Home

PROTECT YOUR PRIVACY

Learn how with Griffon Force

Living in the digital age offers speed and convenience. But these come at the expense of your privacy. As you become more and more dependent on organizations to manage your life, you are increasing your risks for fraud, identity theft, and cyber threats.

.

I was shocked to find three new credit cards in my mailbox. I did not apply for these credit cards. Someone had stolen my identity.  I had an identity theft protection service but they didn’t notify me until after I received the credit cards. I quickly learned that they cannot protect my identity. I called Griffon Force. They showed me how to set up a credit freeze to prevent this from happening again.

Harold T.

Identity theft victim

DATA BREACH & IDENTITY THEFT

Every organization that you give your personal information becomes another potential source of a breach. Over ONE BILLION personal records have been exposed since 2005. Remember the Equifax data breach? It is safe to can assume your information has been exposed and is available for sale online. Bad guys can buy your name, address, date of birth, and SSN online for $1.00. Becoming an identity theft victim is not a matter of if, but when.

After many years, my husband and I had saved enough money to buy our first home. We found the perfect house. The title company emailed us the wire transfer instructions for our down payment. Then we received another email from them saying that the first email was incorrect. We wired the money and waited to close on our home. A few days later we called the title company to get the date for our closing. That is when we learned that they had never received our money. The second email was a phishing email and a crook had stolen our money. If we had known about wire transfer scams we wouldn’t have lost our savings.

David and Nancy H.

Scam victim

TECHNOLOGY AND FRAUD

Technology is rapidly advancing, are you able to keep up? Do you understand how it works and how information is exchanged?  The bad guys understand this and use it to their advantage putting you at a greater risk of fraud, cyber threats, and identity theft. One example is caller ID spoofing. Bad guys can use an online program that will change the information displayed in your caller ID to display whatever they want it to display. You should NEVER believe your caller ID.

I purchased a used car from a dealership. I took the car home and tried to connect my phone to the car. I was shocked to find that the previous owner’s contacts were still in the car. It also had their home saved in the navigation system. That got me thinking about the car I had just traded in. I never thought to remove my information from the vehicle before giving it to the dealer.

Duane D

Privacy victim

LOSS OF PRIVACY

We are discovering how organizations are selling or sharing our personal information, often without our consent. Take Facebook for example. We are learning more and more about how they are using or sharing the personal information of their more than a billion users. We are also learning how even if you never signed up for Facebook, they could still have a profile about you. We are losing control of our personal information and our privacy.

IT IS TIME TO TAKE CONTROL OF YOUR PRIVACY

Learn how with Griffon Force

As a member you will learn

  • How identity thieves steal and use your identity
  • The tools and techniques used to scam you
  • How to adjust privacy settings on your devices, apps, and more
  • How to create your personal privacy plan
  • Protect yourself from identity theft, fraud, and cyber threats
Get started today

WE TELL YOU WHAT "THEY" DON'T WANT YOU TO KNOW

Identity theft protection companies

Credit reporting agencies

Financial institutions

Criminals

What is included with your membership

  • Monthly newsletter delivered to your inbox
  • Weekly tips delivered to your inbox
  • Learn from industry experts with more than 20 years of experience
  • Online access to prevention and incident response plans, tools, and checklists
  • Coming soon…How to develop a Personal Privacy Plan online course
  • Online access to all of our content, updated weekly
  • Membership price is guaranteed for the life of your membership

Here’s a peek at our content

FRAUD AND SCAMS

  • Three steps to identify a scam
  • Explanation of known scams
  • Techniques used by scammers
  • What to do if you become a victim

IDENTITY THEFT

  • Types of identity theft
  • Steps to prevent or minimize your risk
  • How to monitor for identity theft
  • Steps to take if you become a victim
  • Know your rights as a victim
  • How to shop for identity protection services
  • Free resources

CYBER

  • Phishing, smishing and vishing
  • Travel risks including juice-jacking
  • The do’s and don’ts of social media
  • How to adjust the privacy settings of your smartphone
  • How to read privacy policies and terms of service agreements
  • How to find your information online
  • Protect your privacy with digital hygiene

RECENT ARTICLES

GET INSIDER INFORMATION FROM FRAUD, IDENTITY THEFT, AND CYBER EXPERTS

Our team has more than 20 years of experience in the fields of investigation, IT, cyber-security, fraud litigation, and national security. Learn from our experience. Gain our skills.

Benefits of becoming a member

}

SAVE TIME

Everything you need in one convenient location. No more wasting hours searching online.

EMPOWERMENT

The more you know, the less likely you will become a victim. Knowledge is power.

SAVE MONEY

Learn how to identify a scam, saving you from losing your money. Stop paying for services that you can do for free. 

t

CONFIDENCE

Asking for help can be embarrassing. Gain confidence by learning on your own.

CONVENIENT

Crucial information from our experts delivered weekly to your inbox. Staying current has never been easier.

PROTECT FAMILY

You will become empowered with the skills and tools necessary to protect your family.

Meet Our Experts

Carrie Kerskie

Carrie Kerskie

GF President and identity theft expert

Private investigator and author with 15 years of experience assisting identity theft and fraud victims. Identity theft consultant, speaker, and trainer.

Dennis DiGiacomo

Dennis DiGiacomo

GF VP and IT expert

Apple and Microsoft professional with more than 30 years of experience in IT consulting, education, training, and troubleshooting.

Chris Vernon

Chris Vernon

GF Board Chairman and legal expert

Managing partner of Vernon Litigation Group. His law firm handles litigation and arbitration of complex financial matters, identity theft, and data breaches.

John Benkert

John Benkert

GF Advisor

Chief Technology Office, Cigent Technology, with over 20 years of experience in IT and information Security. He is an electrical engineer and technology specialist.

Greg Scasny

Greg Scasny

GF Advisor

Chief Technology Office, Cigent Technology, with over 20 years of experience in IT and information Security. He is an electrical engineer and technology specialist.

START PROTECTING YOUR PRIVACY

Gain expert insight to protect your family from fraud, identity theft, and cyber threats.

SIGN ME UP

HAVE A QUESTION?

8 + 8 =

(239) 325-5155
999 Vanderbilt Beach Rd, Suite 200
Naples, FL 34108