Financial protection against cyber crime Cyber insurance for companies

Financial compensation for business interruption
24/7 cyber claims hotline for assistance in a crisis
Free prevention service included
Calculate premium now (only German)

Digital technology optimizes processes, making them faster and more cost-effective, but it also increases the risk of cyber crime. AXA cyber insurance not only protects your company against financial losses, it also includes a free prevention service.

Sales advice: 052 269 21 60

Why do companies need cyber insurance?

Around a third of Swiss companies have already fallen victim to cyber crime. Hackers seeking to get their hands on money, data or trade secrets can pose an existential threat to them.

Ransomware in particular is an increasingly significant risk to any business as cyber criminals can use it to lock out entire corporate IT networks with encryption and then demand a large ransom in exchange for the unlocking code.

AXA cyber insurance protects your company against the financial and legal effects, as well as the damage to its image, that can result from a cyber attack.

  • Coverage for own and liability claims: We compensate you for the cost of data recovery, income lost through business interruption, and liability claims.
  • Free prevention service: You receive regular training for your employees as well as security reports, helping you to assess and optimize your IT security.
  • Crisis management: If an insured event happens despite all attempts to protect against it, we cover the cost of hiring a PR agency to handle the threat to your company's reputation, among other things.

Are SMEs also affected by cyber attacks?

"It won't happen to my company." Many small and medium-sized enterprises think they're too insignificant to be of interest to hackers, but cyber attacks have in fact become a real threat to SMEs. Manufacturing companies, especially those in the machinery, chemicals, and electrical engineering industries whose products are in demand, are an especially attractive target for cyber criminals.

The mistaken belief that your company is too small and uninteresting for hackers can prove very expensive. In the worst-case scenario, it can endanger the company's very existence. An interruption lasting just one week can still result in a five-figure loss for a medium-sized machinery constructor. If subsequent costs for restoring data, crisis management, and legal advice are taken into account, the extent of the damage can easily triple.

Security updates, restricted administrator rights, backups: most SMEs invest in protection against cyber crime and get a lot of things right. In many cases, however, hackers reach their victims via the easiest possible route, namely e-mail. One click in the wrong place, and malicious software can shut down the company's IT system and all of its operations.

That's why our cyber insurance includes a free prevention service that aids staff training and comes with its own security platform to help minimize the risk of cyber attacks.

How well is your business prepared for online attacks?

Run the Cyber Check for SMEs now. It's free, and it only takes a few minutes.

Cyber crime is on the increase

Over 30,000 cyber crime cases were reported in Switzerland in 2021 – 24% more than in 2020. Most of the offenses – just under 27,000 – were financial in nature, with the majority – around 21,000 – involving fraud, 

(Source: police crime statistics from the Federal Statistical Office, March 2022)

What does AXA cyber insurance cover?

Our insurance covers financial losses as well as the cost of compensation claims and measures to help you prevent reputational damage – not only in connection with cyber crime, but also due to mistakes made by your staff or service providers. Read on to find out all you need to know about the benefits.

Benefits provided by our cyber insurance

Own claims

Compensation for loss of income: If the business activities of an insured person or company – e.g. selling goods via a web shop – are halted by a cyber attack, AXA's cyber insurance pays compensation for the loss of income and covers the additional cost of maintaining operations.

Recovery costs: These include all costs for recovering or restoring data, operating systems, and applications affected by attacks on the company's IT systems.

Third-party claims

Liability and legal protection: If hackers steal sensitive customer data from a database and use them illegally, the company can be held liable for violating data protection. AXA's cyber insurance pays out on all justified third-party claims and covers the cost of contesting unjustified claims.

Crisis management

  • Immediate assistance: In the event of a cyber attack, the computer forensic analysts and IT security specialists at Oneconsult Ltd will identity the vulnerabilities that were exploited and implement appropriate countermeasures.
  • Support: If you have to make a claim, your cyber insurance will also cover advice on legal and forensic matters as well as professional public relations support. 

Insured causes

Basic cyber insurance coverage includes all of the main cyber risks:

  • Implementation of malicious software (Trojans, computer viruses, etc.)
  • Hacker attacks
  • Data misuse
  • Data manipulation
  • Data disclosure
  • Data loss
  • System outage
  • Misappropriation of the system

What optional extras are available?

Depending on a company's size and the industry it operates in, it can make sense to add further components to cyber insurance coverage for tailor-made, all-round protection.

Supplementary coverage for AXA cyber insurance

Social engineering / human hacking: When fraudsters pass themselves off as suppliers or the company's CEO and persuade staff to transfer or divert funds, this is known as social engineering or human hacking. This risk can be included in our insurance coverage on request.

Manipulation of online payments: Financial losses can result directly from third parties gaining access to a company's e-banking or online payment systems. We can cover this risk on request as part of our cyber insurance.

Phone hacking: When criminals hack companies' phone systems in Switzerland to commit fraud under their name, they often cause significant financial losses. This risk can be covered by cyber insurance on request.

Would you like us to advise you? Get in touch!

Documentation on cyber insurance for companies

Frequently asked questions

  • What is cyber crime?

    Cyber crime is criminal activity that makes use of information and communication technology. It can take place anywhere people use internet-connected devices such as computers and smartphones, for example in companies or government offices, in the home or on the move. 

    t is especially dangerous because the perpetrators can strike at virtually any time from anywhere in the world and can easily cover their tracks. There are lots of different kinds of cyber attack, from stealing confidential data to infecting private or corporate computers with malicious software (malware for short), for example by means of spam e-mails. Whatever their nature, cyber attacks have the potential to cause huge losses.

  • What damage does cyber crime cause?

    From business interruptions to theft of critical data and lasting damage to a company's reputation, the scope of cyber risks and the damage they can cause is broad.

    Financial damage: Financial consequences of hacker attacks include loss of income as a result of normal business being interrupted and high costs for recovering lost or stolen data.  When these affect a company's competitiveness or even its share price, they can quickly threaten its very existence.

    Damage due to data protection violations: Anyone who stores or processes customer data is legally obligated to protect them. If data protection is compromised and sensitive data are disclosed or misused as a result of a cyber attack, the company concerned could face legal and regulatory sanctions. Companies with business relationships in other European countries must also comply with the more stringent requirements of the EU's General Data Protection Regulation (GDPR). 

    Reputational damage: If a company is negligent in its handling of the theft or loss of data, this can affect the extent to which it is trusted, perhaps even to the point where it loses customers and business partners. Winning them back can be very hard work.

    Claim scenario

    Despite having the latest security software installed, a small business's entire IT infrastructure is infected with viruses. Some of its data are deleted, and some are corrupted. The operating system and applications have to be reinstalled, and the data backups have to be rolled back.

    The system remains down for several days, making it impossible to serve customers, so they switch to a rival firm. AXA covers the cost of data recovery as well as the loss of income arising from the business interruption.

  • What are the cyber criminals' motives?

    Cyber crime is often financially motivated, with hackers wanting to get rich from selling sensitive data or through blackmail. However, there can also be political or personal reasons for attacking a company's IT systems.

    Money: Cyber crime is a lucrative business for both individuals and criminal organizations. They can make a lot of money by stealing and selling personal data or even goods, blackmailing victims for the release of locked data or manipulating staff.

    Data theft: Attacks on corporate IT are often aimed at stealing customer data. E-mail addresses as well as credit card and login details are traded on underground websites and used for identity theft in further cyber attacks, for example.

    Trade secrets: Cyber criminals are also interested in intellectual property and trade secrets like strategies, plans, and recipes. Any company that is especially innovative or successful in a particular field and owns patents, copyrights or trademarks is at risk of falling victim to industrial espionage. 

    Personal motives: Some cyber attacks are all about power and control. A former employee might want to take revenge on your company, while others might simply enjoy the thrill of having power over their victims.

    Political motives: "Hacktivists" are politically or ideologically motivated. They might attempt to disable the websites of governments, organizations or entire industries or bombard them with requests so as to make them unusable for extended periods.

  • What weaknesses do cyber criminals exploit?

    The human factor: Most cyber risks entail some kind of human interaction, so human nature is the biggest target for cyber crime. Criminals use a range of social engineering tricks to turn company staff into unwitting accomplices. They might invent fictitious security problems to persuade users to disclose their login details or use a fake identity to divert payment flows. This is why comprehensive protection against cyber risks must always include raising awareness among the company's staff. They need to know the dangers involved in using the internet and the company's other interfaces.

    E-mail: Hackers use phishing e-mails to collect confidential data from a company's staff or infect its network with malware.

    Clouds: Many small and medium-sized businesses use third-party cloud services to store their data. If these are manipulated, companies are not just sharing storage space and databases but viruses and Trojans as well.

    The Web: Criminals repeatedly succeed in hacking popular, trusted websites to circulate malware or divert users to harmful sites.

    Wi-Fi: Public Wi-Fi hotspots are like an open door to hackers, making it easy for them to intercept confidential information and passwords.

  • Which companies need cyber insurance? What about tradespeople?

    As a rule of thumb, the more digitally networked your business is, the greater your need for cyber insurance will be. Even businesses that don't need computers or IT infrastructure for their main activity often rely on digital services – be it for online banking, internet telephony, managing customer appointments or using social media for marketing. Any of these are at risk from cyber attacks. 

  • What is the biggest IT weakness in companies?

    The security of any IT system depends entirely on the know-how of its users, so the biggest weaknesses can be found where this is at its poorest. The best way to protect against hackers and other online threats, even now, is thus to raise users' awareness and provide them with training – for example through AXA's prevention service, which is included free of charge with our insurance. 

  • Does virus protection have to be installed on every PC in a company network?

    Yes. All PCs and servers must have an anti-virus program, since malware can also get onto a computer via USB sticks and other tools.

  • When should software updates be installed?

    Whenever the producer publishes one. Good protection is only guaranteed if the software is kept up to date. 

  • What is a drive-by infection?

    Drive-by infections can happen when you visit a website and can cause problems that you might not even notice. Malware can install itself on your computer without needing you to actively click on a link or a download. To ensure that you don't fall victim to this type of insidious attack, you should set your firewall to block unsecure websites automatically. You should also never surf with an outdated browser.

  • What does "social engineering" mean?

    Social engineers exploit human psychology by attempting to build up relationships with a company's employees with a view to stealing its data or gaining access to its IT systems. Examples of the techniques they use include fake phone calls in which they pretend to be technicians and contacting employees via social media. Another technique, known as the USB drop, plays on people's curiosity by strategically placing a "lost" USB stick infected with malware in the hope that an employee will connect it to a company PC.

  • What exactly does a firewall do?

    A firewall is a protection system that protects a PC, server or whole IT system against unauthorized access. It either lets data through or blocks them in line with its own specific rules.

  • What does "phishing" mean?

    Hackers use e-mails with fake sender information to trick staff into visiting highly convincing fake websites so that they can install malware on the company system or steal login details. The quality of phishing e-mails has increased dramatically. They used to be full of spelling mistakes and bad grammar and use the wrong form of address, but it's much harder these days to tell them apart from legitimate e-mails in terms of the way they look and their content. You can learn more about phishing here.

AXA & You

Contact Report a claim Broker Job vacancies myAXA Login Customer reviews Garage portal myAXA FAQ

AXA worldwide

AXA worldwide

Stay in touch

DE FR IT EN Terms of use Data protection / Cookie Policy © {YEAR} AXA Insurance Ltd.

We use cookies and analysis tools to improve your user experience, to personalize advertising by AXA and our advertising partner companies, and to provide social media functions. Unfortunately you cannot change your cookie settings via our Cookie Preference Center if you use Internet Explorer 11. If you would like to change your settings, please use an up-to-date browser. By using our website with this browser, you consent to the use of cookies. Data protection / Cookie Policy