How a Mortgage Company Uses Teramind to Combat Fraud and Protect Data
Learn how a leading mortgage company used Teramind to ensure compliance with federal regulations while building legally defensible evidence for any violations.

Mortgage companies face strict regulatory requirements for handling financial documents and customer data. This leading mortgage company monitors 400 employees to ensure compliance with federal regulations while building legally defensible evidence for any violations.
The stealth approach prevents employees from altering behavior during investigations and maintains the integrity of evidence needed for regulatory reporting. After three years of deployment, they’ve successfully caught document fraud, protected client lists from departing salespeople, and—equally important—cleared innocent employees of false accusations.
Their IT security lead rates Teramind 10 out of 10, citing not just the technology but the exceptional support that has made their stealth investigations possible and effective.
The Challenge: Protecting Client Data in a High-Stakes Sales Environment
Mortgage companies face unique security challenges. Sales teams build valuable client relationships over years, and when employees leave—often poached by competitors—the temptation to take client lists can be overwhelming.
“We are a sales environment. So obviously there are people that would leave us to go to another company for sales because they’re being poached,” the security lead explains. “We need to make sure they’re not trying to take their client data list with them.”
Beyond data theft, the company faced an even more serious threat: document fraud. In the mortgage industry, altered documents can have devastating legal and financial consequences.
The Selection Process: Cloud-Based and Lightweight
When evaluating solutions, the company had specific technical requirements:
- Cloud storage without local server dependencies
- Minimal CPU usage to avoid slowing machines
- Modern, actively maintained platform
- Comprehensive screen recording capabilities
“We looked at two or three in total, including Teramind, and we just liked what Teramind had to offer and felt like it was being more modern or kept up to date than at least one of the competitors was,” the security lead recalls.
The company made a strategic decision to run Teramind completely in stealth mode—employees have no idea they’re being monitored. This approach serves multiple purposes:
- Preserves investigation integrity: Suspects can’t alter behavior if they don’t know they’re under scrutiny
- Maintains legal confidentiality: The monitoring capability itself remains protected information
- Enables authentic evidence gathering: Natural behavior provides the most accurate picture
“We run in full stealth so we don’t want to tip anybody off that we have something that’s recording their actions, especially when we have to use that legally,” the security lead explains.
Fraud Detection in Action
The most significant victories have come in detecting document fraud—a serious crime in the mortgage industry.
The company suspected an employee had modified borrower documents to meet loan requirements. Using Teramind’s keylogger search function, the security team could pinpoint exact moments when numbers were changed.
“We’ve had success where we suspected somebody on the team modified a document, whether it was altering numbers on it to basically meet the requirements,” the security lead shares. “They wanted to add an additional $300, for instance.”
The investigation revealed multiple versions of the same document with different values—clear evidence of fraud. Teramind showed:
- Where the employee pulled the original file
- When they made changes
- Where they saved multiple versions
- How they submitted the altered document
This evidence went directly to legal and HR for additional proceedings.
Proving Innocence: The Other Side of Investigation
Just as important as catching bad actors is clearing innocent employees. Teramind has proven equally valuable in disproving allegations.
“It’s also helped prove innocence—suspicious activity being reported that it’s also proved to be everything is legit,” the security lead notes. “It’s been used to validate that the person didn’t do anything wrong either.”
This dual capability protects both the company and its employees, building trust in the investigation process.
The Investigation Workflow
The security team has developed an efficient investigation process:
- Alert triggers: Compliance or legal reports potential issues
- Keyword searches: Using keylogger data to find specific terms or numbers
- Timestamp verification: Matching file upload times with screen recordings
- Cross-platform validation: Using Teramind findings to guide searches in OneDrive, SharePoint, and Microsoft 365 logs
- Evidence compilation: Building cases using multiple data sources without revealing Teramind’s involvement
“It makes it a lot easier to know what to look for to be able to get that information to then provide the actual evidence or details without having to say, ‘Hey look, we used Teramind showing their screen being recorded,'” the security lead explains.
While maintaining stealth mode, the company still uses Teramind’s alert capabilities for early warning:
- Job website searches (though they filter for legitimate employment verification activities)
- Resume uploads
- Specific keyword patterns in emails
- File transfer activities
These alerts help prioritize investigations without tipping off employees.
Support That Makes the Difference
The security lead reserves highest praise for Teramind’s support team, rating them “fantastic” across the board.
“Anytime I’ve ever had to reach out to support, they have been fantastic. Most I’d say eight or nine out of 10 times they’ve been able to answer the question really quickly,” they report.
Even complex issues receive rapid resolution: “There’s been one or two instances where they’re like ‘Let me look into this,’ and then as early as the next day they’re like ‘Hey, we went ahead and made this change to the account.'”
This responsive support proves critical when dealing with application conflicts, exclusion rules, or behavior notification configurations.
Minimal System Impact
With 400 monitored employees, system performance remains a key concern. Teramind delivers on its promise of lightweight operation.
“The impact on the system resources of the machine has been very good,” the security lead confirms. This efficiency allows comprehensive monitoring without employee complaints about computer performance—crucial for maintaining stealth operations.
The Verdict: Perfect Scores Across the Board
When asked to rate Teramind, the response is unequivocal: “I would rate it five out of five or 10 out of 10. There’s nothing that’s really not worked.”
The security lead struggles to identify missing features: “I can’t really say there’s been something like, ‘Oh, if it had this then we would…'”
Would they recommend Teramind? “I would definitely recommend it.” The only barrier to more recommendations is the confidential nature of their deployment—they can’t exactly discuss their security tools with peers.
This mortgage company’s experience offers valuable lessons for organizations prioritizing security over productivity monitoring:
- Stealth mode preserves investigation integrity while building legally admissible evidence
- Focused deployment on security features avoids productivity monitoring complications
- Cross-platform investigation techniques maximize evidence gathering without revealing methods
- Proving innocence matters as much as catching wrongdoing
- Exceptional support makes complex security deployments successful
For companies in regulated industries dealing with sensitive financial data, this case study demonstrates how Teramind can serve as an invisible guardian—catching fraud, preventing data theft, and protecting both the organization and its honest employees.
“There hasn’t been one thing Teramind hasn’t been able to help out with.” – Security Lead, Mortgage Company