A cartoon frog wearing a blindfold leaps off a cliff toward a group of open-mouthed crocodiles waiting in the water below, symbolizing a risky or uninformed decision.

Look Before You Leap: Assessing Third-Party App Risk

By Bryan Johnson, IT Director, Alliant National Title Insurance Company Aristotle supposedly once said, “It is the mark of an educated mind to be able to entertain a thought without accepting it.” Although the ancient philosopher died nearly 2,000 years ago, his statement remains highly relevant to how businesses should approach security issues today, particularly regarding third-party applications. Digital apps …

A businesswoman in a suit and sunglasses walks confidently with a briefcase, followed by faded shadow versions of herself—illustrating the concept of an "IT Shadow" and unseen or duplicative activity in the business world.

Do You Have A Shadow IT Problem? Here’s Why You Need A Plan

Even when there is no malicious intent, unsanctioned applications can cause major problems for your agency By Bryan Johnson, IT Director, Alliant National Title Insurance Company Have you heard of shadow IT? The term conjures images of masked criminals poking around on your server or installing dangerous devices. Yet shadow IT is usually more mundane, referring to applications installed without …

Wooden figures stand around arrows pointing in different directions, symbolizing outsourcing and workflow paths.

6 Key Considerations When Outsourcing Your IT Needs

There are some important questions to ask when you entrust your IT needs to a third-party Millions of businesses in the U.S. today outsource part or all their IT needs to a third party such as a managed service provider (MSP), and it is not difficult to understand why. Working with an MSP can deliver big benefits for a company, …

Deepfake Dangers: How AI Trickery Is Targeting Real Estate Transactions

From Sci-Fi to Real Life: The Evolution of Deepfake Technology Once upon a time, the idea of digitally swapping faces or creating hyper-realistic videos of people saying things they never actually said was confined to Hollywood blockbusters. Think of movies where actors were digitally de-aged or deceased celebrities made surprising cameos. However, in 2017, a new term hit the internet: …

What What Should You Expect For Multi-Factor Authentication In 2025 And BeyondWhat

For over 15 years, multi-factor authentication (MFA) has played a critical role in how businesses operate securely online. The rise of cloud computing, social media, and mobile apps has made MFA essential for many companies—particularly in regulated industries. However, despite its importance, many users find MFA cumbersome due to its reliance on SMS text or authentication apps. The good news …

What Title Agencies Should Know This Cybersecurity Awareness Month

Use this year’s spooky season to assess your strategies and ward off the specter of cybercrime. For many people, October is associated with ghosts, goblins, tricks and treats. But for those involved in IT, it represents something equally scary: the unpredictable cybersecurity landscape facing businesses today. You see, October is Cybersecurity Awareness Month, and it’s the perfect time for title …