Home Page Navigation Contents Contact Sitemap Search

Prac­tice safe text

What kinds of “access doors” are open on your device, and which kind of viruses can pass through? Prac­ti­cally none, as long as you have acti­vated a fire­wall and installed antivirus software.

Unless you take action, your com­puter, tablet or smart­phone is defence­less in the face of internet danger. Anyone can use mal­ware (viruses, worms, tro­jans, etc.) to view, manip­u­late and even delete your data. That’s why you should check that you have antivirus soft­ware installed and a fire­wall acti­vated on your device.

There is also an inter­view with secu­rity expert Dominik Schupp you can read on this topic (in German).

Check the s-u-p-e-r.ch web­site and «eBanking – but secure!» (EBAS) (https://www.ebas.ch/en/) from 3 May onwards to dis­cover the dan­gers you need to be aware of, and what simple steps you can take to pro­tect yourself.

Fur­ther information:



Be vig­i­lant: viruses are catching!

Mal­ware is a gen­eral term for soft­ware that can harm com­puters and their users. It covers things like viruses, tro­jans and worms.”

André Duvil­lard is del­e­gate for the Swiss Secu­rity Alliance (SVS). He coor­di­nates secu­rity policy between the fed­eral gov­ern­ment and the cantons.

What else would you like to learn about security when e-banking?

Reg­ister for a course now
and learn more:

Basic course

Find out about cur­rent Internet threats and some easy pro­tec­tive mea­sures, and how to securely use e-banking.

fur­ther information

Online course mobile banking/payments

Find out about mobile banking, mobile pay­ments and how to securely use these apps.

fur­ther information

Online course for the under-30s

Learn how to use your smart­phone securely. Next to basics, we will show you what you should know about social media, clouds, mobile banking and mobile payments.

fur­ther information

Course for SMEs

Is your organ­i­sa­tion suf­fi­ciently secure? Learn which mea­sures you can take to sig­nif­i­cantly strengthen your organisation’s IT security.

fur­ther information