Skip to main content

Cybersecurity Best Practices

Julie Edwards avatar
Written by Julie Edwards
Updated over 2 months ago

Just as Walker & Dunlop partners with you to ensure the success of your CRE projects, we also maintain a strong security stance to ensure information remains secure. To that end, we want to share some best practices to help protect business data from cybersecurity threats like phishing attacks.

Phishing scams are increasingly sophisticated attempts to trick you into revealing sensitive information by posing as trusted sources. These attacks can arrive via email, phone calls, or text messages and, if successful, can lead to serious consequences. These essential tips help to safeguard your information:

1) Be cautious with emails and links.

  • Always verify the sender’s email address. Phishing emails often look legitimate but may contain small, altered details like an extra letter or a 1 in place of an L. An eagle eye can keep you safe.

  • Avoid clicking on links or downloading attachments from unknown emails. Hover over any link to check its URL before you click.

2) Create strong, unique passwords.

  • Use passwords that are unique and follow your company’s cybersecurity policies.

  • Avoid reusing passwords across multiple sites. A password manager can help you create and securely store complex passwords.

  • If you suspect your password may have been compromised, reset your password immediately.

3) Train your team on cyber awareness.

  • Regular training can help your team recognize phishing attempts and respond effectively. Awareness is a key defense in the fight against hackers.

4) Verify requests for sensitive information.

  • Be wary of unsolicited requests for information or transactions. Confirm the request is legitimate using a trusted method, such as calling the official phone number you already use to contact Walker & Dunlop.

5) Keep your software up-to-date.

  • Update your operating system, browsers, and antivirus software regularly to protect against vulnerabilities. It’s like bolting the door to your sensitive information.

6) Exercise caution with attachments.

  • Treat files like .exe, .zip, or .scr with caution, especially if they arrive unexpectedly. They can contain harmful software.

7) Be aware of social engineering.

  • Stay vigilant. If something seems suspicious, it probably is. Verify the identity of anyone requesting sensitive data, especially if the communication is unexpected.

By adopting these practices, you’re taking important steps to enhance your security. If you have questions or need further guidance, please reach out to our support team. We’re here to help ensure a safe, secure digital environment.

Did this answer your question?