National

Cyber Security

Center

Phishing

Attacks

Personal

Cyber

Defense

What can we do to protect ourselves?

 

1. Strengthening passwords

2. Updating software and applications

3. Preventing cyber breaches in real time

The investigation process:

 

1. Gathering information

 

 

 

2. Coffee breaks and snacks

 

 

 

 

 

3. Stopping the leaker, a good word, snacks again

 

 

 

 

Kirill Laseev Swiss ENG

By idan liberman

Kirill Laseev Swiss ENG

  • 59