Israel's Cyber-Hotline

Israel has launched a cyber hotline, staffed mostly by veterans of military computing units, to enable businesses and private individuals to report suspected hacking and receive real-time solutions. The 119 call-in number to the Computer Emergency Response Centre (CERT) is being billed by Israel and cyber experts as a world first.

"Our job is to mitigate the damage as quickly as possible, to learn about the threats and to spread the knowledge where relevant," CERT director Lavy Shtokhamer told Reuters at the facility in the southern hi-tech hub city of Beersheba.

"A cyber-attack may not be limited only to property or financial damage. It can also threaten lives."
In some cases, Shtokhamer said, CERT will dispatch teams of experts to affected computer users at a few hours' notice.

At the centre, 20 responder terminals face a bank of huge screens, one of which shows a world map with cyber-attacks rendered as meteor-like strikes on Israel and the country of origin of computer servers used by the hackers. When Reuters viewed the facility, these were in the northeastern United States, western Europe and Indonesia - details Shtokhamer played down given hackers' use of proxy servers to mask their true locations. He declined to elaborate on this. Ahead of Israel's April 9 election, its officials have been reticent about the possibility of online influence campaigns of the kind Russia has been accused of waging in the West, or about Chinese cyber-espionage.

Israeli cyber expertise is also widely believed to have been used in sabotage against Iran's nuclear programme and controversial surveillance software made available to foreign clients.

Since its launch in January, the hotline has received around 100 calls daily, Shtokhamer said. Most complainants, he said, have been victims of cyber-criminals rather than nation-states, and less than one percent were hoax reports. Around 15 per cent of callers have been so-called "white hackers", sleuths who find vulnerabilities in corporate or government systems and want them plugged before they can be hit.

CERT also runs a chat room that links up the technology officers of Israel's major firms for candid but discreet information-sharing about data breaches.

Michael Levi, a Cardiff University criminology professor who has advised EU and UN agencies on cyber-security, described the Israeli hotline as unique and said it could catch on elsewhere.

"The keys are good advice and no leaks, and using patterns to build up good threat assessments and rapid responses," he said. "The earlier you get reports the more you can prevent."

Channel News Asia

You Might Also Read: 

Cybersecurity In Israel:

« Cyber Attribution Could Tear Apart NATO
UK And EU Will Connect With Cybersecurity After Brexit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

DH2i Company

DH2i Company

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

Proton

Proton

Proton provides free encrypted email, calendar, drive, password manager, and VPN services. Building a better Internet.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.