This page is not available in your selected language. Your language preference will not be changed but the contents of this page will be shown in English.

Um Ihren aktuellen Standort zu wechseln, wählen Sie einen der aufgeführten Julius Bär Standorte oder klicken Sie auf International.


Bitte auswählen
Weitere E-Services

* Die Identifikation Ihres Standorts erfolgt näherungsweise anhand Ihrer IP-Adresse. Der identifizierte Standort deckt sich nicht zwingend mit Ihrer Staatsbürgerschaft oder Ihrem Domizil.


Für den Insights Newsletter anmelden


Für den Insights Newsletter anmelden

Ransomware is today’s biggest cyber threat

Organisations face a variety of cyber threats, from phishing campaigns to malware to distributed denial of service (DDoS) attacks, brute force attacks and more. But ransomware is a particularly popular type of cyber attack right now.




Rapid improvements in computer processing power since the early 2010s have fuelled the emergence of ransomware attacks. Computers are now so powerful that they can encrypt their own files in just a few hours, meaning criminals are carrying out attacks relatively quickly without getting caught.

All organisations – large and small – are proving vulnerable. That includes businesses, educational institutions, hospitals and healthcare providers, government agencies and non-profits.

Swiss companies, among others, are falling victim to these cyber attacks time and again.

Mischa Kemmer, Information Security - Head Awareness and Consulting, Bank Julius Baer

The most common gateway for successful ransomware attacks is unpatched systems, as well as VPN (virtual private network) and RDP (remote desktop protocol) connections not secured using two-factor authentication (2FA). Warnings from installed anti-virus software are also, unfortunately, repeatedly ignored on critical systems such as Microsoft Windows domain controllers.

Phased attacks
Cyber criminals who carry out successful ransomware attacks do so in several phases. First, an attacker gains access to a network through phishing emails. Next comes analysis of an organisation’s network and assets to determine where the vulnerabilities lie. Then comes the actual attack, when files are infected and encrypted to make them inaccessible. Finally, the attacker demands a ransom – if the organisation does not pay up, it is increasingly common for the attackers to publicly disclose the compromised data.

Despite ongoing efforts by cyber-security experts over many years to sensitise companies to the potential dangers posed by ransomware, they are not taking the recommended measures and “best practices”. So, risk exposure is high: Swiss companies, among others, unfortunately are falling victim to these cyber attacks time and again. It is common for ransoms in the six- or seven-figure range to be paid. This allows cyber criminals to finance the infrastructure necessary for such attacks, pay collaborators such as money launderers, and move on to prepare attacks on other companies.

Four forms of protection
When it comes to guarding against ransomware attacks, there are four broad actions you can take.

  1. Promote user awareness: User education is a key area. Users need to be educated about the threat of ransomware and how it can be spread.
  2. Block dangerous e-mail attachments: E-mail attachments should be blocked on the e-mail gateway, including Microsoft Office documents with macros.
  3. Install software updates (patches): Make sure all of your systems are patched and updated.
  4. Conduct offline back-ups: Regular backups of the company’s data should be created.

Key takeaways

  • Cyber attacks are becoming more sophisticated, frequent and aggressive. They can affect any organisation, large or small.
  • Unpatched systems and unsecured VPN and RDP connections for remote access are the most common gateways for successful ransomware attacks.
  • Phishing emails are used to gain access to your network: so avoid handling files or URL links in emails, chats, or shared folders from untrusted sources.
  • We offer our intermediary clients cyber security infrastructure reviews through our partner CyNation, who will analyse your infrastructure, provide you with a report with the observed weaknesses and schedule a 30-minute expert call to discuss the findings. Please contact your JB Relationship Manager or email us to find out more.

Zugehörige Artikel