Save yourself from Rental Scams

Nowadays there are a lot of houses for rent on the market. This is definitely a trend that is here to stay and can be beneficial for both landlord and tenant. However, unlike apartment buildings and complexes, rental houses may not be managed by a property manager.

Rental properties that are not managed by professionals are much more likely to be the target of rental scams. Here are some precautions that every potential renter should take, for every rental property they are thinking about renting:

  • The website where you find the property should have multiple photos, inside and outside. Inquire about the property and ask about something you can’t see in one of the photos.
  • The website where you find the property should have details about all the amenities. Look at the list and make sure the attractions mentioned are actually nearby – within walking distance if that’s what they say they are.
  • The webiste should have an exact address, not just an area circled on a map. Move on to another property if you can’t get the exact house address.
  • You should be able to set up an appointment for a walkthrough. Do not sign anything or make any payments until after the walkthrough.
  • You should be asked to provide information about yourself to be screened as a potential tenant. If you are not asked for your information at all or if you are asked for your information prior to a requested walkthrough, move on to another property.
  • You should be asked to sign a lease, but you should not be asked to sign or pay anything before seeing the property. If any kind of payment is requested before you have signed a lease and received keys (that actually open a door to the property) move on to another property.
  • Pay attention to the following warning signs: if the person asking for the intial rent or a deposit is out of the state or country; if the rent requested is too cheap for the area where the property is located; and/or if you are asked to wire a deposit or rental amount. These are all potential signs that the person asking for money does not own or manage the property.
  • Don’t be pressured. Scammers favorite tool is to try to make you act without thinking something through. Whether there is a time limit or not, you should thoroughly research the property – and if you don’t have time, move on to something else.
  • Know the owner – check real estate, property management, and tax assessor’s records to make sure that the person you are dealing with is the legitimate owner of the property.

Finally, if at any time during the process you feel uneasy or doubt what you are being told is true, move on. There are a lot of scammers pretending to be owners as soon as a house is placed on the market because more often than not, they get away with it! If no one was fooled, the number of scammers would drop significantly. Don’t be a statistic.

Introducing the informXL User Security Analyzer

Let’s face it. Security set up and management in complex ERP environments can be daunting. A lot is resting on iron clad security mechanisms being put in place and monitored over time. Implementers, IT managers and even department line managers are charged with ensuring that proper security mechanisms exist across the operational software supporting homebuilder operations, but with so many internal controls, user roles and personnel, visibility into broad and detailed security set up can be challenging.

Enter informXL and the new User Security Analyzer, now available in the informXL 4.5 for NEWSTAR release. This new Analyzer will benefit anyone responsible for maintaining or auditing user security access in NEWSTAR, especially IT personnel, Controllers or those performing internal audits. It can be used for a variety of tasks, including:

  • General security management by user or user type
  • Analysis of internal controls and segregation of duties
  • Project level security management
  • Review of PO approval rules
  • Review or audit of security overrides

The User Security Analyzer provides detailed information for NEWSTAR users around assigned user types, NEWSTAR Web access, PO approval Rules and logged usage. The Analyzer can also be run by Project Security for quick insight into which users and user types have access to specified projects.  Some of the highlights include:

  • Menu Security – pulls from all menu-based security for active user types showing menu security names and the associated controls. This report provides excellent insight into internal controls and allows validation of current set up to ensure adequate segregation of duties have been properly structured and is helpful during initial user security set up.
  • PO Approval Drill Down – ability to audit or review PO approval rules assigned to a specific user. A drill down feature provides visibility into user information, Rule ID, approval limits and escalation contacts if needed.
  • NSE Web Access – for anyone using NSE Web, the User Security Analyzer will provide insight into whether a user ID has been added into NSE Web and whether or not it has been approved. Conditional formatting allows you to easily see the status, along with the last login date.
  • Usage Drill Down – using a logged usage drill down which pulls all logged usage information by user, easily identify every program code a user has hit over a specified period of time.
  • Project Security – for those who have implemented project level security in NEWSTAR, the User Security Analyzer will highlight all operating units and projects a particular user is assigned to using project level security in NEWSTAR. A pivot table is included allow a quick and easy audit of which users have access to a particular project.

Those responsible for user security oversight will appreciate the ease of insight the informXL User Security Analyzer provides, and the time it saves tending to those important tasks associated with properly securing sensitive data. To see the User Security Analyzer video overview, check it out on the informXL YouTube channel where it can be found in the Analyzer – Constellation NEWSTAR section. The User Security Analyzer is only available beginning with release 4.5. Anyone interested in updating to the latest release should email us to request the update.

Cornerstone works with KOVA

  

   

Cornerstone Solutions is pleased to be working closely with KOVA Sapphire Build on projects this year. This strengthens our partnership and ensures that our team is up to date on all the latest features and functionality. If you have any customizations or functionality you’ve been looking to implement, we’d be glad to assist you!

Contact KOVA: http://www.sapphirebuild.com/Contact.aspx

Contact Cornerstone: simply click on the ContactUs link at the top of the page.