Cyber Division
Israel Police
Phishing
Attacks
Personal
Cyber
Defense
What can we do to protect ourselves?
1. Strengthening passwords
2. Updating software and applications
3. Preventing cyber breaches in real time
The investigation process:
1. Gathering information
2. Coffee break and snacks
3. Stopping the leaker, a kind word, and snacks