Cyber Division
Israel Police
Phishing Attacks
Personal Cyber Defense
What can we do to protect ourselves?
1. Strengthening passwords
2. Updating software and applications
3. Preventing cyber breaches in real time
The investigation process:
1. Gathering information
2. Coffee break and snacks
3. Stopping the leaker, a kind word, and snacks
By idan liberman