Are you communicating securely? The controversial cell phone spying tool, also known as IMSI catchers, has long been used by law enforcement to track and monitor mobile users by mimicking a cellphone tower and tricking their devices to connect to them. Sometimes it even intercepts calls and Internet traffic, sends fake texts, and installs spyware on a victim’s phone. Cyber criminals utilize IMSI catchers to intercept calls and data, using a man-in-the-middle attack, by acting as a fake cell tower, which mobile devices in the area see and connect to. Mobile devices like smartphones and tablets operating in the same area as an IMSI catcher will be victims of the surveillance, as these surveillance devices do not only target individual […]

What Comprises Digital Identity? The first thing to consider is what assets or accounts make up our digital identities. Every time we create a new Snapchat, Facebook, or LinkedIN social media account, we’re adding another piece to that digital identity, and that’s just for social media. From PayPal to Amazon, every account we have online, whether it’s financial, professional, or just for commenting on a blog post, makes up a small piece of our digital identities. A digital identity arises organically from the use of personal information on the web and from the shadow data created by the individual’s actions online. A digital identity may be a profile linked to the device’s IP address. Digital identities are seen as contextual in nature since a user […]

By now most of us have realized that our digital identity is under-siege more so than our physical self. This trend of data breaches will only continue to rise. Many couldn’t have imaged the day our digital self being held for ransom could lead to a growing fear of humiliation and damaged reputations. So how can we protect against cyber crimes without understanding what makes up our digital self. Thousands of cybersecurity companies out there create a bunch of fear, doubt and uncertainty, then solve only a small piece of the problem. A problem most cyber companies don’t get in their own industry, at a cost the majority of individuals and corporations can’t afford. Even the ones that can must continue […]

GDPR means General Data Protection Regulation.  This is of no surprise to all of us at Griffin, as we have felt like we are entering a new Industrial Revolution,  where data is the new global currency. When people discuss currencies they tend to think of paper notes—American dollars, euros or pounds. Printed money, is only one kind of currency. Currencies have evolved over time from stones and seashells to the sophisticated forms of legal tender that enable today’s global financial transactions. Some would say that oil has been the ultimate currency in the last 100 years. How do social media platforms make their money? Why do they offer their services to millions of people around the world entirely free? In reality – it’s […]

With the General Data Protection Regulation (GDPR), the European Parliament, the Council and the European Commission intend to strengthen and unify data protection and privacy for individuals within the European Union (EU). When the law takes effect on May 25th, 2018 (tomorrow), it will trigger significant changes to how global brands approach online marketing, data protection and privacy policies.     There are many essential items in the regulation, including increased fines, breach notifications, opt-in consent and responsibility for data transfer outside the EU. As a result, the impact to businesses is huge and will permanently change the way customer data is collected, stored, and used. This regulation not only attempts to ensure that data collection and sales are more […]

Digital Identity is the technological link between a real entity such as a person and its digital equivalent entities. It includes a collection of electronically captured and stored identity attributes including biometric data, and something the person has—like a smartphone—that can uniquely describe a person within a given context.   A Digital Identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavior A digital identity is linked to one or more digital identifiers, like an email address, URL or domain name. Ultimately, identity means the ability to verify that someone is who they say they are, and […]

Secure communication is at the core of data protection; without encryption and authentication every single smartphone in your organization is a potential point of vulnerability. Due to the wealth of apps we all download and pour data into, our smartphones have become a reliable indicator of our lives, an extension of who we are. Encryption offers a vast amount of security when it comes to personal data, and is hard for outside parties to crack. Encryption isn’t about secrets; it’s about security. You might’ve heard about performance lags, and you might think encryption is unnecessary but it can make it possible to leverage the benefits of infrastructure as a service, while still ensuring the privacy of your data. Advantages of […]

High net-worth individuals have access to a lot more financial protection than the rest of the population, but that doesn’t make them immune to fraud in the least. In fact, high net-worth individuals are actually more likely to be the victims of  identity theft then the greater population. The scope and scale of their assets and investments likely translates to increased exposure. And many high net-worth individuals have higher than average public and online profiles. They also can have multiple individuals helping run their lives. Their high-values, & assets can be geographically diverse, potentially outside the country; their investments could be throughout the world, let alone in the country. So the complexity probable does translate into increased exposure. And, again, […]

As more of our physical world becomes digital, crime that was once rooted in “the real world” will become prevalent in cyber space. Attackers are always changing their methods, identifying these cyber security trends will help security professionals plan for addressing these issues in the coming year. While security professionals should try to prevent a breach, its far more critical to uncover breaches quickly and mitigate damage. Here are 3 prevalent trends today: 1. AI powered attacks Artificial intelligence will make existing cyber attacks efforts – things like identity theft, denial-of-service attacks and password cracking – more powerful and more efficient. Much like the human criminal counterpart, an AI with all the right information about a target could ultimately trick them […]

Understanding the cyber security basics, starts with understanding that you’re an attractive target for cyber criminals. If you have money (doesn’t matter how much), data (usernames, passwords, documents, emails, etc.) or a place to work, you’re going to be targeted by criminals in the cyber security world. It’s not even personal, as cyber criminals automate most of their attacks. Don’t ever say “it can’t happen to me.” Given the visibility and public disclosure that results from cyberattack breaches, cybersecurity and enterprise readiness have become very important topics. What’s enabling most cyber crimes is simple human error, such as trusting instructions that are sent electronically, or being taken in by complex scams in which criminals pose as clients, vendors, employees, executives, or other professionals in order […]