ⓘ This page has been translated using artificial intelligence.
Cybersecurity is not a luxury, but a basic digital requirement. Phishing emails, insecure passwords and unprotected Wi-Fi networks – there are many ways for cybercriminals to attack. But with the right cybersecurity measures, you can make it really difficult for hackers. Here we show you how to recognise phishing traps, create secure passwords and protect your data from ransomware attacks.
Go directly to topic
Share this page
10 tips for greater online security - Swisscom Help
When you use the internet, you automatically leave traces behind. Your digital footprint consists of personal data such as your name, IP address or photos that you leave behind in emails, on websites or on social networks. This seemingly insignificant data is more valuable to hackers than you might think.
Cybercriminals are interested in your identity so they can use it as a cover for their criminal activities. If hackers get hold of your login details for email accounts, for example, they can send phishing emails or malware to your contacts in your name. This quickly and unwittingly turns you into a digital super-spreader. Your personal data also enables cybercriminals to create profiles, allowing them to target you more specifically with phishing traps tailored to you.
So keep an eye on your digital footprint and your data. For your own sake and for the sake of others. Because the less data about you is on the internet, the less you have to offer cybercriminals.
Many online services request more data from you than is actually necessary. They do this to optimise their offering to you and thus retain your loyalty. However, every piece of additional information you disclose increases your risk in the event of cyber incidents.
On social networks, you want to connect with friends and share experiences. We understand that. But keep in mind that your posts, photos and comments reveal a lot about you. A holiday photo with your current location, for example, can attract burglars to your home – because thanks to social media, they know you are miles away.
If your primary email address suddenly appears in a data leak, you will soon be inundated with spam and phishing attacks. It is therefore worth protecting your primary email address well and only sharing it with a few trusted companies.
Old, unused accounts are security risks: you forget about them, don't change the passwords and probably won't notice if they've been hacked. That's why such forgotten accounts are very popular with hackers.
Even if you are careful and conscious when using the internet, you still leave traces behind. These take the form of cookies, trackers or analysis tools that follow you as you surf the web in order to create detailed profiles of your habits (and often also to present you with personalised advertising and search results).
We often have no idea what data about us is circulating on the internet. Search engines, data brokers and old accounts store information that you have long forgotten. If you want to track them down, you can:
Strong passwords, regular updates and up-to-date antivirus software are the basic technical requirements for safe surfing. But even the best firewall is useless if you carelessly click on suspicious links or pass on your data to the wrong recipients. Safe behaviour on the internet therefore always starts with a healthy dose of scepticism and adherence to a few basic rules.
Our brain uses habits to save energy. While this is great and makes sense from our brain's perspective, it also leads to careless automatisms in our digital everyday lives, which cybercriminals ruthlessly exploit.
So make sure you develop safe habits: take a break from surfing the internet every now and then, and question unusual requests or links. Do not let yourself be pressured, think about the consequences that a click could have, and trust your gut feeling: if something seems suspicious, it is best to close the page or delete the email.
You should always avoid unsecure connections that begin with ‘http://’ in the URL. Secure connections begin with ‘https://’. Some browsers also display a padlock symbol next to the URL.
Most devices and browsers have built-in technical tools to protect you from cyber attacks. Use them.
Social networks are designed to collect and share large amounts of data. But you are the one who should decide with whom you want to share this data. And you can do just that: in your privacy settings.
Be sure to use end-to-end encryption for sensitive messages. This means that only you and the recipient(s) can read the content. Your message is encrypted and transmitted in an unreadable form on its way from A to B.
Use secure and encrypted messengers to communicate sensitive data. Insurance companies and banks now usually offer secure communication channels on their online portals. And for business communication, it is generally recommended to use the company's official channels anyway.
Be aware of who can read your messages: a profile picture is usually more widely visible (and therefore less protected) than your shared content. And comments on social media are usually public (even if no one else is participating in a discussion), which is why personal data should never be shared in them.
Cybercrime doesn't just happen online. Sometimes it starts on the bus, in a café or in a queue: strangers can glance over your shoulder at your smartphone or laptop screen and spy on sensitive information. Many people are unaware of this danger in public spaces, but it does exist.
Does this mean that I should never use my smartphone on public transport again? No, of course not. But you can take the following precautions to reduce the security risk:
QR codes are extremely practical and widely used in our everyday lives. However, there are dangers lurking here too, as they are increasingly being forged – especially in public spaces, where they may have been covered with phishing codes. How can you recognise these?
Passwords are the keys to your digital identity. A weak password is like leaving your house key under the doormat or flower pot – everyone knows where to find it. So use strong passwords, passphrases and two-factor authentication to protect your digital identity.
DeepDive: Online security – passkeys and MFA
Although it is considered the least secure password in the world, many people still use 123456. You might as well step outside your house and leave a crowbar next to the front door for burglars to use.
Seriously, secure passwords are essential for your digital security. And they actually require relatively little effort. You just need to know how to do it:
Agreed, passwords with 12 characters or more are difficult to remember. But have you ever tried passphrases? If you're wondering what those are, passphrases are complex passwords consisting of random combinations of words (or parts of words) and numbers that you can remember using a mnemonic device. An example?
Passphrase: MyfanaisAlheha3bran1si.
Mnemonic device: ‘My father's name is Albert, he has 3 brothers and 1 sister.’
In the past, especially in larger companies, it was recommended to change passwords approximately every 90 days. However, this often led to weaker passwords being chosen or patterns being used. Change your password:
Even with strong passwords, an account can still be hacked. Two-factor or multi-factor authentication provides an additional layer of security. This is recommended by the National Cyber Security Centre (NCSC)(opens in new tab).
During the login process, you must provide two things: your login details (username and password) and verification via another channel:
Passkeys are the latest generation of authentication and are set to replace passwords and 2FA in the future. But what exactly are passkeys? Passkeys work thanks to modern cryptography and use asymmetric encryption with public-private keys for your login process. – Too technical for you?
To explain it more simply: passkeys are virtual and consist of a digital key pair – think of them as digital twin keys that are automatically created when you register with a passkey. One of the two keys is public and is sent to the provider's website (e.g. your bank, Google, etc.). The other digital twin key is private and always remains locally on your device.
When you visit the website where you want to log in (e.g. your bank), the bank automatically asks you to verify your identity. Your device responds with the matching private cryptographic twin key. You unlock your access with your biometric data (e.g. fingerprint or Face ID) – and you're in.
Passkeys are practical because they only work on the real bank website (the key is not recognised on a phishing site and the login fails). They are created uniquely for each website and your key never leaves your device. This makes them extremely secure, significantly more secure (and user-friendly) than even the most secure password, even if you combine it with 2FA.
Do you have trouble remembering all your passwords? They don't belong on Post-it notes or in a document in the cloud. Instead, a password manager is often a good solution. Here, too, look for providers with a good reputation and strong encryption.
These are the advantages and disadvantages of a password manager:
Our recommendation: Password manager from blue Security & Service(opens in new tab)
Every day, we connect to different networks: to Wi-Fi (Wireless Local Area Network) at home, at work, at school or in a café. But not all connections are equally secure. We'll tell you which networks you can surf safely on.
As a general rule, only use secure networks. Open Wi-Fi networks such as ‘Free WiFi’ or similar services that are not password-protected can be dangerous from a cyber security perspective. With unsecured networks, basically anyone can read what you are doing online.
And beware of false security: even networks with passwords can be insecure if they are poorly configured.
People often connect to available Wi-Fi networks without checking whether they are secure. However, sometimes they are unsecured or the security standards are easy to crack. Be aware of:
Many people rely on Wi-Fi, especially when holidaying abroad, because roaming can be expensive. Some cybercriminals take advantage of this and set up fraudulent hotspots in tourist locations. Here's how to stay safe:
Mobile networks are generally more difficult to hack than Wi-Fi networks (due to differences in infrastructure, security standards and available control points between mobile networks and Wi-Fi networks). We therefore recommend that you use your own mobile network for important transactions when abroad. Please note the following:
You can also make your mobile network available to others by sharing your hotspot. Please note the following:
Sometimes there is no alternative but to use the public Wi-Fi network. In such cases, a VPN is recommended:
At iBarry, you can find out everything else you need to know about VPNs(opens in new tab).
On Apple and Google operating systems, you can disable ‘connect automatically’ in the Wi-Fi settings. This ensures that you will be asked every time your device wants to connect to a Wi-Fi network, or you will even have to initiate it yourself.
It may also be worthwhile to regularly check your saved Wi-Fi networks and delete old workplace or hotel Wi-Fi networks.
When Bluetooth is active, your device constantly sends out signals to find other devices, even if you are not actively using Bluetooth. These signals can be misused (tracking, hackers attempting to connect to your device, data being intercepted).
So it's best to get into the habit of turning off Bluetooth in crowded public places, in foreign countries or at night when you don't need it. This reduces the risk of a cyber incident – and saves battery power at the same time.
The same applies to AirDrop on iOS: AirDrop allows photos or files to be transferred from device to device via Bluetooth (device detection) and Wi-Fi Direct (connection). It is best to set your AirDrop mode in your device settings so that you are not publicly visible (‘Receiving off’) in order to avoid providing an unnecessary target for attack.
Most people are familiar with VPNs, at least from the numerous advertisements on the internet. The advertising is often the same: anonymity on the net, protection from hackers or access to streaming content that is not available in your own country. In this video, we take a look at VPNs and examine what lies behind the advertising promises and why they are often compared to tunnels.
Do I need a VPN service?
Online shopping is convenient and saves time. However, among the reputable providers, there are also some bad apples who are after your data and your money. A few simple checks will help you navigate safely through the shops.
Even fraudulent online shops can appear genuine. However, like phishing emails, they have their weaknesses. Watch out for these warning signs:
Always use official stores to be on the safe side: for software, it's best to go to the manufacturer, and for apps, go to Google Play(opens in new tab) or the App Store(opens in new tab).
And feel free to check out the NCSC recommendations on ‘Buying and selling online’(opens in new tab).
Not all payment methods are equally secure online. What should you look out for?
Before you click ‘Buy’, take a moment to check:
If something seems strange to you, trust your gut feeling. It is better to check once too often than once too little:
In addition to being mindful of your digital security, it is also important to operate your devices and systems securely. This may take a little effort initially, but it is worth it. Fortunately, many protective measures run automatically in the background once you have set them up.
Updates are important. Always carry them out promptly, even if the new features might disrupt your digital habits. Why are they so important? Because they plug the loopholes that hackers have exploited. Device and software manufacturers strive to close such security gaps quickly before other cybercriminals know they exist. They do this by providing you with updates.
It is particularly important to install system updates promptly, as they often close several security gaps at once. After all, there is no point in developers creating and releasing a security patch as quickly as possible to close risky security gaps if you simply do not install it, right? Browser updates are also essential because you are always on the Internet when browsing.
In the settings of your smartphone and tablet, you can activate automatic updates for the operating system and your apps. This ensures that your devices are always up to date without you having to interrupt any activities on the device.
Only in the case of important work devices may it be advisable to delay comprehensive updates for a few days after they are made available. This is because updates can sometimes cause new problems, such as software incompatibilities or workflow disruptions, which are usually resolved within a few days. However, it is important that you do not forget to install the update.
If you're wondering what these are: BIOS and firmware are your device's basic programmes. The former is, in a sense, your device's caretaker, checking that everything is working when you switch it on. The firmware is the device's basic equipment. Both start up before your operating system loads. When it comes to BIOS and firmware, follow the principle of ‘never change a running system’ and contact a technical specialist if you encounter specific problems or security warnings.
Drivers, on the other hand, are small programmes that tell your device how to handle specific hardware (e.g. printers). Outdated drivers can also be a security risk. However, in most cases, the (integrated) drivers are automatically updated with the system update.
Not all devices require the same level of protection, as their basic specifications vary. As a general rule (with some exceptions), it can be said that:
When installing an antivirus programme, choose a paid programme with a good reputation. Free antivirus programmes usually either collect your data, constantly display advertisements, or are even fraudulent software. Check here to see if your preferred antivirus software is secure(opens in new tab).
Before using old devices, check whether their operating system is still supported. If not, and the old operating system is no longer receiving updates, it should no longer be connected to the internet. Otherwise, it will become a security risk.
But what if you have such old devices? Either use them offline only or replace them. You can also recycle old smartphones (e.g. Swisscom Mobile Aid(opens in new tab)) and thus promote the circular economy.
Every app and every programme can potentially become a security vulnerability. Therefore, only install and keep on your device what you really need.
Go through your apps and programmes every few months. And delete what you no longer use. Fewer installed programmes offer less opportunity for attack. The same applies to browser extensions: use them sparingly and regularly check what you still need.
Cybercriminals are not only after your login details, but also target your data in ransomware attacks. They want to destroy or steal your data and use it to put pressure on you. The best protection against such cyber attacks is therefore strategic data backup.
A cloud is convenient because you can access your data from anywhere. Reputable providers such as Google Drive, OneDrive and Dropbox also work hard to keep your data secure: specialised security teams monitor for threats around the clock. And they have to: because cloud providers manage so much data, they are an attractive target for hackers.
When choosing your cloud solution, pay attention to:
What can a cloud do that local data storage cannot – and vice versa? These are the advantages and disadvantages of cloud and local data storage:
| Benefits | Disadvantages | |
| Cloud | The data is available anytime, anywhere. | An internet connection is required to access your data. |
| Backups run automatically in the background. | There are monthly or annual fees for using the service. | |
| Hardly any downtime, because if one server fails, another one seamlessly takes over. | You relinquish responsibility for protecting your data to others. | |
| After a device change, the data is immediately restored. | You are dependent on the provider and their service. | |
| Local data storage (e.g. external hard drive, USB stick) | You have full control over your data. | The hardware can break down or become obsolete. |
| Thanks to local storage, no network is required to access your data. | Your hardware can also be stolen. | |
| There is only a one-time cost when purchasing the hardware. | Your data is only available locally in one place. | |
| Quick access, you don't need to upload or download anything. | You must perform backups manually and on your own responsibility. |
You usually only realise how important backups are when you need them. Automatic backups are worthwhile because they require little effort and offer maximum benefit.
You can activate automatic backups in your smartphone settings. On your MacBook or iMac, you can activate automatic backups with Time Machine. For Windows backups, you can also use tools such as Acronis True Image, which create a complete system image.
Check regularly (approximately every 3-6 months) whether your backup is still working: as a test, try to restore a current file from the backup.
Professionals swear by the 3-2-1 rule: 3 copies of your important data (original + 2 copies), 2 different media (e.g. cloud + external hard drive), 1 backup in a different location (e.g. not in the same house).
Sounds excessive? That depends on the value of your data. If you want to store data that you definitely don't want to lose because it is unique and irreplaceable (e.g. childhood photos), this multiple backup is worthwhile.
Emails and chat histories are often forgotten when backing up data. If you have stored important information, contracts or invoices there, it is best to export your emails or data about once a year and save them to an external hard drive.
Infected backups are useless because if you restore a backup containing viruses, not only will your data be back in the system, but so will the viruses. So what can you do to keep your backups virus-free?
We have compiled further information and content on the topic of cybersecurity here.
How can I protect myself from dangerous websites and malware?
Swisscom Call Filter – Activate it now on your mobile at cockpit.swisscom.ch.
Swisscom Call Filter – Activate now on your landline at swisscom.co.uk/myswisscom
Marcel is a trainer at Swisscom. He is available to answer any questions you may have about cybersecurity.
Trainer at Swisscom