Cyber Division

Israel Police

Phishing
Attacks

Personal
Cyber
Defense

What can we do to protect ourselves?

 

 

 

1. Strengthening passwords

2. Updating software and applications

3. Preventing cyber breaches in real time

The investigation process:

 

 

 

1. Gathering information

 

 

 

2. Coffee break and snacks

 

 

 

 

 

3. Stopping the leaker, a kind word, and snacks

 

 

 

 

 

Yair Fish ENG

By idan liberman

Yair Fish ENG

  • 123