The need for encrypted communication in business and in life, is growing as each data breach is announced to the public. Communication between businesses has been the difference between success and failure, the key to growth and the accessory for expansion. Securing a deal on the other side of the world, or perhaps on the other side of the country, can be hindered by ineffective communication. As such, secure communication is at a premium for the health of the business and the view of the brand.  Cyber attacks are becoming more rampant, the consequences of which make businesses ‘wanna’ cry.  However data breaches on the scale of ‘wanna’ cry can be avoided. Moving forward, we’re likely to see more sophisticated […]

Corporate Digital Data is a key component to your digital identity. It is a critical asset that must be protected from external threats. At the same time, this digital data empowers your business. Forward thinking business leaders should be looking at a few key data protection principals at every scale, from the small business to the large enterprise. Here is how to get started: Authorize only specific user experiences to access your corporate data. Delegate user access via specific applications to interact with your data API. Create a well understood corporate data classification policy. Create a well understood role based access control policy. Provide reasonable defaults for employees. Authorize Specific User Experiences All too often, corporate digital data ends up […]

Secure convenience. In addition to redefining what it means to be cyber secure, and now that we’re starting to understand that modern day convenience up to this point is unsecured. We can start to get into the answer we’re all looking for. It’s simple, secure convenience no matter what. Our mission here at Griffin is simple as well, help people and business. Help everyone take back control of their digital self better protecting the physical self so we can sleep easy at night. So how do we do this, keep it simple. We start by understanding your strategy and business goals, the unique people and processes that make up your business and lifestyle. Then map it to the technology and […]

The number one question we receive from customers is “what is block chain?” Many believe Blockchain technology is set to change the way the world does business. Blockchain is an incorruptible decentralized ledger that not only provides a transaction medium but also acts as a repository of all transactions in hashed digital packets called blocks. The advantage of a blockchain based identity system is its ability to record each identity shared in the global network and maintain continually reconciled data throughout the network. While we have reservations about the long term viability of blockchain (we will get into this in a future post), we do believe that in 2018 Blockchain is a solid safeguard.  The blockchain technology has solved a long-standing […]

Digital Identity, in its simplest form, is a digital means of establishing we are and who we say we are. Identity is vital to participate fully in our modern digital society and economy. Online users must provide their identities using credentials, such as a password. This process is called authentication, and it is essential to protecting your digital identity. If authentication can be circumvented, then anyone can pretend to be anyone else online, and that can lead to serious problems. The following are 3 digital protections you can do yourself today: Use a Password Manager A password manager is easy to use, once a user visits a website and enters their username and password, the password manager captures the information, […]

Security is not convenient. So, you must decide what is important to you, security or convenience? With convenience becoming common among users it’s very hard to break that expectation until something bad happens. Even then it is hard to change behavior, we rate how bad that something is and try to justify not changing our behavior because most of us don’t like change. Convenience is comfortable. What’s going on. Even with Apple saying “we want to be different”, the question is how much? Digital Health is something you will start to hear in this effort. Apple is telling you that “you have the ability to block or limit apps” but they could have taken a hard stance if they wanted. […]

Mobile phones have become ubiquitous and basic communications tools, now used not only for phone calls, but also for accessing the Internet, sending text messages, and documenting the world. Unfortunately, mobile phones were not designed for privacy and security resulting in Identity theft. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance risks, especially location tracking. You probably know your phone can pinpoint your location for GPS, local search, or the weather. Hopefully, you also know that means your phone keeps track of everywhere you go, all the time. Location tracking via smartphones is a common practice used by all the major players, either locally on the device […]

Innovation is one of the greatest driving forces on the planet. Apple and CEO Tim Cook do innovation well. Today he took center-stage at the WWDC announcing the next generation of Apple products and services. Both ones that I use and like, most of the time. The ability to have continuity among my suite of devices is convenient. But is it secured? What does this mean for my digital identity? Does it protect me? It’s only as secure as the provider and the underlaying privacy policies. Apple products communicate with their servers to achieve this convenience. So, your data is their data and they collect metrics as you have agreed to let them. Read more about the details of use here Apple […]

Everyday we have different people ask what is cryptocurrency? Although we have some concerns with the concept and security of cryptocurrency, we felt like it was worth writing a blog to refer customers, prospects and partners alike too. A cryptocurrency is a digital currency that operates in a decentralized manner and uses encryption. In other words, no central bank or government regulates this currency (it’s decentralized). It is digital in that it is virtual, not like physical money. And it uses security features encryption/cryptography in order to avoid counterfeiters, secure transactions, and generate the units of currency. Digital currency has no physical form, but is an increasingly hot commodity such as Bitcoin, its most well-known iteration. Cryptocurrencies rely on blockchain technology. The […]

Are you communicating securely? The controversial cell phone spying tool, also known as IMSI catchers, has long been used by law enforcement to track and monitor mobile users by mimicking a cellphone tower and tricking their devices to connect to them. Sometimes it even intercepts calls and Internet traffic, sends fake texts, and installs spyware on a victim’s phone. Cyber criminals utilize IMSI catchers to intercept calls and data, using a man-in-the-middle attack, by acting as a fake cell tower, which mobile devices in the area see and connect to. Mobile devices like smartphones and tablets operating in the same area as an IMSI catcher will be victims of the surveillance, as these surveillance devices do not only target individual […]