Cyber Security and Safety

Committed to your online safety

Cyber security is a team effort. We work hard to monitor our networks but you also need to take action to help ensure your data stays private.
Image of a rural landscape with a farmer standing in the middle off a grass paddock. We see a shield with the words 'Secured by Telstra.' 

Three ways to keep your data private

Create stronger passwords

Create stronger passwords

A unique password is your first line of defence against hackers. Adding a password manager can eliminate the need for multiple passwords.

Secure your account

Secure your account

Two-step verification is a stronger level of security designed to help keep your Telstra account safe from unauthorised access.

Don't put off security updates

Don't put off security updates

New software updates help fix security gaps, so it's harder for unwelcome visitors to get into your devices. Always update when prompted.

We block millions of threats, every day

There’s no such thing as too much security. We monitor our network 24/7, so blocking millions of malicious calls, emails and websites is all in a day’s work.


Protect up to 10 devices in and out of your home

  • First 3 months on us

  • Helps blocks malicious email and SMS

  • Anti-virus protection

  • Identity monitoring

  • Secure VPN

  • Password manager

Consumer post-paid mobile or internet customers.

Increase your scam awareness, help reduce threats

Know your active scams

If you've received a suspicious email, phone, call or text, please report it to Telstra so we can investigate it and put protections in place.

Set up an SMS scam filter

Our SMS scam filter is managed through our app. It helps identify and block malicious SMS that contain suspicious links or numbers before they reach your mobile phone.

Report harmful content

Get to know the eSafety Commissioner

The eSafety Commissioner is Australia's independent regulator for online safety. Their role is to help safeguard you from online harm. If you've experienced cyber bullying, cyber abuse, seen non-consensual images or material that promotes, incites, instructs or depicts abhorrent conduct, please report it to the eSafety Commissioner.

Report a security vulnerability

We take the security of our systems and customer data seriously. Working with skilled researchers across the globe helps us identify important security issues. To help improve our security further, we've partnered with Bugcrowd on the Vulnerability Disclosure Program so people can submit cyber security vulnerabilities.

Articles about cyber security and safety

Knowledge is an essential tool

Familiarise yourself with the most common cyber security threats and how you can help prevent them from happening.

Helping you shop online securely

We don't need to talk up the convenience of online shopping. But we can help give you peace of mind about how secure it is.

Five ways to spot a scam call

Caution and good common sense are important, but there are other things to be aware of to help you stay safe from scammers.

Helping keep your personal information private

Easy ways to help protect your personal details online and minimise your exposure to misuse.


Find the answers to common questions about Cyber Security and Safety

  • Some of the ways we use your personal information

    • To help us manage the products and services we provide to you, for customer enquiries and complaints, and to maintain and update our records. We need to verify your identity to detect, prevent and address fraud. We also use your information for charging and billing and to identify breaches of our terms and conditions of service.
    • For network, security and fraud protection, including blocking malicious content, as well as monitoring for known domains which can lead to downloading malicious software onto devices. Where Telstra’s DNS services are used to connect to known malicious domains, we may use your personal information to determine whether you might be impacted, and take action to block the activity and/or notify you so that you can protect yourself. We may also use your information to prevent identity theft, unauthorised transactions, or other fraudulent activities, on or off our networks (e.g., fraudulent bank transactions).

    • To communicate with you via phone, email, SMS, social media, search engines and web pages you visit.

    • Direct marketing to tell you about products, services and special offers of Telstra and its related entities. We may use your information to market and promote products, services and special offers, including Telstra loyalty programs.

    • We may also contact you about products, services and offers from our trusted partners. In some cases, this marketing activity can continue for up to 13 months after you have stopped using our products or services, unless you opt out.  Please be aware that if you unsubscribe from a mailing list, we will continue to send you important messages that are not marketing communications, such as safety or administrative messages.
      • You can stop Telstra (including Telstra Energy) using your information unsubscribing from our marketing communications. Log into My Telstra or call us on 1800 039 059.
    • We are required and permitted by law to use your personal information in certain circumstances.
  • Parental controls are a great idea. Check your device operating system, search engine, and gaming platforms to help manage what your kids can see/do online. There are also ways to monitor activity and place restrictions on specific devices. Telstra Device Security is a great product to help keep individual devices safe. You can also choose a filter from the industry-endorsed Family Friendly Filter program .

    Lodge an illegal or offensive digital content complaint via the Office of the eSafety Commissioner .

    Safety tipsheets for all of us

    Parenting tipsheets for your family

  • Here are two of the most common cyber threats:

    Identity theft

    When an unauthorised person accesses your personal information, they can create fake IDs. They can also take loans out or make expensive purchases online in your name.

    Identity theft is usually seen as a hacker’s activity, but it's often carried out by someone you know. For example, it could be a former partner making purchases in your name because they have access to one of your accounts or your personal information. Be cautious when sharing details and when you part ways with someone and make sure they don’t still have access to any of your accounts.

    Hacking and data breaches

    It’s not uncommon for apps, services, websites, and devices to have security flaws. Criminals can exploit these flaws to access private data and sell it over the dark web or use it to steal money.

    You've heard about data breaches where millions of private records have been compromised - affecting the security of people who have had their information stolen. That’s why companies work hard to eliminate as many security flaws and vulnerabilities as they can.

    There isn’t much you can do to stop companies getting hacked, but there are a few actions to help reduce the risk of your data being leaked.

    - Keep your devices and apps up to date. Security updates plug any vulnerabilities to make it harder for hackers.

    - Enable two-step verification .  Even if an unauthorised person gains access to your username and password, they'd still need to complete an extra identity verification step before they can get into your account. This significantly reduces their chances of access.

Need help?

Message us in the My Telstra app