phone icon (+62) 215254737
digital identity

Sep 29, 2025

Data Security: Why Identity Is the Key to Everything

In today’s digital era—where cyberattacks are happening left and right—data security is inseparable from digital identity protection. Let’s understand the threats and how to stay protected.

Keamanan Data: Kenapa Identitas yang Jadi Kunci Utama?

When we talk about data security, most people immediately picture complex IT work: a hacker breaking into a system while an IT team scrambles to stop them. Almost like a movie scene, right?

 

In reality, the biggest threats to data today don’t just come from weak systems—but from unverified digital identities.

 

Whether it’s a data breach, a leaked database, or unauthorized access, they all lead back to the same root cause: identity. The everyday information we use to navigate digital services is actually the foundation of strong data security.

 

So why does identity matter so much? Let’s dive in.


Digital Crime in Indonesia Has Increased Sixfold

Data security challenges come from all directions—rapidly growing digital transactions, evolving threat sophistication, and the increasing habit of sharing personal identity data.

 

According to the DGVERS discussion hosted by the Ministry of Communication and Digital Affairs together with B-Universe in September 2025, digital crimes in Indonesia rose sixfold compared to the previous year.

Investor Daily reported insights from Prof. DR. Ing. Ir. Suhardi of STEI ITB, explaining that the spike is driven by the massive shift of commercial and social activities into the digital space. As a result, personal data such as medical information, financial records, and e-money transactions now circulate widely online—making them prime targets for cybercriminals.

Even more concerning: cybercrime is no longer aimed at large institutions alone. Every individual is now a potential victim. Attackers increasingly use phishing, social engineering, and even exploit household IoT devices—CCTV cameras, smart locks, home routers—you name it. Any weak point can become an entryway.

 

This shows that data security is no longer just about strong systems—it’s about how well identity and access are controlled and verified.

Worse, identity breaches often happen simply because someone manages to log in as someone else. For example, attackers use leaked personal data to impersonate someone, access financial systems, customer records, or internal dashboards. One vulnerability can ripple across an entire organization.


Identity-Based Cyberattacks

Indonesia ranks among the top 10 countries with the highest number of data leaks globally. Based on VIDA’s findings, 84% of businesses in Indonesia experienced identity fraud in the past year—including fake IDs, synthetic identities, and deepfakes posing as CEOs.

 

Unlike traditional attacks like viruses and malware, identity-based attacks rely heavily on deception. Here are the main types:


1. Phishing & Social Engineering

Attackers manipulate victims psychologically into willingly giving away sensitive information—OTP codes, passwords, verification details. Tactics include fake emails, WhatsApp messages, or spoofed websites.

 

A staggering 97% of businesses in Indonesia have been targeted by social engineering, with phishing being the most dominant method.

This proves that identity manipulation is one of the most exploited cybercrime entry points.


2. Account Takeover (ATO)

Successful phishing often leads to account takeover, where attackers gain control of an account to commit illegal transactions, manipulate systems, or steal data.


3. Deepfake Impersonation

Deepfakes are widely used as entertainment online, but the same AI technology can generate fake faces or voices to impersonate someone during calls, video messages, or instructions—posing a serious threat to personal and organizational data security.


4. Synthetic Identity Fraud

Criminals combine real leaked data (like NIK or date of birth) with fabricated details (name, address, photo) to create entirely new digital identities.

 

56% of businesses in Indonesia have been victims of synthetic identity fraud.
Imagine how many customers were affected by those incidents.

All these attacks may look different, but they share the same weakness: digital identities that are not strongly verified.


Digital Identity Is the Foundation of Data Security

Indonesia’s Personal Data Protection Law (UU PDP) requires data controllers to safeguard the information they manage. In the financial sector, OJK and Bank Indonesia also mandate digital identity verification to prevent account misuse.

In Europe, GDPR states that personal data collection and processing must be accompanied by provable consent. This means companies must not only protect data, but also prove that the right person is using it.

From a technology standpoint, identity protection goes far beyond usernames and passwords. Attackers today have countless ways to bypass basic authentication.

Effective data security now relies on three crucial components:

  • Biometric identity verification to prevent fake onboarding

  • Biometric and device-based authentication to ensure transactions are done by legitimate users

  • Fraud monitoring systems to detect suspicious activity in real time

VIDA as a Personal Data Security Platform

VIDA, as a certified digital identity provider (PSrE), helps organizations strengthen security at the most critical point: identity.


VIDA’s solutions include:

• VIDA Identity Verification

Combines biometrics, document validation, and real-time authenticity checks to prevent fake registrations and synthetic identity fraud.


• VIDA FaceToken

Passwordless login powered by facial recognition and liveness detection—accessible only with real faces, not photos or deepfakes.


• VIDA PhoneToken

Binds accounts to verified devices. Even if attackers steal an OTP or password, they still cannot log in without the legitimate device.


• VIDA Deepfake Shield

Detects AI-generated content, preventing impersonation through fake videos or voices.


With this multi-layered approach, VIDA helps institutions prevent fraud, reduce operational risks, and build long-term digital trust.

 

Strengthening data security doesn’t require overly complex technology. It starts with three core pillars: verification, authentication, and fraud detection—the foundation for protecting digital identities.

 

VIDA - Verified Identity for All. VIDA provides a trusted digital identity platform.

Latest Articles

Types of Insurance and How to Buy Them Online
insurance

Types of Insurance and How to Buy Them Online

Get to know the different types of traditional and digital insurance, along with how to buy your policy online. It’s practical and secure w...

October 20, 2025

Data Security: Why Identity Is the Key to Everything
digital identity

Data Security: Why Identity Is the Key to Everything

In today’s digital era—where cyberattacks are happening left and right—data security is inseparable from digital identity protection. Let’s...

September 29, 2025

Anti-Fraud Strategies: Protecting Your Documents and Data
identity verification

Anti-Fraud Strategies: Protecting Your Documents and Data

Fraud can slip into our daily lives without us realizing it—from our personal data to important documents. Here are effective anti-fraud st...

September 22, 2025