News
Cyberthreats
- Advance-fee scam
- Attack on availability (DDoS)
- Business E-Mail Compromise
- Calls in the name of fake authorities (police, duty)
- CEO-Fraud
- Cheque fraud
- Classified ad scam
- Classified ad fraud – pay despite sale
- Cybermobbing
- Cybersquatting
- Data leak
- Defacement
- Domain registration fraud (domain fraud)
- Dubious webshop
- E-banking malware
- Fake Sextortion
- Fake-Support
- Fake threatening emails from authorities
- Fraudulent lotteries
- Fraudulent job offers
- Hacking (using leaked data)
- Hoax
- Illegal pornography
- Investment Fraud
- Investment fraud advertisements
- Malware
- Malware after call
- Money Mules
- Parcel subcription scam
- Phishing, Vishing, Smishing
- Ransomware
- Reputational damage
- Requests for financial assistance
- Romance Scam
- Sextortion
- Social media hacking
- Subscription scam
- Vulnerability
- Web administrator blackmail
Information for
- Information for individuals
- Informationen für Private
- Information for companies
- Current Topics
- Cyberattacks against companies – what you need to know
- Cybersecurity in the supply chain
- Information security checklist for SMEs
- Handling emails securely
- Measures to secure content management systems (CMS)
- Measures to counter DDoS attacks
- Measures to protect industrial control systems (ICSs)
- Measures for security in the Internet of Things (IoT)
- Passwords
- Payment processes
- Recommendations ICT minimum standard
- Recommendations for cooperation with IT service providers
- Recommendations for conducting security checks on employees in companies
- Secure use of remote access
- Security.txt - Include your security contact on your website
- Travelling abroad
- Incident - what next?
- Current threats
- Events
- Current Topics
- Information for authorities
- Current Topics
- Cyberattacks against authorities – what you need to know
- Cybersecurity in the supply chain
- E-learning on cybersecurity and information security for towns, cities and communes
- Handling emails securely
- Home Office - Secure use of remote access
- Measures to secure content management systems (CMS)
- Measures to counter DDoS attacks
- Password
- Payment processes
- Protect your authority
- Recommendations ICT minimum standard
- Recommendations for cooperation with IT service providers
- Recommendations for security in the Internet of Things (IoT)
- Secure communication
- Security.txt - Include your security contact on your website
- Travelling abroad
- Incidents
- Current threats
- Further information/Links
- Events
- Current Topics
- Informations for it specialists
- Topics
- Bug bounty programmes
- Coordinated Vulnerability Disclosure (CVD)
- Cyberattack - what next? Checklist for CISOs
- General forms of threats, perpetrators and tools
- ICT minimum standards
- Measures to protect industrial control systems (ICSs)
- Recommendations on cybersecurity in the healthcare sector
- Security in the Internet of Things (IoT)
- Security.txt - Include your security contact on your website
- Information on GovCERT
- Information about CSH
- Topics
Reporting obligation
- Legal basis for the reporting obligation
- Information on the reporting obligation
- Who has to report?
- Which incidents need to be reported?
- How should it be reported?
- Information about the CSH
- FAQ
NCS Strategy
Documentation
- Reports
- Press releases
- Reporting obligation for cyberattacks
- Awareness-raising and prevention
- Campaign in the Federal Administration
- Federal ICT specifications
- Technology considerations
- SwissCovid Proximity Tracing System - Public Security Test
- Covid Certificate - Public Security Test
About NCSC
Last modification 06.01.2016