Cybercrime poses a real threat to businesses and organisations the world over. When it comes to safeguarding the information we hold on you, we have numerous security protocols in place, from the technology we use, to the training we deliver.
![Governance - graphic icon Governance - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_governance.png?h=110&iar=0&w=110&rev=5f00c773fdfb42b38c54b1db2f87d647&hash=8E5207E388EA18FCCFA36BC4FD3783FA)
Security governance
How we manage information security at Southern Cross
![Security assurance - graphic icon Security assurance - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_assurance.png?h=110&iar=0&w=110&rev=15149e8f280a4e3abd592704a74f7a4a&hash=B3C2AE5AEA01FFF38EDE61F895FC2F52)
Security assurance
How we provide security assurance of information, IT systems and applications
![Security operations - graphic icon Security operations - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_operations.png?h=110&iar=0&w=110&rev=ef7aefa8b4b64ea899f58711892ccaa5&hash=17181D55FA536C68C504A40C7922B245)
Security operations
How we secure our IT systems and services
![Security controls - graphic icon Security controls - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_controls.png?h=110&iar=0&w=110&rev=a593ceeeefcc4a559702369113aea52c&hash=F99777A18E67A2F2B013F13748D935F8)
Security controls
How we implement appropriate security measures to safeguard data
![Security systems and information - graphic icon Security systems and information - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_systems.png?h=110&iar=0&w=110&rev=083c608a046c473ea8edf291aec23637&hash=6735693468D421A59D5B38A05C31E6EC)
Security systems and information
How we design, develop, and implement security in our services and applications
![Security compliance - graphic icon Security compliance - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_compliance.png?h=110&iar=0&w=110&rev=32a00815b1f14c6b8eb5acc241790a5b&hash=7AFC8AA8C143687F2CA4C1BCCC2C3D2F)
Security compliance
How we ensure compliance with our legal obligations and align with industry standards and best practice
![Security awareness and training - graphic icon Security awareness and training - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_awareness.png?h=110&iar=0&w=110&rev=69049bdd5c8841cbacfabea114590e4a&hash=74BC547AB03A9429F1F8D9F21E8DE4B7)
Security awareness and training
How we provide security training, awareness, and promote a security culture
![Third-party service providers - graphic icon Third-party service providers - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_thirdparty.png?h=110&iar=0&w=110&rev=265e0c808bda4ca9917baaeabe8665af&hash=8301ACC389378511109AB9A681492688)
Third-party service providers
How we assess and approve providers and their services
![Staying safe online - graphic icon Staying safe online - graphic icon](https://mc-fec8b19f-c7fd-4e56-8bfe-1850-cdn-endpoint.azureedge.net/society/-/media/health-insurance/trust-centre/icons/icon_safeonline.png?h=110&iar=0&w=110&rev=906ad7cfa1fe49a582dd874ac404ab91&hash=A0308B3D4B4E52CC63FA6BC18D6F05E1)
Our quick guide to staying safe online
How you can keep your identity and personal information safe and secure online
Related information
Member privacy statementLearn more > |
Browser support policyLearn more > |
Cookies policyLearn more > |