Digital resilience during emergencies

⚡ UPDATED: 10 minutes ago

During this period, attempts at influence in the digital space by hostile actors may intensify through the dissemination of false information, fear-mongering messages, impersonations, and false announcements aimed at undermining trust, increasing pressure, and generating confusion. It is important to act responsibly, verify sources, and report any suspicious activity to the relevant authorities. 

  • To report a cyber incident, you can contact the National Cyber Directorate‘s hotline at 119.
  • You can contact the Safe Internet Helpline at safe.org.il or via WhatsApp. 

The main expected distribution methods are text messages, with or without links, calls, and messages impersonating known entities such as news channels and the Home Front Command, as well as distributions in WhatsApp groups, Telegram, and social networks.

the National Bureau for Online Child Protection – 105, and the Security, Information, and Cyber Division in the Ministry of National Security have compiled important information for you to help you maintain information security rules.

Take basic precautions:

  • Do not click on suspicious links: Received a link you are unsure about? Do not enter links to unknown websites or links that came from an unknown source, and do not open attachments that arrived in emails, text messages, WhatsApp, or any other platform if you do not trust their origin.
  • Verify the source: Go to the official website of the entity from which the message was allegedly sent (not through the link), and check if there is a corresponding official message/alert there.
  • Check suspicious text messages using the SCAN MY SMS website: You can copy the content of the message and check if it is a malicious link.
  • Stop before sharing: Verify the source and whether there is confirmation from official sources.
  • Engage critical thinking and cross-reference information: Especially when it comes to content that tries to cause stress, fear, or “rush action.” Sometimes the hostile message will try to “ride” on real events to appear credible.

For more information on phishing