GDPR means General Data Protection Regulation.  This is of no surprise to all of us at Griffin, as we have felt like we are entering a new Industrial Revolution,  where data is the new global currency. When people discuss currencies they tend to think of paper notes—American dollars, euros or pounds. Printed money, is only one kind of currency. Currencies have evolved over time from stones and seashells to the sophisticated forms of legal tender that enable today’s global financial transactions. Some would say that oil has been the ultimate currency in the last 100 years. How do social media platforms make their money? Why do they offer their services to millions of people around the world entirely free? In reality – it’s […]

With the General Data Protection Regulation (GDPR), the European Parliament, the Council and the European Commission intend to strengthen and unify data protection and privacy for individuals within the European Union (EU). When the law takes effect on May 25th, 2018 (tomorrow), it will trigger significant changes to how global brands approach online marketing, data protection and privacy policies.     There are many essential items in the regulation, including increased fines, breach notifications, opt-in consent and responsibility for data transfer outside the EU. As a result, the impact to businesses is huge and will permanently change the way customer data is collected, stored, and used. This regulation not only attempts to ensure that data collection and sales are more […]

Digital Identity is the technological link between a real entity such as a person and its digital equivalent entities. It includes a collection of electronically captured and stored identity attributes including biometric data, and something the person has—like a smartphone—that can uniquely describe a person within a given context.   A Digital Identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavior A digital identity is linked to one or more digital identifiers, like an email address, URL or domain name. Ultimately, identity means the ability to verify that someone is who they say they are, and […]

Secure communication is at the core of data protection; without encryption and authentication every single smartphone in your organization is a potential point of vulnerability. Due to the wealth of apps we all download and pour data into, our smartphones have become a reliable indicator of our lives, an extension of who we are. Encryption offers a vast amount of security when it comes to personal data, and is hard for outside parties to crack. Encryption isn’t about secrets; it’s about security. You might’ve heard about performance lags, and you might think encryption is unnecessary but it can make it possible to leverage the benefits of infrastructure as a service, while still ensuring the privacy of your data. Advantages of […]

High net-worth individuals have access to a lot more financial protection than the rest of the population, but that doesn’t make them immune to fraud in the least. In fact, high net-worth individuals are actually more likely to be the victims of  identity theft then the greater population. The scope and scale of their assets and investments likely translates to increased exposure. And many high net-worth individuals have higher than average public and online profiles. They also can have multiple individuals helping run their lives. Their high-values, & assets can be geographically diverse, potentially outside the country; their investments could be throughout the world, let alone in the country. So the complexity probable does translate into increased exposure. And, again, […]

As more of our physical world becomes digital, crime that was once rooted in “the real world” will become prevalent in cyber space. Attackers are always changing their methods, identifying these cyber security trends will help security professionals plan for addressing these issues in the coming year. While security professionals should try to prevent a breach, its far more critical to uncover breaches quickly and mitigate damage. Here are 3 prevalent trends today: 1. AI powered attacks Artificial intelligence will make existing cyber attacks efforts – things like identity theft, denial-of-service attacks and password cracking – more powerful and more efficient. Much like the human criminal counterpart, an AI with all the right information about a target could ultimately trick them […]

Understand that you’re an attractive target for cyber criminals. If you have money (doesn’t matter how much), data (usernames, passwords, documents, emails, etc.) or a place to work, you’re going to be targeted by criminals in the cyber security world. It’s not even personal, as cyber criminals automate most of their attacks. Don’t ever say “it can’t happen to me.” Given the visibility and public disclosure that results from cyberattack breaches, cybersecurity and enterprise readiness have become very important topics. What’s enabling most cyber crimes is simple human error, such as trusting instructions that are sent electronically, or being taken in by complex scams in which criminals pose as clients, vendors, employees, executives, or other professionals in order to gain access to financial assets. Cyber […]

When an individual’s personal information is accidentally or unlawfully changed, deleted, or disclosed to any parties who do not have a right to it, this is known as a personal data breach. Common personal data breach exposures include personal information, such as credit card numbers, Social Security numbers and healthcare histories, as well as corporate information, such as customer lists, manufacturing processes and software source code. If anyone who is not specifically authorized to do so views such data, the organization charged with protecting that information is said to have suffered a data breach. Unfortunately, some situations are out of our control. We need to be able to trust companies that we do business with to have proper security. That’s […]

Whether you are working on a laptop, smartphone or tablet, you are essentially exposing yourself and, more importantly, your personally identifiable information to cyber security threats every time you log in. Hackers, often with the help of malicious software, do their best to steal information from personal devices for the benefit of themselves or a third party. In today’s networks, we have to consider that digital identity is the new perimeter to be protected. Digital Identity in this case does not mean only the device and its physical location but also the data, applications and user information it contains.     Below are 3 Cyber Security Threats not to overlook Outdated Software A common security flaw in all networks is […]

Thanks to social media, people are sharing more information about themselves than ever before. But that openness also puts them at risk for #identitytheft. Untangling the repercussions of identity theft can take more than a year and cause a lot of headaches. Identity theft isn’t going away any time soon, but that doesn’t mean you have to be a victim. There are steps you can take to reduce your risk, and it all starts with being discriminating about who you share your information with. Learn to recognize Phishing scams. This email-based scam where bad actors pose as a real organization, agency or company, prompting the reader to enter personal information such as addresses, credit card numbers or bank account numbers. If something seems […]