When a suppression is put in place it ‘freezes’ access to your credit file.
VIEW FACT SHEETA credit reporting agency collects data and maintains historical information.
VIEW FACT SHEETA credit report is a point in time snapshot of what credit related transactions you have made.
VIEW FACT SHEETWhen a ban is put in place it ‘freezes’ access to your credit files.
VIEW FACT SHEETA credit report is a point in time snapshot of what credit related transactions you have made.
VIEW FACT SHEETLost or stolen credentials may put you at risk of identity theft.
VIEW FACT SHEETIdentity theft is a type of fraud that involves the use of your personal information.
VIEW FACT SHEETLearn how scammers disguise their numbers to appear more legitimate.
VIEW FACT SHEETHave you had a call from someone who asked you to download and install programs to your device recently?
VIEW FACT SHEETOnline shopping has made the shopping experience more efficient and more accessible.
VIEW FACT SHEETEmployment Scams recruit unsuspecting individuals to launder money for organised crime.
VIEW FACT SHEETHave you received a cold call or automated voice message recently?
VIEW FACT SHEETRelationship Scams involve a person developing a relationship with an individual they believe is real and genuine.
VIEW FACT SHEETShould I report this to the Police, AFP or ReportCyber?
view fact sheetService providers are organisations that transact with your identity information.
view fact sheetDebt collectors work to collect debts on the behalf of business and government.
view fact sheetA credit reporting agency collects data and maintains historical information.
view fact sheetThis is exploitation of the online environment to harass, intimidate or threaten someone.
view fact sheetImage exploitation is when an individual’s image is used without their knowledge or consent.
view fact sheetInstagram is a social networking app made for sharing photos and videos.
view fact sheetLinkedIn is a social media tool for individuals interested in developing their professional network.
view fact sheetTwitter is a virtual and public forum used by individuals, groups and businesses.
view fact sheetA data breach is the unauthorised disclosure or loss of personally identifiable information.
view fact sheetDebt collectors work to collect debts on the behalf of business and government.
view fact sheetWe all have rights in relation to the protection of personal information.
view fact sheetLearn how scammers disguise their numbers to appear more legitimate.
VIEW FACT SHEETCryptocurrencies such as Bitcoin or Ethereum are digital currencies.
VIEW FACT SHEETCriminals attempt to gain ownership of mobile numbers in order to access online accounts.
VIEW FACT SHEETA patch is a piece of software designed to update a computer program.
VIEW FACT SHEETFind out how to keep your Gmail account safe, and what do if something goes wrong.
VIEW FACT SHEETRansomware is a form of malware (a virus) that encrypts files.
VIEW FACT SHEETRansomware targeting mobile phones is an emerging trend internationally.
VIEW FACT SHEETIt’s good cyber security practice to backup your data and files.
VIEW FACT SHEETiPhones are commonly viewed as being more secure than Android devices.
VIEW FACT SHEETMon - Fri: 8am - 5pm AEST
QLD: 07 3555 5900
ACT & NSW: 02 8999 3356
VIC: 03 7018 2366
NT, SA & WA : 08 7078 7741
Mon - Fri: 10am - 7pm NZST
AKL: 09 884 4440