This topic gives an overview of how we collect data from data breaches. We get this information from many sources by collecting data sets that have been breached and leaked using multiple techniques. Our primary focus is using a human approach coupled with scanning and monitoring technologies that can access forums on the deep and […]
Category: F-Secure
F-Secure Business(1304)
F-Secure Endpoint(43)
F-Secure Home(1301)
What happens when there is a data breach and my data gets stolen? (F-Secure MAC)
When a data breach happens, it means that cyber criminals access data sources illegally and can get their hands on sensitive personal data. The data can also end up being sold on forums and market places deep the web. This data may be used for illegal activities such as fraud, identity theft, and blackmail. If […]
Data breaches and identity theft (F-Secure MAC)
A data breach is either an intentional or unintentional exposure of sensitive and confidential personal or financial data to an untrusted environment. A data breach happens when cyber criminals break into a company or online service and steal the private information of its customers or users. This information can range from personally identifiable information, such […]
Keep your passwords safe with Vault (F-Secure MAC)
F-Secure ID PROTECTION stores and protects your personal information, such as passwords, credit card numbers, and PIN codes. The app gives you an easy way to make sure that the account credentials for your online services, as well as your credit card details and other important information, stay both safe and conveniently accessible. The main […]
How we classify data involved in breaches (F-Secure MAC)
Data breaches in ID PROTECTION are divided into three groups based on their severity. We rank the data breaches according to severity based on the following categories: how much of your data has been leaked; how potentially harmful the leak is; is the leaked data in an easily-readable format or encrypted. We use the following […]
Protect your personal data with Monitoring (F-Secure MAC)
F-Secure ID PROTECTION helps you protect your personal information by alerting you of any breached online services that you may use and by giving you specific instructions on how to recover from an incident with minimum damage. The Monitoring feature of F-Secure ID PROTECTION does the following: It protects your own and your family’s personal […]
How do I move from KEY to ID PROTECTION on mobile devices? (F-Secure IOS)
This topic explains how you can move from KEY to ID PROTECTION on your mobile device. Note: These instructions do not apply to you if you have an F-Secure TOTAL subscription. These instructions apply to you in the following instances: You are using F-Secure KEY on your mobile device. You have an ID PROTECTION subscription and […]
How do I move from KEY to ID PROTECTION on desktop devices? (F-Secure IOS)
This topic explains how you can move from KEY to ID PROTECTION on your desktop device. Note: These instructions do not apply to you if you have an F-Secure TOTAL subscription. These instructions apply to you in the following instances: You have previously used F-Secure KEY on a desktop device. You have an ID PROTECTION subscription […]
F-Secure ID PROTECTION replaces KEY in TOTAL. How do I take the new app into use with TOTAL? (IOS)
This topic only applies to you if you have a TOTAL subscription. A new app called ID PROTECTION has now replaced KEY in My F-Secure as part of our new offering to prevent identity theft. ID PROTECTION offers not only a password manager, but also email monitoring to keep track of data breaches and other […]
Does F-Secure collect information on the URLs and other information that users enter into ID PROTECTION? (IOS)
A short answer about data privacy. No. At F-Secure, we don’t collect any of your personal data or information you enter into F-Secure ID PROTECTION. For more information, see the F-Secure ID PROTECTION Privacy Policy here. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team