The Internet is being hailed as a way to help make mortgage operations more efficient, but safeguards must be taken to prevent information from being misused, an industry expert says.
"There are several security problems," said Marc Mandel, manager in the information practice of Ernst & Young, New York, at a technology conference sponsored by the Mortgage Bankers Association of America.
Despite efforts to keep data secure, "you're going into an environment that's pretty much totally open," Mr. Mandel said. Information such as a Social Security number on a mortgage application becomes readily available once it hits the Internet, he said. This makes customers, whose relationships mortgage bankers want to protect, particularly vulnerable.
"I think you need to worry about it," Mr. Mandel said.
In addition to gathering information from the Internet, unauthorized users can sabotage data that have been placed on-line, mortgage experts say.
When using the Internet to facilitate mortgage business, "educate your users to be a little paranoid," Mr. Mandel said. "You're trying to protect assets."
Mortgage companies, because they deal with so much confidential consumer information, "must establish network security from the beginning," Mr. Mandel said.
Workers should immediately respond to suspect use, like the appearance of activity in a seemingly secure file, analysts said.
In cases where something appears to have gone awry, "shut down segments that you think are being penetrated," Mr. Mandel said. Users can then bring up the system piece by piece, checking it out systematically to see where the trouble lies, he said.
Mortgage companies must decide beforehand who will use the system, analysts said, and they must keep tabs through strict user policies.
"You should be answering these questions before you hook into the Internet," Mr. Mandel said.
Instead of relying on traditional identification procedures, mortgage bankers were urged to log on with smart cards or passwords that change daily.
"If you use a password more than once, someone can grab it," Mr. Mandel said.
Employees are also urged to be on the lookout for people who, by phone, pose as high-level managers or information administrators and demand access to the system.
And, if they see a small discrepancy in a program, they should look into it with an eye toward possibly weeding out someone with unauthorized access.
"Don't just hook things up and let it flow," Mr. Mandel said.