Together for Stronger Cybersecurity
In our increasingly digital working environment, information security is not just an IT topic – it concerns all of us. With every click, every email, and every password, we contribute either to protecting our organization from cyber threats – or, unintentionally, making it vulnerable.
Cybercriminals are using ever more sophisticated methods to gain access to confidential data, sabotage systems, or cause financial harm. They deliberately exploit human weaknesses: phishing emails, social engineering, and manipulated websites are among the most common attack methods – and they often have one thing in common: they succeed because we are not vigilant enough.
The goal of this training is to raise your awareness of risks in the digital space and equip you with the knowledge and tools to act safely, confidently, and in compliance with our policies. You will learn how to recognize threats, report suspicious incidents, and contribute to our organization's security through simple but effective behavior.
Because cybersecurity starts with each and every one of us – including you!
Use of iBarry in the Cybersecurity Awareness Training
As part of our cybersecurity awareness training, we rely on iBarry, the national platform for cybersecurity in Switzerland. iBarry is operated by the Swiss Internet Security Alliance (SISA) and provides practical, easy-to-understand, and regularly updated training content on safe digital practices.
Why iBarry?
The platform offers solid knowledge on current threats such as phishing, malware, social engineering, and data protection violations – clearly explained and easy to follow. It focuses on actionable guidance, interactive learning modules, and real-world examples.
What to expect:
- Short, modular learning units
- Practical case studies based on everyday life in Switzerland
- Tips for safe behavior at the workplace and in the home office
By using iBarry, we ensure that our training is not only informative, but also up-to-date, locally relevant, and user-friendly.
Safe devices
Cloud security: Using cloud services securely | Saving photos, videos and other data to the cloud is something we’ve been doing almost automatically for a long time already. But what about security? We can show you how to store your data in the cloud securely while protecting your privacy. | Link |
Mobile device security: How to protect your smartphone | Answering email, surfing the web, socialising or shopping online – with a smartphone, you can do it all wherever and whenever you like. We use our smartphones almost exactly like our computers or laptops – so we should be giving them the same protection. | Link |
Two-factor authentication: Do you already use two steps? | In email, Facebook, Ricardo etc. you log in in one step by entering a password. But what if your password is stolen? Enabling a second step doubles the security of your data. | Link |
Home Office: How to work securely | We know that working from home can be new to some of you, perhaps overwhelming as you adjust to your new environment. One of our goals is to enable you to work as securely as possible from home. Below are five simple steps to working securely. | Link |
Internet of Things (IoT): When the fridge orders supplies ... | Watches, cars, TVs and even refrigerators can be connected to the internet. Those products collect data and use it to make your everyday life more comfortable. Read here how to make it more secure as well. | Link |
Data backup: Store your data in a second location | Your computer contains important data such as photos, documents, emails and tax returns. What if you lost it all? As a precaution, you should always back up your data to a separate location. | Link |
Always install them: The importance of updates | You know how it goes: a pop-up window appears informing you that an update is available. Forget the "Remind me later" button and hit “Update now”. Updates are essential to your digital safety. | Link |
Smishing – phishing via text message on your smartphone | More and more frequently, users are being sent messages via SMS, WhatsApp or other text message services prompting them to click on a link. This is what we call “smishing” – a term coined from the words SMS (short messages) and phishing (theft of access details via fake messages). While most people are familiar with phishing attacks via email, they are unaware that the same danger is lurking on their smartphone. | Link |
Passkeys – The End of Passwords? | We have been using passwords for authentication since the beginning of the internet. They are often complicated to use. Furthermore, weak passwords pose a security risk. Now Apple, Microsoft and Google are introducing authentication via passkeys. Find out what you need to know here. | Link |
Safe surfing
Malware: Beware of viruses, worms & trojans! | Malware burrows into your computer, laptop or smartphone. Through it, third parties can access your system and steal or manipulate your data without being noticed. Updates, the latest antivirus software, and a bit of caution when using the internet and email can protect you. | Link |
E-Mail-Security: You’ve got mail. | We receive contact requests, account notifications, newsletters, documents and lots more via email. Criminals try to trick us by mingling fraudulent messages into this flood of information. | Link |
Data on Social Media Public or private? You decide. | Keep your data under control, and decide for yourself who finds out what about you. Find out here how to curb the use of your personal data, and protect it from misuse. | Link |
Safe Passwords: Protect yourself and your data | Many internet users think that it will never happen to them. But what if it does? What if the password you use to access an online store is stolen and happens to be the same as the password you use to access your Facebook or email account? As a result, cybercriminals are free to log in, place orders at your expense, take out contracts or send messages in your name, change your profiles and more. Choose safe passwords and for each account its own - we show you how. | Link |
E-Banking: How to pay your bills securely online | Find out how to protect your online account against cyber-attacks. | Link |
First aid for cyber accidents | If your online order doesn’t arrive or you’re no longer able to log into your social media account, then you may have fallen victim to hacking or fraud. Read on to find out what you can do in this type of situation. | Link |
Beware of too many scans: why should you stay vigilant with QR codes | How did you end up on this page? Did you scan an unobstrusive QR code (Quick Response Code) that you saw somewhere? In this case, there were no serious consequences for you. Nevertheless, you should think carefully about what you scan with your mobile phone. The following example shows why. | Link |
Internet Risks
How we are tricked in the digital world – social engineering and fake news | In our digitally networked world, information is exchanged at unprecedented speed. While this has many benefits, there is also a downside: disinformation and manipulation. This is where fake news and social engineering take centre stage. | Link |
Deepfakes – when video evidence lies | You can't believe everything you see on the internet – even if you see it in a video. Deepfakes – fake media content created with the help of artificial intelligence – are popping up more and more frequently on social media and elsewhere on the internet. The aim is often to spread false information. Deepfakes are a problem not only for celebrities and politicians. | Link |
Ransomware – when your computer is encrypted | The digital extortion business is booming. Ransomware – a combination of “ransom” and “malware” (malicious software) – is flourishing. Hardly a day goes by without a ransomware incident reported in the news. These reports mention companies, hospitals, organisations – but what about the private sphere? Are private individuals affected by ransomware too? | Link |
Social engineering: How cybercriminals trick us | Emails that threaten to delete our data, text messages announcing that we’ve won a big prize, or Facebook friends who might be the love of our lives – unexpected online encounters are seldom what they seem. Find out more about internet scams, how cybercriminals ensnare their victims, and what you can do to protect yourself. | Link |
Cybergrooming: How to protect your child | Around one third of children and young people in Switzerland have already experienced cybergrooming. Perpetrators try to gain their trust online, entrap them in dependency and ensure that they do not confide in anyone. Make sure that your child is prepared for this. | Link |
Sextortion: Blackmail with compromising videos | The internet is a place where people can fulfil their sexual desires anonymously, for example by consuming pornography or participating in sex chats. Sometimes, in doing so, people are targeted by criminals who try to blackmail them with their (alleged) actions. The victims fear being exposed to their families, friends, acquaintances and employers. | Link |
Money mule: Financial agent or money launderer? | Be wary of lucrative job adverts promising quick cash. You could be used by criminals as money launderer and be liable to prosecution. | Link |
Romance Scam: The one and only love – or lie? | Don’t be fooled! How you can recognise romance scams on the internet and protect yourself against the digital marriage con. | Link |
Tech Support Scam: «Hello, you’ve got a virus on your computer!» | Neither Microsoft or other IT support companies nor banks make unsolicited calls to private users to offer technical support. Find out here how to protect yourself against scams. | Link |
Cyber Mobbing: Say no to online threats and insulting texts. | Especially children and teenagers are affected by cyber mobbing. Help to say "no" to intentionally insulting, threatening or harassing a person over a period of time by using online services. | Link |
Phishing: The email with the bait | When we receive an email, we click on it. Especially when the content is interesting, surprising or worrying. Internet criminals try to exploit this with sophisticated techniques to "phish" sensitive data. Learn how to recognize a phishing attempt and what you can do to protect yourself. | Link |