Insurance buying helpline: 052 269 21 60
Around a third of Swiss companies have already fallen victim to cyber crime. Hackers seeking to get their hands on money, data or trade secrets can pose an existential threat.
Ransomware in particular is an increasingly significant risk to any business as cyber criminals can use it to block access to entire corporate IT networks with encryption and then demand a large ransom in exchange for the encryption key.
AXA cyber insurance protects your company against the financial and legal effects, as well as the damage to its image, that can result from a cyber attack.
Over 43,000 cyber crime cases were reported in Switzerland in 2023 – 32% more than in 2022. Most of the offenses – 40,000 – were financial in nature, with the majority – around 30,000 – involving cyber fraud.
(Source: police crime statistics from the Federal Statistical Office, June 2024)
Cyber crime is criminal activity that makes use of information and communication technology. It can take place anywhere people use internet-connected devices such as computers and smartphones, for example in companies or government offices, in the home or on the move.
This type of crime is especially dangerous because the perpetrators can strike at virtually any time from anywhere in the world and can easily cover their tracks. There are lots of different kinds of cyber attacks, from stealing confidential data to infecting private or corporate computers with malware, for example by means of spam e-mails. Whatever their nature, cyber attacks have the potential to cause huge losses.
From business interruptions to theft of critical data and lasting damage to a company's reputation, the scope of cyber risks and the damage they can cause is broad.
Financial consequences: of hacker attacks include loss of income as a result of normal business being interrupted and high costs for recovering lost or stolen data. When these affect a company's competitiveness or even its share price, they can quickly threaten its very existence.
Damage due to data protection violations: Anyone who stores or processes customer data is legally obligated to protect them. If data protection is compromised and sensitive data are disclosed or misused as a result of a cyber attack, the company concerned could face legal and regulatory sanctions. Companies with business relationships in other European countries must also comply with the more stringent requirements of the EU's General Data Protection Regulation (GDPR).
Reputational damage: If a company is negligent in its handling of the theft or loss of data, this can affect the extent to which it is trusted, perhaps even to the point where it loses customers and business partners. Winning them back can be very hard work.
Claim scenario
Despite having the latest security software installed, a small business's entire IT infrastructure is infected with viruses. Some of its data are deleted, and some are corrupted. The operating system and applications have to be reinstalled, and the data backups have to be rolled back.
The system remains down for several days, making it impossible to serve customers, so they switch to a rival firm. AXA covers the cost of data recovery as well as the loss of income arising from the business interruption.
Cyber crime is often financially motivated, with hackers wanting to get rich from selling sensitive data or through blackmail. However, there can also be political or personal reasons for attacking a company's IT systems.
Money: Cyber crime is a lucrative business for both individuals and criminal organizations. They can make a lot of money by stealing and selling personal data or even goods, blackmailing victims for the release of locked data or manipulating staff.
Data theft: Attacks on corporate IT are often aimed at stealing customer data. E-mail addresses as well as credit card and login details are traded on underground websites and used for identity theft in further cyber attacks, for example.
Company secrets: Cyber criminals are also interested in intellectual property and trade secrets like strategies, plans and recipes. Any company that is especially innovative or successful in a particular field and owns patents, copyrights or trademarks is at risk of falling victim to industrial espionage.
Personal motives: Some cyber attacks are all about power and control. A former employee might want to take revenge on your company, while others might simply enjoy the thrill of having power over their victims.
Political motives: "Hacktivists" are politically or ideologically motivated. They might attempt to disable the websites of governments, organizations or entire industries or bombard them with requests so as to make them unusable for extended periods.
People: Most cyber risks entail some kind of human interaction, so human nature is the biggest target for cyber crime. Criminals use a range of social engineering tricks to turn company staff into unwitting accomplices. They might invent fictitious security problems to persuade users to disclose their login details or use a fake identity to divert payment flows. This is why comprehensive protection against cyber risks must always include raising awareness among the company's staff. They need to know the dangers involved in using the internet and the company's other interfaces.
E-mails: Hackers use phishing e-mails to collect confidential data from a company's staff or infect its network with malware.
Clouds: Many small and medium-sized businesses use third-party cloud services to store their data. If these are manipulated, companies are sharing not just storage space and databases but viruses and Trojans as well.
Web: Criminals repeatedly succeed in hacking popular, trusted websites to circulate malware or divert users to harmful sites.
WLAN: Public Wi-Fi hotspots are like an open door to hackers, making it easy for them to intercept confidential information and passwords.
The rule of thumb is that the more digitally networked your business is, the greater your need for cyber insurance will be. Even businesses that don't need computers or IT infrastructure for their main activity often rely on digital services – be it for online banking, internet telephony, digital management of customer appointments or using social media for marketing. Any of these are at risk from cyber attacks.