riskAware risk management

Legal basis

The imple­men­ta­tion of risk man­age­ment for SME com­pa­nies makes a sig­nif­i­cant con­tri­bu­tion to the ful­fil­ment of the legal require­ment pur­suant to Art. 716a of the Swiss Code of Oblig­a­tions, accord­ing to which the Board of Direc­tors, as the company’s top man­age­ment, is oblig­ed to organ­ise the account­ing sys­tem, pre­pare the annu­al report, car­ry out finan­cial con­trols and man­age the company.

Prin­ci­ples of risk assessment

From a prac­ti­cal point of view, it is impor­tant for the Busi­ness Judge­ment Rule* to be invoked that these for­mal­i­ties are prop­er­ly observed, that the inter­ests of the com­pa­ny are tak­en into account in the event of con­flicts of inter­est and that the oppor­tu­ni­ties and risks of a busi­ness deci­sion are doc­u­ment­ed. If all require­ments are met, the Busi­ness Judge­ment Rule can pro­vide a defence against alle­ga­tions of a breach of duty.

Oppor­tu­ni­ties for the broker

Sup­port your customers

The four objec­tives of risk man­age­ment:
- Tak­ing respon­si­bil­i­ty
- Opti­mise adhe­sion
- Pro­tect rep­u­ta­tion
- Max­imise profits

Con­tact

La Bel­la Con­sult­ing AG
Old Win­terthur­erstrasse 14A
8304 Wal­lisellen

www.riskaware.ch

Infor­ma­tion and coun­selling
Mar­co La Bel­la
Man­ag­ing Part­ner, Co-Founder
Phone 076 355 55 13 
marco.labella@labella.ch

Sil­via Klja­jic-Canale
Senior Con­sul­tant
Phone 079 585 14 72 
silvia.kljajic@labella.ch

Online Risk Dashboard

risks can be viewed at any time and
can be any
can be filtered.

How secure is a cloud?

cur­rent:

Hear­ing Sen­ate
France 2025

read now

Many com­pa­nies are think­ing about obtain­ing some of these ser­vices from the cloud in the future. Well-known providers include Ama­zon, Microsoft, Google etc. The advan­tages for the com­pa­ny are

  • Low­er hard­ware costs per location
  • More secu­ri­ty against failures
  • Small­er eco­log­i­cal footprint
  • Eas­i­er step-by-step scal­ing if required

Large play­ers from the USA have dom­i­nat­ed the cloud from the pub­lic sec­tor. Many com­pa­nies appre­ci­ate the abil­i­ty to con­ve­nient­ly obtain cloud ser­vices, regard­less of where the asso­ci­at­ed data cen­tre is locat­ed. How­ev­er, the move to the cloud is not only being dri­ven by the big tech giants. Swiss providers are in an extreme­ly favourable posi­tion to offer their cus­tomers greater secu­ri­ty. Pri­vate cloud providers can dis­pel many cloud con­cerns.

Let’s take data pro­tec­tion. Not all com­pa­nies want their data to be stored on US or Chi­nese servers. Pub­lic cloud cus­tomers have no say in the loca­tion. What if a secret ser­vice asks the provider, for what­ev­er rea­son, to hand over your customer’s data? This is a par­tic­u­lar­ly sen­si­tive issue when it comes to sen­si­tive data. This is pre­cise­ly where Swiss cloud providers stand out from for­eign providers.

Cloud providers that offer their ser­vices from a pri­vate, Swiss cloud infra­struc­ture use the «Swiss­ness fac­tor» to assert them­selves against inter­na­tion­al tech giants. With a Swiss provider, cus­tomers can be sure that their data will remain in Switzer­land. This is a deci­sive fac­tor for many companies.

Bro­ker­Star is also oper­at­ed in a Swiss pri­vate cloud. Most cus­tomers use this ser­vice. The Swiss Host­ing label ensures that the data remains exclu­sive­ly in Switzerland. 

Cloud providers require a data cen­tre from which the ser­vices offered, such as Soft­ware-as-a-Ser­vice, are pro­vid­ed. This requires the fol­low­ing components.

- Vir­tu­alised stor­age
Stor­age capac­i­ty is pooled from sev­er­al phys­i­cal sys­tems and offered to users as indi­vid­ual, cen­tral­ly con­trol­lable stor­age. The phys­i­cal stor­age is copied and made avail­able as a vir­tu­al «Stor­age Attached Net­work» (vSAN) pool. The appli­ca­tions used from this pool run on vir­tu­al machines (VMs).

- Vir­tu­alised serv­er
With serv­er vir­tu­al­i­sa­tion, CPU pow­er is vir­tu­alised instead of mem­o­ry. Phys­i­cal servers are divid­ed into sev­er­al sep­a­rate vir­tu­al serv­er envi­ron­ments using vir­tu­al­i­sa­tion soft­ware. The users work inde­pen­dent­ly on each vir­tu­al server.

- Vir­tu­alised net­work
Net­work vir­tu­al­i­sa­tion ensures that phys­i­cal net­works in sev­er­al vir­tu­al envi­ron­ments are man­aged inde­pen­dent­ly of each oth­er. Routers or switch­es are man­aged centrally.

- ICT secu­ri­ty
And then you need all kinds of secu­ri­ty devices, from fire­walls with DMZs to virus pro­tec­tion, intru­sion detec­tion and oth­er mea­sures to pro­tect devices, soft­ware and data from mali­cious attacks

WMC customer portal

Instruc­tions

Def­i­n­i­tion of
The WMC cus­tomer por­tal offers you as a cus­tomer cen­tralised, secure and per­son­alised access to var­i­ous ser­vices and infor­ma­tion. You can use the por­tal to access your per­son­al data, car­ry out trans­ac­tions, make enquiries and much more. The indi­vid­ual func­tions are also tai­lored to the autho­ri­sa­tions of the respec­tive users. This means that sev­er­al peo­ple per com­pa­ny (cus­tomer) can have the same or dif­fer­ent authorisations.

Ben­e­fit
The WMC cus­tomer por­tal has the Bro­ker­Web as a role mod­el and aims to make cus­tomer inter­ac­tions more effi­cient, cus­tomer-friend­ly and com­pli­ant with data pro­tec­tion reg­u­la­tions. Cus­tomer por­tals are now regard­ed as an impor­tant part of the cus­tomer jour­ney, as they pro­vide con­stant and direct access to com­pa­ny resources.

Func­tions
You can access the WMC cus­tomer por­tal via the WMC web­site with login — pass­word and mul­ti-fac­tor authen­ti­ca­tion. This cre­ates a secure and data pro­tec­tion-com­pli­ant con­nec­tion to WMC, just as you know it from e‑banking. Infor­ma­tion and doc­u­ments are avail­able to you in the por­tal. You can cre­ate access for sev­er­al peo­ple with dif­fer­ent autho­ri­sa­tions. You can find your con­tract doc­u­ments, the cur­rent sub­scrip­tion and all invoic­es. You can also use the por­tal to sub­mit enquiries such as new or chang­ing employ­ees, orders for addi­tion­al mod­ules. The func­tions are still being expand­ed. We are hap­py to receive suggestions.

For error mes­sages and tech­ni­cal enquiries, please use the tick­et sys­tem in BrokerStar.

The reg­is­tra­tion
You will receive an e‑mail with the link to the por­tal reg­is­tra­tion. Please take the fol­low­ing steps, to be able to use the por­tal afterwards.

  1. Down­load an authen­ti­ca­tor on your mobile phone if you have not already done so
    (WMC rec­om­mends the apps from Microsoft or Google)
  2. Use the link «Login» at www.wmc.ch to log in
    Atten­tion: Use only the login name sent to you
  3. Scan the QR code with the Authen­ti­ca­tor app
  4. Change your pass­word for your security

You can now use the por­tal at any time. As soon as new doc­u­ments are added to the por­tal, you will receive a noti­fi­ca­tion e‑mail.

Login to the cus­tomer por­tal:
(click to enlarge)

Authen­ti­ca­tor Down­load at:

Request access to the portal









     

     

    Do you have any ques­tions?
    We are here for you.
    061 716 11 15
    info@wmc.ch

    Do you need fur­ther access?
    Then please use the form on the left.

    Broker Security Forum Handbook

    The Bro­ker Secu­ri­ty Forum on 19 August 2024 with around 50 par­tic­i­pants was the start of a series of secu­ri­ty events in the sec­ond half of 2024.

    Here you will find the links to all pre­sen­ta­tions and fur­ther infor­ma­tion via the pre­sen­ta­tion below.

    All links in the hand­book are safe and may be clicked on.

    Registration Userday 24

    Bro­kerStar User­day ’24
    Thurs­day, 20 June 2024

    Reg­is­tra­tion   Please until Tues­day, 18 June 2024, 17.00 h


    I would like to take part in the event.
    (Please fill in a sep­a­rate reg­is­tra­tion form for each participant)

    Date: Thurs­day, 20 June 2024. 13.30 — 17.00 h
           

    The event will take place as a web­cast with live trans­mis­sion of the pre­sen­ta­tions. You can also join in only for the top­ics you are inter­est­ed in. You will receive the access link once you have registered.

    My con­tact details


      All about the new Bro­ker­Star pre­sent­ed by the WMC team

      inde­pen­dent

       

      dig­i­tal

       

      net­worked

       

      Mod­er­a­tion: Thomas Bürki 

      Doubling of cyber attacks

      The Fed­er­al Office for Cyber­se­cu­ri­ty (BACS) pro­vides up-to-date infor­ma­tion:
      (Source: BACS press release dat­ed 6 May 2024)

      Twice as many cyber inci­dents were report­ed to the Fed­er­al Office for Cyber Secu­ri­ty (FOCS) in the sec­ond half of 2023 than in the same peri­od last year, name­ly over 30,000. The strate­gic direc­tion of the new Fed­er­al Office is based on four pil­lars in order to strength­en cyber secu­ri­ty for the pop­u­la­tion, the econ­o­my and the author­i­ties in the face of increas­ing threats and the emer­gence of AI-dri­ven fraud.

      The BACS looks back on its first few months as the new fed­er­al office. Direc­tor Flo­ri­an Schütz gave an ini­tial assess­ment at an expert dis­cus­sion on 6 May. The trans­fer of the Nation­al Cyber­se­cu­ri­ty Cen­tre (NCSC) to a fed­er­al office on 1 Jan­u­ary 2024 marked an impor­tant mile­stone in strength­en­ing Swiss cyber­se­cu­ri­ty. The pri­ma­ry tasks of the BACS con­tin­ue to be to increase Switzerland’s secu­ri­ty in cyber­space. To this end, it informs and sen­si­tis­es the pub­lic about cyber threats and attacks. In addi­tion, the BACS acts as a con­tact point for report­ing cyber inci­dents and sup­ports oper­a­tors of crit­i­cal infra­struc­tures in par­tic­u­lar in deal­ing with these inci­dents. The BACS also pre­pares tech­ni­cal analy­ses to assess and defend against cyber inci­dents and cyber threats. It iden­ti­fies and reme­dies weak­ness­es in Switzerland’s pro­tec­tion against cyber threats in order to strength­en the country’s resilience.

      The core man­date of the BACS is to strength­en the cyber secu­ri­ty of crit­i­cal infra­struc­tures, the econ­o­my, edu­ca­tion, the pop­u­la­tion and the author­i­ties by coor­di­nat­ing the imple­men­ta­tion of the Nation­al Cyber Strat­e­gy (NCS). The Fed­er­al Office’s strat­e­gy pre­sent­ed today shows how this core man­date is being ful­filled. The aim of the BACS is to improve cyber secu­ri­ty in col­lab­o­ra­tion with all rel­e­vant stake­hold­ers. To this end, it organ­is­es its ser­vices along four strate­gic pil­lars: Mak­ing cyber threats under­stand­able, pro­vid­ing means to pre­vent cyber attacks, reduc­ing dam­age from cyber inci­dents and increas­ing the secu­ri­ty of dig­i­tal prod­ucts and services.

      The num­ber of cyber inci­dents report­ed in the sec­ond half of 2023 almost dou­bled to 30,331 com­pared to 16,951 in the same peri­od of the pre­vi­ous year. This increase is main­ly due to fraud­u­lent job offers and alleged calls from the police. The most fre­quent­ly report­ed inci­dents includ­ed attempt­ed fraud, with the cat­e­gories ’CEO fraud’ and «invoice manip­u­la­tion fraud» being par­tic­u­lar­ly con­spic­u­ous. With 5536 reports, the num­ber of phish­ing reports dou­bled (pre­vi­ous year: 2179). Of par­tic­u­lar note is so-called «chain phish­ing»: phish­ers use hacked e‑mail inbox­es to send e‑mails to all address­es stored in this inbox. As the sender is like­ly to be known to the recip­i­ents, there is a high prob­a­bil­i­ty that they will fall for the phish­ing. The phished e‑mail account is then used to write to all the con­tacts in the account.

      There was also an increase in reports of attempt­ed fraud involv­ing the use of AI. Cyber crim­i­nals use AI-gen­er­at­ed images for sex­tor­tion attempts, pre­tend to be celebri­ties on the phone or car­ry out invest­ment fraud. Although the num­ber of reports in this area is still com­par­a­tive­ly low, the BACS believes that these are the first attempts by cyber crim­i­nals to explore the poten­tial uses of AI for future cyber attacks.

      Bro­ker Secu­ri­ty Forum
      29 August 2024

      For bro­kers and customers

      Every com­pa­ny should pay close atten­tion to its secu­ri­ty — regard­less of whether it is a bro­ker or a pol­i­cy­hold­er. Cer­ti­fied secu­ri­ty providers offer valu­able sup­port here, from secu­ri­ty checks and eth­i­cal hack­ing to 24/7 monitoring.

      Selu­tion AG is one of sev­er­al secu­ri­ty providers. WMC has been work­ing suc­cess­ful­ly with these spe­cial­ists for sev­er­al years.

      Find here some infor­ma­tion about the ser­vices or con­tact roger.burch@selution.ch

      Registration Security Forum 24

      Bro­ker Secu­ri­ty Forum 24
      29 August 2024

      Reg­is­tra­tion    extend­ed until 26 August 2024


      I am hap­py to take part in the event on site.
      (Please fill in a sep­a­rate reg­is­tra­tion form for each participant)

      Date: Thurs­day, 29 August 2024. 11.00–16.30 h
      Venue: Inno­va­tion Hub, by Sel­moni
                     Alio­th­strasse 4, 4142 München­stein BL 

                     (park­ing spaces avail­able and pub­lic transport)

      My con­tact details:

        com­pli­ant

         

        safe

         

        dig­i­tal

        The new BrokerStar

        A new era begins

        Bro­ker­Star, the solu­tion from start-up to enter­prise broker.

        New Bro­ker­Star V‑3

        • New­er, more con­sis­tent design
        • Many new functions
        • Unfilled fields are not displayed
        • high­er inte­gratin from Sobrado
        • More detailed pre­mi­um statement
        • New autho­ri­sa­tion system
        • Improve­ment of com­mis­sion system
        • Fore­cast Tool
        • Per­for­mance improvement
        • ful­ly com­pli­ant with nDSG

         

        High­lights

        • Max­i­mum secu­ri­ty and data protection
        • New cus­tomer portal
        • Secure mail dispatch
        • Mail syn­chro­ni­sa­tion and telephony
        • Inte­gra­tion of Sobrado
        • Mul­ti-client capability
        • Improve­ments in reporting
        • Mem­ber of IG B2B and SIBA
        • Par­tic­i­pa­tion in Eco­Hub AG
         
        Bro­ker­Star light
         
        • The sim­ple basic solution 
        • con­tains all Bro­ker­Star basic functions
        • Cost-effec­tive all-inclu­sive prices
        • Upgrade to stan­dard pos­si­ble at any time
        • Restric­tion: no addi­tion­al options
        • Fixed sup­port model

                  cli­quer pour voir les différences

        Excit­ing modules

        Addi­tion­al mod­ules for BrokerStar

        Secure exchange with Bro­ker­Web

        The Bro­ker­Web cus­tomer por­tal enables the exchange of infor­ma­tion, doc­u­ments and data between bro­ker and cus­tomer in the same way as e‑banking. Trans­mis­sion takes place via a secure con­nec­tion that does not allow exter­nal access.  
        to Bro­ker­Web

        Intel­li­gent analyses

        The term report­ing cov­ers all types of analy­ses, whether as a list or a graph­ic and regard­less of the for­mat, and in the fol­low­ing arti­cle we explain how the report­ing sys­tem in Bro­ker­Star is struc­tured. 
        to Report­ing

        Mak­ing calls with Bro­ker­Star

        Not only does dialling a tele­phone num­ber in the pro­gramme auto­mat­i­cal­ly cre­ate the con­nec­tion. For incom­ing calls, the sys­tem also recog­nis­es a saved num­ber and auto­mat­i­cal­ly opens the cor­re­spond­ing cus­tomer win­dow. The solu­tion cur­rent­ly works exclu­sive­ly with the pop­u­lar 3CX tele­phone sys­tem. The low costs make this use­ful option a high­light. 
        to tele­phone

        Auto­mat­ic invoice dispatch

        Since 2025, only the IG B2B stan­dards 5.2 and 5.4 have been valid. The XML must con­tain the invoice PDF. After check­ing, this can be elec­tron­i­cal­ly stamped and auto­mat­i­cal­ly for­ward­ed. Invoic­es cre­at­ed by the bro­ker are also saved auto­mat­i­cal­ly and sent auto­mat­i­cal­ly by email, via the cus­tomer por­tal or by post.
        to invoice process

        Messages with personal data

        Dis­patch of per­son­al data by e‑mail

        Emails are part of every­day life today. Many con­tain per­son­al data, often par­tic­u­lar­ly sen­si­tive data. As a rule, e‑mails are sent unen­crypt­ed. How­ev­er, send­ing an unen­crypt­ed e‑mail is less secure than send­ing a post­card because:

        • emails can be inter­cept­ed, read or mod­i­fied with lit­tle tech­ni­cal knowledge;
        • emails can be eas­i­ly searched for key terms;
        • Inter­net providers based in Switzer­land are oblig­ed to retain e‑mails for six months and to dis­close them to the author­i­ties if necessary.

        pro­vi­sions of the Data Pro­tec­tion Act (nDSG).

        It is impor­tant to know whether it is “ordi­nary” per­son­al data, par­tic­u­lar­ly sen­si­tive per­son­al data or per­son­al­i­ty pro­files. The sender is respon­si­ble for the data pro­tec­tion-com­pli­ant pro­cess­ing of the per­son­al data and com­pli­ance with the data pro­tec­tion pro­vi­sions and is oblig­ed to pro­vide evi­dence. The sender is oblig­ed to take all mea­sures to pro­tect the data against loss, theft and unau­tho­rised access or pro­cess­ing. When send­ing per­son­al data in sen­si­tive areas such as health­care, the per­son­al data in ques­tion is always par­tic­u­lar­ly wor­thy of pro­tec­tion, as the mere fact that some­one is a client/patient of the organ­i­sa­tion in ques­tion is par­tic­u­lar­ly wor­thy of protection.

        The fol­low­ing prin­ci­ples apply to the use of e‑mail

        • Use as lit­tle per­son­al data as pos­si­ble. (data minimisation).
        • The data proces­sor is respon­si­ble for the law­ful, appro­pri­ate and pro­por­tion­ate han­dling (e.g. access autho­ri­sa­tion, updat­ing or deletion).

        Since mis­di­rect­ed e‑mails pose a con­sid­er­able risk, address­es must be cho­sen care­ful­ly. Automa­tisms or “con­ve­nience func­tions” should be avoid­ed wher­ev­er possible.

        • No par­tic­u­lar­ly sen­si­tive per­son­al data or pro­files should be processed or stored on pri­vate devices.
        • Not every­thing that is tech­ni­cal­ly pos­si­ble is also permitted.
        • E‑mails should not con­tain any infor­ma­tion about pass­words, accounts, cred­it cards or oth­er access data such as user IDs.
        • No large amounts of data should be scattered.
        • Only select and use known distributors.

        Emails from data sub­jects are gen­er­al­ly per­mit­ted. If you receive an email from a per­son, you may reply by email on the basis of their tac­it con­sent. An excep­tion to this is replies that con­tain par­tic­u­lar­ly sen­si­tive per­son­al data. Encryp­tion or sim­i­lar is rec­om­mend­ed here.

        Alter­na­tives to unen­crypt­ed emails

        • Stor­age on data serv­er e.g. Bro­ker­Web or Brief­But­ler (via a link in the message).
        • Encryp­tion at doc­u­ment level
        • Use of an encrypt­ed mail ser­vice e.g. Seppmail

        Please note that the use of social media and instant mes­sag­ing e.g. What­sapp or SMS for the trans­mis­sion of per­son­al data must be avoid­ed. What­sapp or SMS for the trans­mis­sion of per­son­al data must be avoid­ed. The postal ser­vice is par­tic­u­lar­ly rec­om­mend­ed for very sen­si­tive data.

        Secure exchange with BrokerWeb

         

        The Bro­ker­Web cus­tomer por­tal enables the exchange of infor­ma­tion, doc­u­ments and data between bro­ker and cus­tomer in the same way as e‑banking. Trans­mis­sion takes place via a secure con­nec­tion that does not allow exter­nal access.

        Mail syn­chro­ni­sa­tion with BrokerStar

         

        The Mail Sync mod­ule in Bro­ker­Star con­tains two func­tions that work with Out­look and oth­er mail pro­grammes such as GMail.

        The E‑mail sync allows you to send and receive mails from Bro­ker­Star. Mails are then stored in Bro­ker­Star and in the mail pro­gramme The Appoint­ment sync syn­chro­nis­es appoint­ments, tasks and address­es from Bro­ker­Star into the mail program.

        Mail dis­patch with BriefButler 

        Brief­But­ler is a ser­vice soft­ware that deliv­ers doc­u­ments from Bro­ker­Star, Word and oth­er pro­grammes to the recip­i­ent either via a secure por­tal or by let­ter post with­out print­ing. The recip­i­ent does not need any sep­a­rate soft­ware for decryp­tion. Data pro­tec­tion-com­pli­ant and inex­pen­sive per con­sign­ment from CHF 0.41.

        3CX Firstclass telephony at an SME price

        The com­plete tele­pho­ny solu­tion
        Do you need a new tele­phone sys­tem? WMC offers the entire solu­tion from a sin­gle source. In addi­tion to con­ve­nience and great reli­a­bil­i­ty, you ben­e­fit from sig­nif­i­cant­ly reduced tele­phone costs. Coop­er­a­tion with sip­call and WMC have been work­ing togeth­er for around 20 years. As an expe­ri­enced part­ner of 3CX, WMC is the point of con­tact for all top­ics relat­ing to the vir­tu­al tele­phone sys­tem (PBX).

        The three com­po­nents of the solution

        1. voice over IP (VoIP)

        Since 2019, tele­pho­ny in Switzer­land has always run via the inter­net. New meth­ods recog­nise whether calls or data are involved. In most cas­es, all com­mu­ni­ca­tion is trans­mit­ted via the same connection.

        2. com­put­er inte­grat­ed telephony

        Just as com­put­er data can con­tain a link to a web­site or an e‑mail address, direct links to a tele­phone num­ber are also avail­able. Click­ing on them cre­ates a con­nec­tion direct­ly to the VoIP-based tele­phone net­work or via a tele­phone sys­tem. This can be locat­ed any­where on the Internet.

        3. the CTI soft­ware solution 

        WMC pro­grammes such as Bro­ker­Star or iOf­fice have inte­grat­ed tele­pho­ny. The only link required is a com­pat­i­ble tele­phone sys­tem. Con­nec­tion to a 3CX is avail­able as stan­dard. This con­nec­tion option is also rec­om­mend­ed for Teams tele­pho­ny. Inter­faces to oth­er sys­tems can be cre­at­ed if required.

              Ser­vice included.

        • Record­ing the customer’s requirements.
        • Prepa­ra­tion of an over­all proposal
        • Can­cel­la­tion of pre­vi­ous provider
        • Con­clu­sion of sub­scrip­tion provider
        • Port­ing of tele­phone numbers
        • Licens­ing 3CX
        • Set up hosting
        • Deliv­ery of tele­phones and headsets *
        • Changeover on the key date with­out interruption
        • Pro­fes­sion­al tele­phone announcements *
        • Favourable Inter­net con­nec­tion *                   *option­al on request