Login

 A national widespread technology outage is currently affecting our Contact Centre and Branches. We’re investigating and hope to resolve this issue as quickly as possible. We apologise for any inconvenience this has caused.                   

Search

Login

Glossary

Welcome to the Security Hub at Summerland Bank, your go-to resource for all things related to safeguarding your financial security in the digital age.

If you believe you may have been caught by a scam or suspect some fraud on your account:

  • Contact us on 1300 728 728 (Mon – Fri 8am-6pm) or 0467 953 309 (8am – 6pm weekends & public holidays) and report your situation.
  • You can report your card lost or stolen 24/7 in our App, through Internet Banking or by phoning 1300 728 728.
  • Don’t delay – as the quicker you let us know, the faster we can help protect you.

Learn the lingo.

A non-exhaustive list of definitions to guide you through the world of financial security.


If you believe you may have been caught by a scam or suspect some fraud on your account:

  • Contact us on 1300 728 728 (Mon – Fri 8am-6pm) or 0467 953 309 (8am – 6pm weekends & public holidays) and report your situation.
  • You can report your card lost or stolen 24/7 in our App, through Internet Banking or by phoning 1300 728 728.
  • Don’t delay – as the quicker you let us know, the faster we can help protect you.

Glossary:

Authentication
Authentication is like a secret handshake for your digital life. It’s how systems verify that you are who you claim to be. Think of it as proving your identity at the digital door—using passwords, PINs, or even your fingerprint.

Biometric authentication
Biometric authentication uses unique physical traits—like your fingerprint, face, or iris—to unlock devices or access accounts. It’s like saying, “Hey, it’s really me!”

Encryption
Encryption scrambles your data into gibberish, and only the right key can unscramble it. It’s like sending a coded letter that only the recipient can decode.

Firewall
Firewalls guard your devices and networks, allowing good stuff (like emails) and blocking bad stuff (like cyber intruders). It’s like a security fence around your digital house.

HTTPS (Hypertext transfer protocol secure)
When you see HTTPS at the beginning of a website’s address, ensures that the data exchanged between your browser and the site is encrypted. Look for that little padlock icon—it means you’re in a safe digital zone.

Identity theft
Imagine someone pretending to be you—using your name, address, or bank details. They might open credit cards or take loans in your name. It’s like a digital disguise.

Junk email or spam
Think of it as digital junk mail. Spam is those annoying messages flooding your inbox: ads, offers, and things you didn’t ask for.

Knowledge-based authentication (KBA)
It’s like a secret quiz. When you call us, we ask questions only you should know.

Multi-factor authentication (MFA)
Imagine a lock with two keys. Multi-factor authentication (MFA) is like that. When you log in, it asks for more authentication than just your password, like a one time code or a fingerprint scan.

Network security
Picture a digital security guard. Network security protects your devices (phones, computers) from cyber trouble. Firewalls, strong passwords—they’re your online bodyguards.

Phishing scam
Imagine a sneaky email or message pretending to be from your bank, boss, or a friendly company. But it’s a trap! They want your personal info—like passwords or credit card numbers. Don’t take the bait!

One-time password (OTP)
It’s like a secret code that works only once. When you need extra security (say, logging into your bank), they send you a one-time password (OTP).

Privacy Policy
A privacy policy explains how a business collects, uses, and protects your personal information. It’s like reading the fine print before joining a club.

Quarantine
Imagine a virus in your computer. Quarantine is like putting it in a digital timeout. It isolates suspicious files or programs so they can’t cause more trouble.

Risk assessment
Think of it as a financial weather report. Banks assess risks—like lending money or investing. They weigh the chances of gain versus loss. It’s like deciding whether to surf big waves or stay on the shore.

Social engineering
Imagine a digital con artist. They manipulate people—using charm, lies, or tricks—to reveal secrets or do things they shouldn’t.

Two-factor authentication (2FA)
Picture a double lock on your digital door. Two-factor authentication (2FA) adds an extra layer of security. When you log in, it asks for more than just your password—maybe a text message code or a fingerprint scan.

Update
Updates are like patches for your digital clothes. They fix holes (bugs) and add new features. Whether it’s your phone, software, or apps, updating keeps things fresh and secure.

Virus
Viruses are like digital bugs that infect your computer or device. They spread, causing mischief or damage. But don’t worry, digital bug spray (antivirus software) keeps them at bay!

XXS (Cross site scripting)
Cross-Site Scripting (XSS) is a cyberattack vector that takes advantage of an unknown or unaddressed security flaw in computer software, hardware, or firmware. It occurs when an attacker attaches code to a legitimate website, which executes when a victim loads the website. The malicious code can be inserted in various ways, such as adding it to the end of a URL or posting it directly onto a page that displays user-generated content.

Yield curve
A yield curve is a line that plots the interest rates, or yields, of bonds with equal credit quality but differing maturity dates. It helps us understand bond markets, interest rates, and the health of the economy. 

Zero-day exploit
A zero-day exploit is a cyberattack that takes advantage of an unknown or unaddressed security flaw in computer software, hardware, or firmware. The term “zero-day” refers to the fact that the vendor has zero days to fix the flaw because hackers can already use it to access vulnerable systems. These exploits can plant malware, steal data, or cause other damage.