Lady with iPad

Guide: Cyber security

We are online almost every day and enter login details, upload pictures or write chat messages. Our guide provides information about cyber risks and tips on how to protect your data easily.

As a private individual, am I a target for hackers?

Yes, because the more people the scammers reach, the more likely it is that someone will fall for the scam. The most common methods include:
Laptop

Phishing

Strangers pretend to be someone else in order to steal confidential data such as passwords.

Ransomware

Fraudsters use malware to encrypt data and block user accounts in order to extort ransom money.

Fake advertisements

Fraudsters offer particularly cheap goods online and demand a deposit from interested parties.

Tips: How can I protect myself against cyber attacks?
Zurich Cyber Security App
Protect passwords

Choose and manage complex, unique passwords – a password manager does it for you.

Find out more
Zurich Cyber Security App
Check network

Only use secure, password-protected Internet connections and check whether strangers are logged in.

Find out more
Zurich Cyber Security App
Surf via VPN

Go online via an encrypted connection to protect your privacy.

Find out more
Zurich Cyber Security App
Protect identity

Do not share personal data publicly or carelessly (e.g. via social media).

Find out more
Zurich Cyber Security App
Regular updates

Make regular software updates for devices and backups for data.

Find out more
Zurich Cyber Security App
Think when surfing

Only visit secure websites – recognizable by the lock symbol in the browser line.

Find out more

Information and frequently asked questions about cyber security

What is cyber security and why is it important for me?

Cyber security includes measures to protect your digital devices (e.g. smartphone, PC) and your personal data from unauthorized access. This is to prevent data being stolen and used for fraudulent purposes or malware infecting devices.

More about security on the Internet.

The Zurich Cyber Security App has all the important tools for prevention and offers emergency support from our cyber experts. Appropriate insurance coverage can also be booked – individually or as a package.

To the offer

What types of cyber threats are there?

There are various methods for obtaining other people's personal data or manipulating devices for blackmailing purposes. The most common phenomena include:

  • Phishing: Someone pretends to be a trustworthy sender and requests personal data such as passwords or bank details.
  • Vishing (voice phishing): The principle is the same as with phishing, except that vishing is done by telephone.
  • Fake subscriptions: Fraudsters offer free services that conceal expensive subscriptions.
  • Fake advertisements: Goods are offered at strikingly low prices on online platforms. Interested parties have to pay a deposit.
  • Fake website: Deceptively genuine copies of well-known online stores and other websites deceive users in order to obtain payment information and personal data.

Ransomware: Malware that encrypts a private individual's data and only releases it again after payment of a ransom, which can lead to considerable financial losses and data loss.

As a private individual, am I a target for hackers?

Yes, private individuals are also a popular target, as they often use fewer protective measures than large companies, for example. Hacking is about sneaking into other people's networks or computer systems in order to steal data. This can affect WLAN connections, online banking or social media profiles, for instance.

More about hacking and how you can protect yourself.

Private individuals usually believe that they are of no interest to hackers. Fraudsters often operate using a scattershot approach. This means that they do not target one specific person but write to as many people as possible at the same time – in the hope that as many of them as possible will fall for the scam. Cyber attacks can even be supported with the help of artificial intelligence (AI), for example by automating attacks. In this way, the number of cyber incidents multiplies even further and the risk of being targeted increases. That's why prevention is so important.

Falling for a cyber scam not only means financial loss but also stress and work – for example, if your PC is infected with malware or private user accounts are suddenly blocked.

Discover cyber protection from Zurich.

Do I need special security software on my devices?

Protection against viruses, malware, phishing attacks and other cyber risks is recommended. Cyber attacks can often be prevented in simple ways. On the one hand, through increased awareness of the issue of cyber security, and on the other, through the right support.

With the Zurich Cyber Security App, you get all the important protection functions in one app: e.g. VPN, password manager and identity protection that checks whether your data appears on the darknet. Virus protection is also included for Android devices.

What is two-factor authentication and how do I set it up?

Two-factor authentication (2FA) is an additional level of security to ensure that only you can access your accounts. With this method, you have to enter a code that you receive on your cell phone or to your email address in addition to your password every time you log in. This way, you have to identify yourself twice. If your password is stolen, this password alone is not enough to access your data. With two-factor authentication, you reduce the risk of your data being stolen.

How can I recognize a secure Wi-Fi connection?

You can recognize a secure Wi-Fi connection by the following features: It uses WPA3 or at least WPA2 encryption, which you can check in the router or device settings. The connection is protected by a strong password and has an activated firewall. Avoid networks with generic names such as "Free Wi-Fi" and use known or trusted networks. Deactivate WPS, keep the router up to date with the latest firmware updates and give preference to networks that require authentication. If you use a public network, make sure it is operated by a trustworthy source and use VPN for anonymous surfing.

How can I find out if my device is infected with malware?

Typical signs of malware include:

  • Pop-up messages pop up unexpectedly
  • Unusually slow computer
  • Frequent system crashes
  • Storage space decreases extremely quickly
  • Unusual network activities

You can find more information in our article on the topic of "malware."

If you use our "Cyber – Prevention" offer, IT assistance is included in addition to the Zurich Cyber Security App. This means that IT and cyber security experts are available to you by telephone.

What makes a secure password?

A secure password should be at least 12 characters long, comprising a combination of capital letters, lower-case letters, digits and special characters. Or even better: Use a password manager that does this for you and manages all passwords securely.

More about password security.

Did you know that with the Zurich Cyber Security App you get a password manager and other important protection functions bundled in just one app?

How can I protect my personal data online to avoid identity theft?

You should always think carefully about what data you share and with whom. It is also important whether the information is shared publicly or in a protected environment.

Further information can be found in our articles on identity theft and data protection.

Are you familiar with the Zurich Cyber Security App? It includes an "Identity protection" option. This checks whether the data you enter in the app appears on the darknet. You will receive a message as soon as a match is found.

What should I bear in mind when sharing my data on social networks?

Restrict the visibility of your profiles so that they are only seen by people you know. Check your contact list regularly and generally do not share any sensitive data. Think twice about posting photos and seemingly unimportant information online. Even simple things like a date of birth can be enough to guess passwords or log into user accounts.

It is better not to send vacation photos until you return home to avoid attracting burglars. Be just as vigilant when sharing information about your children – you should also avoid posting photos online that show their school or the name of their football club.

How do I protect myself against fraud when shopping online?

Online shopping offers many conveniences but also harbors risks. Here are some tips on how you can protect yourself when shopping online:

  • Only buy from well-known and trustworthy websites. Look out for reviews and testimonials from other users.
  • Check the URL: Make sure that the website uses a secure connection. The URL should begin with "https://" and a small lock symbol should be displayed in the address bar.
  • Avoid public WLAN networks.
  • Use strong passwords.
  • Activate two-factor authentication.
  • Look out for unusual offers: Be skeptical of offers that seem too good to be true. Fraudsters often lure buyers with extremely low prices in order to deceive them.
  • Protect your payment information: Use secure payment methods such as credit cards or trustworthy payment services.
  • Check your bank statements: Monitor your bank and credit card statements regularly for suspicious activity. Report unauthorized transactions to your bank immediately.
  • Pay attention to the provider's payment information: Only pay via the platform on which you are making the purchase – not via suspicious external links that lead away from the platform.

Update your software: Always keep your operating system, browser and security software up to date to close security gaps.

What is two-factor authentication and how do I set it up?

Two-factor authentication (2FA) is an additional level of security to ensure that only you can access your accounts. With this method, you have to enter a code that you receive on your cell phone or to your email address in addition to your password every time you log in. This way, you have to identify yourself twice. If your password is stolen, this password alone is not enough to access your data. With two-factor authentication, you reduce the risk of your data being stolen.

What should I do if my account has been hacked?

Have you found you can no longer log in, your devices are working differently than usual, and strange messages are being sent in your name on social media? This could mean you've been hacked. The most important thing now is to stay calm and take the right steps:

  • If you use Cyber – Prevention from Zurich, call IT Assistance first. They will explain the next steps and support you.
  • Disconnect the affected device from the Internet immediately.
  • If necessary, have all your bank cards blocked immediately.
  • Check which data and systems are affected to understand the scope of the hacking.

This list is not exhaustive, and you may need to take further steps depending on the circumstances. For example, in the event of identity theft it may make sense to involve the police.

You can find more information in our article on hacking.

What steps do I need to take if my data has been stolen?

  1. Block accounts: Contact your bank and have your payment cards blocked or replaced.
  2. Change passwords: Change your user account passwords, e.g. for emails or online shopping.
  3. Inform the police: Report the identity theft to the police.
  4. Update software: Make sure that your anti-virus program is up to date.

Put your trust in Zurich for cyber security: With the Zurich Cyber Security App, our cyber experts are on hand to advise you and guide you through the right steps to take in an emergency.

You can find more information in our article: Identity theft and how you can protect yourself against it

Cyber Knowledge

Find out more about cyber risks, prevention and how you can actively protect yourself.
Articles Videos