Digital hygiene refers to the set of daily micro-habits that protect an organization against cyber threats, in the same way that washing hands protects against infections. According to the Cyber Security Report 2024 from the Federal Office for Cybersecurity (FOCS), more than 60% of cybersecurity incidents affecting Swiss SMEs are linked to avoidable human errors. The good news: the seven practices presented here only take a few seconds per day and do not require any specific technical skills.
Key figure: According to the FOCS, the median cost of a cybersecurity incident for a Swiss SME exceeds CHF 50,000 — a sum that these 7 simple practices can help avoid.
An unlocked computer is the digital equivalent of an office left open with all client files visible. In an SME environment where visitors, interns, and service providers regularly circulate, a few seconds are enough for a malicious person to copy sensitive data or send a message in your name.
Golden rule: You leave your workstation? You lock it. No exceptions.
Phishing is the most common attack technique against Swiss SMEs. Fraudulent emails perfectly imitate official communications — logos, tone, layout — and the difference lies in the details: a slightly modified sender address (e.g., accounting@your-company.ch instead of accounting@yourcompany.ch), a subtle mistake, or an unusual sense of urgency.
In Switzerland, the revised DPA (Data Protection Act, in force since September 2023) requires companies to report any data breach within 72 hours. A successful phishing attack can therefore lead to serious legal consequences, in addition to direct financial losses. Tools like PhishTrainer allow you to train your teams to recognize these attempts in a controlled environment.
A strong password is a string of at least 16 characters combining upper and lower case letters, numbers, and symbols, without any dictionary words. Using the same password on multiple services is like using the same key for your house, your car, and your safe: if it is compromised once, everything is exposed.
| Approach | Security | Ease of use | Recommended? |
|---|---|---|---|
| Same password everywhere | ❌ Very weak | ✅ Easy | No |
| Different memorized passwords | ⚠️ Medium | ⚠️ Difficult | Partial |
| Password manager | ✅ High | ✅ Easy | Yes |
| Manager + 2FA enabled | ✅✅ Very high | ✅ Easy | Strongly recommended |
Solutions like Proton Pass (Swiss hosting) automatically generate and store complex and unique passwords for each service. Also, enable two-factor authentication (2FA) on all your critical accounts: even if a password is stolen, access remains blocked without the second factor.
Security updates fix known vulnerabilities that cybercriminals actively exploit. According to Microsoft, 85% of successful cyberattacks exploit flaws for which a patch already existed but had not been applied. In an SME, a single un-updated workstation can be enough for a ransomware to spread to the entire network.
Practical tip: schedule restarts for updates outside of working hours (e.g., Friday evening at 8 PM) to avoid interrupting your activity.
Each file downloaded from the Internet represents a potential entry point for malware. A PDF received by email, an invoice downloaded from a website, an Excel file sent by a partner: all can contain malicious code. An unmanaged downloads folder accumulates files whose origin is no longer remembered — and which you risk opening inadvertently months later.
For Swiss SMEs processing personal data, this practice falls directly within the obligations of the revised DPA, which requires data to be kept only for the time strictly necessary and under appropriate security conditions.
Staying permanently connected to all your professional tools creates an unnecessary attack surface. If someone accesses your computer during your absence — a colleague borrowing your workstation, a visitor left alone for a few moments — they immediately have complete access to your email, your CRM, your accounting tools, all under your identity.
| Situation | Recommended action |
|---|---|
| Shared computer or third-party workstation | Never check « Stay connected » — explicitly log out after each use |
| Your own workstation, end of day | Log out of sensitive services (banking, payment, HR) |
| Short break at the office | Locking the session (practice #1) is sufficient |
| Teleworking on an unsecured network | Use a VPN + log out after each session |
Also, close unnecessary tabs in your browser: each service active simultaneously represents an additional opportunity for compromise.
Data backup is the last line of defense against ransomware, hardware failures, and accidental deletions. According to Veeam's Data Protection Trends Report 2024, 76% of organizations that suffered a ransomware attack were able to recover their data thanks to backups — compared to only 13% for those who paid the ransom.
Solutions like Swiss Backup from Infomaniak allow you to comply with this rule while keeping the data in Switzerland, in accordance with the requirements of the revised DPA. Also, consult our guide on the security and backup plan for SMEs.
Critical point often neglected: an untested backup is not a backup. Schedule a monthly restore test of at least one representative file to verify that your system actually works.
| # | Practice | Frequency | Time required |
|---|---|---|---|
| 1 | Lock your session | Each time you leave your workstation | 2 seconds |
| 2 | Verify the sender of emails | For each suspicious email | 30 seconds |
| 3 | Use a password manager + 2FA | One-time configuration, then automatic | 1 hour (setup) |
| 4 | Install updates | As soon as available | 10 minutes |
| 5 | Clean the downloads folder | Weekly | 5 minutes |
| 6 | Log out of sensitive services | Daily (end of day) | 2 minutes |
| 7 | Verify backups | Monthly | 10 minutes |
No. The 7 practices presented here are designed to be adopted by any employee, regardless of their technical level. No specific computer skills are required.
These 7 practices cover the most frequent attack vectors and provide a solid foundation. For complete protection, they must be supplemented by technical measures (firewall, antivirus, network segmentation) and organizational measures (security policy, incident response plan). Bexxo supports Swiss SMEs in this global approach.
The most effective method combines short training (30 minutes), phishing simulations with tools like PhishTrainer, and regular reminders. Studies show that repeated training reduces the click rate on phishing links by 65% on average (Proofpoint, 2024).
The revised DPA (in force since September 2023) requires companies processing personal data to implement appropriate technical and organizational measures to protect them. Practices #2 (anti-phishing), #3 (passwords), #5 (data cleaning), and #7 (backups) directly address these obligations.
If you want to go further in raising awareness among your teams, do not hesitate to contact Bexxo. We support Swiss SMEs in implementing cybersecurity practices adapted to their reality — without technical jargon and with concrete solutions.