Safe from cyber risks such as hacker attacks, ransomware, phishing, viruses

This is a paid contribution, presented by Mobiliar

E-mails, chats and video calls have replaced many physical meetings over the past few months. Digitization enables, changes and facilitates a lot, especially since the beginning of the pandemic. This applies to the business world as well as to everyday private life. And with more home offices, the two worlds are even more closely linked. But the more networked we are, the more attractive the Internet becomes as a playground for cyber criminals. They have their sights set on companies – regardless of industry or size – and also private individuals.

One shows how often companies are targeted by cybercrime study by gfs-zürich on behalf of digitalswitzerland, Mobiliar, SATW and FHNW: In 2020, a quarter of the SMEs surveyed were victims of cyberattacks. Only a few cases are known, such as the ransomware attack on the comparison service Comparis in summer 2021. But that National Cyber ​​Security Center des Bundes (NCSC) records several hundred cyber incidents every week.

Well armed against cyber attacks

You are not exposed to cyber crime without protection. For example, firewalls, anti-virus programs and regular software updates increase security. Frequent data backups ensure that data can be quickly restored after an attack. Not just computers and smartphones, but every networked device has vulnerabilities that cyber criminals can exploit. These weak points need to be closed. And an emergency plan is needed so that in the event of a cyber attack you can react quickly and limit the damage.

One of the most important preventive measures against cybercriminal activities is to raise employees’ awareness. From the executive floor to the branch office: everyone needs to know how to properly handle e-mails, sensitive data and the Internet. And best of all, they receive regular training in cybersecurity topics.

Insurance against cyber risks for companies

The more networked companies are, the more vulnerable they are to attacks from the Internet. If something happens, Mobiliar’s cyber insurance will help. Among other things, it offers:

  • One central point of contact: the general agency nearby
  • Support from experienced experts
  • Covering the cost of restoring damaged data
  • Compensation for loss of income
  • IT assistance for SMEs

The more networked companies are, the more vulnerable they are to attacks from the Internet. If something happens, Mobiliar’s cyber insurance will help. Among other things, it offers:

  • One central point of contact: the general agency nearby
  • Support from experienced experts
  • Covering the cost of restoring damaged data
  • Compensation for loss of income
  • IT assistance for SMEs

The methods of cyber criminals

Cyber ​​criminals use various methods to obtain data or extort money. Most attacks are carried out via cunningly forged emails to employees. That NCSC lists current threats and offers a good insight into the hackers’ big bag of tricks.

Phishing
The most widespread method: criminals try to gain access to confidential data from Internet users via email or SMS. If the attack takes place over the phone, it is called vishing (voice phishing).

Viruses
This refers to malware that is hidden in e-mail attachments or on websites and that is spread on computers, tablets or smartphones. An example of this are Trojans, which pretend to be useful programs but carry out harmful functions in the background.

Ransomware
Ransomware is also malware. The term refers to a program that encrypts files on the computer and the network drives connected to it. Usually this action is connected with an attempt at blackmail. Without professional help, access to the data remains blocked.

How to protect yourself from cyber attacks

Cyber ​​criminals know the weakest link in cyber defense: it is humans. Because one wrong click during stress can be enough to unconsciously open the virtual door into the company for a hacker. The following tips will help you handle data and IT infrastructure safely.

1. Use strong passwords

Secure passwords offer the best protection against unauthorized access.

  • Choose a long password with upper and lower case as well as numbers and special characters.
  • It’s easy with a mnemonic. For example: “Five black bulls and four white cows run on the beautiful meadow”. This becomes the password 5sS & 4wKradsW.
  • Use a different password for each application. Change the passwords regularly.
  • Switch on the automatic lock on the smartphone.
  • Two-factor authentication is the most secure.

2. Confident handling of e-mails

Most attacks come from links and attachments in emails. Cyber ​​criminals smuggle in malware or try to steal data and passwords. That is why particular caution is required here.

  • Check the sender: do you know the person, is the address correct?
  • Do not thoughtlessly click on attachments or links in emails, SMS or Whatsapp messages. Tip: If you move the mouse over the link or button, you will recognize the URL.
  • No service provider and certainly no bank will ever ask you by email to provide passwords or credit card details.
  • Beware of emails that require immediate action or threaten consequences.

3. Separate professional and private matters

Most people use their smartphones for private and business purposes, so caution is advised here too.

  • Consistently separate professional and private data, storage media and e-mail accounts.
  • Do not send business emails to your personal account.
  • Make sure you have secure, encrypted connections. Open WiFi networks are not secure.
  • Only install software and apps that come from secure sources.
  • Always carry out system updates for your computer and smartphone immediately. The software providers also close possible security gaps.

4. Pay attention to discretion

Confidential data must remain confidential.

  • Always lock your computer or smartphone, even if you only leave work for a short time.
  • Business doesn’t belong on social media.
  • Even with private posts, think about what you want to reveal about yourself. The internet never forgets.

5. Report any suspicious activity

One click is enough and data and systems may be at risk. If something happens or is suspected, report it to the cybersecurity officer. The sooner action is taken to limit the damage, the better.

Insure cyber risks

Despite all caution, something can happen. If your company is attacked by hackers, cyber insurance will help you – technically, financially and legally. This enables you to go back to work as quickly as possible and avoid high costs.

Cyber ​​insurance is also available for private individuals. In addition to help in the event of a claim, it offers practical extras for everyday digital life, such as support for everyday IT problems.

Cyber ​​insurance for private individuals

Private individuals can also insure themselves against cyber risks. These are the services of Mobiliar:

  • Help with data loss due to cybercrime or a technical problem, for example due to a virus or if the device falls to the ground
  • Help with personality violations such as cyberbullying, abusive online payments or transactions such as credit card fraud and copyright infringement on the Internet
  • IT assistance for everyday problems with computers, tablets, smartphones or other smart home devices
  • Protection of the digital identity thanks to the data abuse tracing service
  • 100 GB of highly secure data storage for confidential data included – for every member of your household

Private individuals can also insure themselves against cyber risks. These are the services of Mobiliar:

  • Help in the event of data loss due to cybercrime or a technical problem, for example due to a virus or if the device falls to the ground
  • Help with personality violations such as cyberbullying, abusive online payments or transactions such as credit card fraud and copyright infringement on the Internet
  • IT assistance for everyday problems with computers, tablets, smartphones or other smart home devices
  • Protection of the digital identity thanks to the data abuse tracing service
  • 100 GB of highly secure data storage for confidential data included – for every member of your household

Useful links on the topic of cyber risks

Presented by a partner

This post was dated Ringier Brand Studio created on behalf of a customer. The content is journalistically prepared and meets Ringier’s quality requirements.

Contact: Email Brand Studio

This post was dated Ringier Brand Studio created on behalf of a customer. The content is journalistically prepared and meets Ringier’s quality requirements.

Contact: Email to Brand Studio

source site