Watch Xero demo videos
Around-the-clock physical security
Our servers are located within enterprise-grade hosting facilities. Access is restricted to authorised staff through a combination of biometric systems and 24/7 onsite security guards.
Multiple firewall layers and network security
External access to our servers is controlled by multiple layers of firewalls, intrusion protection systems and routers. These are configured, monitored and updated according to industry best practice.
Regular third-party audits and inspections
Our security is regularly reviewed and audited by external specialists. This gives independent confirmation that the way we build software is secure.
Data is securely stored online
With Xero, your accounting data is not stored on your computer. If your PC, laptop or tablet gets lost or stolen, you don’t lose your data – it’s safely and securely stored online and backed up in several locations.
Two-step authentication provides an additional layer of security for your Xero account in case your password is stolen via phishing or malware attacks. As well as using your Xero password to log in, you will also need to enter a code generated by an authenticator app installed on your smartphone.
Financial data in Xero is secure online
Have you received a suspicious email?
Xero’s brand is sometimes used by cyber criminals to try and legitimise their phishing emails and other scams. Find out how to report these emails to Xero and other useful information to help protect you from these attacks.
You’re in control of user access
No one has access to your organisation’s data unless invited by you, and with a level of user permission set by you. Find out more information on how we protect our customers’ data.
Your privacy is our priority
“It means that we've got two conversations in finance. The standard conversation, which is 'How are things going?' and the other conversation is 'How can we do things better and take advantage of what the platform offers us?'”