Nonstop Cyber Attack - Israel Builds Hack-Proof Defense

488x-1.png

Israel is the second most hacked country in the world. Here's what they're doing about it.

In 2013, Israel Electric Corp. registered several hundred potential hacks on its grid each hour. Last year, the figure grew to 20,000.

None succeeded. Israel Electric, which controls more than 80 percent of the country’s power production, has dramatically increased its cyber personnel, developed new defense tools and enhanced employee training, said Yosi Shneck, senior vice president of information and communications. The new protections reflect a nationwide effort to make Israel one of the most hack-proof countries in the world.

While attempted hack attacks on Israel reached 2 million a day during last year’s fighting in Gaza, the country has yet to report destructive events such as the theft of data from about 22 million people at the US Office of Personnel Management.
Hacking Call The threat is growing. Anonymous, a loosely connected global hacker collective, called in April for a hacking onslaught on the country. The Jewish state was the second most hacked country in the world after the US that month, according to monitoring website Hackmageddon.

Two Cables
Only two cables link Israel’s Internet network to the world, giving its companies an advantage on the digital battlefield, said Yaron Blachman, director of cyber and technology consulting at PricewaterhouseCoopers Israel. ‘‘They can just turn to their Internet service provider and disconnect,” he said.
Israel started building up its defenses more than a decade ago. In 2002, the government created the National Information Security Authority to protect critical infrastructure. In 2012 it established the National Cyber Bureau, an agency within the office of Prime Minister Benjamin Netanyahu that coordinates and advises on policy. The authority established this year will be responsible for protecting civilian entities such as banks, said Yitzhak Ben-Israel, who helped found it.

Flame Virus
Iran says Israel tried to sabotage its nuclear program with the Stuxnet virus. It also attributed the Flame virus, which wreaked havoc on Iranian computer systems in the energy sector, to “illegitimate regimes.” Israeli officials have declined to confirm or deny whether the country was involved.
Learning to fend off attacks can be profitable. Israel Electric formed a unit called CyberGym with security consulting firm CyberControl to offer companies around the world a simulated control center to practice protecting their networks.

Bank Protections
Attacks and attackers targeting the Israeli financial sector have increased and become more sophisticated, according to a May report by Cytegic and cyber consulting firm Konfidas. Lenders have largely been unsuccessful in reining them in, it said. The industry targeted most by hack attacks: information technology.

Information Management

 

« UK MPs are No longer Exempt from Surveillance
Darkcode Hacking Forum Forced Offline »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Sponge

Sponge

Cybersecurity Sorted by Sponge is a seriously engaging training game to make your staff the first line of defence against cyber threats.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.