Please note: this will take you to one of our external sites
Manage your share portfolio quickly and securely, update your details, view stock balances and much more
Access the latest in enhanced register search, reporting and management capabilities
Securely manage your employee portfolio and access a wide range of tools and support features
A convenient and environmentally friendly way to apply for IPOs
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.
A keylogger or keystroke logger is a type of software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don’t know that your actions are being monitored.
software that is intended to damage or disable computers and computer systems.
A password manager application supports centralized secure storage of passwords and helps manage using unique passwords across each site.
the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information, such as passwords and credit card numbers
a type of malicious software designed to block access to a computer system until a sum of money is paid
spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information
the use of deception to manipulate someone into giving away confidential or personal information that may be used for fraud
Spyware is software that enables a user to obtain covert information about another’s computer activities by transmitting data
making phone calls or leaving voice messages supposedly from reputable companies in order to get people to reveal their personal information, such as bank details and credit card numbers
a VPN creates a virtual encrypted tunnel between you and a remote server operated by a VPN service. All external internet traffic is routed through this tunnel, so your data is secure from prying eyes. Use of a VPN computer also gives you the appearance of having an IP address of the VPN server, masking your identity