Overwhelming identity theft risks demand a new approach to securing personal information

Identity Theft

F-Secure launches ID PROTECTION to fight back against data breaches with a fast and comprehensive solution for data security.

To confront overwhelming risks of data exposure that can lead to identity theft, F-Secure has launched ID PROTECTION, new solution that provides a comprehensive approach to securing personal information and accounts.

F-Secure ID PROTECTION continuously monitors and detects exposed personal information online, responds quickly to threats to users’ identity, and doubles as a password manager to prevent account takeovers. Utilizing F-Secure’s unparalleled understanding of attackers’ mindsets and methods, this solution offers a powerful combination of human intelligence and real-time monitoring that helps track down breached data.

“When your data leaks, it could end up for sale on the Dark Web within months, putting you on combo lists that could make you an easy target for advanced attacks,” says Perttu Tynkkynen, Vice President, Consumer Sales and Marketing at F-Secure. “Armed with your credentials, online criminals can then easily take over your online accounts and start ordering goods with your credit card. This can happen before the news of the breach even goes public.”

A new F-Secure survey finds that nearly 4 in 10 (37%) of users are aware of at least one data breach involving an online service they use.* Survey participants reported that they have 18.1 accounts on average. Given that 41% say they reuse the same password on multiple accounts and 56% use the same password on multiple accounts with slight variations, one leaked credential could quickly lead to more than a dozen breached accounts. 

Despite this lack of security precautions, nearly 2 in 3 internet users (65%) report they’re worried or very worried about someone stealing their identity for online purchases or loan fraud.**

“Coming up with a strong, unique password for one password is tough – creating and remembering almost 20 strong, unique passwords is almost impossible. And even if you do everything right, your online services can still be breached,” says Tynkkynen. “This pervasive risk demands a new approach to securing personal data online, hardening your identity and accounts, and alerting you whenever your personal data is found in the ‘wild.’”

Some of the ways F-Secure ID PROTECTION’s comprehensive approach helps eliminate identity theft risks include:

  • Identity management provides instant alerts and guidance how to respond when personal information has been found as part of a breach or data leak
  • Comprehensive breach database consists of billions of recovered assets and plain text passwords
  • Combination of human intelligence and Dark Web monitoring to recover breach data up to 6 months faster
  • Protection for the entire family with a single subscription
  • Password management that makes it easy to create unique, strong passwords that are automatically synchronized and auto-filled on all devices

F-Secure ID PROTECTION is available both with monthly and yearly subscriptions and is now included as part of F-Secure TOTAL premium cyber security package. Find out more about the solution and how to protect your identity on F-Secure’s website

* F-Secure Survey, April 2020, 11 countries (USA, Japan, UK, France, Germany, the Netherlands, Italy, Sweden, Brazil, Mexico, South Africa), 400 respondents per country = 4400 respondents (+25years)

** F-Secure Survey, May 2020, 12 countries (Brazil, Finland, France,  Germany, Italy, Japan, Mexico, the Netherlands, Poland, Sweden, UK, USA), 400 respondents per country = 4800 respondents (+25years)


Bekki Barnes

With 5 years’ experience in marketing, Bekki has knowledge in both B2B and B2C marketing. Bekki has worked with a wide range of brands, including local and national organisations.

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.

Best of tech to meet at VivaTech in May

Viva Technology • 10th April 2024

A veritable crossroads for business and innovation, VivaTech once again promises to show why it has become an unmissable stop on the international business calendar. With its expanding global reach and emphasis on crucial themes like AI, sustainable tech, and mobility, VivaTech stands as the premier destination for decoding emerging trends and assessing their economic...

Enabling “Farm to Fork” efficiency between supermarkets & producers

Neil Baker • 03rd April 2024

Today, consumers across the UK are facing a cost of living crisis. As a result, many retailers and supermarkets are striving to keep their costs down, so that they can avoid passing these onto shoppers. Within this, one area that is increasingly under scrutiny for many organisations surrounds how to improve supply chain efficiency. This...

Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

Nadav Avni • 26th March 2024

Corporate-owned single-use (COSU) devices, also known as dedicated devices, make work easier for businesses and many government agencies. They’re powerful smart devices that fulfil a single purpose. Think smart tablets used for inventory tracking, information kiosks, ATMs, or digital displays. But, in a government setting, these devices fall under strict regulatory compliance standards.

Advantages of Cloud-based CAD Solutions for Modern Designers

Marius Marcus • 22nd March 2024

Say goodbye to the days of clunky desktop software chaining us to specific desks. Instead, we’re stepping into a new era fueled by cloud CAD solutions. These game-changing tools not only offer designers unmatched flexibility but also foster collaboration and efficiency like never before!