Call us immediately in an emergency.
Cyber and hacker attacks are increasing significantly. SMEs are a popular target as their IT systems are often insufficiently protected. In an emergency, every second counts, but an ill-considered move may even increase the damage to the company. To make the right decisions under pressure and swiftly mitigate the damage to the company, you need experienced, well-trained experts.
In an emergency, call us so that our team of cybersecurity experts can immediately analyse your situation and provide guidance.
Even the most effective preventive measures cannot provide complete protection from cyber attacks. Should the worst happen, the first important step is to call Swisscom. We will analyse the incident in detail and identify the best course of action. You will receive our recommendations for effective emergency measures to mitigate the damage and isolate your systems.
Once the affected systems are isolated, you will fix the malware infection in accordance with our recommended course of action in order to restore normal operation. If required, we can also advise you on the next steps, such as reporting the incident to the authorities or pursuing a criminal prosecution.
Out of nowhere, your IT and the daily operations of your SME are paralysed. Your online shop is no longer available, and data cannot be accessed. The only accessible document is the instructions for where to pay the ransom to escape this horror scenario. Our experienced team of experts are there for your SME for precisely this type of cyber attack. The team analyses the situation as quickly as possible and provides you with a firm basis for making informed decisions and taking appropriate action.
Calls are free. The charge for using this service is calculated on the basis of time and materials plus a flat rate fee. This offer is exclusively available to companies in Switzerland.
Your SME has been infected during a cyber attack, for example by ransomware. Operations come to a standstill and your data is no longer available. Your data will only be decrypted once a ransom demand has been paid.
As soon as a confirmed attack is reported by the customer, Swisscom’s cybersecurity experts analyse the attack vectors and contain the systems affected. We help you to remove malware and restore operations.
Your employees report that the systems are behaving strangely. This leads you to suspect a hacker attack on your SME, but you are not absolutely certain.
Our team of cybersecurity experts checks your systems thoroughly and provides an answer. If there has been an attack, we show you the steps needed to defend yourself and prevent the spread of malware. After a genuine attack, a forensic investigation provides the basis for establishing the course of action to be taken.
Report a security incident any time on our freephone number 0800 850 000. Our team of experts are available around the clock and will start to analyse the incident as soon as possible. This service is available to all Swiss SMEs, whether or not they are Swisscom customers.
After you have reported an attack by telephone, we check whether or not there has really been an attack on your SME. Stay calm and don’t act in haste – this can often make the situation worse. If your SME has been the victim of a cyber attack, we will get to work.
We recommend that you should never pay the ransom because you have no guarantee that your data will be released once the ransom has been paid. By paying the money, the cyber criminals have got what they wanted and will use it to finance more crime. Paying the ransom demonstrates that you can be blackmailed and makes you a lucrative target. Lists of companies that have previously paid ransoms are traded on the dark net. What is preventing hackers from blackmailing you again? In a case such as this, it is better to involve a team of experts with a detailed plan for dealing with this type of scenario.
Swisscom’s CSIRT (Cybersecurity Incident Response Team) is primarily concerned with analysing the attack (the attacker’s modus operandi, identifying compromised systems, etc.). Your IT partner or your company’s IT department will handle the clean-up and restoration of your IT system.
The CSIRT recommends appropriate emergency measures to prevent the attack spreading further within your systems or the escalation of a data leak. We give you a recommended course of action to effectively eliminate the threat from the affected systems.
This is highly dependent on the type and scope of the cyber attack and cannot be answered in general terms. The costs for using this service are calculated on the basis of time and materials plus a flat rate fee. You are always given a transparent maximum charge for the next step and can decide at any point whether or not to proceed.
Product Owner, Bruker