National
Cyber Security
Center
Phishing
Attacks
Personal
Cyber
Defense
What can we do to protect ourselves?
1. Strengthening passwords
2. Updating software and applications
3. Preventing cyber breaches in real time
The investigation process:
1. Gathering information
2. Coffee breaks and snacks
3. Stopping the leaker, a good word, snacks again
By idan liberman