{"id":6,"date":"2024-02-25T14:54:35","date_gmt":"2024-02-25T14:54:35","guid":{"rendered":"https:\/\/cyberpreventionservices.axa.ch\/?page_id=6"},"modified":"2026-03-19T16:46:07","modified_gmt":"2026-03-19T16:46:07","slug":"vulnerability-scan","status":"publish","type":"page","link":"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/","title":{"rendered":"Vulnerability Scan"},"content":{"rendered":"\n<div class=\"hero-cta-wrapper\"><div class=\"wp-block-silenccio-hero-cta hero-cta\" style=\"background-image:linear-gradient(rgba(0,0,0,0.4), rgba(0,0,0,0.4)), url(\/wp-content\/uploads\/2024\/02\/keyvisual_cyberversicherung_u_frau_brille_computer_web_2880x9601.jpg);background-size:cover;background-position:center\"><h2>24\/7 security for the IT infrastructure of your company<\/h2><h1>Vulnerability scan to protect against cyber attacks<\/h1><div class=\"hero-cta-buttons\">\n<div class=\"wp-block-silenccio-axa-button\"><a class=\"btn btn-accent\" href=\"https:\/\/cyberpreventionservicesapp.axa.ch\/en\/authentication\/service?is_fresh=true&amp;select_scan=true&amp;paid_scanner=true\">Buy now<\/a><\/div>\n\n\n\n<div class=\"wp-block-silenccio-axa-button\"><a class=\"btn btn-outline-white\" href=\"https:\/\/outlook.office.com\/book\/AXA_CH_BKS_EN_CYBERPREVENTIONSERVICES@axa.ch\/s\/3TeXDgFqJUiYSeJmn8fPrg2\">Request Demo<\/a><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\">Cyber attacks occur on a daily basis &#8211; even at smaller companies<\/h4>\n\n\n\n<p class=\"has-text-align-center\">The best way to protect against these attacks is by not making yourself vulnerable in the first place. This is how the vulnerability scan protects you against attacks:<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-d2da212e wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"check-mark-list-wrapper\" style=\"--check-icon-size:2em;--check-icon-valign:0.1em;--check-item-gap:0.5rem;--check-icon-color:currentColor;--check-icon-content:url(&quot;data:image\/svg+xml,%3Csvg%20width%3D%2224%22%20height%3D%2224%22%20viewBox%3D%220%200%2024%2024%22%20fill%3D%22none%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%0A%3Cpath%20fill-rule%3D%22evenodd%22%20clip-rule%3D%22evenodd%22%20d%3D%22M2%2012C2%206.48%206.48%202%2012%202C17.52%202%2022%206.48%2022%2012C22%2017.52%2017.52%2022%2012%2022C6.48%2022%202%2017.52%202%2012ZM10%2014.17L16.59%207.58L18%209L10%2017L6%2013L7.41%2011.59L10%2014.17Z%22%20fill%3D%22%23668980%22%2F%3E%0A%3C%2Fsvg%3E&quot;)\"><ul class=\"wp-block-silenccio-check-mark-list check-mark-list has-medium-font-size\" style=\"font-style:normal;font-weight:600\"><li><strong><strong>Continuous monitoring of your IT infrastructure<\/strong><\/strong><\/li><li><strong>Timely, easily understandable notifications about security risks<br><\/strong><\/li><li><strong><strong>Increasing awareness among your employees using phishing simulations<\/strong><\/strong><\/li><li><strong><strong>Push notifications for actual cyber threats<\/strong><\/strong><\/li><\/ul><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-silenccio-axa-button\"><a class=\"btn btn-primary\" href=\"https:\/\/cyberpreventionservicesapp.axa.ch\/en\/authentication\/service?is_fresh=true&amp;select_scan=true&amp;paid_scanner=true\">BUY now<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\">Monitor your security and close security gaps in a targeted manner \u2013 all with one dashboard<\/h4>\n\n\n\n<div class=\"wp-block-silenccio-scan-result scan-result\"><div class=\"scan-header\"><div class=\"scan-icon-lg\"><svg width=\"90\" height=\"90\" viewBox=\"0 0 143 143\" fill=\"none\" aria-hidden=\"true\"><circle cx=\"71.5\" cy=\"71.5\" r=\"66.77\" fill=\"#C91432\"><\/circle><circle cx=\"71.5\" cy=\"71.5\" r=\"71\" stroke=\"#C91432\"><\/circle><path d=\"M66 38C66 34.134 69.134 31 73 31H74C77.866 31 81 34.134 81 38V82.75C81 86.616 77.866 89.75 74 89.75H73C69.134 89.75 66 86.616 66 82.75V38Z\" fill=\"white\"><\/path><circle cx=\"73.5\" cy=\"103.5\" r=\"7.5\" fill=\"white\"><\/circle><\/svg><\/div><div class=\"scan-header-text\"><h3 class=\"scan-title\">Your IT security is at risk &#8211; We have found significant security gaps.<\/h3><p class=\"scan-meta\">Last Scan: 19.03.2026 17:46<\/p><\/div><\/div><div class=\"cat-grid\"><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#C91432\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#C91432\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.04 16.89C16.56 16.42 17.24 16.12 18 16.12C19.61 16.12 20.92 17.43 20.92 19.04C20.92 20.65 19.61 21.96 18 21.96C16.39 21.96 15.08 20.65 15.08 19.04C15.08 18.82 15.11 18.6 15.16 18.39L8.04 14.23C7.5 14.73 6.79 15.04 6 15.04C4.34 15.04 3 13.7 3 12.04C3 10.38 4.34 9.04004 6 9.04004C6.79 9.04004 7.5 9.35004 8.04 9.85004L15.09 5.74004C15.04 5.51004 15 5.28004 15 5.04004C15 3.38004 16.34 2.04004 18 2.04004C19.66 2.04004 21 3.38004 21 5.04004C21 6.70004 19.66 8.04004 18 8.04004C17.21 8.04004 16.5 7.73004 15.96 7.23004L8.91 11.34C8.96 11.57 9 11.8 9 12.04C9 12.28 8.96 12.51 8.91 12.74L16.04 16.89ZM19 5.04004C19 4.49004 18.55 4.04004 18 4.04004C17.45 4.04004 17 4.49004 17 5.04004C17 5.59004 17.45 6.04004 18 6.04004C18.55 6.04004 19 5.59004 19 5.04004ZM6 13.04C5.45 13.04 5 12.59 5 12.04C5 11.49 5.45 11.04 6 11.04C6.55 11.04 7 11.49 7 12.04C7 12.59 6.55 13.04 6 13.04ZM17 19.06C17 19.61 17.45 20.06 18 20.06C18.55 20.06 19 19.61 19 19.06C19 18.51 18.55 18.06 18 18.06C17.45 18.06 17 18.51 17 19.06Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><\/div><span class=\"cat-label\">Network<\/span><\/div><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#C91432\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#C91432\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><\/div><span class=\"cat-label\">Web presence<\/span><\/div><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#BC9D45\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#BC9D45\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><path d=\"M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z\"><\/path><polyline points=\"22,6 12,13 2,6\"><\/polyline><\/svg><\/span><\/div><\/div><span class=\"cat-label\">E-Mail<\/span><\/div><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#169E3E\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#169E3E\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12 6H20C21.1 6 22 6.9 22 8V18C22 19.1 21.1 20 20 20H4C2.9 20 2 19.1 2 18L2.01 6C2.01 4.9 2.9 4 4 4H10L12 6ZM4 8V18H20V8H4Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><\/div><span class=\"cat-label\">Data leaks<\/span><\/div><div class=\"cat-card\"><div class=\"cat-icon-wrap\"><div style=\"position:relative;display:inline-flex;align-items:center;justify-content:center\"><svg width=\"52\" height=\"52\" viewBox=\"0 0 57 57\" fill=\"none\" aria-hidden=\"true\"><path d=\"M54 28.5C54 42.58 42.58 54 28.5 54S3 42.58 3 28.5 14.42 3 28.5 3 54 14.42 54 28.5Z\" fill=\"#169E3E\"><\/path><circle cx=\"28.5\" cy=\"28.5\" r=\"28\" stroke=\"#169E3E\"><\/circle><\/svg><span style=\"position:absolute;display:inline-flex;width:26px;height:26px\"><svg viewBox=\"0 0 24 24\" fill=\"#fff\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1 21.5L12 2.5L23 21.5H1ZM19.53 19.5L12 6.49L4.47 19.5H19.53ZM11 16.5V18.5H13V16.5H11ZM11 10.5H13V14.5H11V10.5Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><\/div><span class=\"cat-label\">PHISHING-TEST<\/span><\/div><\/div><div class=\"findings\"><div class=\"finding\" data-index=\"0\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.04 16.89C16.56 16.42 17.24 16.12 18 16.12C19.61 16.12 20.92 17.43 20.92 19.04C20.92 20.65 19.61 21.96 18 21.96C16.39 21.96 15.08 20.65 15.08 19.04C15.08 18.82 15.11 18.6 15.16 18.39L8.04 14.23C7.5 14.73 6.79 15.04 6 15.04C4.34 15.04 3 13.7 3 12.04C3 10.38 4.34 9.04004 6 9.04004C6.79 9.04004 7.5 9.35004 8.04 9.85004L15.09 5.74004C15.04 5.51004 15 5.28004 15 5.04004C15 3.38004 16.34 2.04004 18 2.04004C19.66 2.04004 21 3.38004 21 5.04004C21 6.70004 19.66 8.04004 18 8.04004C17.21 8.04004 16.5 7.73004 15.96 7.23004L8.91 11.34C8.96 11.57 9 11.8 9 12.04C9 12.28 8.96 12.51 8.91 12.74L16.04 16.89ZM19 5.04004C19 4.49004 18.55 4.04004 18 4.04004C17.45 4.04004 17 4.49004 17 5.04004C17 5.59004 17.45 6.04004 18 6.04004C18.55 6.04004 19 5.59004 19 5.04004ZM6 13.04C5.45 13.04 5 12.59 5 12.04C5 11.49 5.45 11.04 6 11.04C6.55 11.04 7 11.49 7 12.04C7 12.59 6.55 13.04 6 13.04ZM17 19.06C17 19.61 17.45 20.06 18 20.06C18.55 20.06 19 19.61 19 19.06C19 18.51 18.55 18.06 18 18.06C17.45 18.06 17 18.51 17 19.06Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">http to https redirect<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Meaning<\/strong><\/p><p>Unencrypted HTTP requests are not being redirected to encrypted HTTPS requests. Sensitive data is therefore not protected when being transmitted.<\/p><p><strong>Possible risks<\/strong><\/p><p>Criminals could exploit this vulnerability to intercept data transfers and steal sensitive data or redirect users of your website to other websites. There is also a risk that your website might not open properly in browsers.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expert mode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Meaning<\/strong><\/p><p>Server is not redirecting http request to https.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"1\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.04 16.89C16.56 16.42 17.24 16.12 18 16.12C19.61 16.12 20.92 17.43 20.92 19.04C20.92 20.65 19.61 21.96 18 21.96C16.39 21.96 15.08 20.65 15.08 19.04C15.08 18.82 15.11 18.6 15.16 18.39L8.04 14.23C7.5 14.73 6.79 15.04 6 15.04C4.34 15.04 3 13.7 3 12.04C3 10.38 4.34 9.04004 6 9.04004C6.79 9.04004 7.5 9.35004 8.04 9.85004L15.09 5.74004C15.04 5.51004 15 5.28004 15 5.04004C15 3.38004 16.34 2.04004 18 2.04004C19.66 2.04004 21 3.38004 21 5.04004C21 6.70004 19.66 8.04004 18 8.04004C17.21 8.04004 16.5 7.73004 15.96 7.23004L8.91 11.34C8.96 11.57 9 11.8 9 12.04C9 12.28 8.96 12.51 8.91 12.74L16.04 16.89ZM19 5.04004C19 4.49004 18.55 4.04004 18 4.04004C17.45 4.04004 17 4.49004 17 5.04004C17 5.59004 17.45 6.04004 18 6.04004C18.55 6.04004 19 5.59004 19 5.04004ZM6 13.04C5.45 13.04 5 12.59 5 12.04C5 11.49 5.45 11.04 6 11.04C6.55 11.04 7 11.49 7 12.04C7 12.59 6.55 13.04 6 13.04ZM17 19.06C17 19.61 17.45 20.06 18 20.06C18.55 20.06 19 19.61 19 19.06C19 18.51 18.55 18.06 18 18.06C17.45 18.06 17 18.51 17 19.06Z\" fill=\"white\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Certificate issue<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Meaning<\/strong><\/p><p>Your data is not properly encrypted, which means that the transmission or storage of sensitive information could be vulnerable to unauthorised access.<\/p><p><strong>Possible risks<\/strong><\/p><p>Criminals could exploit this vulnerability to intercept data transfers and steal sensitive data or redirect users of your website to other websites.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expert mode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Meaning<\/strong><\/p><p>Asymmetric encryption algorithm validation failed.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"2\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Unintended publicly accessible directory\/file detected<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Meaning<\/strong><\/p><p>Default folders or files such as configuration files, backups, etc. have been detected.<\/p><p><strong>Possible risks<\/strong><\/p><p>Criminals could use the found folders and files to penetrate deeper into your system, manipulate it or extract confidential information.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expert mode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Meaning<\/strong><\/p><p>Discovered publicly accessible directory\/file on target server which should be inaccessible: \/wp-register.php<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"3\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Content-security-policy (CSP)<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Meaning<\/strong><\/p><p>The Content Security Policy (CSP) isn&#8217;t set up, meaning that the browser isn&#8217;t being given clear instructions on whether or not to load potentially dangerous elements such as scripts, resources or content.<\/p><p><strong>Possible risks<\/strong><\/p><p>Criminals could inject malicious code into your website.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expert mode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Meaning<\/strong><\/p><p>&#8216;content-security-policy&#8217; header is not detected in response headers or response body.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"4\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#C91432\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Cookies not configured correctly<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Meaning<\/strong><\/p><p>The security settings for cookies, which store information such as session keys for logins, are not set restrictively enough; potentially sensitive information may not be adequately protected.<\/p><p><strong>Possible risks<\/strong><\/p><p>Criminals could intercept these cookies, which are not encrypted due to the insufficient setting, and thereby gain access to session data, personal data and authentication information.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expert mode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Meaning<\/strong><\/p><p>&#8216;set-cookie&#8217; header missed required option: &#8216;secure&#8217;.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"5\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#BC9D45\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"><\/circle><line x1=\"2\" y1=\"12\" x2=\"22\" y2=\"12\"><\/line><path d=\"M12 2a15.3 15.3 0 010 20M12 2a15.3 15.3 0 000 20\"><\/path><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">Server allows TRACE method requests<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Meaning<\/strong><\/p><p>HTTP-TRACE is a tool commonly used for website development to identify and fix bugs and shouldn&#8217;t be enabled on live systems as it can potentially expose sensitive information.<\/p><p><strong>Possible risks<\/strong><\/p><p>Criminals could exploit this vulnerability to access confidential data such as login details and other sensitive information, which could then result in security risks.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expert mode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Meaning<\/strong><\/p><p>Server allows TRACE method requests.<\/p><\/div><\/div><\/div><\/div><div class=\"finding\" data-index=\"6\"><div class=\"finding-header\"><div class=\"finding-icon-strip\" style=\"background-color:#BC9D45\"><span style=\"display:inline-flex;width:16px;height:16px\"><svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#fff\" stroke-width=\"2\" aria-hidden=\"true\"><path d=\"M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z\"><\/path><polyline points=\"22,6 12,13 2,6\"><\/polyline><\/svg><\/span><\/div><div class=\"finding-body\"><h4 class=\"finding-title\">DMARC<\/h4><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><\/div><div class=\"finding-detail\"><div class=\"detail-inner\"><p><strong>Meaning<\/strong><\/p><p>Your email domain&#8217;s security mechanisms are not configured or not configured restrictively enough, making it vulnerable to forgery of sender addresses.<\/p><p><strong>Possible risks<\/strong><\/p><p>Criminals could exploit your email domain for social engineering attacks without the receiving mail server being able to check the authenticity of the incoming email.<\/p><\/div><div class=\"expert-section\"><div class=\"expert-header\"><span class=\"expert-title\">Expert mode<\/span><div class=\"chevron\"><svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" aria-hidden=\"true\"><path d=\"M10.59.295L6 4.875 1.41.295 0 1.705l6 6 6-6-1.41-1.41z\" fill=\"#00008F\"><\/path><\/svg><\/div><\/div><div class=\"expert-body\"><p><strong>Meaning<\/strong><\/p><p>No DMARC record found for the domain.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-box-shadow is-layout-grid wp-container-core-group-is-layout-95ea58fd wp-block-group-is-layout-grid\">\n<div class=\"wp-block-group has-white-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-f806ea68 wp-block-group-is-layout-constrained\" style=\"border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-left-radius:8px;border-bottom-right-radius:8px;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-source-sans-pro-font-family has-x-large-font-size\" style=\"line-height:1.3\">Easy to use<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Answer the five simple questions and you\u2019ll get clear results and recommendations for your cyber security. You don\u2019t need any technical knowledge and you don\u2019t have to grapple with complex details.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-white-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-f806ea68 wp-block-group-is-layout-constrained\" style=\"border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-left-radius:8px;border-bottom-right-radius:8px;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-source-sans-pro-font-family has-x-large-font-size\" style=\"line-height:1.3\">24\/7 protection<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">The scan runs in the background and continuously monitors your security so that you can concentrate on your core business. If the scan identifies a vulnerability, you\u2019ll be informed immediately. You\u2019ll also receive push notifications when new security breaches and scams are identified so that you can protect yourself in the best way possible.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-white-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-f806ea68 wp-block-group-is-layout-constrained\" style=\"border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-left-radius:8px;border-bottom-right-radius:8px;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-source-sans-pro-font-family has-x-large-font-size\" style=\"line-height:1.3\">Upgrade to automated, all-round protection<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Do you want to protect your company automatically, around the clock? For just CHF 259, you\u2019ll get easily understandable information about the IT security situation in your company and warning messages as well as clear descriptions of risks posed by security breaches and scams. This will allow you to react quickly and in a targeted manner at all times.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--50);margin-right:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--50);margin-left:var(--wp--preset--spacing--60)\">Vulnerability scan &#8211; an overview<\/h4>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-d93a0af5 wp-block-group-is-layout-constrained\">\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300;line-height:1.8\">Using continuous risk monitoring, our vulnerability scan provides an effective opportunity to protect your company against cyber threats.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\"><strong><strong>Network<\/strong><\/strong><br>The network scan identifies vulnerabilities and configuration errors in your network infrastructure. Hackers can exploit these to gain access to your systems.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\">You receive clear and easily understandable results on the threat situation as well as details about the vulnerabilities identified.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\"><strong><strong>Website and email server<\/strong><\/strong><br>The scan of your website and your email server checks possible points of entry from outside, the security of your technical configuration and the blacklist status of your website. This ensures that your website is protected against attacks and that you don\u2019t lose the trust of your customers.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">You receive clear and easily understandable results on the threat situation so that you can quickly rectify the vulnerabilities that have been identified.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\"><strong><strong>Data theft<\/strong><\/strong><br>Thanks to this monitoring, you are warned immediately if your credit card or telephone numbers are published on the Internet or dark web. The scan also checks whether user accounts associated with a company email address have been hacked. This allows you to take countermeasures quickly to prevent financial losses<\/p>\n\n\n\n<p class=\"has-medium-font-size\">You receive clear and easily understandable results on the threat situation and tips on how to protect your data.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\"><strong><strong>Phishing prevention<\/strong><\/strong><br>Phishing emails are one of the most common causes of data or financial loss. Phishing simulations help you to test the sensitivity of your employees to phishing attacks and to determine if training is needed.<\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);line-height:1.8\">You receive results to determine if your employees need training.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-silenccio-axa-button\"><a class=\"btn btn-primary\" href=\"https:\/\/cyberpreventionservicesapp.axa.ch\/en\/authentication\/service?is_fresh=true&amp;select_scan=true&amp;paid_scanner=true\">BUY now<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7d2e5d18 wp-block-group-is-layout-constrained\" style=\"margin-bottom:var(--wp--preset--spacing--40)\">\n<h4 class=\"wp-block-heading has-text-align-center\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">FAQ<\/h4>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-6a5b49e42e44db3722830904f51cc4c7 is-layout-flow wp-block-details-is-layout-flow\"><summary>What information do I have to enter before I can launch the scan?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-c1e2982d9785e078a4c2fa444e8a3c68\">To launch the vulnerability scan, you only need to provide the following information<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-125251b0d69a96ada6dd734bb482e10c\">Your domain<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-86b664f1540b8782b76932ffc118f7d6\">Your email address<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-ab2dd7c21900ee63096a2a0f12be4c69\">Login function present<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-505b12f0a2ca4bc002737e74e8cf5994\">Payment function present<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-8c7d90bb11cd0cce9c6dd5c88581bde8\">Contact form present<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-903c400334f1753f478f63c4db9295d0 is-layout-flow wp-block-details-is-layout-flow\"><summary>How does the vulnerability scan actually work?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-9cb809bca879a3582f3da6d1787b3508\">Upon activation, the vulnerability scan runs continuously and<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-7157ecf6bd7d2e76a4d2840f3c170a84\">identifies configuration errors in your network infrastructure<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-1c1cf44039c155c284ff1aa44d90f34d\">checks the security of the technical configurations of your website and email<\/li>\n\n\n\n<li class=\"has-dark-grey-color has-text-color has-link-color wp-elements-f3b1138f0b20bed17d6369a520af1362\">checks whether sensitive data is present on the Darknet.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-8546df35f889a554521f604dfb5aa737 is-layout-flow wp-block-details-is-layout-flow\"><summary>Which data is processed for the vulnerability scan?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-a86005b7f87b7984f5022dd78b65f7b2\">Only data that you make available to us will be used. This includes the domain, email and other information about your website and, if you wish, also your credit card details and telephone number.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-f81a581451d3bb72f38261fd9622bbc6 is-layout-flow wp-block-details-is-layout-flow\"><summary>Do I have to install any software to be able to run the vulnerability scan?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-68a83c709a0edb59ddcbf24a091bac23\">No, you do not need to install any software. The vulnerability scan runs on our online platform.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-b523741822b676b8b7767d3240f30603 is-layout-flow wp-block-details-is-layout-flow\"><summary>Can the vulnerability scan also help if I have an antivirus program installed?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-e89cfee04c50f7d9793795771a787d97\">Antivirus programs check whether malware such as computer viruses, Trojans or similar programs are present on a terminal device (e.g. laptop) and then proceed to block and remove them. Antivirus programs are installed separately on devices. On the other hand, the vulnerability scan checks whether there are security gaps in the IT infrastructure (i.e. outside the individual devices), which could be used as points of entry by criminals.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-9eaffb3eaafc58228bd5d8425dfc070d is-layout-flow wp-block-details-is-layout-flow\"><summary>What difference is there between a vulnerability scan and a firewall?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-cfed9bc49650303fc415eba77e723158\">A firewall is a security system that monitors and filters data traffic between an internal network and external networks, whereas a vulnerability scan is an automated process that identifies potential security gaps that could be exploited by attackers. In contrast to firewalls, which monitor data traffic, the vulnerability scan focuses on identifying potential vulnerabilities within the configuration.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-32ea389d55e5dbb16b60f2c72cfddaf2 is-layout-flow wp-block-details-is-layout-flow\"><summary>How will I be notified if a security breach or data theft is identified?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-a341f3ae4d63f09e283fa057b4c58fc9\">We will send you a notification to the email address you have provided asking you to log in to the platform to view the details. For security reasons, we do not send details of vulnerabilities by email.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-2b8611cac60b58e475d5fa0325a83409 is-layout-flow wp-block-details-is-layout-flow\"><summary>My company only has 3 employees \u2013 can I still benefit from the vulnerability scan?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-119c984c2b6aa2e88b8b7a605d5120e5\">It goes without saying that IT systems are tested regardless of the number of employees.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-b2117129b5115172ef0c510db3457d99 is-layout-flow wp-block-details-is-layout-flow\"><summary>What are the payment options?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-fc845891734519a956004e9a43f9ae38\">You can pay easily and conveniently by credit card, Apple Pay or Twint.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-1ca297dbfe70c653d4117c2f00d66ebd is-layout-flow wp-block-details-is-layout-flow\"><summary>How does phishing training work?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-16f61545f15425532e156d28c2156c11\">Simply choose from a selection of email templates such as \u201cGoogle Login\u201d or \u201cVisa Terms and Conditions Update\u201d, enter up to 30 employee email addresses and click \u201cSend\u201d. You gain insight into the statistics as soon as employees react to the emails by opening them, clicking on them or forwarding sensitive data.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-27dfdda23f3fab54e53a08b444e6d828 is-layout-flow wp-block-details-is-layout-flow\"><summary>What are the advantages of phishing training?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-03739dfd96c20385009b84af7ee6be61\">On the one hand, you raise awareness among your employees of the need to handle (phishing) emails carefully in a protected environment. On the other hand, you gain insight into the behaviour of individual employees and can set up targeted training courses to further instruct employees in dealing with phishing emails. Employees who hand over sensitive data as part of the phishing training are immediately informed of this and given recommendations on how to handle emails safely.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-40d33f45155f790673eec79e473e7a69 is-layout-flow wp-block-details-is-layout-flow\"><summary>How frequently should I run the phishing training?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-d5c18d23183035bbe3316c2812718006\">You can run the phishing training up to once a week on an individual basis. We recommend adjusting how often they are sent so that employees do not find them too predictable.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details faq-entry has-axa-blue-color has-text-color has-link-color has-medium-font-size wp-elements-b17deb812ba7765f91610bf18e3300ea is-layout-flow wp-block-details-is-layout-flow\"><summary>How will my employees receive notification of the phishing training?<\/summary>\n<p class=\"has-dark-grey-color has-text-color has-link-color wp-elements-a721586a53ac5e672c51e9a9ba9284cc\">On our platform, we provide you with a corresponding email template to help you inform employees about phishing and the associated data protection issues.<\/p>\n<\/details>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks occur on a daily basis &#8211; even at smaller companies The best way to protect against these attacks is by not making yourself vulnerable in the first place. This is how the vulnerability scan protects you against attacks: Monitor your security and close security gaps in a targeted manner \u2013 all with one [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1660,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schwachstellen-Scan Cyber-Pr\u00e4ventionsservices<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schwachstellen-Scan Cyber-Pr\u00e4ventionsservices\" \/>\n<meta property=\"og:description\" content=\"Cyber attacks occur on a daily basis &#8211; even at smaller companies The best way to protect against these attacks is by not making yourself vulnerable in the first place. This is how the vulnerability scan protects you against attacks: Monitor your security and close security gaps in a targeted manner \u2013 all with one [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberpr\u00e4vention Services\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T16:46:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/en\\\/kmu\\\/vulnerability-scan\\\/\",\"url\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/en\\\/kmu\\\/vulnerability-scan\\\/\",\"name\":\"Schwachstellen-Scan Cyber-Pr\u00e4ventionsservices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#website\"},\"datePublished\":\"2024-02-25T14:54:35+00:00\",\"dateModified\":\"2026-03-19T16:46:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/en\\\/kmu\\\/vulnerability-scan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/en\\\/kmu\\\/vulnerability-scan\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/en\\\/kmu\\\/vulnerability-scan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBER PREVENTION FOR SMEs\",\"item\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vulnerability Scan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#website\",\"url\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/\",\"name\":\"Cyber-Pr\u00e4ventionsservice\",\"description\":\"Cyber prevention for Swiss SMEs \u2013 discover tailored services to protect your business from cyber threats quickly and easily.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#organization\",\"name\":\"Cyber-Pr\u00e4ventionsservice AXA Schweiz\",\"url\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-img-logo-axa-logo-solid-rgb-copy.png\",\"contentUrl\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-img-logo-axa-logo-solid-rgb-copy.png\",\"width\":512,\"height\":512,\"caption\":\"Cyber-Pr\u00e4ventionsservice AXA Schweiz\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberpreventionservices.axa.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/axacyberalarmschweiz\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Schwachstellen-Scan Cyber-Pr\u00e4ventionsservices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/","og_locale":"en_US","og_type":"article","og_title":"Schwachstellen-Scan Cyber-Pr\u00e4ventionsservices","og_description":"Cyber attacks occur on a daily basis &#8211; even at smaller companies The best way to protect against these attacks is by not making yourself vulnerable in the first place. This is how the vulnerability scan protects you against attacks: Monitor your security and close security gaps in a targeted manner \u2013 all with one [&hellip;]","og_url":"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/","og_site_name":"Cyberpr\u00e4vention Services","article_modified_time":"2026-03-19T16:46:07+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/","url":"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/","name":"Schwachstellen-Scan Cyber-Pr\u00e4ventionsservices","isPartOf":{"@id":"https:\/\/cyberpreventionservices.axa.ch\/#website"},"datePublished":"2024-02-25T14:54:35+00:00","dateModified":"2026-03-19T16:46:07+00:00","breadcrumb":{"@id":"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberpreventionservices.axa.ch\/en\/kmu\/vulnerability-scan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberpreventionservices.axa.ch\/en\/"},{"@type":"ListItem","position":2,"name":"CYBER PREVENTION FOR SMEs","item":"https:\/\/cyberpreventionservices.axa.ch\/en\/"},{"@type":"ListItem","position":3,"name":"Vulnerability Scan"}]},{"@type":"WebSite","@id":"https:\/\/cyberpreventionservices.axa.ch\/#website","url":"https:\/\/cyberpreventionservices.axa.ch\/","name":"Cyber-Pr\u00e4ventionsservice","description":"Cyber prevention for Swiss SMEs \u2013 discover tailored services to protect your business from cyber threats quickly and easily.","publisher":{"@id":"https:\/\/cyberpreventionservices.axa.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberpreventionservices.axa.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberpreventionservices.axa.ch\/#organization","name":"Cyber-Pr\u00e4ventionsservice AXA Schweiz","url":"https:\/\/cyberpreventionservices.axa.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberpreventionservices.axa.ch\/#\/schema\/logo\/image\/","url":"https:\/\/cyberpreventionservices.axa.ch\/wp-content\/uploads\/2026\/02\/cropped-img-logo-axa-logo-solid-rgb-copy.png","contentUrl":"https:\/\/cyberpreventionservices.axa.ch\/wp-content\/uploads\/2026\/02\/cropped-img-logo-axa-logo-solid-rgb-copy.png","width":512,"height":512,"caption":"Cyber-Pr\u00e4ventionsservice AXA Schweiz"},"image":{"@id":"https:\/\/cyberpreventionservices.axa.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/axacyberalarmschweiz\/"]}]}},"_links":{"self":[{"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/pages\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":71,"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":3384,"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/pages\/6\/revisions\/3384"}],"up":[{"embeddable":true,"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/pages\/1660"}],"wp:attachment":[{"href":"https:\/\/cyberpreventionservices.axa.ch\/en\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}