What is an F-Secure ID PROTECTION master password? (Windows) 0 (0)

The master password is very important as it gives you access to the app and keeps your password data safe. Once you’ve installed F-Secure ID PROTECTION and you start the application for the first time, the app asks you to create a master password. The master password is the only password that you need to […]

Read More

Installing the app on your computer (F-Secure Windows) 0 (0)

This topic describes how you can install and activate F-Secure ID PROTECTION on your desktop computer. Note: Depending on your service provider, the installation procedure may vary from the one described here. Note: If you have an F-Secure TOTAL subscription, you can find the installation instructions here. To install the app on your computer: Go to F-Secure’s website and select […]

Read More

How we monitor for data breaches (F-Secure Windows) 0 (0)

This topic gives an overview of how we collect data from data breaches. We get this information from many sources by collecting data sets that have been breached and leaked using multiple techniques. Our primary focus is using a human approach coupled with scanning and monitoring technologies that can access forums on the deep and […]

Read More

Data breaches and identity theft (F-Secure Windows) 0 (0)

A data breach is either an intentional or unintentional exposure of sensitive and confidential personal or financial data to an untrusted environment. A data breach happens when cyber criminals break into a company or online service and steal the private information of its customers or users. This information can range from personally identifiable information, such […]

Read More

Keep your passwords safe with Vault (F-Secure Windows) 0 (0)

F-Secure ID PROTECTION stores and protects your personal information, such as passwords, credit card numbers, and PIN codes. The app gives you an easy way to make sure that the account credentials for your online services, as well as your credit card details and other important information, stay both safe and conveniently accessible. The main […]

Read More

How we classify data involved in breaches (F-Secure Windows) 0 (0)

Data breaches in ID PROTECTION are divided into three groups based on their severity. We rank the data breaches according to severity based on the following categories: how much of your data has been leaked; how potentially harmful the leak is; is the leaked data in an easily-readable format or encrypted. We use the following […]

Read More