Cyber Security and Safety
Committed to your online safety
Three ways to keep your data private
Create stronger passwords
A unique password is your first line of defence against hackers. Adding a password manager can eliminate the need for multiple passwords.
Secure your account
Two-step verification is a stronger level of security designed to help keep your Telstra account safe from unauthorised access.
Don't put off security updates
New software updates help fix security gaps, so it's harder for unwelcome visitors to get into your devices. Always update when prompted.
We block millions of threats, every day
There’s no such thing as too much security. We monitor our network 24/7, so blocking millions of malicious calls, emails and websites is all in a day’s work.
Extra security options
TELSTRA DEVICE SECURITY
Protect up to 10 devices in and out of your home
- First 3 months on us
- Helps blocks malicious email and SMS
- Anti-virus protection
- Identity monitoring
- Secure VPN
- Password manager
Consumer post-paid mobile or internet customers.
Increase your scam awareness, help reduce threats
Know your active scams
If you've received a suspicious email, phone, call or text, please report it to Telstra so we can investigate it and put protections in place.
Set up an SMS scam filter
Our SMS scam filter is managed through our app. It helps identify and block malicious SMS that contain suspicious links or numbers before they reach your mobile phone.
Report harmful content
Get to know the eSafety Commissioner
The eSafety Commissioner is Australia's independent regulator for online safety. Their role is to help safeguard you from online harm. If you've experienced cyber bullying, cyber abuse, seen non-consensual images or material that promotes, incites, instructs or depicts abhorrent conduct, please report it to the eSafety Commissioner.
Report a security vulnerability
We take the security of our systems and customer data seriously. Working with skilled researchers across the globe helps us identify important security issues. To help improve our security further, we've partnered with Bugcrowd on the Vulnerability Disclosure Program so people can submit cyber security vulnerabilities.
Articles about cyber security and safety
Knowledge is an essential tool
Familiarise yourself with the most common cyber security threats and how you can help prevent them from happening.
Helping you shop online securely
We don't need to talk up the convenience of online shopping. But we can help give you peace of mind about how secure it is.
Five ways to spot a scam call
Caution and good common sense are important, but there are other things to be aware of to help you stay safe from scammers.
Helping keep your personal information private
Easy ways to help protect your personal details online and minimise your exposure to misuse.
Find the answers to common questions about Cyber Security and Safety
Some of the ways we use your personal information
- To help us manage the products and services we provide to you, for customer enquiries and complaints, and to maintain and update our records. We need to verify your identity to detect, prevent and address fraud. We also use your information for charging and billing and to identify breaches of our terms and conditions of service.
- For network, security and fraud protection, including blocking malicious content, as well as monitoring for known domains which can lead to downloading malicious software onto devices. Where Telstra’s DNS services are used to connect to known malicious domains, we may use your personal information to determine whether you might be impacted, and take action to block the activity and/or notify you so that you can protect yourself. We may also use your information to prevent identity theft, unauthorised transactions, or other fraudulent activities, on or off our networks (e.g., fraudulent bank transactions).
- To communicate with you via phone, email, SMS, social media, search engines and web pages you visit.
- Direct marketing to tell you about products, services and special offers of Telstra and its related entities. We may use your information to market and promote products, services and special offers, including Telstra loyalty programs.
- We may also contact you about products, services and offers from our trusted partners. In some cases, this marketing activity can continue for up to 13 months after you have stopped using our products or services, unless you opt out. Please be aware that if you unsubscribe from a mailing list, we will continue to send you important messages that are not marketing communications, such as safety or administrative messages.
- You can stop Telstra (including Telstra Energy) using your information unsubscribing from our marketing communications. Log into My Telstra or call us on 1800 039 059.
- We are required and permitted by law to use your personal information in certain circumstances.
Parental controls are a great idea. Check your device operating system, search engine, and gaming platforms to help manage what your kids can see/do online. There are also ways to monitor activity and place restrictions on specific devices. Telstra Device Security is a great product to help keep individual devices safe. You can also choose a filter from the industry-endorsed Family Friendly Filter program.
Lodge an illegal or offensive digital content complaint via the Office of the eSafety Commissioner.
Safety tipsheets for all of us
Parenting tipsheets for your family
Here are two of the most common cyber threats:
When an unauthorised person accesses your personal information, they can create fake IDs. They can also take loans out or make expensive purchases online in your name.
Identity theft is usually seen as a hacker’s activity, but it's often carried out by someone you know. For example, it could be a former partner making purchases in your name because they have access to one of your accounts or your personal information. Be cautious when sharing details and when you part ways with someone and make sure they don’t still have access to any of your accounts.
Hacking and data breaches
It’s not uncommon for apps, services, websites, and devices to have security flaws. Criminals can exploit these flaws to access private data and sell it over the dark web or use it to steal money.
You've heard about data breaches where millions of private records have been compromised - affecting the security of people who have had their information stolen. That’s why companies work hard to eliminate as many security flaws and vulnerabilities as they can.
There isn’t much you can do to stop companies getting hacked, but there are a few actions to help reduce the risk of your data being leaked.
- Keep your devices and apps up to date. Security updates plug any vulnerabilities to make it harder for hackers.
- Enable two-step verification. Even if an unauthorised person gains access to your username and password, they'd still need to complete an extra identity verification step before they can get into your account. This significantly reduces their chances of access.
Message us in the My Telstra app
Got a cyber security concern? Ask us in the My Telstra app. It's quick and easy and we’ll get back to you as soon as we can.
Find the answers you're looking for on our cyber security support page.