A brief guide to the most important points

Protection against cyberattacks is a continuous process made up of a whole series of individual measures.

  • There are various different types of cyberattacks that all employees should be aware of – such as vishing (voice phishing), CEO fraud and many more.
  • Regular training is particularly effective as it teaches employees how to recognize cyberattacks and prevent potential attacks.
  • Every company should also have clear rules of conduct, such as verifying unusual telephone requests, consistently using two-factor authentication and applying the dual control principle for payments.

Cyberattacks: why employees pose the greatest security risk

The cyber threat in Switzerland is rising dramatically: in 2025, the National Cyber Security Centre (NCSC) recorded around 65 000 incidents. This represents almost a doubling compared to 2023. One in three Swiss SMEs has already been affected. Although companies invest extensively in technical firewalls and anti-virus programs, the people who work there often remain the weakest link in the security chain. Most successful cyberattacks are not actually carried out by means of highly complex technical hacks, but via clever manipulation of employees.

Cybercriminals rely on what is known as social engineering. This means that they attempt to deceive employees with fake emails that appear to come from superiors, banks or well-known companies. All it takes to open the door to attackers is an employee who carelessly clicks on a link, opens an infected attachment or unwittingly discloses access data. There has been a massive increase in two-stage phishing attacks, in which fraudsters first collect telephone numbers and then call their victims, pretending to be bank employees. Unless employees have received training and been made aware of hackers’ techniques, even the best technology is of no use.

Your goals in focus

Together, we turn your goals into real successes. With our network and specialist knowledge, we provide new impetus for your growth.

Let us transform your ideas into reality.

Common cyberattacks and protective measures

A company’s employees are probably the biggest gateway for hackers. Security gaps can only be closed by means of continuous training and awareness-raising measures. Here we explain four of the most common attack scenarios and how you can protect yourself against them.

If a cyberattack succeeds despite your precautions – what you should do now

If you are the victim of a cyberattack, it’s crucial to act quickly. The National Cyber Security Centre (NCSC) recommends taking the following steps:

  • Keep calm and assess the situation: What exactly happened? Which systems or data are affected?
  • Disconnect any affected devices from the network immediately: Prevent further propagation and switch off the WLAN/LAN.
  • Inform banks and credit card companies: Block all the affected accounts and cards immediately. Most institutions have 24-hour emergency numbers.
  • Change your passwords: Change all affected passwords. If possible, do so from a secure, uncompromised device.
  • File a complaint with the police: Report the incident to your local police station or via suisse-epolice.ch (in German). Wait until all the potential evidence has been collected before restarting your systems.
  • Report the incident to the NCSC: Even unsuccessful or partially successful attacks should still be reported to the NCSC via ncsc.admin.ch

Additional measures in the event of CEO fraud

If a payment has already been made: Contact your bank and the recipient bank immediately. The faster you react, the greater the chances that the transfer can still be stopped. Document the fraudulent email and keep all email correspondence. Check whether other employees have received similar requests. Inform the management and, if necessary, your superior, right away.

Additional measures in the event of invoice fraud

Inform the genuine supplier about the fraud immediately. Have your email system checked by IT specialists to see if it has been compromised or if forwarding rules have been set up by hackers. Criminals often redirect messages automatically so that they can read them unnoticed. Check all the payments made in recent weeks for suspicious account changes. Activate two-factor authentication (2FA) immediately for all your email accounts if you have not already done so.

Additional measures in the event of login fraud (credential phishing)

Change your passwords immediately on all the platforms where you use the same or similar passwords. Check your account activity: Have emails been sent in your name? Have there been any orders or transactions? Activate 2FA everywhere. Check the settings of email accounts for unknown forwarding or linked devices. Carefully check all your bank transactions from the last few days.

Additional measures in the event of vishing (voice phishing)

If you have installed remote software such as TeamViewer or AnyDesk: Uninstall it immediately and disconnect the device from the Internet. The criminals may have full access to your system via the program. Have your device checked by a specialist before you use it again, as malware may have been installed. Check all your bank accounts for unauthorized transactions. Warn people you know that criminals could call them in your name.

Impulse newsletter: first-hand business insights

Get detailed analyses of the economy and markets, along with valuable tips, delivered directly to your inbox.

Frequently asked questions about cyberattacks

Conclusion: cybersecurity is a complete concept

Cybersecurity is not a one-off measure, but a continuous process.

  • Swiss companies can obtain comprehensive support from the NCSC, ITSec4KMU and Swiss crime prevention organization.
  • Investing in employee training pays off and is the most effective line of defense against modern cyber threats. Many attacks can be prevented by alerting employees so they know what to watch out for. Employees need to be aware of common scams and develop a healthy distrust.
  • It is particularly important to insist on simple rules of conduct such as verifying unusual telephone requests, consistently using two-factor authentication and applying the dual control principle for payments.

If an attack nevertheless succeeds, quick action is crucial. Disconnect your devices, inform the relevant banks and report the incident.

Discover further content

Disclaimer