Our commitment is to protecting your data and ensuring that your information remains secure.
If you suspect any unauthorised access or security issues with your account, contact our security team immediately at security@athena.com.au
If you have concerns about your privacy, contact us at hello@athena.com.au. We take all reports seriously and will take immediate action to protect your account.
How we protect your data
We take a proactive, multi-layered approach to security to protect your data. Our dedicated security team continuously monitors, improves, and upholds our security posture, ensuring alignment with industry best practices and compliance frameworks. We enforce strict security controls across our infrastructure, systems, and data handling processes.
We provide passwordless authentication to enhance security and simplify access. Instead of passwords, we use time-based, one-time passcodes (OTPs) via email and SMS, ensuring only you can log into your account. Read more about multi-factor authentication - Multi-factor authentication | cyber.gov.au
Multi-factor OTP is significantly more secure than traditional password + SMS OTP combinations as it:
Eliminates password-based attacks – Since there’s no password to steal, phishing, credential stuffing, and brute-force attacks are rendered ineffective.
Requires real-time access to both your phone and email – Unlike passwords, which can be stolen and used anywhere in the world, OTPs require real-time access to your phone or email.
Prevents SIM swapping exploits – Even if an attacker hijacks your phone number, they still need access to your email to complete authentication.
Time-sensitive codes – OTPs expire quickly and can’t be reused, reducing the risk of unauthorised access.
Stronger multi-factor authentication (MFA) by default – Instead of relying on a single weak password, our system inherently requires two independent authentication factors.
Customer choice of multi-factor authentication – You can choose to use SMS or enable biometrics as additional factors for simpler, more secure access
We maintain strict security around the domains and email addresses we use to communicate with you.
Always ensure you are interacting with a website that belongs to Athena. All our domains are accessed using the HTTPS protocol.
All our official communications come from email addresses ending in:
Messages from us come from our registered numbers. If you receive an SMS from an unknown sender claiming to be us, report it immediately.
We take extra precautions to ensure our communications are safe and trustworthy.
What you can do (security recommendations)
To further protect yourself, we recommend the following security best practices.
Your personal device, like a smartphone, is central to your security. Not only does it contain sensitive data (like photos, emails and messages), it also serves as a key authentication method for your account.
FAQs
Some of your most common questions on security and privacy answered below. Don’t see what you’re looking for? Feel free to reach out to our team at security@athena.com.au or hello@athena.com.au.
Traditional passwords are vulnerable to attacks like phishing, credential stuffing, and brute-force attempts. By using passwordless authentication with one-time passcodes (OTPs) via email and SMS, we reduce the “attack surface” and enhance security while making login faster and easier.
If your phone is lost or stolen, take the following steps immediately:
Knowing your email address alone isn’t enough to access your account. They would also need access to your phone or email inbox to retrieve the OTP and also pass either an SMS OTP or biometric MFA challenge. We recommend enabling multi-factor authentication (MFA) on your email account for additional protection.
If you lose your phone, follow these steps:
To speed up login you can enrol your device to use biometric authentication (e.g., Face ID or fingerprint) for the Athena App or Home Hub.
To confirm whether an email or SMS is legitimately from us:
If you receive a suspicious message claiming to be from us:
The nitty gritty
Whether you’re a security pro or just curious, this section gives you full transparency into how we protect your data.
All sensitive and customer data is encrypted both in transit and at rest, using TLS protocols and AES-256 encryption algorithm. We also have documented standards for key management and encryption requirements based on data classification. We continuously monitor our environment to ensure compliance to these standards.
We only retain data for as long as required to support our operational, regulatory and legal obligations, and securely destroy data once it is no longer required.
We follow the Principle of Least Privilege, which states that a subject should be given only the permissions needed to complete its role and responsibilities. This means that we limit access to data and systems only to people and processes that need it, to minimise data exposure.
In particular, this principle is strictly enforced for customer data – access is provided only to those who require it for their role.
When staff depart Athena, all access to systems and services is revoked. In addition, we regularly review staff access levels for all systems, and address any gaps promptly.
System to system access credentials are rotated frequently via an automated workflow and regularly audited.
We have a third party assessment program to review the security of our suppliers and partners that we choose to work with, ensuring that they meet our security standards. If a supplier does not meet our baseline we will choose not to continue that relationship.
The Principle of Least Privilege applies here too - if a supplier or partner requires access to Athena data or systems, this is limited to what is required for the purpose for which they have been engaged.
Security training material is provided for all new staff, with regular refresher courses given. Security culture is important, and our security team actively engages with all parts of Athena to ensure staff know how to perform their role securely.
We have a dedicated Security Operations Centre team which monitors logs and investigates alerts received through our centralised logging platform.
We also performs threat hunting and discovery activities on a regular basis and we leverage threat intelligence to identify emerging threats and iterate on all aspects of our security program.
Our approach is aligned with the Zero Trust Security Model, in which we do not place any inherent trust in the network, nor have a traditional “perimeter”. Instead, we place controls around the systems and data we use and ensure that only verified identities can access them in a time-boxed fashion.
In line with the Principle of Least Privilege previously referenced, we limit access to systems and services to the source networks and geographies that require access to them.
We use a CI/CD pipeline and we segregate development, test and production environments. All our code is subject to review before deployment in the production environments. and that includes regressive testing, automated code security scanning and code review.
Security is actively engaged as part of the technical design process, and security patterns are provided for common components to promote safe design.
Whilst we do everything we can to prevent security incidents, we acknowledge that no organisation can be 100% safe. To ensure we’re prepared for a security related incident, we have a documented Security Incident Response framework and a number of technical incident response playbooks we iterate on regularly.
Athena will promptly alert affected customers of major incidents impacting Athena services or data, and of any incidents affecting the confidentiality and integrity of user data, in line with the Athena Privacy Policy.