Detecting and Stopping Phishing Attacks: Practical Guide for Swiss Teams
Phishing attacks are the most common entry point for cybercriminals targeting Swiss SMEs. This practical guide shows you how to recognize attacks, protect your team, and implement concrete measures immediately.

Detecting and Stopping Phishing Attacks: Practical Guide for Swiss Teams
Every 39 seconds worldwide, a company falls victim to a cyberattack — and in Switzerland, phishing attacks cause damage exceeding CHF 100 million annually. The problem: most attacks don't start with sophisticated malware, but with a single deceptively authentic email.
TL;DR
- Phishing is the most common cyberattack on Swiss SMEs — over 60% of all security incidents begin with a phishing email.
- Spoofed sender addresses, time pressure, and unusual links are the most reliable indicators.
- Technical protective measures (SPF, DKIM, MFA) cost little but dramatically reduce risk.
- According to NCSC, regular employee training is the single most effective measure against phishing in Switzerland.
What exactly is phishing — and why does it hit Swiss SMEs so hard?
Phishing (from English fishing) refers to attempts to obtain login credentials, payment information, or other sensitive data through fake emails, SMS messages, or websites. Attackers impersonate banks, government authorities, Microsoft, or even internal employees.
Swiss SMEs are particularly attractive targets: they possess valuable data and banking relationships but invest significantly less in IT security than large enterprises.
📊 61% of all reported cybersecurity incidents to the National Center for Cybersecurity (NCSC) are attributable to phishing. Source: NCSC Semi-Annual Report 2024
How do you reliably identify a phishing email?
A phishing email can almost always be identified by several concrete indicators — you just need to know where to look.
Overview of the most common warning signals:
- Check the sender address carefully:
[email protected]is not Microsoft. The display name can be anything — what matters is the actual domain. - Artificial time pressure: "Your account will be locked in 24 hours" is a classic coercion tactic.
- Unusual links: Hover over the link with your mouse (without clicking). Does the URL match the displayed text?
- Language errors or unnaturally perfect language: AI-generated phishing emails today often appear deceptively authentic.
- Unexpected attachments: Never open ZIP, Office, or PDF files from unknown senders.
- Unusual payment requests: So-called CEO fraud impersonates management for urgent wire transfers.
⚠️ Important: Since 2023, a growing number of attackers use AI-generated, error-free phishing emails in Swiss languages. Language quality alone no longer protects you.
Which technical protective measures actually work?
Four technical measures block the majority of phishing attempts before they reach your inbox.
| Measure | Protection Effectiveness | Costs (SME, approx.) | Effort |
|---|---|---|---|
| SPF / DKIM / DMARC | Very high (email spoofing) | Free (setup ~2 hrs) | Low |
| Multi-Factor Authentication (MFA) | Very high (credentials) | CHF 3–6/user/month | Low |
| Anti-Phishing Filter (M365/Google) | High (links & attachments) | Included in subscription | Minimal |
| Security Awareness Training | Very high (human factor) | CHF 20–80/user/year | Medium |
💡 Tip: Microsoft 365 Business Premium already includes Microsoft Defender for Office 365 with Safe Links and Safe Attachments. Check whether this feature is active in your subscription — many SMEs pay for it but never enable it.
How do you protect your team in 6 concrete steps?
Build solid phishing protection for your Swiss SME this way:
-
Set up email authentication — Have SPF, DKIM, and DMARC configured for your domain. This prevents attackers from sending emails on your behalf. Your IT service provider will handle this in approximately two hours.
-
Enable MFA for all accounts — Particularly for Microsoft 365, Google Workspace, banking, and VPN. A stolen password alone won't be enough anymore.
-
Conduct a phishing simulation — Send your employees a controlled test phishing email. The click rate shows you where the greatest training needs exist. Tools like KnowBe4 or Proofpoint are affordable even for SMEs.
-
Define a clear reporting procedure — Every employee must know: whom do I contact if I receive a suspicious email? Create a single, simple point of contact (e.g.,
[email protected]). -
Train employees — regularly — One annual training session is not enough. Short, monthly micro-trainings (5–10 minutes) are proven to be far more effective.
-
Create an incident response plan — What happens if someone clicks on a link anyway? Change password immediately, inform IT, isolate affected systems — this procedure must be known before an emergency occurs.
🚨 Warning: If someone in your company makes a payment abroad due to a phishing email, chances of reimbursement are minimal. Banks and authorities can usually do nothing once the transaction is executed.
What does a phishing attack cost — and what does protection cost?
The cost of a successful attack typically exceeds protection investments by a factor of 10 to 50.
An average data breach costs a Swiss SME approximately CHF 190,000 according to the IBM Cost of a Data Breach Report 2024 — including recovery, downtime, reputational damage, and potential GDPR/DSG fines.
By contrast, a complete phishing protection package for 20 employees costs:
- MFA solution: approx. CHF 1,400/year
- Awareness training: approx. CHF 1,200/year
- Email security filter (in subscription): CHF 0–600/year
Total costs: CHF 2,600–3,200 per year for 20 people.
ℹ️ Note: The Swiss Federal Data Protection Act (revDPA) has required Swiss companies since September 2023 to implement appropriate technical and organizational protective measures. Phishing protection is therefore not just a matter of security but also legal compliance.
Conclusion: Act now, before the next email arrives
Detecting and stopping phishing is not a matter of expensive technology — it's about knowledge, processes, and the right partners. Technical measures like MFA and email authentication can be implemented within hours. Regular training costs less than a single compromised account.
The greatest vulnerability in any organization remains the human element. Invest first in awareness — then in technology.
On IT-Provider.ch, you'll find over 200 verified Swiss providers for cybersecurity, email security, and employee training — filtered by region, company size, and budget. Compare directly, request quotes, and get started immediately.
Frequently Asked Questions about Phishing in Switzerland
Where do I report a phishing email in Switzerland?
You can report suspicious emails directly to the National Center for Cybersecurity (NCSC) at antiphishing.ch. Your email provider (e.g., Microsoft, Google) also has a report button directly in your inbox.
What should I do if I clicked on a phishing link?
Immediately: change the password of the affected account, enable MFA, inform your IT department, disconnect the affected device from the network. If you entered payment data, contact your bank immediately.
Is SMS phishing (Smishing) also a problem in Switzerland?
Yes. The NCSC has recorded a sharp increase in Smishing campaigns since 2022, impersonating Post, Swisscom, or customs authorities. The same recognition rules apply: check the link, never enter credentials.
How often should I train my team on phishing?
At least quarterly — preferably monthly with short micro-trainings. Studies show that the click rate on phishing simulations increases by up to 40% after 6 months without training.
Does antivirus software protect me from phishing?
Partially. Modern endpoint protection solutions recognize known phishing domains and malicious code. However, they are not a substitute for technical email security (DMARC, MFA) and human vigilance.


