How we monitor for data breaches (F-Secure) 0 (0)

This topic gives an overview of how we collect data from data breaches. We get this information from many sources by collecting data sets that have been breached and leaked using multiple techniques. Our primary focus is using a human approach coupled with scanning and monitoring technologies that can access forums on the deep and […]

Read More

Data breaches and identity theft (F-Secure) 0 (0)

A data breach is either an intentional or unintentional exposure of sensitive and confidential personal or financial data to an untrusted environment. A data breach happens when cyber criminals break into a company or online service and steal the private information of its customers or users. This information can range from personally identifiable information, such […]

Read More

Keep your passwords safe with Vault (F-Secure) 0 (0)

F-Secure ID PROTECTION stores and protects your personal information, such as passwords, credit card numbers, and PIN codes. The app gives you an easy way to make sure that the account credentials for your online services, as well as your credit card details and other important information, stay both safe and conveniently accessible. The main […]

Read More

How we classify data involved in breaches (F-Secure) 0 (0)

Data breaches in ID PROTECTION are divided into three groups based on their severity. We rank the data breaches according to severity based on the following categories: how much of your data has been leaked; how potentially harmful the leak is; is the leaked data in an easily-readable format or encrypted. We use the following […]

Read More

Protect your personal data with Monitoring (F-Secure) 0 (0)

F-Secure ID PROTECTION helps you protect your personal information by alerting you of any breached online services that you may use and by giving you specific instructions on how to recover from an incident with minimum damage. The Monitoring feature of F-Secure ID PROTECTION does the following: It protects your own and your family’s personal […]

Read More

Starting email monitoring (F-Secure) 0 (0)

This chapter describes how to start monitoring your email addresses with ID PROTECTION. You can start monitoring your email addresses either through your My F-Secure or through the F-Secure ID PROTECTION app. To start monitoring through My F-Secure: Log in to your My F-Secure account. Do one the following: If you are using a mobile device: In […]

Read More

Installing ID PROTECTION on iPhone and iPad (F-Secure) 0 (0)

This topic describes how to install F-Secure ID PROTECTION on your iOS devices if you have an F-Secure TOTAL subscription. With F-Secure TOTAL, the number of ID PROTECTION licenses and monitored items is determined by your TOTAL subscription. For example, if you have a 5-device subscription, you can have ID PROTECTION on five devices with […]

Read More

Installing ID PROTECTION on Android devices (F-Secure) 0 (0)

This topic describes how to install F-Secure ID PROTECTION on your Android device if you have an F-Secure TOTAL subscription. With F-Secure TOTAL, the number of ID PROTECTION licenses and monitored items is determined by your TOTAL subscription. For example, if you have a 5-device subscription, you can have ID PROTECTION on five devices with […]

Read More