background

Swiss SME Cybersecurity: 2025 Summary & 30/60/90-Day Action Plan for 2026

In 2025, a reality has become clear: most incidents do not come from a spectacular "hack," but from a chain of avoidable failures: reused password, weak authentication, overly broad permissions, delayed updates, untested backup... and a phishing email that gets through.

The objective of this article is to give you a clear, actionable, and prioritized summary for SMEs with 10–50 and 50–250 employees, with two reading paths:

Manager / executive (simple decisions with high ROI)

IT / service provider (concrete implementation)

 

Manager or IT: choose your reading

 

Want the essentials without the jargon? Read the Manager Version.

Want the implementation details? Switch to the IT Version


   
      Manager Version (priorities)
   

   
      IT Version (checklists)
   

 

   Next step (10 min): measure your phishing reflexes.

 


 

The 9 priorities for 2026 (express summary)

 

  1. Enable MFA (Multi-Factor Authentication) on critical accounts (email, cloud, VPN, admin)
  2. Stop password reuse (and adopt a password manager)
  3. Reduce access rights (principle of least privilege)
  4. Implement updates as a “system” (policy + automation)
  5. Monitor vulnerabilities (monitoring + prioritization)
  6. Strengthen anti-phishing reflexes (short and regular training)
  7. Structure backups (and test restoration)
  8. Prepare for crisis management (Cyber Action Plan: roles + checklists)
  9. Adopt a Zero-Trust approach (progressive, pragmatic)

 


 

Part 1 — Managers / Executives: secure without becoming an expert

If you are a manager, executive, or responsible for admin/finance or operations: this section gives you a simple plan with high ROI (without jargon) to reduce risk in 30 days.

1) The fastest ROI: protect access (MFA + passwords)

MFA: if you only do one thing this month, do this. MFA strengthens access to emails, the cloud, business tools, and administrator accounts.

Read: MFA for Swiss SMEs — 2025 guide

Passwords: an "OK" password that is reused becomes a "dangerous" password. Aim for: passphrases, password manager, and a simple rule: one service = one unique password.

Read: Strong Password — 2025 guide

Expected result: fewer account takeovers, fewer incidents that start "through email".

 

2) Reduce the impact of an incident: the principle of least privilege

Even with good protections, an account can be compromised. The difference between a "manageable" incident and a crisis often comes down to a single question: what exactly was this account allowed to do?

"Each person only has the necessary access. No more, no less."

Read: Principle of Least Privilege — 2025 guide

Expected result: a compromised account does not allow an attacker to "traverse" the entire company.

 

3) Updates & vulnerabilities: the hygiene that avoids disasters

Known vulnerabilities are exploited... because they remain unpatched. Two complementary levers:

  • make updates a routine (policy, maximum deadlines, automation),
  • monitor vulnerabilities to prioritize correctly.

2025 Resources:

To illustrate the issue, you can also consult an example of monthly statistics (2025):

Expected result: fewer opportunistic attacks, fewer "open doors".

 

4) Business continuity: backups (and restoration test)

An untested backup is not a strategy: it's hope. Your vital minimum:

  • automated backups,
  • redundant copies,
  • planned restoration test,
  • priority to business data (customers, finance, production, HR).

Read: Backup Security Plan — 2025

Expected result: faster business recovery, lower stress, clearer decisions.

 

5) The day of: have a crisis plan (Cyber Action Plan) ready

The question is no longer "if" but "when". A Cyber Action Plan (CAP) avoids improvisation at the worst moment.

To plan for:

  • roles & responsibilities (management / IT / service provider / communication),
  • scenarios (email compromise, ransomware, data leak),
  • decision checklists (isolate, communicate, restore).

Read: Cyber Crisis Management — CAP (2025)

Expected result: faster reaction, limited impact, controlled communication.

 

30 / 60 / 90-day action plan (management version)

  • 0–30 days: immediate risk reduction

    • MFA enabled on critical accounts

    • "unique passwords" rule + recommended password manager

    • 1 backup restoration test

    • phishing quiz shared with the team

    31–60 days: structuring

    • least privilege (admin rights reviewed, "overly broad" access removed)

    • update policy (max deadlines + automation)

    • vulnerability monitoring / prioritization routine

    61–90 days: maturity

    • Cyber Action Plan version 1 + short exercise

    • phishing training on a regular schedule (micro-format, regular)

    • first steps Zero-Trust (progressive)

 

Manager or IT: choose your next step

 


 Manager: the 30/60/90-day roadmap above is enough to get started.

 IT / service provider: continue for implementation (checklists).
 

   
      Go to the IT version
   

   
      Return to the beginning of the Manager version
   

 

Immediate action (10 min): measure your phishing reflexes.


    Take the phishing quiz (10 min)
 

 


 

Part 2 — IT / Service Providers: the implementation checklist (without unnecessary complexity)

Objective: transform the above priorities into concrete deployment, with clear tasks and a pragmatic approach (SME 10–50 / 50–250).

 

A) Identities & Access (IAM) — order of battle

  1. Inventory of accounts (admins, shared mailboxes, service providers, dormant accounts)
  2. MFA everywhere possible (email, cloud, VPN, admin)
  3. Hardening: limit admins, quarterly review of rights, deletion of unnecessary access (least privilege)

 

2025 Resources:

 

B) Patching & vulnerabilities — make security "regular"

  • patching policy (max deadlines per criticality)
  • automation as soon as possible
  • vulnerability monitoring → prioritization → execution → proof (update log)

2025 Resources:

 

C) Mobility & BYOD — secure without hindering productivity

Two real-world realities for SMEs: teams move around, and personal devices are (sometimes) used for work. The idea is not to prohibit: it is to frame with simple rules.

To standardize:

  • prioritize 4G/5G sharing rather than public WiFi
  • VPN (or equivalent solution) to encrypt connections
  • no access to critical services on unverified networks
  • BYOD policy: locking, updates, separation of professional/personal, storage rules

2025 Resources:

 

D) Phishing: train + measure + anchor

Effective awareness is short, regular, positive, and measurable. Phishing is best combatted with reflexes than with rules "on paper".

To delve deeper (2025):

Immediate action (10 min): get a clear starting point with the phishing quiz.

Take the phishing quiz (10 min)
Complementary option (if you want to go further than the quiz): phishing simulations and tracking with PhishTrainer.

Discover PhishTrainer

 

E) Backups & recovery — moving from "backup" to "recovery"

Minimum checklist:

  • define RPO/RTO (acceptable data loss / acceptable downtime)
  • automated backups + isolated copies when possible
  • planned restoration test + simple procedure "restore in crisis"

Read: Backup Plan — 2025

 

F) Sensitive data: when to add a "premium" layer

For certain documents (customers, HR, finance), client-side encryption provides useful additional protection, especially in a cloud context.

Read: Client-Side Encryption — 2025

 

G) Zero-Trust: a progressive logic (SME-friendly)

Pragmatic Zero-Trust version: verify, segment progressively, reduce lateral movements, strengthen authentication.

Read: Zero-Trust — 2025

 


 

SME 10–50 vs 50–250: adapt without overloading

If you are 10–50

  • aim for simplicity: MFA + manager + auto updates + tested backups
  • 1 internal contact + an external partner if necessary
  • culture: 1 rule = 1 reflex (not 20 pages of policy)

If you are 50–250

  • aim for repeatability: piloted patching, access by roles, regular reviews
  • industrialize onboarding/offboarding (access, equipment, procedures)
  • governance: 30 minutes "cyber" per month in the management committee

 


 

Conclusion: your next (simple and measurable) step

Want to move from "we know" to "we do"?

  1. Start with the phishing quiz (10 minutes):

    https://academy.bexxo.ch/fr/formation/quiz/quiz-reconnaitre-signaux-phishing-ingenierie-sociale.html
     
  2. Apply the 30/60/90-day plan: access (MFA + passwords), rights (least privilege), updates + monitoring, tested backups, Cyber Action Plan, and training schedule.

 

To understand why SMEs are particularly exposed (2025):
Cybersecurity: why are SMEs particularly vulnerable?

 


 

2025 Readings cited (references)

Discover how bexxo can secure your business. Don't hesitate to contact us for a personalized consultation today!