Home
Apply now

Welcome to the Security Centre | Zip

Your security is important to us. At Zip our priority is to provide a safe and secure experience. Learn more about how you can stay safe and protect yourself online.

How Does Zip Protect My Account?

At Zip we are committed to keeping our customers safe and secure by utilising some of the best processes and technology available. Here are some of the ways we help keep you safe and secure.

Fraud management

Zip uses a range of security measures including:

  • Facial biometrics for identity verification and to prevent the risk of fraud. You may be asked to capture your face or ID documents through your mobile device in order to verify your identity or purchases.
  • Single-use cards which expire after use minimising the risk of your card number being compromised.

Data encryption

When personal information is captured on our website we use encryption to protect your information. You can check the security level of a web page by clicking on your internet browser's padlock or key icon.

Types of Cyber Crime

Identity theft

Identity theft occurs when someone uses your personal information without your permission to establish a new account, apply for a loan, or gain access to an existing account. Identity thieves may use a variety of methods to access your personal information, including:

  • Steal wallets and purses containing your personal identification. For example a driver's licence, Medicare card and bank cards.
  • Steal your mail, which may include bank and credit card statements, tax information and pre-approved credit offers.
  • Use personal information you reveal on the Internet.
  • Send false emails pretending to be from your bank to trick you into revealing your personal information and passwords. This is known as Phishing.

Scams

Most scams ask you for money or your bank account details in return for a reward which never arrives. A common type of Scam is the Remote Access Scam, which involves a request to download software or a mobile app which grants the scammer access to your device. It may include an attempt to deceive or coerce you into making purchases that will benefit the scammer, such as purchasing digital gift cards or crypto currency.

Scams are becoming more elaborate and come in other forms, such as online, SMS or unsolicited phone calls. The objective of the scammer is to obtain your personal details by impersonating reputable companies to gain access to your accounts.

Phishing

Phishing is a way Cybercriminals trick you into revealing your personal information such as passwords, account, identification details or credit card numbers.

Cybercriminals often impersonate well known businesses that you are likely to deal with such as financial institutions, utility companies, telecommunications companies and government agencies.

Malware

Malware is the term used to refer to any type of code or program that is used for a malicious purpose. Cybercriminals use malware for many different reasons. Common types of malware are used for stealing your personal information, holding your computer to ransom or installing other programs without your knowledge.

How To Protect Your Security Online

As online presence is increasing, it's important you know how to protect yourself against cyber threats and manage your account security. Below are some useful techniques to protect yourself online.

  • Ensure you have the most up-to-date software installed on your mobile and electronic devices as well as your personal computers. For more information on how to update an iOS or Android Device, please refer to Resources.
  • Use Multi-factor Authentication or Two-factor Authentication (2FA) to provide an extra layer of security.
  • Set strong passwords and change them regularly. Use a combination of numbers and characters, including uppercase and lowercase in your password to make it more secure.
  • Keep yourself informed about the latest cyber security risks.

Avoid becoming a victim of scams and cyber crimes by:

  • Avoid opening suspicious texts, pop-up windows or clicking on links to attachments in emails. You should report it as spam and then delete the contents. If unsure, verify the identity of the sender contact through an independent source such as an online search.
  • Not downloading and installing apps or software to your mobile device or computer at the request of an unsolicited caller. Zip will never contact you and request you to do this.
  • Stop and think before you click on links or attachments in emails. Spam emails often look legitimate but they can be used to carry viruses and other malicious software.
  • Never disclose any personal, account and password information via SMS, email or web links.
  • Check your account transactions regularly and report any suspicious or unauthorised transactions to Zip or your bank promptly.
  • Handle unsolicited calls with care. If you're unsure about the legitimacy of the call, hang up and call back on an official phone number.

If you think your Zip password has been compromised, change it immediately and contact us.

How to Report

At Zip, we understand how important it is to protect your security and personal information. As a valued customer, we want you to know how you can reach out to us if you are concerned about your online security.

If you believe you have received a Zip scam/or phishing email, you can report it by submitting a request via our Help Centre.

Do Not click on any links or open any attachments in the email.

If you responded to or actioned a suspicious email, SMS, or phone call, please contact Zip's Customer Experience team immediately.

Resources

The following government resources can help you to stay safe, identify and report scam activity.

ACCC: www.staysmartonline.gov.au

Stay Smart Online: www.scamwatch.gov.au
Report a scam - You can report a scam to the ACCC by completing the report a scam web form.

eSafety Commissioner: www.esafety.gov.au

Australia Cyber Security Centre: www.cyber.gov.au

For Information on how to update the software on some common mobile devices, refer to the below links: