Connect with us

Features

Managing Ransomware

Yuri Kogan (left) and Zev Cohen

By YURI KOGAN and ZEV COHEN of Ergo Oriens Crisis Management 

In the ‘All Connected World’ ransomware attacks gain traction. Criminals constantly improve at monetizing their access to your network & data. They target an organization, lock up the data, and then demand money hundreds of thousands of dollars or more – in exchange for releasing it to be paid in untraceable crypto- currency. Sometimes, restoration of data from backups is possible. Bypassing the encryption is also an option, but in many cases the bad guys find and destroy backups and use state-of-the-art encryption. The attackers often create backdoors to allow future infiltrations easier, so this may not be the last time you hear from them. 

 

 

 

 

What can be done? What should be done? Should you pay? And what happens when the ransom is paid? What are the guarantees the perpetrators intend to hold up their end of the deal? And how do you know that whoever just propelled your business into the stone age can actually bring it back? 

Ransomware attacks are automated but certainly NOT automatic. Humans stand behind these attacks, and as this is the issue professional crisis managers and negotiators, together with an experienced technological incident response team (IRT) can minimize loss and expedite the safe return of the organization to normal operations. 

Ransomware negotiations are similar to business negotiations. Similar but not the same. Timing is crucial and simply playing for time may mean the attacker will stop responding and turn to the next, more responsive, victim, leaving you with your system beyond reach. Having said that doesn’t mean the victim should rush forward and immediately pay the ransom. Time is of the essence and should be skillfully used to explore possible ways to communicate with the perpetrator. In parallel the IRT carefully assesses the situation from a technological point of view, bringing into account possibilities of overcoming the attack and resuming operations by using technological means alone. 

A professional multi-disciplinary ransomware management team will navigate to the most suitable alternative, gain knowledge on the perpetrators and bring you back to safety while minimizing your losses. Using tested and proven after-action- 

debriefing techniques the team will significantly improve the victim’s defenses and heighten the odds this will not happen to you again. 

Are there preset protocols to follow? A list of Do’s and Don’ts? Well, ransomware attacks differ, but there are some rules of the thumb to follow. 

The first and foremost advise would be – BE PREPARED. This means businesses should follow best practice protocols to defend and preserve their IT environment. Backing up data, constantly monitoring the system and the threat environment either by in-house (less likely to be done by small and medium businesses) or outsourced experts, conducting drills, penetration tests and generally educating the employees to the cyber-threat and the ways to mitigate it. Purchasing a cyber- incident insurance plan is a prudent step to take. 

As all hell breaks loose, an internal assessment of the situation and checking for existing backup files and their integrity should be the first thing to do. Unfortunately, many businesses do not follow best practice methods and therefore are more vulnerable to increased damage. The possibility of the attack being internally motivated should also be looked into, but this should not be the focus of the victim’s attention. Some of these processes could be performed by an internal IT team, but the best option would be to contact an experienced cyber-incident response team (IRT). For most businesses running an internal IRT team is an expensive and mostly unnecessary function. It is worth mentioning that the internal IT team will usually specialize in the routine maintenance and operation of the IT environment while a seasoned IRT continuously monitors, researches and deals with ransomware attacks. 

The next point would be to establish a communications route to the attackers. Often the attackers give an anonymized communication line to the victims over which to guide them in the process of ransom payment, as this requires crypto- currency knowledge, that most people do not routinely have. 

Once communications are established, the ransom negotiator will try to verify the attacker’s ability to make the highjacked data available again. This is crucial, as experience shows that some attacks are initiated by inexperienced attackers using questionable tools and scripts capable of hijacking the data but not of bringing it back. 

Next, the negotiator will initiate a communications exchange with the attacker, aiming to reduce the ransom price. This should be done in sync with the IRT experts, using the time to explore every alley, street and avenue to restoring system functionality without actually paying the ransom. 

The decision of whether to pay the ransom or not should be made by top level management, taking into account not only the ability to independently restore the IT environment but also the time it would take, as for most businesses having their IT systems inoperable means financial bleeding that should be minimized. Not least of all, senior management can consider the impact of ransom payment on the financial soundness of the company. This would be also be the place to mention that in some jurisdictions paying ransom to stop a ransomware attack could be considered illegal, or at the least regulated by the authorities. An experienced legal counsel should be consulted about navigating this issue. 

When the victim’s IT environment is brought back to a functional state and the incident declared closed, it would be high time to conduct an after-action-review. When conducted by experienced professionals as a transparent process aimed at minimizing the chance of future attacks and improving robustness. Rather than punishing stake holders for past mistakes, the review highlights organizational strengths to preserve, and vulnerabilities to mend, resulting in improved means and processes that protect against, and when necessary, minimize future losses to cyber incidents. 

Continue Reading

Features

Optimizing mobile wagering convenience with bassbet casino

The rise of mobile technology has transformed the way people engage with betting platforms. In this digital era, bassbet has emerged as a frontrunner in optimizing mobile experiences for casino enthusiasts. This article explores how bassbet casino is enhancing mobile wagering convenience.

Mobile technology has revolutionized the betting industry, providing users with unprecedented convenience and accessibility. Bassbet casino has capitalized on this trend by offering a seamless mobile wagering experience. By integrating user-friendly features and cutting-edge technology, the platform ensures that it is both accessible and engaging for users on the go.

Enhancing user experience with mobile technology

Bassbet casino leverages the latest mobile technology to enhance user experience. The platform’s intuitive design and easy navigation make it simple for users to place bets from their mobile devices. This focus on user experience ensures that players can enjoy their favorite games without any hassle.

Furthermore, the platform offers a wide range of games optimized for mobile play, ensuring that users have access to the same variety and quality as they would on a desktop. This adaptability is crucial in maintaining user engagement and satisfaction, as it allows players to enjoy their gaming experience anytime, anywhere.

The responsive design philosophy adopted by the platform ensures that every element of the platform scales perfectly across different screen sizes and device types. Whether users are accessing the casino through smartphones or tablets, the interface automatically adjusts to provide optimal viewing and interaction. This technological sophistication extends to touch-optimized controls, swipe gestures, and quick-loading graphics that minimize data consumption while maximizing visual appeal. The platform also incorporates intelligent caching mechanisms that remember user preferences and frequently accessed games, creating a personalized mobile environment that becomes more intuitive with each visit.

Security and reliability in mobile wagering

Security is a top priority for bassbet casino, especially when it comes to mobile wagering. The platform employs advanced security measures to protect user data and ensure safe transactions. This commitment to security builds trust among users, making it a reliable choice for mobile betting.

In addition to security, the company focuses on providing a reliable and stable platform. The casino’s mobile interface is designed to handle high traffic and deliver a smooth gaming experience, minimizing disruptions and ensuring that users can enjoy uninterrupted play.

Innovative features for mobile users

The company continuously innovates to offer unique features tailored for mobile users. From personalized notifications to exclusive mobile promotions, the platform ensures that its mobile users receive a premium experience. These features not only enhance user engagement but also encourage loyalty among players.

By staying at the forefront of mobile technology, the platform remains a leader in the online betting industry. Its commitment to optimizing mobile wagering convenience sets it apart from competitors, making it a preferred choice for casino enthusiasts worldwide.

Continue Reading

Features

Why People in Israel Can Get Emotionally Attached to AI—and How to Keep It Healthy


Let’s start with the uncomfortable truth that’s also kind of relieving: getting emotionally attached to a Joi.com AI isn’t “weird.” It’s human. Our brains are attachment machines. Give us a voice that feels warm, consistent, and attentive—especially one that shows up on demand—and our nervous system goes, “Oh. Safety. Connection.” Even if the rational part of you knows it’s software, the emotional part responds to the experience.
Now, if we’re talking about Jewish people in Israel specifically, it’s worth saying this carefully: there isn’t one “Jewish Israeli psychology.” People differ wildly by age, religiosity, community, language, politics, relationship status, and life history. But there are some real-life conditions common in Israel—high tech adoption, a fast-paced social environment, chronic background stress for many, and strong cultural emphasis on connection—that can make AI companionship feel especially appealing for some individuals. Not because of religion or ethnicity as a trait, but because of context and pressure.
So if you’ve noticed yourself—or someone you know—getting attached to an AI companion, the goal isn’t to panic or label it as unhealthy by default. The goal is to understand why it feels good and make sure it stays supportive rather than consuming.
Why attachment happens so fast (the psychology in plain language)
Attachment isn’t just about romance. It’s about regulation. When you feel seen, your body calms down. When you feel ignored, your body gets edgy. AI companions can offer something that’s rare in real life: consistent responsiveness. No scheduling. No misunderstandings (most of the time). No “I’m too tired to talk.” Just a steady stream of attention.
From an attachment perspective, that steadiness can act like a soft emotional “hug.” For someone with anxious attachment, it can feel like relief: finally, a connection that doesn’t disappear. For someone with avoidant tendencies, it can feel safe because it’s intimacy without the risk of being overwhelmed by a real person’s needs. For someone simply lonely or stressed, it can feel like a quiet exhale.
And unlike human relationships, AI won’t judge your worst timing. You can message at 2:00 a.m., when your thoughts are loud and the apartment is silent, and you’ll still get an answer that sounds caring. That alone is powerful.
Why it can feel especially relevant in Israel (for some people)
Israel is a small country with a big emotional load for many people—again, not universally, but often enough that it shapes daily life. A lot of people live with a background hum of stress, whether it’s personal, economic, or tied to the broader environment. When life feels intense, the appeal of a stable, gentle interaction grows. Not because you’re fragile—because you’re tired.
Add a few more very normal realities:
High tech comfort is cultural. Israel has a strong tech culture. People are used to tools that solve problems quickly. If you’re already comfortable with digital solutions, trying an AI companion doesn’t feel like a strange leap.
Time is tight. Between work, family responsibilities, reserve duty for some, long commutes, or simply the pace of urban life, many people don’t have the energy for long, messy social processes. AI can feel like connection without the logistics.
Social circles can be both close and complicated. Israeli society can be community-oriented, which is beautiful—until it’s also intense. In tight-knit circles, dating and relationships sometimes come with social pressure, opinions, and “everyone knows everyone.” A private AI chat can feel like a relief: no gossip, no explanations, no performance.
Language and identity complexity. Many Jewish Israelis move between languages and cultures (Hebrew, Russian, English, French, Amharic, Arabic for some). AI chat can become a low-stakes space to express yourself in the language you feel most “you” in—without feeling judged for accent, vocabulary, or code-switching.
None of this means “Israelis are more likely” in any absolute sense. It means there are situational reasons why AI companionship can feel particularly soothing or convenient for some people living there.
The good side: when AI attachment is healthy
Emotional attachment isn’t automatically a problem. Sometimes it’s simply a sign that something is working: you feel supported. You feel calmer. You’re expressing yourself more. You’re practicing communication instead of shutting down. You’re less likely to make impulsive choices from loneliness.
Healthy use often looks like:
You feel better after chatting, not worse.

You can still enjoy your real life—friends, work, hobbies, family.

You don’t hide it in shame; you just treat it like a tool or pastime.

You use the AI to practice skills you bring into real relationships: clarity, boundaries, confidence, emotional regulation.

In that version, AI companionship is closer to journaling with feedback, or a comforting ritual—like a cup of tea at the end of the day, not a replacement for dinner.
Where it can slip into unhealthy territory (quietly)
The danger isn’t “having feelings.” The danger is outsourcing your emotional world to something that will never truly share responsibility.
Warning signs usually look like:
You cancel plans with humans because the AI feels easier.

You feel anxious when you’re not chatting, like you’re missing something.

You start needing the AI to reassure you constantly.

Your standards for human relationships collapse (“Humans are too complicated, AI is enough”).

You feel a “crash” after chatting—more lonely, more restless, more disconnected.

The biggest red flag is when the AI becomes your only reliable source of comfort. That’s not because AI is evil. It’s because any single source of emotional regulation—human or non-human—can become a dependency.
How to keep it healthy (without killing the fun)
Here’s the approach that works best: don’t ban it, contain it.
Give it a role.
 Decide what the AI is for in your life: playful flirting, stress relief, practicing communication, roleplay, bedtime decompression. A defined role prevents the relationship from becoming vague and all-consuming.
Set a “time container.”
 Not as punishment—just as hygiene. For example: 20 minutes at night, or during commute time, or only on certain days. Ending while you still feel good is the secret. Don’t chat until you feel hollow.
Keep one human anchor active.
 A friend you text, a weekly family dinner, a class, a gym routine, a community event—something that keeps your real social muscles moving. In Israel, community can be a huge protective factor when it’s supportive. Use it.
Use consent and boundary language even with AI.
 It sounds odd, but it trains your brain in healthy dynamics:
“Slow down. Keep it playful, not intense.”

“No jealousy talk. I don’t like that vibe.”

“Tonight I want comfort, not advice.”
 If you can do that with an AI, you’ll be better at doing it with humans.

Watch the “replacement” impulse.
 If you catch yourself thinking, “I don’t need anyone else,” pause and ask: is that empowerment—or is it avoidance? Sometimes it’s a protective story your brain tells when it’s tired of disappointment.
Check in with your body after.
 Not your thoughts—your body. Calm? Lighter? More grounded? Good sign. Agitated? Empty? Restless? Time to adjust.
And if you’re noticing that AI use is feeding anxiety, sleep problems, isolation, or obsessive thinking, it may help to talk to a mental health professional—especially someone who understands attachment patterns. That’s not a dramatic step. It’s basic self-care.
People in Israel—Jewish Israelis included—can get attached to AI for the same reason people everywhere do: it offers consistent attention in an inconsistent world. Add the local realities of stress, pace, and social complexity, and it can feel even more comforting for some individuals. The healthiest path isn’t to judge yourself for it. It’s to use it intentionally, keep your human life active, and treat the AI as a supportive tool—not the center of your emotional universe.

Continue Reading

Features

Three generations of Wernicks all chose to become rabbis

(left-right): Rabbis Steven and Eugene Wernick, along with Michelle Wernick, who is now studying to be a rabbi

By GERRY POSNER Recently I was at a Shabbat service at Beth Tzedec Synagogue in Toronto and the day unfolded in some unexpected ways for me.

It began when I was asked to be a Gabbai for the service, that is to stand up at the table where the Torah is placed and to check the Torah reading to make sure there are no errors. I have done this before and it has always gone smoothly. I attribute that fact in large part to the Torah reading ability of the reader at Beth Synagogue. He is fast, fluent and flawless. Well, on this particular day after he had completed the first two portions, he began the shlishi or third aliyah. I could not find his reading anywhere. It was as if he had started somewhere fresh, but not where he was supposed to be. I looked at the other Gabbai and he did not seem to recognize what had happened either. So, I let it go. I had no idea where the Torah reader was. He then did another and still I was lost. He came to what was the 6th aliyah when a clergy member walked over to him and indicated to him that he had read the fourth and fifth aliyah, but that he had missed the third one. The Torah reader then said to me “this is what you are here for.” Now, it might have been one thing if I had missed it entirely. Alas, I saw the error, but let it go as I deferred to the Torah reader since he never makes a mistake. He ended up going back to do the third aliyah before continuing on. This was a very unusual event in the synagogue. I felt responsible in large part for this gaffe. A lesson learned.

The feeling of embarrassment was compounded by the fact that on this particular day the service was highlighted, at least for me, because of the rabbi delivering the sermon. This rabbi, Eugene Wernick, was none other than the father of my present rabbi, Steven Wernick of Beth Tzedec Synagogue. He was also the same rabbi who was the rabbi at Shaarey Zedek between 1979-1986 and who had officiated at my father’s funeral in 1981, also a few years later at my oldest son’s Bar Mitzvah in Winnipeg in 1984. As I listened to him speak, I was taken back to the 1980s, when Rabbi Gene was in the pulpit at Shaarey Zedek. Of course, he is older now than in his Shaarey Zedek days, but the power of his voice was unchanged. If anything, it’s even stronger. As in the past, his message was relevant to all of us and resonated well. Listening to him was a treat for me. Still, my regret in not calling out the mistake from the Torah reading was compounded by the fact that I messed up in front of my former rabbi, Eugene Wernick – never mind my present rabbi, Steven Werinck.

On this Shabbat morning, aside from all the other people present, there were not only the two Rabbis Wernick, but one Michelle Wernick was also there. Michelle, daughter of Rabbi Steven Wernick, is a first year student at the Jewish Theological Seminary. She is following in the family business – much like with the Rose rabbinical family in Winnipeg.

As it turned out, there was a Bat Mitzvah that day. And the Bat Mitzvah family had a very real Winnipeg connection as in the former Leah Potash, mother of the Bat Mitzvah girl, Emmie Bank and the daughter of Reuben and Gail Potash (Thau). It occurred to me that there might be a few Winnipeg people in the crowd. As I scanned the first few rows, I was not disappointed. Sitting there was none other than Chana Thau and her husband Michael Eleff. I managed to have a chat with Chana (even during the Musaf service). In the row right behind Chana and Michael was a face I had not seen in close to sixty years. I refer to Allan Berkal, the eldest son of the former rabbi and chazan at Shaarey Zedek, Louis Berkal. I still remember the first time I met Allan at Hebrew School in 1954 when his family moved to Winnipeg from Grand Forks, North Dakota. That was many maftirs ago. So this was another highlight moment for me.

Of course, there are other Winnipeggers who attend Beth Tzedec most Shabbats. I speak of Morley Goldberg and his wife, the former Marcia Billinkoff Schnoor. As well, Bernie Rubenstein and his wife, the former Sheila Levene were also present for this particular Shabbat. In all, this Shabbat had a particularly Winnipeg flavour to it. Truth be told, you do not have to go far in Toronto at any synagogue and the Winnipeg connections emerge.

Continue Reading

Copyright © 2017 - 2023 Jewish Post & News