Guide

More articles

Password security

Password security

Choose secure passwords or generate them using a password manager, that's how it works.
identity theft

Protection against identity theft

Learn how to further protect your data from misuse.
Skater is looking at his smartphone.

Ransomware

Find out how you can recognize this type of malware and protect yourself against it.
Mother sits with her daughter on the sofa and looks at a smartphone.

Malware

Find out how you can recognize malware and protect yourself against it.
Phishing protection

Recognizing and responding to phishing

Learn how to detect phishing attacks and protect yourself. Get informed now.
Two couples are on the phone in a city

Data protection regulation

How personal data may be processed is regulated by the FADP, which applies in Switzerland, and the GDPR, which applies in EU countries. This serves to protect private individuals and, if need be, companies.
Young girl listens to music through headphones and holds an icetea.

Safety on the Internet

Find out what risks you need to be aware of and how you can best protect yourself.
Child with a tablet

Safe online surfing and shopping

Quickly check the weather, order socks online or stream a movie – the internet makes our lives easier. But private individuals can also be hacked, defrauded during online shopping or robbed via the internet. Seven questions and answers on the subject “safe surfing and online shopping”.
Package outside the front door

Stolen package - this is how you are protected

The long-awaited package has not show up – it has obviously been stolen. Now what?
Woman is on cell phone and holding credit card

New smartphone? This insurance makes sense for you.

Is it worth getting cellphone insurance for my new smartphone? We show you the options available. And which of them makes most sense for you.
A woman is working with a laptop on the terrace

Security in the home office

What to consider when working outside the office.

Cyber attacks on the car

What hardly anyone knows is that not only computers but also cars can become the target of hackers' attacks.