;Dear members,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA would like to advise that we have reported instances of malicious parties, purporting to be from PEXA, reaching out to members and their clients via telephone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In these cases, the caller requests that the member and/or client “opt in” for financial services related to PEXA Key. Please note that PEXA does not have any such opt in or opt out functionality built into PEXA Key. PEXA Key provides three core services:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A secure channel for communicating bank account details&lt;/LI&gt;
&lt;LI&gt;Notifications providing your clients with a countdown to their property settlement&lt;/LI&gt;
&lt;LI&gt;Settlement tracking and ‘what to expect’ information&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any requests for account details are securely completed within the app or actioned by the practitioner within the PEXA Exchange.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, PEXA does not use or authorise any third party to contact members or their clients regarding PEXA Key or any other PEXA service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Legitimate communications from our team will be delivered from email addresses ending in “@pexa.com.au” or via our PEXA Support Centre: 1300 084 515.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, do not act on any unknown phone calls, emails, text messages. If you are unsure of the caller ID, hang up and redial the number. Further, do not click on links or open attachments in any email unless you are sure of the sender’s authenticity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you encounter suspicious activity, email PEXA’s security team at &lt;A href="mailto:security@pexa.com.au" target="_blank" rel="noopener"&gt;security@pexa.com.au&lt;/A&gt; and we’ll kindly assist.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;PEXA Security.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2020 05:06:32 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Alert-Fraudulent-calls-related-to-PEXA-Key/m-p/21103#M50</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2020-09-21T05:06:32Z</dc:date>
    </item>
    <item>
      <title>Reduce your cyber-security risk significantly by implementing these simple steps</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Reduce-your-cyber-security-risk-significantly-by-implementing/m-p/20953#M49</link>
      <description>&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Reduce your cyber-security risk significantly by implementing these simple steps&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2020 has been one we never thought it would be. The ongoing global COVID-19 pandemic is forcing us to change our ways of work. Today’s technology provides great flexibility, enabling us to work from &lt;U&gt;anywhere&lt;/U&gt;, with many of us presently using our homes as our primary places of work. Let’s refer to this as “remote working”.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remote working has been part of our lives for some time, but never previously in the capacity it is today. There are reports that people are spending more time on work than they were doing pre-COVID in the office. Employees tend to use multiple devices to get work done while managing other personal aspects of their daily lives during these times. As we increase our use of mobile devices to continue to work and connect, there’s never been a more important time to be diligent in securing our devices. With the convenience of remote working comes the challenge of protecting against parties with malicious intentions to steal your information or cause damage to your professional/personal lives.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Australian Cyber Security Centre (ACSC) is the Government agency that provides guidance to the Australian public on cyber-security and increases awareness of cyber related matters. PEXA is a proud &lt;U&gt;partner&lt;/U&gt; of the ACSC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There’s lots of information in the public domain covering the &lt;U&gt;what &lt;/U&gt;and &lt;U&gt;why&lt;/U&gt; of cyber-security but not so much clarity on the &lt;U&gt;how.&lt;/U&gt; To address this, the ACSC has put together some very simple, but very important &lt;U&gt;step by step guides&lt;/U&gt; on 12 cyber security controls to immediately assist with reducing the cyber-security risk to you and your organisation. These are explained in an easy-to-understand format – focusing on actions such as updating your devices across multiple device/operating system types to backing up your data and enabling two-factor authentication on your applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please use the &lt;U&gt;safe link&lt;/U&gt; below to access this information and also take the time to share it with your family and friends. Together we can create a cyber-safe environment for everyone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cyber.gov.au/acsc/individuals-and-families/step-by-step-guides" target="_blank"&gt;https://www.cyber.gov.au/acsc/individuals-and-families/step-by-step-guides&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are some key recommendations for you to stay secure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Keep your devices/apps up to date at all times&lt;/LI&gt;
&lt;LI&gt;Keep a backup of your data (it is very easy to backup data now with cloud storage services)&lt;/LI&gt;
&lt;LI&gt;Be aware of the website and the apps you use. Delete the apps you no longer use or require&lt;/LI&gt;
&lt;LI&gt;Remain vigilant on emails asking to take your actions and seeing a level of urgency (do not solely rely on the email appears on the email as they can be easily spoofed)&lt;/LI&gt;
&lt;LI&gt;Be aware of the ongoing scams so you know when something is not right (Scam Watch has a great list of ongoing scams in Australia and regularly updated)&lt;/LI&gt;
&lt;LI&gt;Do not use the same password across all your apps/services – use a password manager&lt;/LI&gt;
&lt;LI&gt;Use websites like &lt;A href="https://haveibeenpwned.com/" target="_blank"&gt;HaveIbeenPwned&lt;/A&gt; to check your email addresses are part of the previous breaches periodically&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Join the discussion on the PEXA Community below and follow us on social media for more tips and articles like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA Security Team&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 00:13:35 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Reduce-your-cyber-security-risk-significantly-by-implementing/m-p/20953#M49</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2020-09-03T00:13:35Z</dc:date>
    </item>
    <item>
      <title>Security alert | Email phishing communication</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-alert-Email-phishing-communication/m-p/20930#M60</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;PEXA is aware of a phishing email, purporting to be sent by a member of our team.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The email copied the contents of a&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;previous&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;legitimate&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;communication but&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;was sent from a fraudulent email address and contained a malicious attachment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Please note that&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;legitimate&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;communications from our team or PEXA will be delivered from email addresses ending in “&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;@pexa.com.au&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;”.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Additionally,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;PEXA will never send you an email advising you to click a link to access the PEXA Exchange and will always direct you to login to access your account via pexa.com.au.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Phishing Email Samples1024_1.png" style="width: 773px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/6235i1C9D1F21875D38F8/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Phishing Email Samples1024_1.png" alt="Phishing Email Samples1024_1.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As always, if you receive a similar phishing email or another communication you believe to be suspicious, please:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Do not respond&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Do not click links or download attachments&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Delete the email&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Report it to your relevant security administrator or&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;e&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;mail PEXA’s security team at&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;security@pexa.com.au&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’d like to remind members to remain vigilant at this time and please reach out to us if you have any questions or would like any assistance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Kind regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;LI-USER uid="5851"&gt;&lt;/LI-USER&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 05:04:36 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-alert-Email-phishing-communication/m-p/20930#M60</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2020-09-03T05:04:36Z</dc:date>
    </item>
    <item>
      <title>Security Alert - WeTransfer Email Phishing</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Alert-WeTransfer-Email-Phishing/m-p/20823#M59</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’d like to advise members of an email phishing scam targeting PEXA Exchange users. In this instance, an email was sent to a practitioner, purporting to be from PEXA via &lt;STRONG&gt;WeTransfer&lt;/STRONG&gt;, asking the recipient to open/download files.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Malicious emails being sent via WeTransfer is an &lt;A href="https://www.auscert.org.au/blog/2018-06-20-malicious-emails-wetransfer#:~:text=This%20means%20that%20WeTransfer%20is,strength%20of%20their%20own%20brand.&amp;amp;text=Fill%20out%20a%20form%20and,be%20used%20to%20send%20spam" target="_blank"&gt;ongoing cyber-threat&lt;/A&gt; affecting Australian organisations. &lt;STRONG&gt;Please note PEXA does not use WeTransfer for any email correspondence or service&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you receive an email appearing to be sent from PEXA via WeTransfer, do not click any links and delete immediately.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, if you receive a similar phishing email or another communication you believe to be suspicious, please:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the e-mail&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or e-mail PEXA’s security team at &lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA will never send you an email advising you to click a link to access the PEXA Exchange, and will always direct you to login to access your account via &lt;A href="https://community.pexa.com.au/pexa.com.au" target="_blank"&gt;pexa.com.au&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about phishing e-mails &lt;A href="https://www.pexa.com.au/security/how-to-protect-your-business#identify-spam-and-phishing" target="_blank"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;David Willett&lt;/P&gt;
&lt;P&gt;General Manager, IT Security&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2020 05:25:03 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Alert-WeTransfer-Email-Phishing/m-p/20823#M59</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2020-08-21T05:25:03Z</dc:date>
    </item>
    <item>
      <title>Security Update - High Profile Twitter Accounts Hacked</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Update-High-Profile-Twitter-Accounts-Hacked/m-p/20535#M54</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Community,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As you may be aware, this morning several high-profile Twitter accounts were targeted by cyber-criminals. &lt;A href="https://www.itnews.com.au/news/scammers-take-over-high-profile-twitter-accounts-in-mass-hack-550539" target="_blank" rel="noopener"&gt;You can read about this here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;While this incident has no impact on PEXA or the broader network, it’s a timely reminder to be cyber-aware when working or browsing online – particularly on social media.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As always, only seek information from known, trusted sources and remember that PEXA will never send you links requesting your sensitive login or financial details. &lt;/SPAN&gt;&lt;SPAN&gt;If you have any questions or would like to flag suspicious material, please get in touch with our friendly team at&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link" href="mailto:security@pexa.com.au" target="_blank" rel="noopener noreferrer" aria-describedby="sk-tooltip-2675" data-sk="tooltip_parent" data-stringify-link="mailto:security@pexa.com.au"&gt;security@pexa.com.au&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;David Willett&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;General Manager, IT Security&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2020 01:36:16 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Update-High-Profile-Twitter-Accounts-Hacked/m-p/20535#M54</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2020-07-16T01:36:16Z</dc:date>
    </item>
    <item>
      <title>Security checklists for safe browsing</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-checklists-for-safe-browsing/m-p/20320#M51</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="security-checklist-1-FB1.png" style="width: 400px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5893i20DE16E16F6BC8A6/image-size/medium?v=1.0&amp;amp;px=400" role="button" title="security-checklist-1-FB1.png" alt="security-checklist-1-FB1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;While businesses are doing their best to adapt to COVID-19, scammers are looking for opportunities to exploit the current climate. As we &lt;A href="https://community.pexa.com.au/t5/Raise-a-Security-Concern/Remote-working-Advice-on-how-to-keep-property-transactions-safe/m-p/19442" target="_blank" rel="noopener"&gt;previously shared&lt;/A&gt;, t&lt;/SPAN&gt;he global COVID-19 pandemic has sparked a surge of phishing attempts on unsuspecting individuals. One such attack used the logo of the CDC Health Alert Network claiming to provide a list of local active infections, before stealing confidential information from the unprepared victims.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's important we remain vigilant at this time and our&amp;nbsp;&lt;SPAN&gt;Head of IT Security,&lt;/SPAN&gt;&amp;nbsp;&lt;LI-USER uid="5851"&gt;&lt;/LI-USER&gt;&amp;nbsp;has put together the below quick checklists to ensure you're browsing safely while working and at your leisure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to keep safe while working online:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Ensure the device you are using has security software installed (either work supplied or your own) to protect you from ransomware, malware, and other threats&lt;/LI&gt;
&lt;LI&gt;Use a VPN (either company-provided or your own) when connecting to your work network to keep your data safe&lt;/LI&gt;
&lt;LI&gt;Only use WiFi you trust to reduce the risk of being hacked&lt;/LI&gt;
&lt;LI&gt;Make sure you have a backup solution in place such as a USB or the cloud in case something goes wrong&lt;/LI&gt;
&lt;LI&gt;Watch out for scams and fake news around COVID-19. Only trust reputable sources&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to keep the family safe online:&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Keep your operating system and applications (software updates) up to date to protect yourself from being hacked&lt;/LI&gt;
&lt;LI&gt;Make sure all the devices in your home (phones, tablets, PCs) have security software installed to keep you safe from online threats and risks&lt;/LI&gt;
&lt;LI&gt;Schedule screen time for kids and their device. You can do this by drawing up a timetable or using parental controls features of your security software&lt;/LI&gt;
&lt;LI&gt;Set ground rules by having a conversation on what they can do online&lt;/LI&gt;
&lt;LI&gt;Discuss the importance of online safety with your kids. You can read more here: &lt;A href="https://www.trendmicro.com/en_au/initiative-education/internet-safety-kids-families.html" target="_blank"&gt;https://www.trendmicro.com/en_au/initiative-education/internet-safety-kids-families.html&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Keep an eye out for more security tips and tricks from our team here at PEXA. If you have any questions, please leave them below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 05:13:04 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-checklists-for-safe-browsing/m-p/20320#M51</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2020-07-08T05:13:04Z</dc:date>
    </item>
    <item>
      <title>Security Shorts | Confirming a website is secure</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Shorts-Confirming-a-website-is-secure/m-p/20105#M48</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this Security Shorts video, Anish Dharmakkan from our PEXA Security team, provides some valuable advice on how to verify if a website is secure. Keep an eye out for more tips and tricks from our team and if you'd like more information on this topic, you can access helpful links below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-VIDEO vid="https://youtu.be/qjjI1fu8l7w" align="center" size="large" width="600" height="450" uploading="false" thumbnail="https://i.ytimg.com/vi/qjjI1fu8l7w/hqdefault.jpg" external="url"&gt;&lt;/LI-VIDEO&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;A href="https://community.pexa.com.au/t5/Security-Updates/How-to-identify-duplicate-or-unsafe-websites/td-p/16583" target="_blank" rel="noopener"&gt;How to identify duplicate or unsafe websites&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.pexa.com.au/t5/Security-Updates/Cyber-Criminals-the-Modern-Day-Con-Artists/m-p/16584" target="_blank" rel="noopener"&gt;Cyber-Criminals, the Modern-Day Con Artists&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 03:48:17 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Security-Shorts-Confirming-a-website-is-secure/m-p/20105#M48</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2020-06-12T03:48:17Z</dc:date>
    </item>
    <item>
      <title>Remote working | Advice on how to keep property transactions safe</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Remote-working-Advice-on-how-to-keep-property-transactions-safe/m-p/19442#M47</link>
      <description>&lt;P&gt;Hello Community&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With many businesses asking their teams to work remotely, security experts are warning of spikes in cyber-crime attempts.&lt;/P&gt;
&lt;P&gt;The global COVID-19 pandemic has sparked a surge of phishing attempts on unsuspecting individuals. One such attack used the logo of the CDC Health Alert Network claiming to provide a list of local active infections, before stealing confidential information from the unprepared victims.&lt;/P&gt;
&lt;P&gt;Cyber criminals are looking to take advantage of this period of global uncertainty, reinforcing the urgent need for everyone to be extra vigilant when it comes to cybercrime.&lt;/P&gt;
&lt;P&gt;We strongly recommend Australian lawyers and conveyancers utilise the tools and processes available to them to mitigate this risk, including:&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Install and update your anti-virus software&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Ensuring your &lt;A href="https://community.pexa.com.au/t5/Help-Centre/Virus-Protection/ba-p/14662" target="_blank" rel="noopener"&gt;anti-virus software&lt;/A&gt; is up-to-date is critical. Cyber-criminals can use a number of different methods to try and attack your devices, anti-virus should always be your first line of defence in protecting you and your business.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Keep operating systems (OS) and browsers up-to-date&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Updated OS and browsers add protection from security issues that could be used to compromise your information. Restart your devices regularly to make sure updates are fully installed.&lt;/P&gt;
&lt;P&gt;Cyber-criminals use weaknesses in outdated software to scam individuals and businesses. The best way to keep you and your business safe is to action software updates the instant they become available.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;We also recommend that you shut down and restart your device frequently for automatic updates to proceed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Do not use public WiFi&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;If outside of the home or office, we do not recommend the use of free WiFi.&amp;nbsp; Instead, use your mobile as a hotspot (or purchase a 4G mobile router). This will provide you with a safer connection online.&lt;/P&gt;
&lt;P&gt;Public WiFi is easily compromised by hackers and your personal information easily obtained.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Virtual Private Network (VPN)&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;When you’re working from home for an extending period of time, use your company’s &lt;A href="https://us.norton.com/internetsecurity-privacy-what-is-a-vpn.html" target="_blank" rel="noopener"&gt;VPN&lt;/A&gt; to make sure that you maintain a secure connection to all your corporate services and applications, away from the prying eyes of cyber-criminals.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Phishing – protect you and your clients’ information&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;With reported email phishing attacks on the rise and the risk becoming more tangible across the world, it has never been more important for us and the broader e-Conveyancing network to use the tools available to us to protect against this threat.&lt;/P&gt;
&lt;P&gt;While you’re working remotely and limiting face-to-face client meetings, bank and trust account details can be communicated safely via the free &lt;A href="https://community.pexa.com.au/t5/PEXA-Key/ct-p/PEXA-Key" target="_blank" rel="noopener"&gt;PEXA Key&lt;/A&gt; app between you and the homebuyer or seller. The app removes the need to use email, mitigating any risk of succumbing to email phishing attacks in the sharing of critical transaction information.&lt;/P&gt;
&lt;P&gt;Lawyers and Conveyancers who use InfoTrack can also use &lt;A href="https://www.securexchange.com.au/lawyers-conveyancers/" target="_blank" rel="noopener"&gt;Securexhange&lt;/A&gt; to communicate sensitive information with real estate agents.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Multi-factor Authentication (2FA/MFA)&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Check the security and privacy settings of all your essential services and make sure they have 2FA/MFA available.&lt;/P&gt;
&lt;P&gt;When logging into PEXA, members must use MFA to access their accounts. Although users have the option of receiving their &lt;A href="https://community.pexa.com.au/t5/Share-your-Experiences/MFA-Why-I-love-the-smartphone-app/m-p/14008#M1339" target="_blank" rel="noopener"&gt;MFA&lt;/A&gt; code via SMS or the smartphone app, we find the most reliable option to be the latter – via the PINGID application.&lt;/P&gt;
&lt;P&gt;The code is generated immediately in the smartphone app for users to transcribe into PEXA.&amp;nbsp; The SMS option can experience latency issues with some telecommunication providers, meaning the code is not received by the user for some time. If you’d like assistance moving from SMS to the smartphone app, please contact PEXA’s Support Centre on 1300 084 515.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Protect your passwords&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Keep your passwords and pin codes safe. Now might be a good time to change your passwords and use a password manager e.g. &lt;A href="https://www.lastpass.com/?ds_rl=1278224&amp;amp;ds_rl=1278224&amp;amp;gclid=Cj0KCQjwmdzzBRC7ARIsANdqRRmPaLwXEuCd4fRRBTR6vhzNEdBUMl7RgF3ZPQpiq4DauoyyDyqaMb8aAsj3EALw_wcB" target="_blank" rel="noopener"&gt;LastPass&lt;/A&gt; and &lt;A href="https://1password.com/" target="_blank" rel="noopener"&gt;1Password&lt;/A&gt; to ensure you have unique passwords for all your different accounts. This ensures that if one of your accounts is compromised, the others are protected, and the impact is minimised.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kind regards&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;David Willett&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Head of IT Security, PEXA&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 00:52:10 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Remote-working-Advice-on-how-to-keep-property-transactions-safe/m-p/19442#M47</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2020-03-25T00:52:10Z</dc:date>
    </item>
    <item>
      <title>Scam Alert - Scammers using COVID-19 to steal information</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Scam-Alert-Scammers-using-COVID-19-to-steal-information/m-p/19320#M46</link>
      <description>&lt;DIV class="p-rich_text_section"&gt;Hi Community,&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;Whilst businesses around the country and indeed the globe are making important preparations to respond to COVID-19 (Coronavirus), it is important to understand that cyber criminals can use a situation like this to their advantage.&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;Targetted phishing attacks, with malicious content disguised as Coronavirus notices, may be launched to capitalise on the public's desire to learn more about the outbreak. There have already been reports in the media about scams attempting to steal personal information or infect people's devices with malware that distributes false information or scam products.&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;In one example, a phishing email that used the logo of the CDC Health Alert Network claimed to provide a list of local active infections. Recipients were instructed to click on a link in the email to access the list. Next, recipients were asked to enter their email login credentials, which were then stolen by scammers.&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;What to do&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG data-stringify-type="bold"&gt;to protect yourself&lt;/STRONG&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;OL class="p-rich_text_list p-rich_text_list__ordered" data-stringify-type="ordered-list" data-indent="0"&gt;
&lt;LI&gt;If you want to educate yourself further on COVID-19, only look at reputable sources like the World Health Organisation, Centre for Disease Control or the the Australian Governments Department of Health websites.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Always be on the lookout for tell-tale signs of email phishing from emails that appear to come from reputable sources.&amp;nbsp;Remember, you can look at the sender’s details – specifically the part of the email address after the ‘@’ symbol – in the ‘From’ line to see if it looks legitimate.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Be weary of social media posts that attempt to bait you to click on links to gain more information. Social media is notorious for being used to spread misinformation despite the review processes that have been implemented by these sites in recent times. As per point number 1, go direct to reputable or government sources to get information on COVID-19.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;You can check out our link on phishing emails &lt;A class="c-link" href="https://www.pexa.com.au/security/members#security-v2-members-security-tips" target="_blank" rel="noopener noreferrer" aria-describedby="slack-kit-tooltip"&gt;here&lt;/A&gt; to get more general information on how to spot scams.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Finally make sure you have good anti-virus protection installed on your device, whether it be a laptop or mobile.&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;BR /&gt;Kind regards&amp;nbsp;&amp;nbsp;&lt;BR /&gt;David Willett&lt;BR /&gt;Head of IT Security&lt;/DIV&gt;</description>
      <pubDate>Wed, 11 Mar 2020 01:10:54 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Scam-Alert-Scammers-using-COVID-19-to-steal-information/m-p/19320#M46</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2020-03-11T01:10:54Z</dc:date>
    </item>
    <item>
      <title>File Sharing Email Scam - Multi Factor Authentication will help to protect you</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/File-Sharing-Email-Scam-Multi-Factor-Authentication-will-help-to/m-p/19233#M45</link>
      <description>&lt;P&gt;Dear Members,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Legal Practitioners Liability Committee (LPLC) recently published an article about an ongoing fraudulent document sharing email circulating among the legal community. They are essentially looking to steal your credentials to login to your email&amp;nbsp; accounts by tricking you to click on a link. Highly recommend you are taking time to read the publication to increase your awareness and your staff on this matter.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a great reminder to implement two factor authentication on your email accounts (for that matter on all the online services you use where 2 factor authentication is offered) which will significantly reduce the risk of falling in to this type of scams.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access to the LPLC article below or browsing to the LPC website.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="https://lplc.com.au/bulletins/file-sharing-email-scam-multi-factor-authentication-will-help-protect-you/?utm_medium=email&amp;amp;utm_campaign=Bulletin%20-%20Cyber%20-%2027%20Feb%20copy&amp;amp;utm_content=Bulletin%20-%20Cyber%20-%2027%20Feb%20copy+CID_9f5d1146016dc0b1264766948206a367&amp;amp;utm_source=Email%20marketing%20software&amp;amp;utm_term=Read%20more" href="http://FILE SHARING EMAIL SCAM – MULTI-FACTOR AUTHENTICATION WILL HELP PROTECT YOU" target="_blank" rel="noopener"&gt;FILE SHARING EMAIL SCAM – MULTI-FACTOR AUTHENTICATION WILL HELP PROTECT YOU&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Few quick actions you can take to increase your cybersecurity awareness,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.Take time to assess your online presence and enable two factor authentication on applications&lt;/P&gt;
&lt;P&gt;2. Share the LPLC article with your staff and your colleagues in the industry to increase the awareness&lt;/P&gt;
&lt;P&gt;3. Print the PDF in the article and leave them where everyone can see them. Example - on a common wall.&lt;/P&gt;
&lt;P&gt;4.Generate and build a cyber risk aware culture by creating space for your staff to learn and stay safe about cyber risks and threats.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 05:14:33 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/File-Sharing-Email-Scam-Multi-Factor-Authentication-will-help-to/m-p/19233#M45</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2020-02-28T05:14:33Z</dc:date>
    </item>
    <item>
      <title>(LPLC) Beware the risk that your clients email may have been compromised</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/LPLC-Beware-the-risk-that-your-clients-email-may-have-been/m-p/19141#M44</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Legal Practitioners&amp;nbsp;Liability Committee has recently posted an insightful article that details a use case of email compromise leading to funds being transferred to a fraudster.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Be alert and get to know the warning signs that your client may have been compromised. A request to change account details at the last minute? This should always be followed up with a phone call to confirm it is legitimate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://lplc.com.au/blog/beware-risk-your-client-email-system-compromised/?utm_medium=email&amp;amp;utm_campaign=Blog%2010%20February%20Beware%20the%20risk%20your%20clients%20email%20system%20may%20have%20been%20compromised&amp;amp;utm_content=Blog%2010%20February%20Beware%20the%20risk%20your%20clients%20email%20system%20may%20have%20been%20compromised+CID_14333b81efff2a2c5d05413cd09773a2&amp;amp;utm_source=Email%20marketing%20software&amp;amp;utm_term=Read%20more" target="_blank" rel="noopener"&gt;Take a look at the LPLC article here to learn more! &lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 00:02:43 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/LPLC-Beware-the-risk-that-your-clients-email-may-have-been/m-p/19141#M44</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2020-02-20T00:02:43Z</dc:date>
    </item>
    <item>
      <title>Phishing Email Notification</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Phishing-Email-Notification/m-p/19089#M43</link>
      <description>&lt;P&gt;Dear members,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are aware of an email phishing attempt targeting PEXA members, asking about the "PEXA Residential Seller Guarantee". Please be vigilant for similar emails and take time to validate&amp;nbsp;before taking any action within emails. I have attached a sample email a member received on 12 February 2020 for your reference.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you come across any or similar email notifications, please don't click on any links, inform your PDS/PEXA Partner and forward it to security@pexa.com.au.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;----------------------------------&lt;/P&gt;
&lt;P&gt;Phishing email capture below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="phish 1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5509i7D8E8C25AB5C9B27/image-size/large?v=1.0&amp;amp;px=999" role="button" title="phish 1.PNG" alt="phish 1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;End of image.&lt;/P&gt;
&lt;P&gt;----------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA Security Team&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2020 22:09:18 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Phishing-Email-Notification/m-p/19089#M43</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2020-02-18T22:09:18Z</dc:date>
    </item>
    <item>
      <title>Microsoft Internet Explorer Critical Zero Day Vulnerability</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Microsoft-Internet-Explorer-Critical-Zero-Day-Vulnerability/m-p/18841#M43</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5" color="#800080"&gt;&lt;STRONG&gt;This advisory applies to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;Microsoft Internet Explorer&lt;/U&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Web Browser&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IE.png" style="width: 786px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5436iEB3B9B7A1E3AAB80/image-size/large?v=1.0&amp;amp;px=999" role="button" title="IE.png" alt="IE.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5" color="#800080"&gt;&lt;STRONG&gt;What is the new software vulnerability?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;PEXA Security is aware of a Microsoft Windows Internet Explorer &lt;A href="https://en.wikipedia.org/wiki/Zero-day_(computing)" target="_blank" rel="noopener"&gt;zero day&lt;/A&gt; vulnerability which is being attacked by malicious actors and other cyber criminals over the internet. You can be a target of this attack by clicking on a link or opening an attachment sent you by an unknown party or malicious actor.&lt;/P&gt;
&lt;P&gt;More information on this can be found on the links below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5" color="#800080"&gt;&lt;STRONG&gt;How do I address/mitigate the vulnerability?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Currently there is no patch available from Microsoft for this vulnerability. However, they have provided a workaround to protect users from being a target of this attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#800080"&gt;Important -&lt;/FONT&gt;&lt;/STRONG&gt; Given the use of malicious websites as part of the vulnerability’s exploitation routine, individual users are encouraged to practice caution when it comes to clicking links, especially those&amp;nbsp;embedded in a suspicious email message.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5" color="#800080"&gt;&lt;STRONG&gt;Do I need to take any action?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Reach out to your IT support service team or your regular System Maintenance team about this vulnerability. They may already be aware of this and it would be important to check with them and follow the instructions given.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200001" target="_blank"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200001&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://thehackernews.com/2020/01/internet-explorer-zero-day-attack.html" target="_blank"&gt;https://thehackernews.com/2020/01/internet-explorer-zero-day-attack.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;PEXA Security&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 22:39:34 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Microsoft-Internet-Explorer-Critical-Zero-Day-Vulnerability/m-p/18841#M43</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2020-01-20T22:39:34Z</dc:date>
    </item>
    <item>
      <title>Security Advisory – Citrix Zero Day Vulnerability Alert</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Citrix-Zero-Day-Vulnerability-Alert/m-p/18785#M42</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are aware of a critical &lt;A href="https://en.wikipedia.org/wiki/Zero-day_(computing)" target="_blank"&gt;zero day&lt;/A&gt; vulnerability discovered in the Citrix application.&amp;nbsp; This vulnerability is still without any permanent fixes and patch is yet to be released by the Citrix vendor.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using Citrix applications (example - for digital signing certificate) described in the article below there is a potential you may be vulnerable.&amp;nbsp; Your IT team/ support services may already be aware of this and it would be important to check with them and follow the instructions. We recommend you consider implementing the mitigation strategies explained in the advisories below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.citrix.com/blogs/2020/01/11/citrix-provides-update-on-citrix-adc-citrix-gateway-vulnerability/" target="_blank"&gt;https://www.citrix.com/blogs/2020/01/11/citrix-provides-update-on-citrix-adc-citrix-gateway-vulnerability/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.citrix.com/article/CTX267027" target="_blank"&gt;https://support.citrix.com/article/CTX267027&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.citrix.com/article/CTX267679" target="_blank"&gt;https://support.citrix.com/article/CTX267679&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;PEXA Security Team&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 03:38:35 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Citrix-Zero-Day-Vulnerability-Alert/m-p/18785#M42</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2020-01-14T03:38:35Z</dc:date>
    </item>
    <item>
      <title>Security Advisory - Critical Vulnerability Alert</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Critical-Vulnerability-Alert/m-p/18782#M41</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Dear PEXA Community,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#800080"&gt;&lt;STRONG&gt;This advisory applies to &lt;U&gt;Firefox&lt;/U&gt; Web Browser installed on all device types.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#993366"&gt;&lt;STRONG&gt;What is the new software vulnerability?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;New critical vulnerability in the Firefox web browser has been discovered by security researches which is currently being attacked by malicious parties and criminal groups. Attackers could use this vulnerability to gain access to your devices by exploiting the way Firefox browser works on your devices.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#993366"&gt;&lt;STRONG&gt;Do I need to take any action?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Yes. Firefox vendor has released an emergency security update which addresses the vulnerability and has advised everyone who uses Firefox to immediately update to the latest version.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#993366"&gt;&lt;STRONG&gt;How do I update my Firefox Web Browser?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;PEXA Security always advise to keep your software, including web browsers, up to date.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Please follow the steps below to update your browser,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;Open your Firefox Web Browser and Click on the “Menu” and then Click on the “Help"&amp;nbsp; (As indicated in red colour on the screen capture below)&lt;/FONT&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firefox - 1.png" style="width: 393px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5421i548E8E3A63439448/image-size/large?v=1.0&amp;amp;px=999" role="button" title="firefox - 1.png" alt="firefox - 1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 2. Click on the “About Firefox”. This will start the update automatically&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firefox - 2.png" style="width: 286px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5422iBE2BC988557CBEA2/image-size/large?v=1.0&amp;amp;px=999" role="button" title="firefox - 2.png" alt="firefox - 2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;3.&amp;nbsp; Make sure version it displays is as same as below highlighted in red text box&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firefox - 3.png" style="width: 758px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5426i07157335DA496E4D/image-size/large?v=1.0&amp;amp;px=999" role="button" title="firefox - 3.png" alt="firefox - 3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4" color="#800080"&gt;&lt;STRONG&gt;PEXA Security recommends members enable automatic updates to make sure in the future, new browser updates are done automatically.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;Go to the top right-hand corner “Menu” and click on “Options” from the dropdown menu&lt;/FONT&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firefox - 4.png" style="width: 368px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5424i35A06340E56DDE44/image-size/large?v=1.0&amp;amp;px=999" role="button" title="firefox - 4.png" alt="firefox - 4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 2. &amp;nbsp;Scroll down to the section “Firefox Updates” and tick the “Automatically install updates” check box. This will install updates automatically without any manual intervention in the future.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firefox - 5.png" style="width: 743px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5425i1BC548A9864A91F5/image-size/large?v=1.0&amp;amp;px=999" role="button" title="firefox - 5.png" alt="firefox - 5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Thank you.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;PEXA Security&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 03:04:42 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Critical-Vulnerability-Alert/m-p/18782#M41</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2020-01-14T03:04:42Z</dc:date>
    </item>
    <item>
      <title>Reduce your risk of falling victim to cyber attacks</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Reduce-your-risk-of-falling-victim-to-cyber-attacks/m-p/18627#M41</link>
      <description>&lt;P&gt;Staying safe online&amp;nbsp;has never been more&amp;nbsp;important&amp;nbsp;for individuals and business’ worldwide.&amp;nbsp;In 2018 alone, Australian businesses lost more than &lt;A href="https://www.accc.gov.au/system/files/Targeting%20scams%E2%80%94Report%20of%20the%20ACCC%20on%20scams%20activity%202018.pdf" target="_blank" rel="noopener"&gt;$60 million&lt;/A&gt; to e-mail scams. It is also estimated that by the end of 2019, cyber-scam losses&amp;nbsp;will&amp;nbsp;exceed $532 million, surpassing half a billion dollars for the first time.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Understandably, it can be difficult to&amp;nbsp;know&amp;nbsp;where to begin&amp;nbsp;to ensure you’re taking the appropriate steps to&amp;nbsp;avoid falling victim to cybercrime.&amp;nbsp;First, it’s important to get the basics&amp;nbsp;right.&amp;nbsp;Below&amp;nbsp;is a checklist of 12&amp;nbsp;initial&amp;nbsp;steps that you and your business can take&amp;nbsp;to&amp;nbsp;boost your safety while online.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Anti-Virus&lt;/STRONG&gt; — As your first line of defence, ensure you have&amp;nbsp;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Virus-Protection/ba-p/14662" target="_blank" rel="noopener"&gt;antivirus protection&lt;/A&gt;&amp;nbsp;on&amp;nbsp;all of&amp;nbsp;your devices,&amp;nbsp;including&amp;nbsp;&lt;A href="https://community.pexa.com.au/t5/Security-Updates/Tips-to-protect-your-mobile-device-amp-its-data/m-p/17918" target="_blank" rel="noopener"&gt;mobile devices&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Two Factor Authentication(2FA)&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; &amp;nbsp;&lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;for e-mail&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;— Most&amp;nbsp;email providers,&amp;nbsp;such as Google and Hotmail,&amp;nbsp;provide&amp;nbsp;2FA&amp;nbsp;to protect&amp;nbsp;user&amp;nbsp;accounts.&amp;nbsp;This significantly reduces the threat&amp;nbsp;of&amp;nbsp;intrusion by&amp;nbsp;a hacker if your&amp;nbsp;password is compromised, as your account is secured&amp;nbsp;by an additional layer of protection&amp;nbsp;(the passcode that you&amp;nbsp;receive through&amp;nbsp;SMS&amp;nbsp;or the mobile app).&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;PEXA&amp;nbsp;members&amp;nbsp;must&amp;nbsp;use&amp;nbsp;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://community.pexa.com.au/t5/Help-Centre/Multi-factor-authentication-FAQs/ba-p/10693" target="_blank" rel="noopener"&gt;Multi-factor authentication (MFA)&lt;/A&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;to access the platform,&amp;nbsp;providing an extra layer of security when logging into your account.&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;(Note: It is recommended to use&amp;nbsp;an app-based security PIN generator for 2FA, such as&amp;nbsp;Google Authenticator,&amp;nbsp;rather than SMS).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Phishing&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; — E-mail phishing&amp;nbsp;is&amp;nbsp;the number one avenue&amp;nbsp;used&amp;nbsp;in cybercrime.&amp;nbsp;The typical phishing email will contain a&amp;nbsp;false&amp;nbsp;and/or mimicked&amp;nbsp;story designed to lure you into taking an action such as clicking a link or button in the email or calling a phone number.&amp;nbsp;Learn how to identify a phishing e-mail&amp;nbsp;with the&amp;nbsp;help&amp;nbsp;of&amp;nbsp;this&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="http://the%20typical%20phishing%20email%20will%20contain%20a%20concocted%20story%20designed%20to%20lure%20you%20into%20taking%20an%20action%20such%20as%20clicking%20a%20link%20or%20button%20in%20the%20email%20or%20calling%20a%20phone%20number./" target="_blank" rel="noopener"&gt;interactive&amp;nbsp;tool&lt;/A&gt;&lt;SPAN style="font-family: inherit;"&gt;.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Password&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; — Do&amp;nbsp;not&amp;nbsp;use&amp;nbsp;the&amp;nbsp;same&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://community.pexa.com.au/t5/Help-Centre/Strong-Passwords/ba-p/14658" target="_blank" rel="noopener"&gt;passwords&lt;/A&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;on multiple systems.&amp;nbsp;If your password is compromised, then hackers can access&amp;nbsp;all&amp;nbsp;of&amp;nbsp;your other services as well.&amp;nbsp;Use a password manager to&amp;nbsp;maintain your varying passwords&amp;nbsp;or pin&amp;nbsp;codes.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;Additionally,&amp;nbsp;instead of passwords, use passphrases. Passphrases&amp;nbsp;can be&amp;nbsp;a&amp;nbsp;minimum of&amp;nbsp;three&amp;nbsp;words&amp;nbsp;combined that are&amp;nbsp;easy to remember with numbers and special characters&amp;nbsp;e.g. UniverseAthletic4!&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Use&amp;nbsp;host-based&amp;nbsp;firewalls &lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;— Both Windows and Apple OS offer&amp;nbsp;firewall capability. These are not difficult to set&amp;nbsp;up&amp;nbsp;and easy to follow help videos are easily found online.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Update&amp;nbsp;operating systems and applications &lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;— Operating&amp;nbsp;systems&amp;nbsp;(OS)&amp;nbsp;and application vendors&amp;nbsp;frequently&amp;nbsp;release security updates to address vulnerabilities.&amp;nbsp;We highly&amp;nbsp;recommend you have automatic updates enabled so it&amp;nbsp;all&amp;nbsp;happens&amp;nbsp;in the background without waiting for your intervention.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Review&amp;nbsp;applications &lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;— Spend 5-10 minutes&amp;nbsp;inspecting&amp;nbsp;your system and applications.&amp;nbsp;If&amp;nbsp;there are unwanted applications&amp;nbsp;in&amp;nbsp;your program list, uninstall them.&amp;nbsp;This is&amp;nbsp;because third party apps can contain vulnerabilities&amp;nbsp;that hackers&amp;nbsp;may&amp;nbsp;then exploit.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Email Rules&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; — Email providers&amp;nbsp;offer&amp;nbsp;the capability to create&amp;nbsp;&lt;/SPAN&gt;&lt;EM style="font-family: inherit;"&gt;rules.&lt;/EM&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;If your email is compromised, there is a&amp;nbsp;possibility&amp;nbsp;that the&amp;nbsp;hacker&amp;nbsp;created rules in your email system to forward mail to&amp;nbsp;a&amp;nbsp;hacker managed email account without you knowing it. Go in to&amp;nbsp;the&amp;nbsp;e-mail rules&amp;nbsp;section of&amp;nbsp;your account&amp;nbsp;and make sure&amp;nbsp;that only the rules you’ve created are present. We recommend you complete this action at least once per month.&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;If you find that there are rules you have not created, delete these rules before immediately changing your password.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Back-up &lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;— &amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://www.staysmartonline.gov.au/protect-your-business/doing-things-safely/backups-business" target="_blank" rel="noopener"&gt;Backing up all of your&amp;nbsp;data&lt;/A&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;is paramount. Ensure your&amp;nbsp;back up&amp;nbsp;solution&amp;nbsp;is on a separate device&amp;nbsp;and is accessible&amp;nbsp;if you cannot&amp;nbsp;or are denied access to&amp;nbsp;your files’ original location.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Removable Storage&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; — Do you use removable media such as USB&amp;nbsp;drives?&amp;nbsp;If yes, we recommend using a&amp;nbsp;Cloud file storage instead,&amp;nbsp;as&amp;nbsp;removable media&amp;nbsp;is&amp;nbsp;easily corrupted or infected with malware.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Browser Security &lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;— There are a few important&amp;nbsp;tips&amp;nbsp;to remember here,&amp;nbsp;including:&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;a. Do not save password/passphrases on browsers&lt;BR /&gt;&lt;A href="https://community.pexa.com.au/t5/Raise-a-Security-Concern/A-web-browser-the-internet-and-PEXA-walk-into-a-bar/m-p/18000" target="_blank" rel="noopener"&gt;b. Frequently update your web browsers&amp;nbsp;&lt;/A&gt;&lt;BR /&gt;c. Lookout for &lt;A href="https://community.pexa.com.au/t5/Security-Updates/How-to-identify-duplicate-or-unsafe-websites/m-p/16583" target="_blank" rel="noopener"&gt;duplicate or unsecure web pages&amp;nbsp;&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Social Media and App&amp;nbsp;Privacy/Security&amp;nbsp;settings&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;–&amp;nbsp;Do you use your social media,&amp;nbsp; such as&amp;nbsp;Facebook,&amp;nbsp;to access&amp;nbsp;third&amp;nbsp;party services?&amp;nbsp;If so, we highly recommend&amp;nbsp; you review the privacy settings on your social media apps to determine what it has access to. Again,&amp;nbsp;2FA&amp;nbsp;is your friend here.&amp;nbsp;Other privacy tips include:&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a. Check settings to ensure you're not providing unnecessary access to your information to apps you've installed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; b. Switch off Bluetooth when&amp;nbsp;it’s not being used.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; c. Do not connect to Free Wi-Fi access points no matter how secure it claims to be. If you have no&amp;nbsp;option,&amp;nbsp;then use a VPN service to secure your communications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; d. Don’t let others including family members,&amp;nbsp;use your device without your supervision.&amp;nbsp;They may unknowingly click on links and pop-ups which will&amp;nbsp;expose&amp;nbsp;your device to the hackers.&amp;nbsp;Where possible use parental controls.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, maintain your cyber security awareness.&amp;nbsp;A great place to refer to is the Australian governments’&amp;nbsp;&lt;A href="https://www.staysmartonline.gov.au/protect-yourself" target="_blank" rel="noopener"&gt;Staysmartonline&lt;/A&gt;&amp;nbsp;resource and,&amp;nbsp;of course,&amp;nbsp;PEXA’s&amp;nbsp;dedicated security page on the&amp;nbsp;&lt;A href="https://community.pexa.com.au/t5/Security/ct-p/Security" target="_blank" rel="noopener"&gt;e-Conveyancing Community&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Indika Wimalasiri&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 03:36:44 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Reduce-your-risk-of-falling-victim-to-cyber-attacks/m-p/18627#M41</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2020-02-20T03:36:44Z</dc:date>
    </item>
    <item>
      <title>FAQs | Microsoft to cease Windows 7 support by January 2020</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/FAQs-Microsoft-to-cease-Windows-7-support-by-January-2020/m-p/18556#M39</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft has announced that support for Windows 7 will end on 14 January 2020. Its notice to consumers &lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-au/help/4057281/windows-7-support-will-end-on-january-14-2020" target="_blank"&gt;can be accessed here&lt;/A&gt;&lt;/SPAN&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Following this milestone, key software updates from Microsoft will no longer be released for Windows 7. Users who continue to use this operating system, or other unsupported operated systems, place their IT security at risk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Updating your operating system to supported software is important best practice to ensure your business is suitably protected.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;In order to comply with the &lt;SPAN&gt;&lt;A href="https://www.pexa.com.au/images/uploads/page_parts/Pdfs/PEXA_Subscriber_Security_Policy_v3.pdf" target="_blank"&gt;PEXA Subscriber Security Policy&lt;/A&gt;&lt;/SPAN&gt;, Windows 7 users will need to upgrade to a supported operating system, such as Windows 10, as soon as possible.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;To help you navigate this change, we’ve compiled the below FAQ thread.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DL class="toggle"&gt;
&lt;DT&gt;&lt;A&gt;Why is Windows 7 no longer being supported by Microsoft?&lt;/A&gt;&lt;/DT&gt;
&lt;DD&gt;
&lt;P&gt;Microsoft’s notice to users &lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-au/help/4057281/windows-7-support-will-end-on-january-14-2020" target="_blank"&gt;can be accessed here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/DD&gt;
&lt;/DL&gt;
&lt;DIV class=""&gt;
&lt;DL class="toggle"&gt;
&lt;DT&gt;&lt;A&gt;Why is it important to not use unsupported software?&lt;/A&gt;&lt;/DT&gt;
&lt;DD&gt;
&lt;P&gt;Unsupported software will not receive updates or security fixes which are vital in maintaining your system’s security. This leaves your system vulnerable to hackers who actively target unsupported systems.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;In addition, as per your obligations as stated in the PEXA Subscriber Security Policy:&amp;nbsp;&lt;EM&gt;‘Subscribers are required to maintain the security of their computer systems and keep them up to date, including taking reasonable steps to install patches and operating system updates’&lt;/EM&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;When using unsupported software, this obligation can no longer be met as these products are not supported. In addition, running unsupported software may impact performance when using the PEXA platform, including your signing capabilities.&lt;/P&gt;
&lt;/DD&gt;
&lt;/DL&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DL class="toggle"&gt;
&lt;DT&gt;&lt;A&gt;What software, other than Windows 7, is no longer supported?&lt;/A&gt;&lt;/DT&gt;
&lt;DD&gt;
&lt;P&gt;The below software is no longer supported by Windows and Apple:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Windows XP&lt;/LI&gt;
&lt;LI&gt;Windows Vista&lt;/LI&gt;
&lt;LI&gt;Mac OS X (Snow Leopard)&lt;/LI&gt;
&lt;LI&gt;Mac OS X (Mavericks)&lt;/LI&gt;
&lt;LI&gt;Mac OS X (Yosemite)&lt;/LI&gt;
&lt;LI&gt;Mac OS X (El Capitan)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DD&gt;
&lt;/DL&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DL class="toggle"&gt;
&lt;DT&gt;&lt;A&gt;How can I upgrade my software? &lt;/A&gt;&lt;/DT&gt;
&lt;DD&gt;
&lt;P&gt;It is advised to upgrade directly to a supported operating system, such as Windows 10. Windows 10 can be purchased from the&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://www.microsoft.com/en-au/store/b/windows" target="_blank"&gt;Microsoft Store&lt;/A&gt;&lt;/SPAN&gt;&amp;nbsp;or from leading technology retailers.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;PEXA also recommends reaching out to your IT professional or industry body to assist you with this upgrade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Other helpful links:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Upgrading FAQs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-au/help/12435/windows-10-upgrade-faq" target="_blank"&gt;https://support.microsoft.com/en-au/help/12435/windows-10-upgrade-faq&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows Vista end of support&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-au/help/22882/windows-vista-end-of-support" target="_blank"&gt;https://support.microsoft.com/en-au/help/22882/windows-vista-end-of-support&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to upgrade (macOS)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.apple.com/au/macos/how-to-upgrade/" target="_blank"&gt;https://www.apple.com/au/macos/how-to-upgrade/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DD&gt;
&lt;/DL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 06 Dec 2019 05:05:08 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/FAQs-Microsoft-to-cease-Windows-7-support-by-January-2020/m-p/18556#M39</guid>
      <dc:creator>Jarrod_McAleese</dc:creator>
      <dc:date>2019-12-06T05:05:08Z</dc:date>
    </item>
    <item>
      <title>Member Security Alert</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Member-Security-Alert/m-p/18172#M38</link>
      <description>&lt;P&gt;Hi Community,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA has been made aware of a sophisticated phishing incident targeting an Australian conveyancer. In this instance, an email was sent to a client of a practitioner purporting to be from the practitioner. The sender of the email had established a similar email address to that of the practitioner, and subsequently telephoned the client to advise of a change to bank details.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA reminds all members of the importance of having processes in place to obtain or share account details with clients, and to confirm those by a secondary means. We have previously posted about this &lt;A href="https://community.pexa.com.au/t5/Security-Updates/Security-Reminder-Confirming-client-bank-details/m-p/9644" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA also recommends members implement multi-factor authentication for email accounts that are used for business purposes to reduce the risk of compromise.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Members are also encouraged to consider using &lt;A href="https://community.pexa.com.au/t5/Help-Centre/Introducing-PEXA-Key/ba-p/17263" target="_blank" rel="noopener"&gt;PEXA Key&lt;/A&gt; to securely communicate and receive bank account details with their clients.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Heather&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2019 06:04:22 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Member-Security-Alert/m-p/18172#M38</guid>
      <dc:creator>HeatherC</dc:creator>
      <dc:date>2019-11-04T06:04:22Z</dc:date>
    </item>
    <item>
      <title>A web browser, the internet, and PEXA walk into a bar...</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/A-web-browser-the-internet-and-PEXA-walk-into-a-bar/m-p/18000#M37</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="I dont get the joke.jpg" style="width: 999px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5170i0D1CFFFF60AFCFD5/image-size/large?v=1.0&amp;amp;px=999" role="button" title="I dont get the joke.jpg" alt="I dont get the joke.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;While at the bar the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;w&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;eb browser asks the internet to talk to PEXA. The internet says, “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN data-contrast="auto"&gt;sure,&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;I&gt;&lt;SPAN data-contrast="auto"&gt;w&lt;/SPAN&gt;&lt;/I&gt;&lt;I&gt;&lt;SPAN data-contrast="auto"&gt;eb&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;I&gt;&lt;SPAN data-contrast="auto"&gt;b&lt;/SPAN&gt;&lt;/I&gt;&lt;I&gt;&lt;SPAN data-contrast="auto"&gt;rowser not a problem, but first you must tell PEXA who you are.”&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;w&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;eb browser responds, “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN data-contrast="auto"&gt;tell PEXA I am&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;Mozilla/5.02520(Macintosh;2520Intel2520Mac2520OS2520X252010_13_6)2520AppleWebKit/537.362520(KHTML,2520like2520&lt;/SPAN&gt;&lt;/I&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;Gecko)2520Chrome/61.0.3163.1002520Safari&lt;/SPAN&gt;&lt;/I&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;/537.36&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN data-contrast="auto"&gt;”&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Not much of a punchline I know, but it’s an important part of how your web browser&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(such as&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Google&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Chrome or&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Mozilla&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Firefox)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;connects to PEXA. The web browser’s description of itself in this case is actually called a ‘&lt;/SPAN&gt;&lt;A href="https://www.howtogeek.com/114937/htg-explains-whats-a-browser-user-agent/" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;user agent’&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is a user agent?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The short version is&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;that&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;it’s a line of text&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;that tells PEXA (and other s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ervices you access on the internet&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;) which browser&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and operating system&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s are&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;being used to connect to them. E.g.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Mozilla&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Firefox or Google Chrome.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Recently&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;PEXA identified which browsers&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and versions of these browsers&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;were connecting to PEXA&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;for the month of August&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and we found some interesting results.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;T&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;he majority of&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;our members are connecting to PEXA with up&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;-&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;-&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;date web browser&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;however there is&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;a&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;small per&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ce&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ntage co&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;n&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;n&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ecting with outdated browser&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, some dating back to 2013.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Ho&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;w&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;do I&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;u&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;pdate my&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;w&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;eb&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;b&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;rowser?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;L&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ike any software&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, web browsers are constantly being updated with&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Patching/ba-p/14660" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;patches&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and other updates.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;y&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;commonly include updates to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;important security features&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;which are&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Security-Updates/Why-Me-Peter-s-patching-pickle/m-p/16195" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;pivotal to staying safe on the internet&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, especially when using&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;platforms like PEXA to manage your client&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;’&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s information.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;How can you address this?&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you are one of the few that are using&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;an&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;outdated web browser, it’s time to update! B&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;y updating your&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;browser,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;you are one step closer to having a more secure system.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;If you are using Google Chrome&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;as your web browser, you can follow this link&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://support.google.com/chrome/answer/95414?co=GENIE.Platform%3DDesktop&amp;amp;hl=en" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;https://support.google.com/chrome/answer/95414?co=GENIE.Platform%3DDesktop&amp;amp;hl=en&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="4" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;If&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;you are using Mozilla Firefox as your web browser, you can follow this link&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.mozilla.org/en-US/kb/update-firefox-latest-release" target="_blank"&gt;https://support.mozilla.org/en-US/kb/update-firefox-latest-release&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;For users using Microsoft Edge and Internet Explorer, Windows updates will u&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;pdate the browser when the Operating system updates are installed&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 04:34:36 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/A-web-browser-the-internet-and-PEXA-walk-into-a-bar/m-p/18000#M37</guid>
      <dc:creator>wesleylacy</dc:creator>
      <dc:date>2019-10-16T04:34:36Z</dc:date>
    </item>
    <item>
      <title>Security Shorts - Episode 1</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Shorts-Episode-1/m-p/17927#M32</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Securely managing your Digital Certificate&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-VIDEO vid="https://www.youtube.com/watch?time_continue=8&amp;amp;v=8oywuEJetcU" align="center" size="custom" width="483" height="483" uploading="false" thumbnail="https://i.ytimg.com/vi/8oywuEJetcU/hqdefault.jpg" external="url"&gt;&lt;/LI-VIDEO&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Welcome to the first episode of Security Shorts featuring one of our experts&amp;nbsp;&lt;LI-USER uid="6683"&gt;&lt;/LI-USER&gt;!&lt;/P&gt;
&lt;P&gt;This series will focus on providing you with informative and useful information to help you with your PEXA and IT security. In this episode, Jesse will be discussing how to securely manage Digital Certificates. Stay tuned for the next episode!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2019 22:39:01 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Shorts-Episode-1/m-p/17927#M32</guid>
      <dc:creator>Meghan</dc:creator>
      <dc:date>2019-10-10T22:39:01Z</dc:date>
    </item>
    <item>
      <title>Tips to protect your mobile device &amp; its data</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Tips-to-protect-your-mobile-device-amp-its-data/m-p/17918#M31</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;use&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;our&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;mobile device and its installed apps&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;every day&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. T&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;he apps&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;we download&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;make it&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;easy&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for us t&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;o&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;do&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;everyday&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;things like&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;check&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;our&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;mail, tap onto the tram&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;/train&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;/bus&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, update&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;our&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Instagram story, pay for coffee, track our calories&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and now&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;even&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to track&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;our&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;property settlement&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;hameless plug of&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Introducing-PEXA-Key/ba-p/17263" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;PEXA Key&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;).&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;All&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;co&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;nveniently completed&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;on our way in to work&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;all&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;this&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;private&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;information&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;available at the touch of a button&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;keeping our phones and&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;chosen&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;apps secure&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;has become&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;increasingly&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;important.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here are some handy&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;tips&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;assist you&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;in&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;doing so&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Download from official stores&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Cybercriminals are known to create&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.pandasecurity.com/mediacenter/panda-security/mobile-security-tips/" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;rogue mobile apps&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;that mimic trusted brands in order to obtain users’ confidential information.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;To avoid&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;these type&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;of scam&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;a&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;lways download new apps from the official app stores&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, check the publisher&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;is&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;f&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;rom the official supplier e.g. Property Exchange Australia Ltd)&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and when&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;app&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;w&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;as&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;last updated&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;For example&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;PEXA Key&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;is&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;available exclusively on&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Google Play St&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ore&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and Apple App store&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 325px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/5142i3FD439C49AA9FE53/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;2.&amp;nbsp;Use device security&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;All smart phones have multiple methods&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;of&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;authentication&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;available. We advise you to:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Not leave your phone unlocked&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Make sure your phone is set to auto lock within 30-60 seconds of inactivity&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;; and&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Use at least one of the authentication methods available to unlock your device e.g. facial recognition etc.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If using a pin code&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to access your phone, do not use the same pin for your apps&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;or write the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;m&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;down&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;on a piece of paper&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. Try using&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;a&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://blog.envisionitsolutions.com/5-benefits-of-using-a-password-manager" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;password manager&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;app&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;store&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;keep track of&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and generate new&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;passwords&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;pin codes.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3. &lt;/STRONG&gt;&lt;STRONG&gt;Call your provider&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;lose&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;or&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;m&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;isplace&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;your phone, call your provider&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to ensure your SIM is deactivated&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to protect your&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;phone and the apps on it from potential criminals.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;This is good advice for your clients who use PEXA Key&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. It is also important that they remember to&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;notify you in the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;unlikely&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;event&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;that they lose their phone.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;4. &lt;/STRONG&gt;&lt;STRONG&gt;Anti-virus on your phone&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Your&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;hand-held&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;device is no different to your laptop&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;o&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;r&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;PC and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;is similarly&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;susceptible to scams such as phishing&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Consider installing&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Virus-Protection/ba-p/14662" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;anti-virus software&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;onto your mobile device.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2019 04:55:44 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Tips-to-protect-your-mobile-device-amp-its-data/m-p/17918#M31</guid>
      <dc:creator>DavidWillett</dc:creator>
      <dc:date>2019-10-10T04:55:44Z</dc:date>
    </item>
    <item>
      <title>Can you spot the scam? - phishing email</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Can-you-spot-the-scam-phishing-email/m-p/17906#M33</link>
      <description>&lt;HTML lang="en"&gt;
&lt;HEAD&gt;
&lt;TITLE&gt;Can you spot the scam? - phishing email&lt;/TITLE&gt;
&lt;STYLE type="text/css"&gt;
	
	.topimage {
display: inline-block;
        width: 999px;
        height: 250px;
        background: url("/t5/image/serverpage/image-id/5124i64EB0BFDEB27725E/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	}
	.title {
display: inline-block;
        width: 222px;
        height: 21px;
        background: url("/t5/image/serverpage/image-id/5106i69FD4F937F67F4C1/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	}
	
    .pexxa {
display: inline-block;
        width: 41px;
        height: 21px;
        background: url("/t5/image/serverpage/image-id/5104iA76E3E8332241D8B/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
   .pexxa:hover {
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5136i745AF0CA36FD7AC7/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
	
	.comau {
display: inline-block;
        width: 64px;
        height: 21px;
        background: url("/t5/image/serverpage/image-id/5105i99D2F6580F959151/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 
	
	.subject {
display: inline-block;
        width: 228px;
        height: 23px;
        background: url("/t5/image/serverpage/image-id/5107iF58D7FB0ABF8BABD/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 
	
		.date {
display: inline-block;
        width: 144px;
        height: 21px;
        background: url("/t5/image/serverpage/image-id/5112i74868B48F81419D6/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 
	
			.time {
display: inline-block;
        width: 72px;
        height: 21px;
        background: url("/t5/image/serverpage/image-id/5113iF1F2B1D58514ADF5/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 
	 .time:hover {
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5137i8D97650FB5306B56/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
	
	.hi {
display: inline-block;
		margin-left: 1px;
        width: 75px;
        height: 18px;
        background: url("/t5/image/serverpage/image-id/5115iD920B9BEA1D2E71F/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 
	
	.wehave {
display: inline-block;
        width: 710px;
        height: 22px;
        background: url("/t5/image/serverpage/image-id/5116iE41F90F5AA8047B4/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 
	
	.failure {
display: inline-block;
margin-left: 2px;
        width: 63px;
        height: 22px;
        background: url("/t5/image/serverpage/image-id/5117iA90C3813EE95ADBC/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 	
	
.failure:hover {
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5138iB170A32C4F47BC32/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
	
	.youmust {
display: inline-block;
        width: 207px;
        height: 22px;
        background: url("/t5/image/serverpage/image-id/5118iBC87AF06248A198A/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 
	
		.immediately {
display: inline-block;
margin-left: 4px;
        width: 109px;
        height: 23px;
        background: url("/t5/image/serverpage/image-id/5121i2207C9BA550887AE/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 	
	
.immediately:hover {
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5141i3D4F789A2759339C/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
	
	.to {
display: inline-block;
margin-left: 3px;
        width: 435px;
        height: 23px;
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5139i06EAC7573A1E9AA2/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 	
	
		.will {
display: inline-block;
        width: 288px;
        height: 23px;
        background: url("/t5/image/serverpage/image-id/5122iD61BC28BE5E975D4/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 	
	
.will:hover {
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5143iB0F594D0E4B16A42/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
	
	.badbutton {
display: inline-block;
        width: 199px;
        height: 62px;
        background: url("/t5/image/serverpage/image-id/5123i70656D98614B0806/image-size/small?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=200") no-repeat;
	} 	
	
.badbutton:hover {
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5144i3A1023C702688C29/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
	
	.postitle {
display: inline-block;
        width: 190px;
        height: 19px;
        background: url("/t5/image/serverpage/image-id/5127i7A53FC32F1209B46/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 	
	
.postitle:hover {
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5146i9B49294F2A9B6B41/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
	
	.lisa {
display: inline-block;
        width: 96px;
        height: 19px;
        background: url("/t5/image/serverpage/image-id/5125i248131F3E349F807/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 	
	
	.kind {
display: inline-block;
        width: 120px;
        height: 23px;
        background: url("/t5/image/serverpage/image-id/5126iA9A2E8F2C041E8D3/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
	} 	
	
	.logobad {
display: inline-block;
        width: 199px;
        height: 62px;
        background: url("/t5/image/serverpage/image-id/5128iD45F892C5EBF8CA8/image-size/small?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=200") no-repeat;
	} 	
	
.logobad:hover {
        background: url("https://community.pexa.com.au/t5/image/serverpage/image-id/5145i5FF0979BBB52A7A5/image-size/large?v=1.0&amp;amp;amp;amp;amp;amp;amp;amp;amp;px=999") no-repeat;
    }
	
	
&lt;/STYLE&gt;

&lt;/HEAD&gt;&lt;BODY&gt;
&lt;P&gt;Below is a seemingly legitimate email from PEXA – but is it?&lt;/P&gt;
&lt;P&gt;There are nine red flags in this email that you should always be on the lookout for. Hover your mouse over parts of the email which you believe to be a red flag to reveal them!&lt;/P&gt;
&lt;P&gt;Tell us in the comments below how many red flags you found! Answers will be released next week.&lt;/P&gt;
&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="topimage"&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;BR /&gt;
	&lt;DIV class="header"&gt;&lt;/DIV&gt;
&lt;DIV class="title"&gt;&lt;/DIV&gt;&lt;DIV class="pexxa"&gt;&lt;/DIV&gt;&lt;DIV class="comau"&gt;&lt;/DIV&gt;
&lt;BR /&gt;
	&lt;BR /&gt;
		&lt;DIV class="subject"&gt;&lt;/DIV&gt;
		&lt;BR /&gt;
			&lt;DIV class="date"&gt;&lt;/DIV&gt;&lt;DIV class="time"&gt;&lt;/DIV&gt;
			&lt;BR /&gt;
			&lt;BR /&gt;
			&lt;DIV class="hi"&gt;&lt;/DIV&gt;
&lt;BR /&gt;
			&lt;BR /&gt;
			&lt;DIV class="wehave"&gt;&lt;/DIV&gt;&lt;DIV class="failure"&gt;&lt;/DIV&gt;
			&lt;BR /&gt;
			&lt;DIV class="youmust"&gt;&lt;/DIV&gt;&lt;DIV class="immediately"&gt;&lt;/DIV&gt;&lt;DIV class="to"&gt;&lt;/DIV&gt;
			&lt;BR /&gt;
			&lt;DIV class="will"&gt;&lt;/DIV&gt;
			&lt;BR /&gt;
&lt;BR /&gt;
			&lt;A href="https://www.loginpexa.com" target="_blank" rel="nofollow noopener noreferrer"&gt;
&lt;DIV class="badbutton"&gt;&lt;/DIV&gt;
&lt;/A&gt;
			&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="kind"&gt;&lt;/DIV&gt;
&lt;BR /&gt;
			&lt;DIV class="postitle"&gt;&lt;/DIV&gt;
			&lt;BR /&gt;
			&lt;DIV class="lisa"&gt;&lt;/DIV&gt;
			&lt;BR /&gt;

&lt;BR /&gt;
			&lt;DIV class="logobad"&gt;&lt;/DIV&gt;
			

  &lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2019 03:09:41 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Can-you-spot-the-scam-phishing-email/m-p/17906#M33</guid>
      <dc:creator>TJ</dc:creator>
      <dc:date>2019-10-11T03:09:41Z</dc:date>
    </item>
    <item>
      <title>Security Advisory - Vulnerability Alert - "Bluekeep"</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert-quot-Bluekeep-quot/m-p/17298#M30</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alert.PNG" style="width: 79px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4973i8851A2CE33FBBAFD/image-dimensions/79x87?v=1.0" width="79" height="87" role="button" title="alert.PNG" alt="alert.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;The threat of cyber-attacks are real but there is something you can do about it.&lt;/FONT&gt;&amp;nbsp; &amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Australian Government’s Cyber Security Center has released a &lt;U&gt;critical security advisory&lt;/U&gt; to individuals and business organizations using older versions of Microsoft Windows operating systems (Windows Vista, Windows 7, Windows XP, Server 2003 and Server 2008) to apply security update/upgrade to newer operating system version to avoid being compromised for the vulnerability named as “Bluekeep”.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is Bluekeep ?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Bluekeep is a vulnerability in the Windows operating system’s Remote Desktop Protocol (RDP – service use to connect to another computer/network remotely) which allows an attacker to execute commands to compromise your computer. BlueKeep exploit has the potential to spread in a&amp;nbsp;virus fashion and self-replicate &lt;U&gt;without&lt;/U&gt; requiring any user interaction.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An unpatched&amp;nbsp;system gives criminals a front door to break into your computer or network and steal your corporate and customer information.&lt;/P&gt;
&lt;P&gt;The threat of cyber-attacks are real but there is something you can do about it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to protect my systems?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Segoe UI',sans-serif;"&gt;It is critical that organisations and individuals operating older versions of Windows systems&amp;nbsp;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;&lt;U&gt;immediately&lt;/U&gt; install Windows&amp;nbsp;BlueKeep vulnerability patch&lt;/SPAN&gt;, available at &lt;A href="https://www.microsoft.com/security/blog/2019/08/08/protect-against-bluekeep/" target="_blank" rel="noopener"&gt;Microsoft website.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Recommendations&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identify the Computer Systems operating older version of Windows Operating Systems. ( Windows Vista, Windows 7, Windows XP, Server 2003 and Server 2008 operating systems)&lt;/LI&gt;
&lt;LI&gt;Confirm you have backup of data available if needed.&lt;/LI&gt;
&lt;LI&gt;Apply the updates through Windows Update or manually by downloading it from &lt;A href="https://www.microsoft.com/security/blog/2019/08/08/protect-against-bluekeep/" target="_blank" rel="noopener"&gt;Microsoft website.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Reach out to your IT service support team and ask them to address the Bluekeep if not already.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Mitigation activities until patch is applied.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Practice due diligence and be alerted around what happens in your computer. If any unusual activities observed, engage your IT personnel to look in to it.&lt;/LI&gt;
&lt;LI&gt;Avoid using Remote Desktop Services from internet. (If needed use it only over a Virtual Private Network and with multi-factor authentication.)&lt;/LI&gt;
&lt;LI&gt;Always keep operating systems and application up to date.&lt;/LI&gt;
&lt;LI&gt;Backup your data to a secure location. (Cloud storage/offsite volume)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More Info -&amp;nbsp;&lt;A href="https://www.cyber.gov.au/news/update-acsc-confirms-potential-exploitation-bluekeep-vulnerability" target="_blank"&gt;https://www.cyber.gov.au/news/update-acsc-confirms-potential-exploitation-bluekeep-vulnerability&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 23:54:25 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert-quot-Bluekeep-quot/m-p/17298#M30</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2019-08-13T23:54:25Z</dc:date>
    </item>
    <item>
      <title>Are you using unsupported software?</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Are-you-using-unsupported-software/m-p/17293#M29</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;The below software is no longer supported by Microsoft and Apple:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Windows Server 2003 and 2008&lt;/LI&gt;
&lt;LI&gt;Windows XP&lt;/LI&gt;
&lt;LI&gt;Windows Vista&lt;/LI&gt;
&lt;LI&gt;Windows 7&lt;/LI&gt;
&lt;LI&gt;Mac OS X (Snow Leopard)&lt;/LI&gt;
&lt;LI&gt;Mac OS X (Mavericks)&lt;/LI&gt;
&lt;LI&gt;Mac OS X (Yosemite)&lt;/LI&gt;
&lt;LI&gt;Mac OS X (El Capitan)&lt;/LI&gt;
&lt;LI&gt;Mac OS X (Sierra)&lt;/LI&gt;
&lt;LI&gt;Mac OS X (High Sierra)&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Why you shouldn’t use unsupported software&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unsupported software will not receive updates or security fixes which are vital in maintaining your system’s security. This leaves your system vulnerable to hackers who actively target unsupported systems.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;In addition, as per your obligations outlined in the &lt;A href="https://www.pexa.com.au/images/uploads/page_parts/Pdfs/PEXA_Subscriber_Security_Policy_v4.pdf" target="_blank" rel="noopener"&gt;PEXA Subscriber Security Policy&lt;/A&gt;: "Subscribers are required to maintain the security of their computer systems by keeping them up to date. This includes maintaining a currently supported operating system."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When using unsupported software, this obligation can no longer be met as these products are not supported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What action is required?&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In order to ensure your compliance with the PEXA Subscriber Security Policy, you must upgrade as soon as possible to a supported version of Windows or macOS.&amp;nbsp;&lt;SPAN style="font-family: inherit;"&gt;Please note that for Mac users, you may have to purchase a new machine in order to upgrade to a supported operating system.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;PEXA recommends reaching out to your IT professional or industry body to assist you with this upgrade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA is responsible for maintaining the security of the network and may take steps to prevent user access to the platform from these unsupported operating systems, to ensure this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Helpful links:&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Upgrading FAQs&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.microsoft.com/en-au/help/12435/windows-10-upgrade-faq" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-au/help/12435/windows-10-upgrade-faq&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Windows Vista end of support&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.microsoft.com/en-au/help/22882/windows-vista-end-of-support" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-au/help/22882/windows-vista-end-of-support&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;How to upgrade (macOS)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.apple.com/au/macos/how-to-upgrade/" target="_blank" rel="noopener"&gt;https://www.apple.com/au/macos/how-to-upgrade/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2021 02:38:54 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Are-you-using-unsupported-software/m-p/17293#M29</guid>
      <dc:creator>Meghan</dc:creator>
      <dc:date>2021-01-18T02:38:54Z</dc:date>
    </item>
    <item>
      <title>Phishing.. Is it only emails?</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Phishing-Is-it-only-emails/m-p/17018#M28</link>
      <description>&lt;P&gt;&lt;STRONG&gt;What is phishing and different variants attached to it?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An email appears to come from a someone you trust, such as your bank, online store, credit card company or a popular website. At first it all appears normal, but it will try to trick you in to giving away sensitive information, installing malware on your device or open an attachment while indicating an urgency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phishing is one of the easiest and very successful avenue for hackers to gain access to your organization's information. Security researchers say more than 90% of the data breaches worldwide are started with a phishing email. For us to defend against this malicious attack type we need to be able to identify the threat as there are multiple variants of methods used by hackers.&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Phishing.PNG" style="width: 1096px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4902i6849F36DDBFBF648/image-dimensions/1096x260?v=1.0" width="1096" height="260" role="button" title="Phishing.PNG" alt="Phishing.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1 id="Phishing..Isitonlyemails?-Keyindicatorsofaphishingemail.Whattolookfor?"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H1&gt;&lt;STRONG&gt;Key indicators of a phishing email. What to look for?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;Article below showcase what you need to look for in an email to make sure it is not part of a phishing campaign. This will help to increase your awareness both in and out of work place.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Capture.PNG" style="width: 999px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4904i604DAABAE4D21072/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Indika Wimalasiri -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 05:25:47 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Phishing-Is-it-only-emails/m-p/17018#M28</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2019-07-24T05:25:47Z</dc:date>
    </item>
    <item>
      <title>Why does Community need 3rd party trackers to operate full capacity?</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Why-does-Community-need-3rd-party-trackers-to-operate-full/m-p/16949#M32</link>
      <description>&lt;P&gt;Why is it needed to allow these 3rd party trackers for posting and liking?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="merely curious since not really discussed anywhere..." style="width: 351px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4886iAD1F1AD0CD312532/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Community-3rd party trackers.PNG" alt="merely curious since not really discussed anywhere..." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;merely curious since not really discussed anywhere...&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 04:56:58 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Why-does-Community-need-3rd-party-trackers-to-operate-full/m-p/16949#M32</guid>
      <dc:creator>DMc</dc:creator>
      <dc:date>2019-07-22T04:56:58Z</dc:date>
    </item>
    <item>
      <title>Cyber-Criminals, the Modern-Day Con Artists</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Cyber-Criminals-the-Modern-Day-Con-Artists/m-p/16584#M27</link>
      <description>&lt;P&gt;Con artists have been constant figures throughout our society’s evolution. From ‘short-cons’, like the &lt;SPAN&gt;&lt;A href="https://www.goodtricks.net/three-card-monte.html" target="_blank" rel="noopener"&gt;Three-Card Monte&lt;/A&gt;&lt;/SPAN&gt; to ‘long-cons’, when Victor Lustig sold the &lt;SPAN&gt;&lt;A href="https://pvteyes.com/the-most-elaborate-cons-in-history/" target="_blank" rel="noopener"&gt;Eiffel Tower&lt;/A&gt;&lt;/SPAN&gt; as scrap metal back in 1925. They use their smarts and &lt;SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-Tale-A-look-behind-the-curtain-2/m-p/13784" target="_blank" rel="noopener"&gt;charisma&lt;/A&gt;&lt;/SPAN&gt; to gain the trust of unexpectant victims, all for financial gain.&lt;/P&gt;
&lt;P&gt;Over the past 20-30 years, the world has evolved dramatically, with advances in technology taking precedence. This has given rise to the modern-day con artist; hackers or cyber-criminals. Since the emergence of &lt;SPAN&gt;&lt;A href="https://phrasee.co/a-brief-history-of-email/" target="_blank" rel="noopener"&gt;e-mail,&lt;/A&gt;&lt;/SPAN&gt; it has been one of the most prominent and successful mediums for fraud world-wide, including the conveyancing industry; as an entry way to more elaborate scams. For us, the every-day person, employee or business owner, it is essential that we are aware of the real risks of cyber-crime.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Eiffel Tower SOLD_ option 2.png" style="width: 400px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4836i250B12065C7C3397/image-size/medium?v=1.0&amp;amp;px=400" role="button" title="Eiffel Tower SOLD_ option 2.png" alt="Eiffel Tower SOLD_ option 2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The following scenario is one example of a hacker at large, trying to ‘con’ their way into the conveyancing industry with a duplicate website.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Hacker&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Elliot has been dabbling in cyber-crime for some time. It’s quite a lucrative career – if you know what you’re doing – which he and his team do. &lt;SPAN&gt;He is involved in penetrating computer systems, collecting passwords and then selling them to other cyber-criminals for profit. &lt;/SPAN&gt;&amp;nbsp;However, this time, Elliott decided to do something more elaborate than simply selling these credentials.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“One of these usernames and passwords has landed me a gold-mine. I noticed a few ‘PEXA’ e-mails in this person’s inbox. I did my research and figured it could be a big win for the team. The username and password I have doesn’t match his PEXA account, but I have another way in.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The team and I set about duplicating the PEXA login page. In the end it looked almost identical to the original and we placed it on a &lt;SPAN&gt;&lt;A href="https://www.websitebuilderexpert.com/web-hosting-services/" target="_blank" rel="noopener"&gt;hosting service&lt;/A&gt;&lt;/SPAN&gt; based in Belize. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Next step, we sent the link via a duplicate PEXA e-mail and waited for our victim, Barry, to enter his details into the fake website. Once we capture his credentials, we’ll have easy access to his account, and his client’s money! &lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Victim&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Barry’s firm keeps its staff up-to-date with the latest cyber-security trends. They complete security awareness training to maintain the firm's security posture and the integrity of its service. Barry considers himself to be security-savvy, so he had no worries that morning when he opened his inbox.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“I scrolled through my e-mails and noticed a PEXA workspace notification which I opened straight away. I have a million-dollar settlement today and want it to go smoothly. I clicked on the link in the e-mail and instantly thought twice about my decision – it’s unusual for any company to send you a link to their login page. However, the PEXA login page looks legitimate. Although, before I progress any further, I’d better ensure the web page&amp;nbsp;is secure…&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;I look up at the address bar to check for a padlock symbol – no joy. Instead there’s a red triangle with a white exclamation mark inside. Next, I check the URL begins with ‘http&lt;FONT color="#FF0000"&gt;s&lt;/FONT&gt;’. It didn’t - Oh no!&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;I exit the page immediately and sigh a breath of relief that I hadn’t entered my credentials into the page. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;I’d better let PEXA know, other practitioners might not check the website’s security level…”&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Hacker&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;On the other side of the world, Elliot checks if Barry has fallen for his scam.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“It looks like Barry is more tech-savvy than we expected. He didn’t enter his details into our fake website. But not to worry, we’ve sent it to multiple others in his industry. Someone is bound to fall for it.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Hold on. The website has been removed, Barry must have also informed PEXA. **bleep** it, all that time and money wasted…”&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Elliot and his team quickly bounce back from their failed website scam and start planning their next con.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“We didn’t fool them this time, but wait until they see what else we have up our sleeves…”&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To learn more about how to identify duplicate websites, please refer to the article "&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://community.pexa.com.au/t5/Security-Updates/How-to-identify-duplicate-or-unsafe-websites/td-p/16583" target="_blank" rel="noopener"&gt;How to identify duplicate or unsafe websites&lt;/A&gt;"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 02:44:36 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Cyber-Criminals-the-Modern-Day-Con-Artists/m-p/16584#M27</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2019-06-27T02:44:36Z</dc:date>
    </item>
    <item>
      <title>How to identify duplicate or unsafe websites</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/How-to-identify-duplicate-or-unsafe-websites/m-p/16583#M26</link>
      <description>&lt;P&gt;It’s important to be aware of how to identify a duplicate or unsafe website. You can easily check the &lt;SPAN&gt;&lt;A href="https://support.google.com/chrome/answer/95617?visit_id=636935864125192593-1331840948&amp;amp;p=ui_security_indicator&amp;amp;rd=1" target="_blank" rel="noopener"&gt;security certificate&lt;/A&gt;&lt;/SPAN&gt; beside the web address (URL). You’ll see one of the following three symbols.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Web Security.png" style="width: 185px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4835i28D201BC4EDDE390/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Web Security.png" alt="Web Security.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tips&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;If a website does not display the first symbol above (padlock), this confirms that it is not secure and everything you do is susceptible to a cyber-attack. We recommend you close the browser without completing any further actions such as inserting your login credentials etc.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Check if the address begins with "http&lt;FONT color="#FF0000"&gt;s&lt;/FONT&gt;” (not "http)". This will be another indicator of a website’s security level. If you see "http", this means that there is no encryption in place, and information you provide on that page is at risk of being seen by unauthorized personnel.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you’d like more information about website safety or other aspects of cyber security, the Australian Government’s &lt;SPAN&gt;&lt;EM&gt;&lt;A href="https://staysafeonline.org/" target="_blank" rel="noopener"&gt;Stay Safe Online&lt;/A&gt;&lt;/EM&gt;&lt;/SPAN&gt; website provides practical tips to assist everyone in staying secure while online.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Indika Wimalasiri&lt;/P&gt;
&lt;P&gt;(PEXA Security Team)&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 02:03:01 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/How-to-identify-duplicate-or-unsafe-websites/m-p/16583#M26</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2019-06-27T02:03:01Z</dc:date>
    </item>
    <item>
      <title>Security Advisory - Vulnerability Alert</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert/m-p/16454#M25</link>
      <description>&lt;P style="background: white; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;Dear PEXA Community,&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="background: white; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: purple;"&gt;This advisory applies to Microsoft Outlook App installed on Android devices.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;New vulnerability in the Microsoft Outlook App for Android has been discovered. Attackers could use this vulnerability to gain access to your emails and phone by inviting you to click on a crafted link.&amp;nbsp;Microsoft has released an update to its Outlook app through the Android Google Play Store.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;PEXA Security advises its members using Outlook app for emails on Android devices to update the app at your earliest window.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;How do I get the update for Outlook for Android?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;1. Tap the Google Play icon on your home screen.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;2. Swipe in from the left edge of the screen.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;3. Tap My apps &amp;amp; games.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;4. Tap the Update box next to the Outlook app.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;Note - Security always recommends keeping your mobile device OS and Apps up to-date by applying updates as soon as they are available.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;PEXA Security Team&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 7.5pt 0cm .0001pt 0cm;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2019 05:03:27 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert/m-p/16454#M25</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2019-06-21T05:03:27Z</dc:date>
    </item>
    <item>
      <title>Why Me? Peter’s patching pickle</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Why-Me-Peter-s-patching-pickle/m-p/16195#M24</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image001.jpg" style="width: 620px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4764i8488FF8B1D7B7DE7/image-size/large?v=1.0&amp;amp;px=999" role="button" title="image001.jpg" alt="image001.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Peter: Tuesday&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Today is my favorite day of the year, my firm's birthday, marking 12 years since I poured my heart, my soul and my savings into my dream; this company. It’s an incredibly proud and emotional day for me as I have spent my whole career building this business. It’s a small firm, but the key to my success lies in my skill to network and I digitally store a comprehensive list of all my network contacts and clients’ details in a secure computer. Through this, I can tailor my service to each individual client without having to re-ask for information I already know.&lt;/P&gt;
&lt;P&gt;My nephew Matt is a good kid, he helps me out with my firm’s IT environment and set up all my networking stuff, including the firewalls which protect web traffic. He will often visit and check my systems whilst he has a coffee and chat, but lately, he has been pretty busy with his studies, so my IT environment has taken a back seat for the meantime.&lt;/P&gt;
&lt;P&gt;I vaguely remember my nephew mentioning something about a new Microsoft patch released to fix a vulnerability, but I'm too busy at the moment. Besides, last time I installed a patch my computer restarted, and I don't have the time to go through and save all my working documents; I’ll install it tomorrow.&lt;/P&gt;
&lt;P&gt;Little did I know that today is also Elliot's favorite day, &lt;A href="https://blog.sonicwall.com/en-us/2017/01/simple-tips-for-network-sanity/" target="_blank" rel="noopener"&gt;Microsoft’s “Patch Tuesday”&lt;/A&gt;. The day that Microsoft releases patches for Windows’ users to protect their machines. Elliot is a skilled hacker and is able to analyse the details of the patch and uncover what vulnerabilities it might be trying to solve. This means that on &lt;A href="https://blog.sonicwall.com/en-us/2017/01/simple-tips-for-network-sanity/" target="_blank" rel="noopener"&gt;“Exploit Wednesday”&lt;/A&gt;, Elliot and his team can deliver codes to exploit systems that haven't installed the patch, and he has just selected me as his victim.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Wednesday&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I'm sitting at my desk tending to my daily emails when my mouse cursor starts moving across the screen without me touching it. At first, I think it's my brain playing tricks on me, last night was a big night out celebrating with my colleagues after all, so maybe I’m just tired, but no! There - it moved again!&lt;/P&gt;
&lt;P&gt;Confused, I take my mouse and bang it against the desk - but that doesn’t help. I look up and see my cursor opening and closing my client’s files with all their personal information. I frown. I don’t have time for technology to be breaking, especially when I'm so busy. I send a frustrated message to Matt asking him to order me a new mouse.&lt;/P&gt;
&lt;P&gt;As I leave the office my receptionist calls out to me, she sounds worried. She tells me that her mouse has been doing strange things lately, even when she disconnects it from her PC. To my dismay, I see her cursor darting around the screen like it did on mine, opening and closing files.&lt;/P&gt;
&lt;P&gt;I start to feel concerned - two mouse devices can’t possibly break on the same day! I call Matt again and ask him to come in first thing tomorrow.&lt;/P&gt;
&lt;P&gt;As I leave the office Elliot continues his work, he is able to control my screen through his own, a vulnerability that the latest patch would have fixed. Elliot is especially interested in the numerous files I have of client information and is able to seamlessly access and copy them. Elliot loves people who don’t install their patches, it almost makes his job too easy!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Thursday&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Matt inspects my computer and I stand behind him, anxiously shifting my weight to each foot. Eventually, he leans back in the chair and closes his eyes, “did you install the Microsoft patch on Tuesday?”.&lt;/P&gt;
&lt;P&gt;I stammered, informing him that I hadn't. But surely that wouldn't explain the issue with my mouse? Matt goes on to inform me that both mine and the receptionist’s computer had been remotely accessed and controlled by a third party via remote desktop. And because of this, the hacker was able to access all our sensitive information – including my client’s.&lt;/P&gt;
&lt;P&gt;Before I can begin to panic, a notification pops up on my computer, Matt stops mid-sentence and opens the email, but it's an email from me, to me. How could that have happened?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Peter,&lt;/P&gt;
&lt;P&gt;I have accessed all your client’s information including photo identification, names, email, addresses and bank information. I have posted them for sale on the &lt;A href="https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html" target="_blank" rel="noopener"&gt;dark web&lt;/A&gt;. If you transfer 0.72 &lt;A href="https://www.coindesk.com/information/what-is-bitcoin" target="_blank" rel="noopener"&gt;bitcoin&lt;/A&gt;* to XXX XXX XXX I will remove them immediately.&lt;/P&gt;
&lt;P&gt;You have until 3pm.&lt;/P&gt;
&lt;P&gt;-Elliot&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Approximately $8,803 AUD&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I look to Matt, waiting for him to tell me this is a joke, but he sits there quietly staring into the distance. Upon further investigation, we see that each computer has been sending my client information to a strange email account, but there is nothing we can do – it's too late now. And how can I trust that this so-called Elliot will pull the information down from the dark web if I pay him??&lt;/P&gt;
&lt;P&gt;I’m filled with despair and guilt, if my client's information is purchased, then criminals could perform identity theft and significantly impact their lives, and I would be the one responsible for it! I’m filled with shame, how am I ever going to sleep knowing this was my fault?&lt;/P&gt;
&lt;P&gt;Gosh, Why me?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The next day&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The next few weeks are spent cleaning up the mess Elliot made, I have emailed all my clients and informed them that their sensitive information has been obtained and the possible effects of this. In addition, I have reported the incident to the Privacy Commissioner, just to be safe.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Patching &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The patch that Peter didn’t install, known as &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener"&gt;CVE-2019-0708&lt;/A&gt;, was fixing a vulnerability in the &lt;A href="https://searchenterprisedesktop.techtarget.com/definition/Remote-Desktop-Protocol-RDP" target="_blank" rel="noopener"&gt;Remote Desktop Protocol (RDP)&lt;/A&gt; service that enabled it to be abused remotely. Because Peter did not install the patch, highly skilled and trained Elliot, was able to remotely use Peter’s desktop, access his files and send information to himself.&lt;/P&gt;
&lt;P&gt;Software patches usually fix identified vulnerabilities within your system that could be exploited by hackers. Most operating systems, by default, are configured to automatically apply patches when a system is restarted. If yours does not do this, speak with your IT professional to “enable automatic updates”.&lt;/P&gt;
&lt;P&gt;Often, people avoid installing patches because they see it as an inconvenience. Usually, your PC must fully shut down for the patch to be installed. However, in Peter’s instance, he could have saved his clients sensitive information and his business by taking a few minutes to install the patch. Read more information on patching&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Patching/ba-p/14660" target="_blank" rel="noopener"&gt; here.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 23:32:09 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Why-Me-Peter-s-patching-pickle/m-p/16195#M24</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-06-05T23:32:09Z</dc:date>
    </item>
    <item>
      <title>Working Outside the Office?</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Working-Outside-the-Office/m-p/16035#M46</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The introduction of e-Conveyancing has afford&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ed&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;industry&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;greater flexibility&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;in their work life&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;f&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;rom&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.pexa.com.au/news/set-sail-and-settle" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;signing&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;in Slovakia&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.pexa.com.au/news/pexa-liberates-bankwest-employees" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;ad&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;opting flexible work hours&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Whether you’re working from home or overseas, we recommend the following when using PEXA outside the office.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Take your laptop&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;using PEXA&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;outside of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;your usual environment&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, we recommend you use your own device because:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="2" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;U&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;nfamiliar&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;device&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, such as&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;a&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;hotel’s computer,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;might not have&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;level of virus protection&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;necessary&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to comply with&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.pexa.com.au/images/uploads/page_parts/Pdfs/PEXA_Subscriber_Security_Policy_V2.4.pdf" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;PEXA’s Subscriber Security Policy&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to protect you and your clients.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="2" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Your own device should already have signing software downloaded, a&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;n unfamiliar&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;device will not.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;As a result&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;you’ll have to download and install the software onto the new device – which may not have the correct level of protection.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;2. &lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Do not use public&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;WiFi&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;We r&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;ecommend&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;&amp;nbsp;you&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;&amp;nbsp;use your mobile&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;as&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;&amp;nbsp;a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;hotspot&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;(or purchase a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;4G mobile router&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;). This will provide you with a safer connection online.&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;C&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;heck with your mobile carrie&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;r&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;&amp;nbsp;as data roaming charges from mobile devices may apply&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;" data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Public&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;WiFi&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;– whether it’s at your hotel or at McDonalds&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;- is easily compromised&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;by hackers and your&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;personal information can be&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;obtained&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;3.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Keep you&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;r&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;DigiCert&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;safe&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Ensure you pack your&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Digital-Certificates/ba-p/166" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;digital certificate (DigiCert)&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Y&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ou’ll need it to sign&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;in PEXA&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;as no one else is&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.arnecc.gov.au/publications/model_participation_rules" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;permitted to&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;do so&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;on your behal&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;f&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;When out of the office we recommend you:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="4" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Disconnect your DigiCert from&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;your&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;computer when no longer accessing PEXA&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="4" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Do not leave it unattended or in a public place&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="4" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Keep it in a secure, lockable location&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(unless you are taking it with you)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Use MFA via the&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;smart&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;phone app&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Multi-factor-authentication-FAQs/ba-p/10693?advanced=false&amp;amp;collapse_discussion=true&amp;amp;q=mfa&amp;amp;search_type=thread" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;M&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;ulti-factor authentication (MFA)&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;via&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;PingID&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;gives&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;PEXA Members&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;an extra layer of security as&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;they&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;are required to provide both&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;a&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;password and&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;a&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;one-time passcode&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;when logging into PEXA&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When out of the office or overseas, the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;PingID&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;smartphone&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;app works best&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;as it&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;provides the code instantly.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;A&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;code via SMS&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;can sometimes be delayed&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;if&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;your mobile phone service is limited&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;or disrupted.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;F&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;u&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;rther, i&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;f you&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;’&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;re travelling overseas and have not enabled roaming, you&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;’&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ll still receive your authentication code if your phone is&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;connected to the internet&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;STRONG&gt;&amp;nbsp;5.&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;Use PEXA Key&lt;/STRONG&gt;&lt;BR /&gt;If you’re working remotely and cannot attend face-to-face client meetings, PEXA Key provides your business with an extra layer of security when communicating bank account details and allows homebuyers and sellers to track their settlement on their phone.&lt;/P&gt;
&lt;P&gt;Bank and trust account details are communicated via the PEXA Key app, removing the need to use email and mitigating you and your client’s risk of succumbing to &lt;A href="https://www.pexa.com.au/security/members" target="_blank" rel="noopener"&gt;phishing&lt;/A&gt; attacks.&lt;/P&gt;
&lt;P&gt;For more information about PEXA Key, visit our &lt;A href="https://community.pexa.com.au/t5/PEXA-Key/ct-p/PEXA-Key" target="_blank" rel="noopener"&gt;help page&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 6.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Getting help while you’re away&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;PEXA&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.pexa.com.au/support" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Support Centre&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is available by phone on 1300 054 515 between 8.30am – 8.00pm AEST/DT. You can also e-mail the team at&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:support@pexa.com.au" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;support@pexa.com.au&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. If you e-mail outside&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;of operating hours the team will respond&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;the following business day.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;e-Conveyancing Community is another excellent resource you can access for help online via community@pexa.com.au.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2020 22:51:07 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Working-Outside-the-Office/m-p/16035#M46</guid>
      <dc:creator>HeatherC</dc:creator>
      <dc:date>2020-03-18T22:51:07Z</dc:date>
    </item>
    <item>
      <title>Security Advisory - Vulnerability Alert</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert/m-p/15910#M21</link>
      <description>&lt;P&gt;Dear PEXA Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This notice is for anyone that uses Microsoft Windows 7 or Windows Server 2008.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft has recently announced a &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0708#ID0EGB" target="_blank"&gt;critical vulnerability in its Remote Desktop Protocol for Microsoft Windows 7 and Windows Server 2008.&lt;/A&gt; This vulnerability opens up the possibility for unauthorised access to your computer system and data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a user, it is important that your Windows software is kept up to date to ensure that your device is secure. To keep your Windows software updated, &lt;A href="https://support.microsoft.com/en-au/help/12373/windows-update-faq" target="_blank"&gt;please refer to this article.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PEXA recommends you reach out to your IT Support team/provider if you require further assistance in addressing this security issue.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PEXA Security Team&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 05:31:33 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert/m-p/15910#M21</guid>
      <dc:creator>jesselane</dc:creator>
      <dc:date>2019-05-16T05:31:33Z</dc:date>
    </item>
    <item>
      <title>Why Me? - Password blunder</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Why-Me-Password-blunder/m-p/15857#M20</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="why me image.jpg" style="width: 341px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4713i21C0886E2A73D923/image-dimensions/341x286?v=1.0" width="341" height="286" role="button" title="why me image.jpg" alt="why me image.jpg" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Just another day for John&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;It’s Monday morning and everything is going smoothly. I made breakfast for my kids, dropped them off at school on time and the barista didn’t burn my coffee – a great start to the day. I get to my desk and look through my emails and I notice there are quite a few spam messages in my inbox. One of them says I won a free toaster, and another is an Indian prince claiming to be my uncle, the usual silly scams. I’m pretty savvy when it comes to security and have never had a breach. My firm uses some of the best firewall and virus protection software available. In addition, I even have a strong password that no-one will ever guess, and I use it across all my accounts so that everything is secure.&lt;/P&gt;
&lt;P&gt;After a day full of meetings, I return to my desk and decide to check LinkedIn. I like to keep up with industry news, and a lot of my business comes from the connections I make through the website.&lt;/P&gt;
&lt;P&gt;Little did I know that somewhere in the world, Elliot, an individual in an organised group of hackers, was searching the &lt;SPAN&gt;&lt;A href="https://www.zdnet.com/article/how-the-dark-web-works/" target="_blank" rel="noopener"&gt;Dark Web&lt;/A&gt;&lt;/SPAN&gt;&lt;U&gt;,&lt;/U&gt;&amp;nbsp;where illegal information can be bought and sold. Elliot stumbles across 117 million &lt;SPAN&gt;&lt;A href="https://darkwebnews.com/dark-web/117million-linkedin-accounts-forsale/" target="_blank" rel="noopener"&gt;leaked LinkedIn username and passwords&amp;nbsp;&lt;/A&gt;&lt;/SPAN&gt;for &lt;SPAN&gt;&lt;A href="https://www.coindesk.com/information/what-is-bitcoin" target="_blank" rel="noopener"&gt;2 bitcoin&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;($16,853). How interesting. His team quickly purchases the data, as 2 bitcoin is nothing considering the monetary opportunities the data could present. Elliot and his team get to work downloading the data and selecting their victims.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Two weeks later &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;It wasn’t a good morning. The kids were dropped off late, one of my daughters left their lunch at home and the traffic was abysmal. To make things worse, the petrol prices had gone up another 2 cents – great. I get into the office and my mobile starts ringing almost as soon as I sit down. It’s my mother.&lt;/P&gt;
&lt;P&gt;“Hi Mum, how are you?”&lt;/P&gt;
&lt;P&gt;“Yes, good. I transferred the money you needed for your car repair. Here I was thinking that the days of you asking me for money were over! Also, when did you change banks?”&lt;/P&gt;
&lt;P&gt;I frowned. I didn’t recall asking her for any money, and what car repair or new bank account was she talking about?&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;“I never asked you for money”&lt;/P&gt;
&lt;P&gt;“Yes, you did, last night on Facebook!”&lt;/P&gt;
&lt;P&gt;I start to wonder if my mother had finally gone crazy. Suddenly, my desk phone starts ringing, it's one of my most loyal clients.&lt;/P&gt;
&lt;P&gt;“John, why am I getting emails from you with dodgy links, and you’ve been asking me for money that I don’t owe you, have you been hacked?”&lt;/P&gt;
&lt;P&gt;I quickly access my work email and see to my horror that last night over 100 emails were sent to my clients from my email address, some asking for money, others with suspicious links that I was too scared to click. But I never sent these emails! What’s happening?&lt;/P&gt;
&lt;P&gt;Next, I login to my LinkedIn account and see that someone has been posting advertisements from my account, some of them extremely inappropriate coming from someone who considers themselves a professional. I quickly scramble to delete them all, but most of them have already received scathing comments.&lt;/P&gt;
&lt;P&gt;I don’t understand what is going on. My heart races and I sink down into my seat, I wouldn’t be surprised if this day marks the end of my career.&lt;/P&gt;
&lt;P&gt;Why me?&lt;/P&gt;
&lt;P&gt;Unbeknownst to me, over the past two weeks Elliot and his team had been working to execute the perfect crime. Known as &lt;SPAN&gt;&lt;A href="https://www.wired.com/story/what-is-credential-stuffing/" target="_blank" rel="noopener"&gt;credential stuffing&lt;/A&gt;&lt;/SPAN&gt;, the group was able to use my credentials to access different accounts through automation, and because I used the same password for every account, they were able to easily access my social channels, work email and destroy my professional reputation. Having a strong password is great, but using it for everything isn’t.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Two hours later&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;My IT supplier confirms that majority of my accounts have been compromised and advises me to change all my passwords and employ a password manager, so I don’t have to remember them all. I post a statement on my website announcing that I have been hacked and instruct my clients to not click on or engage with any material that they have received. The next three weeks I spend ringing my clients and family to explain what has happened, but it’s too late. My reputation is ruined.&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Strong passwords &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As far-fetched as it may seem, what happened to John has happened to ordinary people before. It is vital that individuals protect themselves and their personal information by using strong passwords that are &lt;SPAN&gt;&lt;A href="https://medium.com/tech-ramblings/different-passwords-on-different-accounts-it-matters-974f2fdb93c7" target="_blank" rel="noopener"&gt;unique to each account&lt;/A&gt;&lt;/SPAN&gt;. Because John used the same password for everything, Elliot was able to use John’s login information to access all his accounts, impersonate him and obtain information.&lt;/P&gt;
&lt;P&gt;Understandably, it’s unrealistic that you will be able to create and remember strong passwords for each account so you may want to consider a &lt;SPAN&gt;&lt;A href="https://www.howtogeek.com/141500/why-you-should-use-a-password-manager-and-how-to-get-started/" target="_blank" rel="noopener"&gt;password manager&lt;/A&gt;&lt;/SPAN&gt;.&amp;nbsp;By doing this, you will only need to create and remember a strong password for the password manager and change the password every six months.&lt;/P&gt;
&lt;P&gt;When you change your password, you should change the entire combination rather than the number at the end. Hackers know this is a common practice and will try different numbers against the end of your password.&lt;/P&gt;
&lt;P&gt;When creating a password, it is recommended that you choose two, easily remembered words that are separated by two symbols and a number, e.g. “Alpaca7!@housE”. To make it easier to remember, you could use the names of objects that are around you.&lt;/P&gt;
&lt;P&gt;For more information on strong passwords click &lt;SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Strong-Passwords/ba-p/14658" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 00:59:51 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Why-Me-Password-blunder/m-p/15857#M20</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-05-15T00:59:51Z</dc:date>
    </item>
    <item>
      <title>Security Advisory - Vulnerability Alert</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert/m-p/15103#M19</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dear PEXA Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This security vulnerability notice &lt;U&gt;only applies&lt;/U&gt; to members using an ASUS branded laptop device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security researchers have discovered a critical vulnerability with ASUS laptop computers relating to its “Live Update” software component. Live Update is functionality on ASUS laptop computers that keeps your ASUS laptop software up-to-date .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a user, you are required to &lt;STRONG&gt;update the “Live Update” software component to Version 3.6.8 or higher&lt;/STRONG&gt; at your earliest window to ensure your device is secure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The article linked below, published by the vendor, outlines the steps you are required follow to make your device secure.&lt;/P&gt;
&lt;P&gt;To ensure your device is safe please follow the details &lt;A href="https://www.asus.com/support/FAQ/1018727/" target="_blank"&gt;here.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA recommends you reach out to your IT Support team/provider if you require further assistance in addressing this security issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA Security Team&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 03:12:21 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert/m-p/15103#M19</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2019-03-28T03:12:21Z</dc:date>
    </item>
    <item>
      <title>A Hacker’s Tale – A look behind the curtain #3</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-Tale-A-look-behind-the-curtain-3/m-p/14832#M18</link>
      <description>&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Seasonal Attacks&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Imagine it’s 3 weeks till Christmas&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You’ve got (e)mail! (&lt;SPAN&gt;&lt;SPAN class="char" data-decimal="9993" data-entity="&amp;amp;#9993;" data-id="43595"&gt;✉&lt;/SPAN&gt;&lt;/SPAN&gt;)&lt;/P&gt;
&lt;P&gt;The email says that you are due to receive a parcel delivery from FedEx. You weren’t expecting anything, but then, it’s close to Christmas. It could be something special – who could it be from? Excitedly, you quickly fill in the required details and send the email. You and your team at your conveyancing firm have been receiving an unusually high number of emails lately. It must be that time of the year, when old contacts try to connect, and banks ask you to validate information. A couple of them have clearly been phishing emails – thank goodness they were identified.&lt;/P&gt;
&lt;P&gt;Unbeknownst to you, you’ve missed some.&lt;/P&gt;
&lt;P&gt;Meanwhile at the other end of these phishing emails, Elliot is slowly gathering information about you and your firm. Through his multiple phishing emails, he’s managed to obtain quite a bit of information about you, your assistant and some of your colleagues. It was relatively easy to follow you from the coffee shop’s free Wi-Fi. As the ‘man in the middle’ (&lt;A href="https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-tale-A-look-behind-the-curtain-1/m-p/13116" target="_blank" rel="noopener"&gt;MITM&lt;/A&gt;), he’s managed to have continuous conversations with you and your client Grace. Now he’s just waiting for you to take the bait.&lt;/P&gt;
&lt;P&gt;Finally, success! Elliot’s managed to install malware&lt;A href="applewebdata://4A56DEDF-3B64-4F1A-97DF-F3BC7B0A218F#_ftn1" target="_blank" rel="noopener" name="_ftnref1"&gt;&lt;SPAN&gt;[1]&lt;/SPAN&gt;&lt;/A&gt; into your system through one of the links you clicked on. This spyware will hide in the background and watch what you’re doing online. It records your online activities and data such as your passwords, credit card details and the websites you regularly visit. All this is happening while you remain unaware that your personal data is being compromised.&lt;/P&gt;
&lt;P&gt;By the way, did you know that Elliot isn’t really just Elliot. He is an individual in an organised group comprising of six to seven other perpetrators existing for the purpose of theft. Not wanting to put all their eggs in one basket, at any given time, the team may be running multiple online schemes targeting many organisations. They have spent weeks planning this one, fooling different people and collecting information.&lt;/P&gt;
&lt;P&gt;In order to perform the theft of the funds from you and your client, Grace, they have also been spending time cultivating people that can execute the transfer of these stolen funds. Abigail King looks positive as a &lt;A href="https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-Tale-A-look-behind-the-curtain-2/m-p/13784" target="_blank" rel="noopener"&gt;money mule&lt;/A&gt; victim.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Grinch_0001_The-Grinch-Carrey-steals-this-holiday-show.jpg" style="width: 999px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4473i4238FA33103A7039/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Grinch_0001_The-Grinch-Carrey-steals-this-holiday-show.jpg" alt="Grinch_0001_The-Grinch-Carrey-steals-this-holiday-show.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;A couple of days before Christmas&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The group has been busy. They’ve managed to set it up – pretending to be Grace they’ve instructed you to transfer the proceeds from the sale of her house to Abigail King. Once the settlement has completed, $250,000 is moved immediately to Abigail’s bank account. Soon after, she will transfer the money, just under $10,000 at a time, to the group’s overseas account; until she gets caught that is.&lt;/P&gt;
&lt;P&gt;Back at your conveyancing firm the property transaction was settled several days ago, but you’ve only just realised what’s happened. The funds have gone to the account you’ve told it to go to, but that’s not the right one! You call the bank. They say that they’ll look into it.&lt;/P&gt;
&lt;P&gt;Uncertain what to do next, you ring PEXA and inform them that your email account was possibly compromised. PEXA contacts the bank who holds Abigail’s account, ensuring no further funds can be transferred out. However, approximately $30,000 has already been transferred to an overseas account.&lt;/P&gt;
&lt;P&gt;The bank works with their counterparts to retrieve the money. They manage to recover close to $20,000 as the remaining $10,000 has already been physically withdrawn. Just under $240,000 is returned to Grace in total, it’s not everything.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;After Christmas&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It’s been a few days since the incident, and because it was a phishing scam you contacted your PI insurer, they should be able to cover the money that Grace lost through your cyber security policy. As a precaution, you arrange a full review of your firm’s IT security system as well as change your passwords, and suggest that Grace, do the same. You make a mental note that in the future, you will be diligent in verbally confirm bank details, only using private secure Wi-Fi networks and being wary of phishing email scams. It may also be a good idea to install a firewall to protect your systems from malware. The biggest deterrent to a cybercriminal is attempting to break through a robust cyber security system. They will generally go for an easier target because they are financially motivated to get in and out quickly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cybercrime in Australia&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Email is the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.sonicwall.com/en-us/resources/infographics/stopping-advanced-email-threats" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;common technique&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&lt;SPAN&gt;used by cyber criminals and according to the Cyber Security Review, led by the Department of the Prime Minister and Cabinet, cybercrime costs the Australian economy approximately &lt;/SPAN&gt;&lt;A href="https://www.acic.gov.au/about-crime/organised-crime-groups/cybercrime" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;AUD 1B&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&lt;SPAN&gt;per annum.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The &lt;A href="https://www.acic.gov.au/about-crime/organised-crime-groups/cybercrime" target="_blank" rel="noopener"&gt;Australian Criminal Intelligence Commission&lt;/A&gt; (ACIC) states that Australia is an attractive target for serious and organised crime syndicates, and because of the lucrative financial gains, cybercrime is a serious threat.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;According to some experts, the majority of hackers are affiliated in one way or another to &lt;A href="https://www.zdnet.com/article/disorganized-crime-and-state-backed-hackers-the-cybercrime-landscape-is-changing/" target="_blank" rel="noopener"&gt;organised groups&lt;/A&gt;. They operate like a &lt;A href="https://www.zdnet.com/article/cybercrime-inc-how-hacking-gangs-are-modeling-themselves-on-big-business/" target="_blank" rel="noopener"&gt;legitimate business&lt;/A&gt; with people who have a range of skills working towards a common goal.&lt;/P&gt;
&lt;P&gt;Some organised groups receive direction and support from &lt;A href="https://www.fireeye.com/current-threats/apt-groups.html" target="_blank" rel="noopener"&gt;nation states&lt;/A&gt; – who exist with the purpose of stealing data, disrupting operations or destroying infrastructure. The state sponsors a coordinated attack with the intention of acquiring intellectual property or government data, many of these groups are a part of a collective ‘army’.&lt;/P&gt;
&lt;P&gt;In this fictional story, Elliot does not belong to a nation state. He is a member of an organised group, that exist for the purpose of theft. It is highly likely that this group do not reside in Australia and like most others, live a lucrative lifestyle off the stolen proceeds. The reality of this story is that it can happen to you, and that being aware, and putting in the right cyber security controls can stop you from becoming another cybercrime statistic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="applewebdata://4A56DEDF-3B64-4F1A-97DF-F3BC7B0A218F#_ftnref1" target="_blank" rel="noopener" name="_ftn1"&gt;&lt;SPAN&gt;[1]&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://www.avg.com/en/signal/what-is-malware" target="_blank" rel="noopener"&gt;Malware&lt;/A&gt; is malicious software, written with the intent of doing harm to data, devices or people.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 04:45:33 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-Tale-A-look-behind-the-curtain-3/m-p/14832#M18</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-03-08T04:45:33Z</dc:date>
    </item>
    <item>
      <title>Security Advisory - Vulnerability Alert</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert/m-p/14829#M17</link>
      <description>&lt;P&gt;Dear PEXA Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;High severity vulnerability has been discovered in the Google Chrome Internet browser. Attackers can use this unpatched vulnerability to steal information from your computer.&lt;/P&gt;
&lt;P&gt;Google has issued an update to the Chrome Internet browser to address the vulnerability. PEXA Security strongly recommend PEXA members check the version of the Chrome browser used and make sure it is up to date.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please follow the steps and figure shown below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open Chrome browser -&amp;gt; Click on settings -&amp;gt; Help -&amp;gt; Click on “About Google Chrome”&lt;/LI&gt;
&lt;LI&gt;Check your version number to make sure it’s 72.0.3626.121 or later.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Chrome Version.png" style="width: 999px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4460iA745BAE4601EE6F9/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Chrome Version.png" alt="Chrome Version.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA Security Team&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 05:41:15 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Advisory-Vulnerability-Alert/m-p/14829#M17</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2019-03-07T05:41:15Z</dc:date>
    </item>
    <item>
      <title>Ransomware: The profitable business of the cybercrime industry</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Ransomware-The-profitable-business-of-the-cybercrime-industry/m-p/14644#M15</link>
      <description>&lt;P&gt;Recently, it was reported that a &lt;A href="https://www.theage.com.au/national/victoria/crime-syndicate-hacks-15-000-medical-files-at-cabrini-hospital-demands-ransom-20190220-p50z3c.html" target="_blank" rel="noopener"&gt;Victorian hospital&lt;/A&gt; fell victim to a cybercrime syndicate that held 15,000 medical files to ransom. This attack, a probable result of a phishing scam, inadvertently opened by a staff member, resulted in criminals hacking into the hospital’s server to plant ransomware that scrambled and encrypted data, locking access to files from medical staff.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ransomware can happen in different forms. For hospitals, holding their data at ransom not only creates reputational damage but could have a serious impact on their patients. Another method of ransomware is to attack a company's IT infrastructure by disabling employee access to laptops or servers. The company is then held to ransom and the payment method is typically demanded in bitcoin or other forms of cryptocurrency. The use of cryptocurrency is prevalent in the cyber fraud community because of its ability to be transferred anonymously.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In 2017, &lt;A href="https://www.businessinsider.com.au/hackers-broke-into-amazon-cloud-to-mine-bitcoin-2017-10?r=US&amp;amp;IR=T" target="_blank" rel="noopener"&gt;two&lt;/A&gt; companies had their Amazon Web Services accounts compromised by hackers using the victims’ bandwidth and computing power to &lt;A href="https://www.bitcoinmining.com/" target="_blank" rel="noopener"&gt;mine bitcoins&lt;/A&gt;, an energy intensive, but potentially lucrative exercise.&lt;A href="applewebdata://F359015F-DE29-416E-A8B3-FC9A824AD1C5#_ftn1" target="_blank" rel="noopener" name="_ftnref1"&gt;&lt;SPAN&gt;[1]&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Data ransom and bitcoin mining may seem simple and straightforward when compared to more sophisticated hacks such as one which occurred in 2017. The attack, called WannaCry, infected up to &lt;A href="https://www.abc.net.au/news/2017-05-15/ransomware-attack-to-hit-victims-in-australia-government-says/8526346" target="_blank" rel="noopener"&gt;200,000&lt;/A&gt; computers, locking up users’ data in 150 countries, and demanded a ransom to release them. WannaCry was so damaging because the cyber criminals managed to exploit the vulnerabilities of older of Windows software when newer, more secure versions were available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Australia, conservative estimates show that cybercrime costs the economy in excess of &lt;A href="https://www.smartcompany.com.au/technology/from-millions-to-malware-cyber-attacks-in-australia-by-the-numbers/" target="_blank" rel="noopener"&gt;AUD 1B&lt;/A&gt; each year. More than 500,000 small Australian businesses fell victim to cybercrime in 2017 and it is estimated that the majority paid an average of &lt;A href="https://www.smartcompany.com.au/technology/from-millions-to-malware-cyber-attacks-in-australia-by-the-numbers/" target="_blank" rel="noopener"&gt;AUD 4,677&lt;/A&gt; in ransom to unencrypt their data. Often small business fall victim as in some cases, maintaining the latest version of IT software is not their highest priority.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-02-22 at 2.32.54 pm.jpg" style="width: 999px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4433i8DF98D4A482302E5/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Screen Shot 2019-02-22 at 2.32.54 pm.jpg" alt="Screen Shot 2019-02-22 at 2.32.54 pm.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Source: Smart Company, &lt;/EM&gt;&lt;A href="https://www.smartcompany.com.au/technology/from-millions-to-malware-cyber-attacks-in-australia-by-the-numbers/" target="_blank" rel="noopener"&gt;&lt;EM&gt;From millions to malware: Cyber attacks in Australia by the numbers&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;, July 2018&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The cybercrime landscape is ever evolving, and it is therefore imperative for our industry to continually develop and advance a robust security framework. As an industry, we must uphold the highest standards when it comes to cyber security and maintaining the latest in secure software versions. This is non-negotiable when dealing with someone’s most important and emotionally significant investment – their home.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At PEXA, we are determined to ensure that the cyber security practices we have in place continue to protect our members and their customers. Our IT systems are annually audited by external professionals and we continually explore new ways to bolster the security posture of our network. This is achieved by investing, maintaining and constantly improving security controls as well as running a Security Operations Centre to monitor, detect, and respond to cyber-attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What your firm can do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To ensure your practice is protected from similar events, it is important to be aware of how these criminals operate. Hackers like this look for the weakness in a security framework and will exploit vulnerabilities in older versions of software, as they did in the WannaCry ransomware attack. As a preventative measure, we recommend staying up to date with &lt;A href="https://community.pexa.com.au/t5/Help-Centre/Patching/ba-p/14660" target="_blank" rel="noopener"&gt;patching&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Patching reduces the risk of hackers exploiting vulnerabilities that have already been remediated by software companies. It updates, fixes, or improves the program or data and mends security vulnerabilities and other bugs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Firewalls/ba-p/14663" target="_blank" rel="noopener"&gt;Firewalls&lt;/A&gt; are another layer of protection that can act as a barrier between your computer and the Internet helping safeguard your computer and information. By having a firewall, you reduce the risk of an attacker compromising your computer. There are a number of anti-virus providers that you could employ that meet the requirements in &lt;A href="https://www.pexa.com.au/images/uploads/page_parts/Pdfs/PEXA_Subscriber_Security_Policy_V2.4.pdf" target="_blank" rel="noopener"&gt;PEXA’s Subscriber Security Policy&lt;/A&gt; e.g. Symantec, McAfee, TrendMicro, etc. The Policy also provides guidance on all the security controls that PEXA Subscribers should be leveraging to maximise their security posture.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;You’ll notice that in the Victorian Hospital’s ransomware attack, an unwitting staff member fell victim to a phishing e-mail. Training your staff to recognise potential cyber-fraud is the first step to preventing this from happening to you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, your business must plan early for this eventuality, however unlikely. Making this decision will assist you in avoiding ‘heat of the moment’ reactions that could have detrimental effects on your business.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Taking the necessary steps to ensure your data is &lt;A href="https://www.staysmartonline.gov.au/protect-your-business/doing-things-safely/backups-business" target="_blank" rel="noopener"&gt;backed-up&lt;/A&gt; will alleviate the need to and risks involved in paying a ransom. There are two main options for backing-up your organisation’s data:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;perform your own back-ups to a storage device (USB or external hard drive); or&lt;/LI&gt;
&lt;LI&gt;back up to an online (cloud) service.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Business’ that decide to pay a ransom need to be aware&amp;nbsp;of the risks, including the likelihood that even if the ransom is paid, they may not receive their information back and leave themselves open to further attacks. We recommend you speak with your legal advisor beforehand to ensure you are making the correct decision for your firm.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a lot of information available to help your firm plan for this scenario. Visit &lt;A href="https://www.staysmartonline.gov.au/protect-your-business/recover-when-things-go-wrong/ransomware-business" target="_blank" rel="noopener"&gt;staysmartonline.gov.au&lt;/A&gt; for more information on ransomware and &lt;A href="https://community.pexa.com.au/t5/Security-Updates/bd-p/Security-Updates" target="_blank" rel="noopener"&gt;PEXA’s online Community forum&lt;/A&gt; to learn about measures PEXA takes to bolster security.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.pexa.com.au/t5/PEXA-Community-Blog/Community-Easter-Egg-Hunt-2019/ba-p/15346" target="_blank" rel="noopener"&gt; &lt;IMG src="https://community.pexa.com.au/html/assets/Easter-Community-ee.png" border="0" width="65" height="100" /&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="applewebdata://F359015F-DE29-416E-A8B3-FC9A824AD1C5#_ftnref1" target="_blank" rel="noopener" name="_ftn1"&gt;&lt;SPAN&gt;[1]&lt;/SPAN&gt;&lt;/A&gt; Bitcoin miners pool together different computers to solve complex algorithms, success of which generates a set number of valuable new bitcoins.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 06:45:08 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Ransomware-The-profitable-business-of-the-cybercrime-industry/m-p/14644#M15</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-08-02T06:45:08Z</dc:date>
    </item>
    <item>
      <title>un-hackable network.</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/un-hackable-network/m-p/14596#M18</link>
      <description>&lt;P&gt;Is this a unicorn?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.dailymail.co.uk/sciencetech/article-4727572/China-launching-unhackable-computer-network.html" target="_blank" rel="noopener"&gt;https://www.dailymail.co.uk/sciencetech/article-4727572/China-launching-unhackable-computer-network.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Feb 2019 05:30:35 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/un-hackable-network/m-p/14596#M18</guid>
      <dc:creator>DMc</dc:creator>
      <dc:date>2019-02-20T05:30:35Z</dc:date>
    </item>
    <item>
      <title>Security alert | phishing e-mail - RESOLVED</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-alert-phishing-e-mail-RESOLVED/m-p/14459#M12</link>
      <description>&lt;DIV class="lia-quilt-column lia-quilt-column-18 lia-quilt-column-left lia-quilt-column-main-left"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-left"&gt;
&lt;DIV id="messageBodySimpleDisplay" class="lia-message-body lia-component-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA is aware of a phishing e-mail received by various members of your network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Details of phishing e-mail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;From&lt;/U&gt;: Pexa Admin&lt;/P&gt;
&lt;P&gt;&lt;U&gt;E-mail&lt;/U&gt;:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;dfsffgsgg@telus.net&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;U&gt;Subject&lt;/U&gt;: Monro-Sale: New conversation message received - Financial Settlement - Payout figure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The e-mail implies that the reader has received a message from ANZ RETAIL AND SMALL BUSINESS. It includes a Workspace number and requests the recipient to click on a link to read a message.&lt;/P&gt;
&lt;P&gt;This is an example of a cyber-criminal creating an e-mail to resemble PEXA communications. It is likely member e-mail addresses were sourced from publicly available information online.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;See below for a screenshot of the e-mail.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you received this e-mail, clicked on the link and entered your PEXA username and password, &lt;STRONG&gt;we advise you to reset your PEXA password now&lt;/STRONG&gt;. Please note, multi-factor authentication on entering your PEXA account protects you against unauthorised persons accessing your account.&lt;/P&gt;
&lt;P&gt;If not the above, and you receive a similar phishing e-mail or another you believe to be suspicious, please:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the e-mail&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or e-mail PEXA’s security team at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank" rel="nofollow noopener noreferrer"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note, all PEXA Workspace e-mails are system-generated from PEXA and will be received from&amp;nbsp;pexa.admin@pexa.com.au.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;PEXA will never send you an e-mail advising you to click a link to access the PEXA Exchange, and will always direct you to login to access your account via pexa.com.au.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about phishing e-mails&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://www.pexa.com.au/security/how-to-protect-your-business#identify-spam-and-phishing" target="_blank" rel="nofollow noopener noreferrer"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aoife&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2019-02-11 14_04_57-Photos_phishingemail.png" style="width: 846px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4387i6A4C0022A301EF8A/image-size/large?v=1.0&amp;amp;px=999" role="button" title="2019-02-11 14_04_57-Photos_phishingemail.png" alt="2019-02-11 14_04_57-Photos_phishingemail.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-rating-metoo lia-component-me-too"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 04:00:30 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-alert-phishing-e-mail-RESOLVED/m-p/14459#M12</guid>
      <dc:creator>Aoife</dc:creator>
      <dc:date>2019-02-15T04:00:30Z</dc:date>
    </item>
    <item>
      <title>Security alert | Phishing e-mail - RESOLVED</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Phishing-e-mail-RESOLVED/m-p/13954#M11</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA is aware of an instance where a member’s e-mail account has been hacked. The hacker proceeded to send e-mails from the conveyancer’s account to other PEXA members.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Details &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The e-mail sent by the hacker informed the recipient of a shared document from PEXA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Screenshot of e-mail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="screenshot of phishing e-mail" style="width: 731px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4249i8ED8CE24E77F8221/image-size/large?v=1.0&amp;amp;px=999" role="button" title="phishing.png" alt="screenshot of phishing e-mail" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;screenshot of phishing e-mail&lt;/span&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you receive a similar phishing e-mail or another you believe to be suspicious, please:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the email&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or e-mail PEXA’s security team at &lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Please note, all PEXA workspace e-mails are system-generated from PEXA. To receive a task related e-mail from a fellow PEXA member is unusual and unnecessary.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For outstanding tasks, please check your workspace(s) via your PEXA account.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about phishing e-mails &lt;SPAN&gt;&lt;A href="https://www.pexa.com.au/security/how-to-protect-your-business#identify-spam-and-phishing" target="_blank"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aoife&lt;/P&gt;</description>
      <pubDate>Wed, 19 Dec 2018 05:30:22 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Phishing-e-mail-RESOLVED/m-p/13954#M11</guid>
      <dc:creator>Aoife</dc:creator>
      <dc:date>2018-12-19T05:30:22Z</dc:date>
    </item>
    <item>
      <title>A Hacker's Tale - A look behind the curtain #2</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-Tale-A-look-behind-the-curtain-2/m-p/13784#M10</link>
      <description>&lt;P&gt;&lt;FONT size="5"&gt;It’s more than just an Internet romance...&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The lover’s tale&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Abigail thinks she’s in love. It must be love. She’s been looking for love for a while and Elliot seems like the perfect guy. Many of her friends have warned her about internet romances but Elliot’s different. He has never asked her for money. Never asked her for anything. She thinks he might be quite wealthy in fact. He is always moving money around. He’s been struggling lately though. So, she’s been helping him transfer money to his accounts. For some reason, he’s having issues sending money to his overseas account. Abigail doesn’t really know the reasons why, nor does she question it. It all seems too complicated, and as long as it’s not her money she’s transferring over, it must be okay… besides he’s committed to the relationship. He said they will be together soon.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Over the past couple of weeks Abigail’s been transferring money for Elliot’s family and friends. They are all preparing for a big holiday and need the money ready to meet them. It’s not much – a couple of hundred here and there. Now he’s asked for her help to transfer funds from the sale of his property in Australia.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just a few days ago, Abigail received $250,000 to her account. She’s not meant to transfer everything over to him though. Elliot told her that while he was excited to have sold his house, he needs to move the money in parts to avoid government taxes. He’s asked her to transfer just under $10,000 at a time, over several days, because that way it doesn’t trigger any alerts. Abigail doesn’t completely understand the reasoning, but Elliot is good to her. He said they will meet face-to-face now that he has sold his house, and she is excited to finally put a face to her love.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the third day in a row she has made the transfer. Something strange has happened though, all her accounts have now been frozen, and her bank keeps leaving messages to call them back.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Image_internet romance.jpg" style="width: 400px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4242i3C782706A1FD52C4/image-size/medium?v=1.0&amp;amp;px=400" role="button" title="Image_internet romance.jpg" alt="Image_internet romance.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The practitioner’s tale&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Meanwhile your client, Grace, is frantic. She hasn’t received her house’s sale proceeds yet. It’s been a couple of days; how has this happened? You arranged the transfer of the money according to her instructions which you received just before finalising the payment. You look back at the details and see the account name &lt;EM&gt;Abigail King&lt;/EM&gt; and a different BSB – not your client’s.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Wait. What’s happening?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Going back through the email trail you realise that there’s something funny about the email address. The instruction did not come from Grace. Blood drains from your face… you call the bank immediately to try and stop the funds from disappearing. Hopefully it’s not too late.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Hacker’s tale&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Meanwhile, Elliot is busy moving money around several of his accounts across the world and connecting with different people online. While he’s looking for a way to gain access to steal the funds, he has also been cultivating internet romances with men and women to transfer the funds outside of Australia. He loves living in the &lt;EM&gt;internet era&lt;/EM&gt; where crimes can be performed anonymously, and no-one ever has to see his face. On the internet you can pretend to be whoever you want, and a lot of people believe you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Money Mules&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Unfortunately, the above scenario is all too common. Cyber criminals often use middlemen to transfer stolen money to their accounts. These middlemen are real people, with real accounts and they don’t have unusual bank account activity. Known as money mules, they are sometimes recruited or deceived into helping cyber criminals carry out these crimes. Offenders like our fictitious character Elliot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These criminals have been known to recruit money mules via romance scams or employment scams. In a romance scam, the ‘money mule’ is emotionally invested and could also be considered a victim. Employment scams often offer potential money mules a job that requires minimal effort with lucrative returns – for instance, a small commission for receiving and transferring money.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to the &lt;SPAN&gt;&lt;A href="https://www.afp.gov.au/what-we-do/crime-types/cyber-crime/online-fraud-and-scams" target="_blank" rel="noopener"&gt;Australian Federal Police&lt;/A&gt;&lt;/SPAN&gt;, it is a crime to transact in the movement of stolen funds, even if you are unaware that you are acting as a money mule. Money mules are caught because they are not trying to hide their activities, and when caught, they can have their entire bank accounts, including their own funds, suspended and potentially face criminal prosecution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;How can I protect myself?&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Be wary of advertisements for a guaranteed income or job with lucrative returns and very little effort&lt;/LI&gt;
&lt;LI&gt;Don’t transfer money on behalf of someone else, especially when you have never met them&lt;/LI&gt;
&lt;LI&gt;Never give your bank details to anyone&lt;/LI&gt;
&lt;LI&gt;Protect your personal information and be suspicious if anyone asks you for those details&lt;/LI&gt;
&lt;LI&gt;Be cautious of people seeking financial assistance or asking you for financial details – money sent via wire transfer is rarely recoverable&lt;/LI&gt;
&lt;LI&gt;As a business operator, when receiving instructions to transfer money, confirm that the instructions you’ve received have come from your client - verbally confirm details or changes with your client&lt;/LI&gt;
&lt;LI&gt;Be cautious of situations where the name on the account differs from that of your customer&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;I think I am a victim, what can I do?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Anyone who has disclosed their bank account details, received funds into their account or suspect that they are a victim of a mule scam should contact their bank or financial institution immediately.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on this and more, please refer to &lt;SPAN&gt;&lt;A href="https://www.scamwatch.gov.au/types-of-scams/jobs-employment/jobs-employment-scams" target="_blank" rel="noopener"&gt;Scam Watch&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 22:04:58 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-Tale-A-look-behind-the-curtain-2/m-p/13784#M10</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-01-24T22:04:58Z</dc:date>
    </item>
    <item>
      <title>A Hacker's tale - A look behind the curtain #1</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-tale-A-look-behind-the-curtain-1/m-p/13116#M6</link>
      <description>&lt;P&gt;&lt;FONT size="5"&gt;Shhh! Someone's listening...&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An uninvited guest, Elliot, has inserted himself into your conversation. You are sitting at a coffee shop having a chat with your client Grace, and unbeknownst to you, Elliot, at the next table is virtually listening to your entire conversation. This unwanted guest eavesdrops the conversation with your client and gathers all their critical information. When you leave the table, he continues the conversation with your client pretending to be you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="quiet image.jpg" style="width: 400px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4129i95A561EE592E9D3D/image-dimensions/400x256?v=1.0" width="400" height="256" role="button" title="quiet image.jpg" alt="quiet image.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know what you’re thinking - this would not be possible face-to-face. Your client, Grace, knows what you look like, what you sound like. But what if I told you that this is not improbable at all… this is happening online today.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This seemingly far-fetched scenario is a very real cyber-attack method, aptly called man-in-the-middle (MITM). The hacker, in this instance, Elliot, effectively intercepts your conversation, places himself in the middle and conveys the information he wants to pass on to both sides.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;How could this happen?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Hackers like Elliot use various methods to gain access to your computer systems. Elliot may have used a phishing scam, or capitalised on poorly secured Wi-Fi routers, often found in public areas with free hotspots. His goal is to obtain your password and access your email account. The current statistics show an increase of&amp;nbsp;&lt;A href="https://www.itgovernanceusa.com/blog/80-increase-in-business-email-compromise-attacks/" target="_blank"&gt;80% in hacks performed through an email compromise&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Changing your password may not be enough&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Once Elliot has got into your system, he can create a rule that automatically forwards your emails to a secondary account. This means that any email you receive is also sent to his email account. Using further filtering with key words, he only needs to monitor what he deems as relevant emails. So, even if you regularly change your email password, in this scenario, the hacker still has access to your emails.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;How does it work?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;With access to your emails, Elliot then uses the information he has obtained, and, mimicking your email style, he can begin a new conversation as you, with your client, Grace. With valuable context acquired, the hacker then impersonates Grace, responding to your emails.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once he has obtained the information required, he then exits the conversation. You and your client, Grace, are none the wiser, until that is, you realise you are a victim of a scam. By then, money has exchanged hands and you may or may not be able to recover missing funds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;What can you do to protect against a MITM attack?&lt;/EM&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Be aware of potential phishing emails. They could appear to be from a trusted source, masked as from your family, friends or even your bank. Instead of clicking on the link, type the website address into your browser.&lt;/LI&gt;
&lt;LI&gt;Moving your mouse over the link will show the website name. If the name doesn’t look like the site, don’t click on it.&lt;/LI&gt;
&lt;LI&gt;Use secure Wi-Fi networks, or if using public networks, connect with a virtual private network (VPN)&lt;/LI&gt;
&lt;LI&gt;Ensure you have a &lt;SPAN&gt;comprehensive internet security solution&lt;/SPAN&gt;. An interesting article on this topic can be found&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://www.inc.com/symantec/building-a-comprehensive-security-solution.html" target="_blank"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;I think I am a victim, what can I do?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;If you suspect that you’re a victim of a scam:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Change your passwords to be unique on all of your systems.&lt;/LI&gt;
&lt;LI&gt;Check if there are any forwarding rules in your email account, and if found:
&lt;OL&gt;
&lt;LI&gt;Record the email address being forwarded to&lt;/LI&gt;
&lt;LI&gt;Confirm no-one in your organisation created this rule&lt;/LI&gt;
&lt;LI&gt;Have your team check their email accounts for forwarding emails and reset their passwords too&lt;/LI&gt;
&lt;LI&gt;Inform your clients by telephone and verbally reconfirm all details, especially bank account details&lt;/LI&gt;
&lt;LI&gt;Delete the rule&lt;/LI&gt;
&lt;LI&gt;If this has impacted your PEXA business, inform PEXA Security alias – &lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au?subject=I%20found%20my%20email%20is%20forwarding%20to%20a%20scam%20account" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;/SPAN&gt;PEXA is working with Law Enforcement to identify these types of behaviours and any information you provide could help in the tracking and potential capture of those involved in cyber-crime.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;At PEXA…&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Multi-factor authentication (MFA) provides an additional level of security to access your PEXA Workspace. The levels include your PEXA account name, password, your MFA token, and your digital signing token and pin. However, you still need to be vigilant when it comes to communicating with your client. Soon, PEXA will introduce a new app that will allow your clients to input financial data directly into the Workspace and enable you to request and receive information from your clients securely. [Stay tuned]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As our world becomes more and more connected online, it’s important to be aware of the cyber threats that could compromise the security of your personal information and business operations. Cyber criminals have a low cost of entry into criminal activities and they often have the anonymity to avoid detection. With many targets they will usually go for the easiest person to scam so stay informed and be aware. Collectively, we are better together, as we work as one to reduce the threat of cyber-crime and stay smart online.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By Craig Brown, Head of PEXA Security&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 05:14:13 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-tale-A-look-behind-the-curtain-1/m-p/13116#M6</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2018-12-20T05:14:13Z</dc:date>
    </item>
    <item>
      <title>PEXA Security Initiatives</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/PEXA-Security-Initiatives/m-p/12813#M5</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The team at PEXA continues to explore techniques and technologies to align with the ever-changing security landscape. Below is an update on current security initiatives happening on the PEXA platform including our insights into a &lt;SPAN&gt;topical&amp;nbsp;&lt;/SPAN&gt;security concern – phone porting.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Multi-Factor Authentication &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In September, &lt;SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Multi-factor-authentication-FAQs/ba-p/10693" target="_blank" rel="noopener"&gt;multi-factor authentication (MFA)&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;was rolled out to PEXA members. MFA requires the user to provide two or more types of evidence to verify their identity when logging in to an account or completing a transaction. This includes a password and unique authentication code which regularly changes. Members choose to receive an authentication code by SMS, the PingID mobile app, or the PingID desktop app.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MFA was added as another layer of authentication on top of &lt;SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Five-things-to-remember-about-Digital-Certificates/ba-p/9246" target="_blank" rel="noopener"&gt;digitally signing&lt;/A&gt;&lt;/SPAN&gt;. Members with the relevant authority must digitally sign-off transactions with their unique [bespoke] digital signing token and PIN, confirming that all details are correct prior to the transfer of funds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;More than verification&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Additionally, we initiated the following measures to boost the protection of members while transacting online:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Increased monitoring&amp;nbsp;&lt;/STRONG&gt;of unusual activity surrounding password resets, new user creations and changes to BSB and account numbers. If such activity is detected by PEXA, a member of PEXA’s team will contact members to confirm that the activity is legitimate.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Machine learning&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;algorithms&amp;nbsp;&lt;/STRONG&gt;to detect behavioural anomalies on a per user basis. If the behavioural pattern of a user changes, PEXA’s risk profiling mechanism is activated to trigger an alert. The member will then be promptly contacted by PEXA’s Security team.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Workspace time stamps and summary screen&amp;nbsp;&lt;/STRONG&gt;so that members can see when the Financial Settlement Schedule was last updated and by which user.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Phone porting&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A current concern from industry is the possibility of phone porting – a situation where a scammer uses your personal details to port your mobile number from one provider to another, therefore accessing further personal details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With a suite of security measures in place to protect PEXA members and your clients, and lawyers and conveyancers continuing to practice their due diligence, the small percentage of members who have chosen to receive their authentication code via SMS should not be alarmed.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;It is important to note that for phone porting to occur, the scammer would require several pieces of a user’s ID, as well as the ability to convince a service provider to transfer the SIM details from one telco to another. Therefore, not only would the scammer need to know the targeted user’s personal information, they would also need to know if that user has chosen SMS as the preferred method.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To assist in preventing this from happening, I advise members to remain vigilant of people calling, emailing and requesting personal details.&lt;/P&gt;
&lt;P&gt;If you have any questions about this information, please don’t hesitate to reply below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Craig Brown&lt;BR /&gt;Head of PEXA Security&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 03:17:01 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/PEXA-Security-Initiatives/m-p/12813#M5</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-02-28T03:17:01Z</dc:date>
    </item>
    <item>
      <title>Stay Smart Online Week</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Stay-Smart-Online-Week/m-p/12742#M4</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Twitter_Header.jpg" style="width: 999px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4041i01E0D816406444FA/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Twitter_Header.jpg" alt="Twitter_Header.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This week is &lt;/SPAN&gt;&lt;A class="_58cn" href="https://www.facebook.com/hashtag/staysmartonline?source=feed_text&amp;amp;__xts__%5B0%5D=68.ARAoAjr4jW-G12j8nANgoLiI-VrXvhsFBajvOl3LovrqGuahnuFd4kEuFv0NAlbWGORr9Uhz2lzRaY_4JiBFJRvvFcmIyPP5Ol2rxGoJMRB4T5frbKPE2GEhIzBQadySOBkC2b1bu3wZQPRH9ExHLL0QyRv6Kp8UexuTUqwNyKwRio13RRyPlg&amp;amp;__tn__=%2ANK-R" data-ft="{&amp;quot;type&amp;quot;:104,&amp;quot;tn&amp;quot;:&amp;quot;*N&amp;quot;}" target="_blank"&gt;&lt;SPAN class="_5afx"&gt;&lt;SPAN class="_58cl _5afz"&gt;#&lt;/SPAN&gt;&lt;SPAN class="_58cm"&gt;StaySmartOnline&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; Week.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The campaign aims to reverse the threat of cyber-crime by empowering people to discuss and own their cyber-security.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Over the next few days we’ll be sharing a number of best-practice resources to assist you, here on Community and on PEXA's social channels.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;LI-VIDEO vid="https://www.youtube.com/watch?v=JdvjqUb_fmo" align="center" size="small" width="200" height="113" uploading="false" thumbnail="https://i.ytimg.com/vi/JdvjqUb_fmo/hqdefault.jpg" external="url"&gt;&lt;/LI-VIDEO&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Oct 2018 02:55:39 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Stay-Smart-Online-Week/m-p/12742#M4</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-10-08T02:55:39Z</dc:date>
    </item>
    <item>
      <title>Security alert | Phishing e-mail</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Phishing-e-mail/m-p/12313#M3</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA is aware of a phishing e-mail received by a member of your network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Details of phishing e-mail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;From: Jessica Wong&lt;/P&gt;
&lt;P&gt;E-mail: &lt;SPAN&gt;cains8x@nsas.avinetmail.net&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The e-mail implies to have a contract of sale attached and requests to settle via PEXA. See below for a screenshot of the e-mail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you receive a similar phishing e-mail or another you believe to be suspicious, please:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the email&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or e-mail PEXA’s security team at &lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about phishing e-mails &lt;SPAN&gt;&lt;A href="https://www.pexa.com.au/security/how-to-protect-your-business#identify-spam-and-phishing" target="_blank"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aoife&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Phishing e-mail" style="width: 256px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/4005iE5FDB857EE0E30D6/image-size/medium?v=1.0&amp;amp;px=400" role="button" title="Phishing e-mail.png" alt="Phishing e-mail" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Phishing e-mail&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 01:11:34 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Phishing-e-mail/m-p/12313#M3</guid>
      <dc:creator>Aoife</dc:creator>
      <dc:date>2018-09-11T01:11:34Z</dc:date>
    </item>
    <item>
      <title>PEXA Digital Certificate Software not correctly digitally signed</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/PEXA-Digital-Certificate-Software-not-correctly-digitally-signed/m-p/12222#M1</link>
      <description>&lt;P&gt;PEXA's digitial certificate software download is signed with a certificate issued to 'pexa.net.au'.&amp;nbsp; Why should anyone trust software signed by a website?&amp;nbsp;Especially&amp;nbsp;one that is not in use? It is trivial to register website names, and numerous 'pexa.' domains are available for registration now by anyone.&amp;nbsp; How are we to discern whether pexa.net.au is actually&amp;nbsp;owned by the Property Exchange Australia Limited?&amp;nbsp; How then, are we to determine whether to trust the signer and install this software?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The software should be signed with a certificate issued to&amp;nbsp;&lt;SPAN&gt;PROPERTY EXCHANGE AUSTRALIA LIMITED.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Surely PEXA does not think that users should ignore incorrect security certification of its software? Or that we should trust anything with 'PEXA' in it somewhere? This is EXACTLY how fake (malicious) software is promulgated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a snip of what the digital signatures look like on correctly signed software by two other well known software companies (left hand side)&amp;nbsp;and on the right-hand side,&amp;nbsp;a snip of the PEXA software signature.&amp;nbsp; (Red markup added by me for emphasis)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Pexa Digital Software Certificate.png" style="width: 910px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/3999i87CC552EBB1949EA/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Pexa Digital Software Certificate.png" alt="Pexa Digital Software Certificate.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I posted about this in the general forum section, but received no response.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 12:10:15 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/PEXA-Digital-Certificate-Software-not-correctly-digitally-signed/m-p/12222#M1</guid>
      <dc:creator>Andrew_GC</dc:creator>
      <dc:date>2018-09-05T12:10:15Z</dc:date>
    </item>
    <item>
      <title>Member security alert | phone scam</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Member-security-alert-phone-scam/m-p/11702#M1</link>
      <description>&lt;P&gt;Hi Community,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;PEXA is aware of a current phone scam purporting to come from PEXA.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;So far, two cases have been identified.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Details&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Phone call one: Scammers contacted an AIC member telling them that they have been randomly selected by PEXA to trial PEXA 5.6.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Phone call two: Scammers contacted an AIC member referring to an email sent two months ago from PEXA regarding security enhancements and asking for email addresses.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Please note, a PEXA employee will never call you and ask for your e-mail address.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you receive a call similar to the above or that you believe to be suspicious, please:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Ask for the caller’s full name&lt;/LI&gt;
&lt;LI&gt;Ask for the caller’s e-mail address&lt;/LI&gt;
&lt;LI&gt;Record the caller’s preferred phone number&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then, contact your Account Manager, PEXA Direct Specialist or PEXA’s security team at &lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt; to alert them.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;It’s important that we continue to work together to defend against scammers, phishing attempts and/or cyber-fraud. Please reach out if you encounter any suspicious behaviour.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aoife&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 01:44:56 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Member-security-alert-phone-scam/m-p/11702#M1</guid>
      <dc:creator>Aoife</dc:creator>
      <dc:date>2018-08-14T01:44:56Z</dc:date>
    </item>
    <item>
      <title>Using your PEXA login credentials and Digital Certificates</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Using-your-PEXA-login-credentials-and-Digital-Certificates/gpm-p/11647#M37</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Email_Banner_Security.jpg" style="width: 999px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/3912i69A0D04BDA364DEE/image-size/large?v=1.0&amp;amp;px=999" role="button" title="Email_Banner_Security.jpg" alt="Email_Banner_Security.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;This checklist will help you protect your identity and the integrity of the network when using your PEXA login credentials and Digital Certificate to electronically sign in PEXA.&lt;/P&gt;
&lt;P&gt;Following the steps below will help you remain compliant with your professional obligations, and those set out in the Model Participation Rules which govern your use of PEXA. Non-compliance with these obligations may result in the Registrar of Titles in your jurisdiction instructing PEXA to suspend or terminate your access to the network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Ensure you are the only person who knows your PEXA password&lt;/FONT&gt;&lt;/H3&gt;
Upon registering with PEXA, unique credentials are provided to an organisation’s nominated Subscriber Manager. If required, the Subscriber Manager can then create individual user profiles with unique login details for additional employees within their organisation. Employees should never share User IDs or password login details for PEXA.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Select different passwords for your email, desktop access and PEXA&lt;/FONT&gt;&lt;/H3&gt;
Using the same password across multiple log in channels is risky - if one was compromised, then all could be compromised. Strong passwords have a minimum of 10 characters and use a mix of uppercase and lowercase letters, numbers and special characters like &lt;STRONG&gt;!&lt;/STRONG&gt;, &lt;STRONG&gt;&amp;amp;&lt;/STRONG&gt;, and &lt;STRONG&gt;*. #&lt;/STRONG&gt; (Using a special character in your password will increase the difficulty of breaking it significantly).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Ensure each employee required to sign documents and authorise funds in PEXA has their own Digital Certificate&lt;/FONT&gt;&lt;/H3&gt;
Every Subscriber is required to obtain and maintain at least one Digital Certificate. The number required will depend on how many people will be signing on behalf of the organisation. Digital Certificates are assigned to an individual – when used to digitally sign, both the signer and organisation are clearly identifiable. If your Digital Certificate is shared within your firm and misused in a PEXA transaction, you will be identifiable as the signer.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Ensure no one else has access to your Digital Certificate and PIN&lt;/FONT&gt;&lt;/H3&gt;
Your Digital Certificate is your unique, binding electronic signature. If a digitally signed document in a PEXA transaction is called into question, and it is suggested that the owner of the Digital Certificate was not the person who applied it, your professional reputation and ability to claim on your professional indemnity insurance could be impacted. Whenever your digital signature is applied in PEXA, it is taken to be signed by you and is binding, similar to a ‘wet’ signature. It is important to check documents and the Financial Settlement Schedule prior to signing. Should someone other than the owner of a Digital Certificate use it to sign in PEXA, it may be considered the equivalent of forging a ‘wet’ signature. We suggest you do not leave it inserted in your computer, and instead consider locking it away and ensure secure storage provisions are available for all employees with a Digital Certificate.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Plan ahead to ensure your business has sufficient coverage to sign in PEXA&lt;/FONT&gt;&lt;/H3&gt;
Consider how many people in your organisation may be required to digitally sign in PEXA and arrange Digital Certificates for each unique user. When managing operations, you may need to account for staff leave, those who are frequently out of the office, and ensuring there are enough people present who are trained and authorised to sign in PEXA.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Know what to do if you or a staff member move on to a new job&lt;/FONT&gt;&lt;/H3&gt;
A Digital Certificate identifies both you and the firm, therefore cannot be taken by the owner to a new job. A new Digital Certificate will need to be ordered by their new employer. In these circumstances, Digital Certificates must be cancelled by calling the PEXA Support Centre on &lt;STRONG&gt;1300 084 515&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Multi-factor authentication (MFA)&lt;/FONT&gt;&lt;/H3&gt;
MFA is utilised to confirm that the person logging in to PEXA is the person who owns the profile being used, and not someone else. MFA requires the user to provide two or more types of evidence to verify their identity when logging in to an account or completing a transaction. As MFA requires the owner of the profile to pair their mobile phone, logging in requires the user to have their device on them, enabling them to receive their authentication code by SMS or the PingID app directly. It’s important to note that each Subscriber will be required to authenticate with their own device every 12 hours.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 10 Aug 2018 01:45:18 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Using-your-PEXA-login-credentials-and-Digital-Certificates/gpm-p/11647#M37</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2018-08-10T01:45:18Z</dc:date>
    </item>
    <item>
      <title>Talking to consumers about the security of e-Conveyancing</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Talking-to-consumers-about-the-security-of-e-Conveyancing/gpm-p/11003#M35</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;We've had a&amp;nbsp;few&amp;nbsp;questions on how to&amp;nbsp;talk to consumers&amp;nbsp;about the security of e-Conveyancing. Here's&amp;nbsp;some&amp;nbsp;talking points that might assist when having these conversations with your customers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can discuss your personal experience transacting through&amp;nbsp;PEXA and point out that over a million transactions have taken place on the platform safely without issue or interference.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Over 1.2 million transactions have been successfully processed through the platform, and over $150 billion in property value settled.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Provide&amp;nbsp;your&amp;nbsp;customers the assurance that your business has good cyber security measures in place&amp;nbsp;and that the PEXA platform itself is incredibly secure.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;As your representative, I must physically sign off on the account details using my own digital signing certificate and password before a payment can be processed. If the details of any such payment change prior to a settlement proceeding in PEXA, I am required to re-sign before settlement can take place. I always check to make sure that the details are accurate immediately prior to digitally signing the settlement schedule.&lt;/LI&gt;
&lt;LI&gt;PEXA’s Information Security Management System (ISMS) aligns with the international security standard ISO27001 – protecting PEXA’s platform against online cyber security threats. Importantly, this is an e-Conveyancing regulator (&lt;A href="https://www.arnecc.gov.au/" target="_blank"&gt;ARNECC&lt;/A&gt;) requirement as well as a PEXA cyber security measure.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;In addition, the ISMS is independently audited – currently by Ernst &amp;amp; Young (EY) – each year.&amp;nbsp; Independent reviews ensure PEXA’s cyber security is fit for purpose and up to date. All review outcomes and recommendations are shared with PEXA’s regulator, ARNECC. The results of the audit demonstrate that PEXA has consistently complied with the international security standard.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can tell your customers that as a result of the most recent events there have been extra security measures put in place by PEXA&amp;nbsp;to&amp;nbsp;reduce the risk of this type of fraud happening in the future.&lt;/P&gt;
&lt;P&gt;And, of course, letting them know if it does occur, PEXA is&amp;nbsp;implementing a residential sellers guarantee to cover the lost funds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;To further protect us (lawyers and conveyancers), PEXA has also introduced extra security measures to protect against a recurrence of this incident. This includes:&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI&gt;Increased monitoring of PEXA Workspaces&lt;/LI&gt;
&lt;LI&gt;Creation of new users in an ‘inactive’ state, pending PEXA activation after verification&lt;/LI&gt;
&lt;LI&gt;Providing Workspace time stamps&lt;/LI&gt;
&lt;LI&gt;Introduction of multi-factor verification&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;PEXA has also recently announced&amp;nbsp;a residential seller guarantee, safeguarding all transactions that occur on their platform.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 12 Jul 2018 23:29:43 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Talking-to-consumers-about-the-security-of-e-Conveyancing/gpm-p/11003#M35</guid>
      <dc:creator>TJ</dc:creator>
      <dc:date>2018-07-12T23:29:43Z</dc:date>
    </item>
    <item>
      <title>Email impersonation fraud – reassurance for Lawcover insured lawyers</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Email-impersonation-fraud-reassurance-for-Lawcover-insured/gpm-p/10780#M32</link>
      <description>&lt;P&gt;Lawcover have provided reassurance to their customers regarding email impersonation fraud, please find below their full pdf.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"The recent email fraud incident identified by PEXA has caused a number of lawyers to contact Lawcover to understand their insurance coverage.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The email fraud referred to has been a risk for some time and is one about which Lawcover has repeatedly warned law practices to be aware. Our message remains the same irrespective of the method of funds transfer – be aware and prepared for the risks of email impersonation fraud and follow steps to protect yourself from becoming a victim or an unwitting participant in a fraudulent activity.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;While individual matters will of course depend on the facts of the case and the terms and conditions of the relevant policy, the following should provide some reassurance about the extent of your insurance coverage as a Lawcover insured.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;"&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 01:24:08 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Email-impersonation-fraud-reassurance-for-Lawcover-insured/gpm-p/10780#M32</guid>
      <dc:creator>TJ</dc:creator>
      <dc:date>2018-06-29T01:24:08Z</dc:date>
    </item>
    <item>
      <title>Security Advisory - New Malware could be Infecting your Home Modem/Router Devices</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Security-Advisory-New-Malware-could-be-Infecting-your-Home-Modem/gpm-p/10000#M29</link>
      <description>&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;U&gt;&lt;STRONG&gt;Security Advisory&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Every now and again we come across security issues that can impact you at home. There is one that is making some noise in the security world. The new virus/malware discovered can infect your home or small business router (the box that connects to the Internet). It’s called “VPNFilter” and the estimated number of infected devices is around 500,000; in at least 54 countries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Read on to see if this affects your internet box (router/modem) and what to do to protect yourself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#000080"&gt;&lt;STRONG&gt;1&lt;/STRONG&gt;.&amp;nbsp;&lt;/FONT&gt;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;How does this affect you?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you have a router/modem from the following companies, it’s suggested you review your vendor’s update steps.&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Vendor&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Action to take&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Telstra&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;No action – Telstra reports that your modem is updated automatically&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Linksys&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://community.linksys.com/t5/Wireless-Routers/VPNFilter-Malware-Update/td-p/1315372" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Netgear&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://kb.netgear.com/000058814/Security-Advisory-for-VPNFilter-Malware-on-Some-Routers" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;MikroTik&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://forum.mikrotik.com/viewtopic.php?f=21&amp;amp;t=134776&amp;amp;sid=e1317ac312b35b2f791df77e6d9a6404" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;TP-Link&lt;BR /&gt;(TP-R600VPN model only)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://www.tp-link.com/us/faq-2212.html" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;QNAP Systems &lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://www.qnap.com/en/security-advisory/NAS-201805-24" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;2.&amp;nbsp;&lt;FONT size="3"&gt;Can I learn more about the VPNFilter issue?&lt;/FONT&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you would like to get into the details, follow this link (&lt;A href="https://blog.talosintelligence.com/2018/05/VPNFilter.html" target="_blank"&gt;https://blog.talosintelligence.com/2018/05/VPNFilter.html&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;FONT color="#000080"&gt;&lt;STRONG&gt;&amp;nbsp; 3. &lt;FONT size="3"&gt;Is there anything we can do to be secure?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;A few helpful tips to keep your home devices secure are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Always change the default password.&lt;/LI&gt;&lt;LI&gt;Put a password on your home wireless network.&lt;/LI&gt;&lt;LI&gt;Use a strong password with at least 8 characters, a combination of upper and lower case, include numbers and special characters such as @, #,and !.&lt;/LI&gt;&lt;LI&gt;Use a different password on your PC, to your email, to your work, and so on.&lt;/LI&gt;&lt;LI&gt;Make sure you update your software regularly so that security patching occurs.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you still have questions, email &lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 May 2018 23:09:27 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Security-Advisory-New-Malware-could-be-Infecting-your-Home-Modem/gpm-p/10000#M29</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-05-30T23:09:27Z</dc:date>
    </item>
    <item>
      <title>Five steps to protect yourself by LPLC</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Five-steps-to-protect-yourself-by-LPLC/gpm-p/9647#M27</link>
      <description>&lt;P&gt;Hi community,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.scamwatch.gov.au/news/stop-and-check-is-this-for-real-scams-awareness-week-2018" target="_blank"&gt;Scams Awareness Week&lt;/A&gt;&lt;/STRONG&gt; runs this week from 21 – 25 May 2018 and the Australian Government is urging Australians to be on the lookout for threat-based impersonation scams by taking a moment to ask ‘is this for real?’&lt;/P&gt;
&lt;P&gt;I thought you might be interested in the following article &lt;A href="http://digitalfinanceanalytics.com/blog/australians-lost-340-million-to-scammers-in-2017/" target="_blank"&gt;Australians Lost $340 million to scammers in 2017&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also found a helpful resource on LPLC's website about &lt;A href="https://lplc.com.au/risk-management/cyber-security-2/cyber-fraud-dont-fall-for-it/" target="_blank"&gt;cyber fraud&lt;/A&gt;.&amp;nbsp;&amp;nbsp;There's also a downloadable poster which I've attached to this post (link below). It covers 'Five steps to protect yourself'. It would be worthwhile printing for your offices as a reminder.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cyber-security.PNG" style="width: 529px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/3535iBA2DA679681763B3/image-size/large?v=1.0&amp;amp;px=999" role="button" title="cyber-security.PNG" alt="cyber-security.PNG" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 01:01:26 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Five-steps-to-protect-yourself-by-LPLC/gpm-p/9647#M27</guid>
      <dc:creator>AnnaHardie</dc:creator>
      <dc:date>2018-05-21T01:01:26Z</dc:date>
    </item>
    <item>
      <title>Security Reminder - Confirming client bank details</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Reminder-Confirming-client-bank-details/m-p/9644#M2</link>
      <description>&lt;P&gt;PEXA is aware of phishing attempts outside the PEXA platform where unknown parties are intercepting emails between practitioners and their clients and fraudulently changing customer bank details which may result in the unwitting misdirection of funds.&lt;BR /&gt; &lt;BR /&gt;While not specific to e-Conveyancing, PEXA urges all practitioners to take steps to reduce the risk of fraud. This includes verbally confirming bank account details with your clients before entering them into the settlement schedule (if completing the transaction electronically).&lt;BR /&gt; &lt;BR /&gt;It may not be sufficient to simply confirm with the client that they have sent you an email with their bank account details. It would be appropriate to read the bank account details out to your client, confirming that the information you have received is the same as what the client intended to send.&lt;BR /&gt; &lt;BR /&gt;The Law Institute of Victoria offers a practical guide covering cyber security which we would encourage you to &lt;A href="https://www.liv.asn.au/getattachment/Professional-Practice/Areas-of-Law/Technology-and-the-Law/Resources/20171122_LP_LawTechEssentials_CyberSecuirtyFirms-v02.pdf.aspx?mkt_tok=eyJpIjoiT0RrME5UazNaak5pTWpabCIsInQiOiJZOE9GZzdMYkdlbUwwbnlDSDZCQXlySTZcL2FpVEkrYUY5ZVZHK1ZyYmZucGlONW1ZOU1mMm9zQm5PNXFiOW96K3BvdFwvY3JoXC9KY2NsVWZZUDNTXC91QXJWQU5GRjVXY0dBbEIwb1wvVTY2STZiQURnaklaalZjOVNtQTM4VlB1ZDNvIn0%3D" target="_blank"&gt;read&lt;/A&gt;. In addition, The Queensland Law Society has also published a warning in relation to email &lt;A href="http://www.qls.com.au/About_QLS/News_media/News/Warning_on_new_email_scam?mkt_tok=eyJpIjoiT0RrME5UazNaak5pTWpabCIsInQiOiJZOE9GZzdMYkdlbUwwbnlDSDZCQXlySTZcL2FpVEkrYUY5ZVZHK1ZyYmZucGlONW1ZOU1mMm9zQm5PNXFiOW96K3BvdFwvY3JoXC9KY2NsVWZZUDNTXC91QXJWQU5GRjVXY0dBbEIwb1wvVTY2STZiQURnaklaalZjOVNtQTM4VlB1ZDNvIn0%3D" target="_blank"&gt;scams&lt;/A&gt;. &lt;BR /&gt; &lt;BR /&gt;If you have any questions or concerns regarding an existing transaction, or guidance on how to stay safe online, please contact the PEXA Support Centre on 1300 084 515 or visit the security page on our &lt;A href="https://www.pexa.com.au/security?mkt_tok=eyJpIjoiT0RrME5UazNaak5pTWpabCIsInQiOiJZOE9GZzdMYkdlbUwwbnlDSDZCQXlySTZcL2FpVEkrYUY5ZVZHK1ZyYmZucGlONW1ZOU1mMm9zQm5PNXFiOW96K3BvdFwvY3JoXC9KY2NsVWZZUDNTXC91QXJWQU5GRjVXY0dBbEIwb1wvVTY2STZiQURnaklaalZjOVNtQTM4VlB1ZDNvIn0%3D" target="_blank"&gt;website&lt;/A&gt;.&lt;BR /&gt; &lt;BR /&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 May 2018 00:47:23 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Reminder-Confirming-client-bank-details/m-p/9644#M2</guid>
      <dc:creator>JoW</dc:creator>
      <dc:date>2018-05-18T00:47:23Z</dc:date>
    </item>
    <item>
      <title>Phishing Emails... How to stay away from it...</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Phishing-Emails-How-to-stay-away-from-it/gpm-p/8784#M22</link>
      <description>&lt;P&gt;Dear Members,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is an example of an actual phishing email for awareness purposes. Please take a moment to look at the pointers to understand how you can be misguided by a hacker. Being on top of this can help you to stay safe online.&amp;nbsp;Remember, one click is all that matters to open the door to whole new level of issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://home.pexa.io/download/attachments/35243618/phishing-email-signs%20Paypal.jpg?version=1&amp;amp;modificationDate=1523495744947&amp;amp;api=v2" border="0" alt="phishing-email-signs Paypal.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="columnLayout two-equal"&gt;&lt;DIV class="cell normal"&gt;&lt;DIV class="innerCell"&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Here are few helpful steps and questions to try/ask yourselves before clicking on any suspicious/unknown email.&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Reputable &amp;amp; legitimate organizations:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don't request your sensitive information via email&lt;/STRONG&gt;&amp;nbsp;- Legitimate organisations do not send you emails asking you to download certain content e.g. utility bills, gift card link etc. or request you to verify your account details by clicking on a link.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don't call or address you by a common greeting -&lt;/STRONG&gt;&amp;nbsp;Most of the time it will not include generic greetings e.g. "PayPal User", unless it’s advisory and openly available information.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Have their own email domains&lt;/STRONG&gt;&amp;nbsp;- Don't just look at the person's name sending the email. Check the full email address including the domain to make sure it is actually from the organisation represented, as most of the time they'll have their own domain. Hover your mouse over the email to verify this and make sure there's no additional numbers or special characters attached to the address. If there are, it is most likely a phishing e-mail.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don't make grammatical errors -&amp;nbsp;&lt;/STRONG&gt;Spelling mistakes and bad grammar are key giveaways that it's phishing.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don’t force you to their website -&lt;/STRONG&gt;&amp;nbsp;Most of the phishing emails contain multiple hyperlinks to maximize their chances of you clicking on one of them.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don't send unsolicited attachments in the emails -&lt;/STRONG&gt;&amp;nbsp;Attractive attachment headings are another giveaway that it is a phishing scam. Another common case is utility bills or any other public event happening around the same time. Scammers use these events or news items to grab your attention and potentially to get you click on the links.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Send legitimate URLs&amp;nbsp;&lt;/STRONG&gt;- It may look like it is but it may send you somewhere else. Hover your mouse on the link (do not click) to check the link is actually legitimate and does not represent a different suspicious name. Always type the URL into your browser rather than using links on emails if you want to access the website. Don’t trust the email, instead call the sender to validate the request.&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="cell normal"&gt;&lt;DIV class="innerCell"&gt;&lt;P&gt;&lt;SPAN class="confluence-embedded-file-wrapper confluence-embedded-manual-size"&gt;&lt;IMG src="https://home.pexa.io/download/attachments/35243618/download.jpg?version=1&amp;amp;modificationDate=1523495744925&amp;amp;api=v2" border="0" height="400" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="columnLayout single"&gt;&lt;DIV class="cell normal"&gt;&lt;DIV class="innerCell"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;I clicked on it... Now what happens?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you click on a phishing link accidentally, it does certain actions behind the scenes which you cannot see. These actions could be anything from a simple add popup on your screen to a stealing of your personal/customer data.&amp;nbsp;So, if you fall into this category, speak up and seek help by contacting your internal security&amp;nbsp;professionals or IT partners. Sending phishing emails and inviting people to click on these links are by far the most successful way for organisations to experience data breaches.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;if you find any phishing/spam material referring to PEXA, please forward it to &lt;FONT color="#0000FF"&gt;security@pexa.com.au&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 17 Apr 2018 00:30:28 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Phishing-Emails-How-to-stay-away-from-it/gpm-p/8784#M22</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-04-17T00:30:28Z</dc:date>
    </item>
    <item>
      <title>Overseas login to PEXA</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Overseas-login-to-PEXA/m-p/8535#M5</link>
      <description>&lt;P&gt;I am going on leave for 2 weeks and have 2 PEXA settlements due while I am away.&amp;nbsp; Is there any limitation on logging in to PEXA from an overseas location?&amp;nbsp; I ask because some sites, such as ASIC, will not allow login from outside Australia.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obviously I need to take my Licence key with me, but is there any other issue you can think of?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 00:57:07 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Overseas-login-to-PEXA/m-p/8535#M5</guid>
      <dc:creator>SRJ</dc:creator>
      <dc:date>2018-04-09T00:57:07Z</dc:date>
    </item>
    <item>
      <title>Phishing Emails referring to PEXA</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Phishing-Emails-referring-to-PEXA/gpm-p/7964#M21</link>
      <description>&lt;P&gt;Dear Members,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;FONT color="#3366FF"&gt;&lt;STRONG&gt;Forwarding suspicious emails to security@pexa.com.au&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have made changes to our security configurations when you forward a phishing/suspicious email to PEXA via security@pexa.com.au&lt;/P&gt;&lt;P&gt;Previously when you forward an email to security@pexa.com.au with potential malicious content it denied successful delivery and often you would have received a delivery fail/bounce back message. But not any more.... Now you can click the forward button on the actual malicious/phishing email and send directly to us via security@pexa.com.au without the email being blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is important members forward us the actual email to PEXA instead of trying to send it as PDF or a Screenshot of the email.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PEXA Cyber Security Team&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 21:34:22 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Phishing-Emails-referring-to-PEXA/gpm-p/7964#M21</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-03-07T21:34:22Z</dc:date>
    </item>
    <item>
      <title>How to Spot a Phishing Email</title>
      <link>https://community.pexa.com.au/t5/Online-Security/How-to-Spot-a-Phishing-Email/gpm-p/7708#M19</link>
      <description>&lt;P&gt;&lt;STRONG&gt;How to Spot a Phishing Email&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The typical phishing email will contain a concocted story designed to lure you into taking an action such as clicking a link or button in the email or calling a phone number.&amp;nbsp;In an email, there will be links or buttons that take you to a fraudulent website. The fraudulent website will also mimic the appearance of a popular website or company (in this case PEXA). The scam site will present you almost identical login page looks like PEXA waiting for you to login with your actual PEXA login credentials. Where malicious party able to collect your credentials and then they can re-use this to login to PEXA or sell them on the internet. If you felt you have accidentally just did that then your next best option to change the PEXA password immediately.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to Protect Yourselves?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Whenever you get an email about your PEXA account, or a workspace needs action the safest and easiest course of action is to open a new browser, type&amp;nbsp;&lt;A href="https://www.pexa.com.au/" target="_blank"&gt;https://www.pexa.com.au/&lt;/A&gt; OR &lt;A href="https://workspaces.pexa.com.au" target="_blank"&gt;https://workspaces.pexa.com.au&lt;/A&gt; , and log in to your PEXA account directly. Also you can call your known contact which appears to be sent the email to validate.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Do not click on any link in an email that requests personal information.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to report a phishing email ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Follow these steps:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Forward the entire email to&amp;nbsp;&lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt; .&amp;nbsp; &lt;FONT size="2"&gt;(Refer to "How to forward a phishing email to PEXA")&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Do not alter the subject line OR forward the message as an attachment.&lt;/LI&gt;&lt;LI&gt;Delete the suspicious email from your email account.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We’ll let you know quickly if the email is legitimate. Your vigilance helps protect other PEXA users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;A genuine PEXA email will never ask you for&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Credit and debit card numbers&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Bank account numbers&lt;/LI&gt;&lt;LI&gt;Driver's license numbers&lt;/LI&gt;&lt;LI&gt;Email addresses&lt;/LI&gt;&lt;LI&gt;Passwords&lt;/LI&gt;&lt;LI&gt;Your full name&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Further steps to protect you from Phishing&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Monitor your PEXA account.&amp;nbsp;&lt;/STRONG&gt;Check your account periodically for suspicious activity. If you notice unauthorized use, report it to us.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Be smart about your password.&lt;/STRONG&gt;Change passwords often and use unique passwords that include letters, numbers, and symbols.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Keep security software current.&amp;nbsp;&lt;/STRONG&gt;Update your firewalls and security patches frequently.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="phishing 1.png" style="width: 720px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/3019iC8567D43CBEB1EE9/image-size/large?v=1.0&amp;amp;px=999" role="button" title="phishing 1.png" alt="phishing 1.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is an identical looking &lt;U&gt;malicious &lt;/U&gt;PEXA website.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="phishing 2.png" style="width: 609px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/3021i3D2FB94FBC5F0777/image-size/large?v=1.0&amp;amp;px=999" role="button" title="phishing 2.png" alt="phishing 2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;---&amp;nbsp; END ---&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 04:59:41 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/How-to-Spot-a-Phishing-Email/gpm-p/7708#M19</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-02-23T04:59:41Z</dc:date>
    </item>
    <item>
      <title>Risky behavior exposing you to a data leakage</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Risky-behavior-exposing-you-to-a-data-leakage/gpm-p/7675#M18</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Risky behavior&amp;nbsp;exposing you to data leakage&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here’s an simple opportunity to check whether you’re exposed to data leakage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Do you find yourself guilty of the following?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I don’t keep my software (apps, browsers, etc.) and my operating system up to date by installing updates as soon as they’re released.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I don’t use antivirus and additional layers of security that can protect me against second-generation malware.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I don’t pay attention to password security and I reuse passwords.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I use public Wi-Fi networks for online banking and online shopping.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I frequently share personal details on social media or in emails.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I don’t use two-factor authentication.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I don’t have anything to hide or nothing valuable that cyber criminals may want.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I open emails from unknown senders. (Remember your emails have pretty much the full digital print of your life. You have your Driver’s License, Passport, Bank Account details sent to an authority or another business. Don’t you?)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I download and open attachments from unknown senders.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#800080"&gt;I am just a small business and no one is interested in what I do.&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is not meant to be an incriminatory interrogatory, but rather a way to evaluate your own cyber security practices. You may find out that your online safety measures are inadequate, but that doesn’t mean you can’t make a change for the better.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 03:41:19 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Risky-behavior-exposing-you-to-a-data-leakage/gpm-p/7675#M18</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-02-22T03:41:19Z</dc:date>
    </item>
    <item>
      <title>From the Law Society of NSW</title>
      <link>https://community.pexa.com.au/t5/Online-Security/From-the-Law-Society-of-NSW/gpm-p/7492#M16</link>
      <description>&lt;P&gt;From The Law Society - NSW&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="page" title="Page 1"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P&gt;&lt;EM&gt;"In one instance the criminal has hacked into one of the party’s computers and has been monitoring the emails between the solicitor and the other party. The other party sent its final instructions as to the bank account details where the payment of $250,000 was to go to by attaching a PDF of the instructions to the email. However, the hacker amended the PDF with their own bank account details and stated this was the account where the funds were to go. Accordingly, the solicitor referred instructions to PEXA to pay the $250,000 to the wrong bank account. The payment of the $250,000 was paid to the wrong bank account. Luckily, the other party was eagerly awaiting the funds and contacted the solicitor immediately and the bank was notified, and the funds were saved."&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.lawsociety.com.au/cs/groups/public/documents/internetcontent/1439012.pdf" target="_blank"&gt;https://www.lawsociety.com.au/cs/groups/public/documents/internetcontent/1439012.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To be clear, this wasn't a breach of the PEXA platform - the user's computer and or email client were compromised and the&amp;nbsp;false bank details were entered into PEXA by the user who received the email with the amended PDF.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In order to protect yourself in&amp;nbsp;similar circumstances, a great tip is to, as a matter of course,&lt;SPAN&gt;&amp;nbsp;telephone the other party (using the telephone details on file) in every transaction where new bank account details are given, to confirm those new bank details with the client prior to the transfer.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="page" title="Page 2"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Sun, 24 Jun 2018 22:53:10 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/From-the-Law-Society-of-NSW/gpm-p/7492#M16</guid>
      <dc:creator>TJ</dc:creator>
      <dc:date>2018-06-24T22:53:10Z</dc:date>
    </item>
    <item>
      <title>Security Awareness - Spam Emails</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Security-Awareness-Spam-Emails/gpm-p/7265#M10</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="spam.png" style="width: 170px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/2895i9E20948F4829231F/image-size/large?v=1.0&amp;amp;px=999" role="button" title="spam.png" alt="spam.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;FONT color="#800080"&gt;Spam and what is it?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#333333"&gt;Spam or spamming is big business and a mechanism criminals use as well as marketing companies to get your attention, or to convince you to click on a malicious link.&amp;nbsp;&lt;/FONT&gt;&lt;FONT color="#333333"&gt;Spam is the electronic equivalent of junk mail. The term refers to unsolicited, bulk – and often unwanted – email. &amp;nbsp;See below for a few tips&amp;nbsp; to reduce the number of spam emails you get.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;Enable &lt;/STRONG&gt;&lt;STRONG&gt;filters&lt;/STRONG&gt; &lt;STRONG&gt;on your email programs&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;FONT color="#333333"&gt;Most internet service providers (ISPs) and email providers offer spam filters, however, depending on the level you set, you may end up blocking emails you want. It’s a good idea to occasionally check your junk folder to ensure the filters are working properly.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;Report spam&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;FONT color="#333333"&gt;Most email clients offer ways to mark an email as spam or report instances of spam. Reporting spam will also help to prevent the messages from being directly delivered to your inbox.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;Own your online presence&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;FONT color="#333333"&gt;Consider hiding your email address from online profiles and social networking sites or only allowing certain people to view your personal information.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 22:04:28 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Security-Awareness-Spam-Emails/gpm-p/7265#M10</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-29T22:04:28Z</dc:date>
    </item>
    <item>
      <title>6 Simple Steps for a Stronger Password</title>
      <link>https://community.pexa.com.au/t5/Online-Security/6-Simple-Steps-for-a-Stronger-Password/gpm-p/7263#M9</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pw.PNG" style="width: 307px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/2894i4EB62C0A95D53703/image-size/large?v=1.0&amp;amp;px=999" role="button" title="pw.PNG" alt="pw.PNG" /&gt;&lt;/span&gt;&lt;FONT size="4" color="#800080"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;1. MAKE YOUR PASSWORDS STRONG&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Short and simple passwords might be easy for you to remember, but unfortunately they are also easier for cyber criminals to crack.&lt;/P&gt;&lt;P&gt;Strong passwords have a minimum of 10 characters and use a mix of:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Uppercase and lowercase letters&lt;/LI&gt;&lt;LI&gt;Numbers&lt;/LI&gt;&lt;LI&gt;Special characters like!, &amp;amp;, and *. # (Using a special character in your password will increase the difficulty of breaking it significantly)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;Use passphrases&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Criminals often perform password brute force attacks, in which a computer program tries to guess every possible password combination to match your password. Using passphrases will significantly reduce this attempt.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What is a passphrase?&amp;nbsp;A passphrase is collection of words that is meaningful to you, but not to someone else. For example: "horseswimminghigh#" is 18 characters long.&amp;nbsp;Depending on the systems you access, you may be limited to a defined number of characters.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;2. CREATE PASSWORDS HARD TO GUESS&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Avoid using personal information such as your children, partner or pets name, favorite football team or date of birth as your password, as they can be easy for others to guess and for computer programs criminals use to guess&amp;nbsp;passwords.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When trying to hack into an online account, cyber criminals start with commonly found words and number combinations.&lt;/P&gt;&lt;P&gt;Here are some things to avoid using:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Dictionary words&lt;/LI&gt;&lt;LI&gt;A keyboard pattern like qwerty&lt;/LI&gt;&lt;LI&gt;Repeated characters ( ex : aaaaa)&lt;/LI&gt;&lt;LI&gt;Personal information such as your date of birth or driver’s license number&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;3. CREATE UNIQUE PASSWORDS EVERY TIME&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;If you need to reset a password, don’t just change one part of it. Instead of changing a number at the beginning or end, create something completely new you’ve never used before.&amp;nbsp;Get into the practice of changing your password often, ideally every few months.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;4. DON’T SHARE PASSWORDS, EVER.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Never share your password with someone, not even with someone you trust or in the family.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What if a business or company I know asks for my password?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Reputable companies won’t ask you to give them your password over the phone, via emails, or SMS messages. This might be a&amp;nbsp;&lt;A href="https://www.nab.com.au/about-us/security/fraud-warnings-for-all-nab-customers" target="_blank"&gt;warning sign of phishing or a scam&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;PEXA will &lt;STRONG&gt;never ask you&lt;/STRONG&gt; for your password or PIN; either by email, SMS, over the phone or at a branch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;5. DO NOT USE SAME PASSWORD FOR ALL THE ACCOUNTS AND SERVICES&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;This is a common mistake a lot of people make. Using different passwords means that if one of your accounts is breached, criminals won’t have access to other accounts that use the same password.&amp;nbsp;If a criminal has access to several of your online accounts, it increases the chance that they may impersonate you to your online friends, or businesses you deal with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;6. STORE PASSWORDS SAFELY&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;As your online presence grows you may have many accounts with different&amp;nbsp;passwords. You can store these passwords in a password manager. There are many password manager apps&amp;nbsp;available. Almost all of these password manager solution allows PIN access method to make it more secure.&lt;/P&gt;&lt;P&gt;If a web browser you are visiting asking you to save your password think twice whether you want to do that. This is not a good practice. Do not allow web browser to save your PEXA account passwords.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 22:05:42 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/6-Simple-Steps-for-a-Stronger-Password/gpm-p/7263#M9</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-29T22:05:42Z</dc:date>
    </item>
    <item>
      <title>Keep Up to Date with Software and Applications – "Known as Patching"</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Keep-Up-to-Date-with-Software-and-Applications-quot-Known-as/gpm-p/7261#M8</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;FONT size="4" color="#800080"&gt;Keep Up to Date with Software and Applications – "Known as Patching"&lt;/FONT&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3" color="#800080"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="patch.png" style="width: 281px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/2893i853A1F76B55AA333/image-size/medium?v=1.0&amp;amp;px=400" role="button" title="patch.png" alt="patch.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;No matter which phones, tablets, laptops or computers your organisation uses, it’s important they are kept up to date at all times. This is true for both Operating Systems and installed apps or software. Doing so is quick, easy, and free.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Smart Phones/Tablet Manufacturers and developer owners frequently release new updates to their products. The purpose of updates are to update the device with new features and to also fix newly found vulnerabilities. Staying up to date with updates is critical to staying safe online.&lt;/P&gt;
&lt;P&gt;If you don’t apply these regular patches to you computers, tablets and other smart devices then you are at high risk of being a victim of online scams and frauds.&lt;/P&gt;
&lt;P&gt;All devices have a limited lifespan. When new updates cease to appear for your hardware or software, you should consider a modern replacement.&lt;/P&gt;
&lt;P&gt;If you don’t&amp;nbsp;wish to manually&amp;nbsp;update there is an option to set it to “automatic update” which will require no action from you when a new update is available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy Updating ......&amp;nbsp;&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.pexa.com.au/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 02:24:17 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Keep-Up-to-Date-with-Software-and-Applications-quot-Known-as/gpm-p/7261#M8</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-29T02:24:17Z</dc:date>
    </item>
    <item>
      <title>Secure Your Computer, Tablet, Smart Phone</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Secure-Your-Computer-Tablet-Smart-Phone/gpm-p/7259#M7</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Our lives are increasingly dependent on the internet and our digital devices. Digital copy of our lives always lives on these devices. Our personal data is a big business for some organizations. On top of that cyber criminals are increasingly interested in your personal data so they can impersonate you and use your details to carry out illegal activities. This is the main reason why we should think twice and take effective actions to secure our digital devices.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This article provides few tips how you can be on top of this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Set up a password, pass-code, PIN or fingerprint/face-id to lock your devices especially mobile devices.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Keep your devices up to date at all time. Think about setting automatic updates.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Enable automatic screen lockout after a set period of time.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Develop a habit of deleting your web browsing history regularly on your mobile devices and other browsers.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Enable remote locking and remote wipe capabilities on your devices. This will greatly help to take action in case you have lost the possession and control of your device.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Be vary of public Wi-Fi spots specially the free offers. – Wi-Fi is a great tool for criminals to lure you in to traps so they can get easy access to your data.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Switch off your Bluetooth when not used. If you don’t use Bluetooth regularly it is recommended you switch this capability off on your device.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Be mindful operating your device in crowded places. Shoulder surfing is a good technique cyber criminals use. Shoulder surfing refers to looking over your shoulder as you type in our password/PIN/financial details to try and capture them.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 29 Jan 2018 02:41:19 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Secure-Your-Computer-Tablet-Smart-Phone/gpm-p/7259#M7</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-29T02:41:19Z</dc:date>
    </item>
    <item>
      <title>Security Awareness - General Information Security</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Security-Awareness-General-Information-Security/gpm-p/7258#M6</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Video provides information security awareness in and around your workplace. Simple tips how you can create a secure working environment for yourself and colleagues around you without any technical controls. Video runs just over 2 minutes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;LI-VIDEO vid="https://youtu.be/o_58rBduAqQ" align="center" size="medium" width="400" height="225" uploading="false" thumbnail="https://i.ytimg.com/vi/o_58rBduAqQ/hqdefault.jpg" external="url"&gt;&lt;/LI-VIDEO&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 00:20:42 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Security-Awareness-General-Information-Security/gpm-p/7258#M6</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-29T00:20:42Z</dc:date>
    </item>
    <item>
      <title>Cyber Security Awareness - Phishing Attacks</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Cyber-Security-Awareness-Phishing-Attacks/gpm-p/7257#M5</link>
      <description>&lt;P&gt;&lt;LI-VIDEO vid="https://youtu.be/5RHeJAEdiEc" align="center" size="medium" width="400" height="225" uploading="false" thumbnail="https://i.ytimg.com/vi/5RHeJAEdiEc/hqdefault.jpg" external="url"&gt;&lt;/LI-VIDEO&gt;Video provides great insight in to Phishing attacks and how they are conducted. Video is just over 3 minutes and would be helpful to identify and defend against these sort of common attacks.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 00:12:10 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Cyber-Security-Awareness-Phishing-Attacks/gpm-p/7257#M5</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-29T00:12:10Z</dc:date>
    </item>
    <item>
      <title>Password Security</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Password-Security/gpm-p/7249#M4</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="NCSC Password Security.jpg" style="width: 1071px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/2892iC62F48C0DA5D684A/image-dimensions/1071x754?v=1.0" width="1071" height="754" role="button" title="NCSC Password Security.jpg" alt="NCSC Password Security.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2018 03:30:14 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Password-Security/gpm-p/7249#M4</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-25T03:30:14Z</dc:date>
    </item>
    <item>
      <title>STOP. THINK. ACTION</title>
      <link>https://community.pexa.com.au/t5/Online-Security/STOP-THINK-ACTION/gpm-p/7247#M3</link>
      <description>&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;Protect Yourself with these STOP. THINK. ACTION&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;When in doubt, throw it out&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Links in email, tweets, posts and online advertising are often how cyber criminals&amp;nbsp;try to compromise your information. If it looks suspicious, even if you know the source, it’s best to delete or – if appropriate – mark it as junk.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;Think before you act&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Be wary of communications that&amp;nbsp;asks you to act immediately, offers something that sounds too good to be true, or asks for your personal information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;Make your password a sentence&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;A strong password is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember (for example, “I love country music.”). On many sites, you can even use spaces!&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;Unique account, unique password&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Having separate passwords for every account helps to protect you against cyber-criminals. At a minimum, separate your work and personal accounts and make sure that your critical accounts have the strongest passwords.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;Lock down your login&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passwords are not enough to protect key accounts like email, banking and social media.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;Awareness&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Be generally aware about the issues, incidents, current affairs happening in the world. Cyber criminals try to take advantage of these events by using them to grab your attention.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 03:37:20 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/STOP-THINK-ACTION/gpm-p/7247#M3</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-29T03:37:20Z</dc:date>
    </item>
    <item>
      <title>Malicious Emails and How to Protect Yourself</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Malicious-Emails-and-How-to-Protect-Yourself/gpm-p/7246#M2</link>
      <description>&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Mal.png" style="width: 220px;"&gt;&lt;img src="https://community.pexa.com.au/t5/image/serverpage/image-id/2891i1D77E1E82AEF7F81/image-dimensions/220x161?v=1.0" width="220" height="161" role="button" title="Mal.png" alt="Mal.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Have you ever received an email that looked like it came from a colleague, friend, employer or your utility company? Did you think twice before opening it or clicking on the link in that email?&lt;/P&gt;
&lt;P&gt;No matter the controls we have in place there might be a time when one weak link provides an attacker&amp;nbsp;access&amp;nbsp;via a malicious email. A malicious email can&amp;nbsp;look like it comes from someone you know at PEXA, a Financial institution, an e-commerce site, a government agency or any other service or business. The email&amp;nbsp;often urges you to act &lt;U&gt;quickly&lt;/U&gt;, because your account has been compromised, your order cannot be fulfilled or there is another &lt;U&gt;urgent&lt;/U&gt; matter to address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;If you are unsure whether an email request is legitimate, try to verify it with these steps&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Contact the company or the person you know directly – using information provided on an account statement, on the company’s official website or any other previous legitimate official transcript.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Search for the company online – &lt;U&gt;but not with&lt;/U&gt; information provided in the email.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Read it carefully. Most likely you will see grammar or spelling mistakes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Watch out for anything asking urgent action.&amp;nbsp;Requesting urgent action is a common phishing technique.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Hove your mouse pointer over the link provided (do not click) and it should show you the actual web address its trying to take you to. Most of the times these are malicious websites created just to infect your computer just by visiting them.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;STRONG&gt;What to Do if You Are a Victim&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Report it to the appropriate people &lt;/STRONG&gt;within the organization or your IT &amp;amp; Network service provider, including network administrators. They will be alert for any suspicious or unusual activity.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;If you believe your financial accounts may be compromised, contact your financial institution immediately to take actions to protect your accounts.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Watch for any unauthorized charges to your account.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Consider reporting the attack to your local police department, and file a report with the Federal Trade Commission or the Internet Crime Complaint Centre.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 29 Jan 2018 03:04:26 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Malicious-Emails-and-How-to-Protect-Yourself/gpm-p/7246#M2</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-01-29T03:04:26Z</dc:date>
    </item>
  </channel>
</rss>

