When a Cyber Contract Becomes a Business Headache
Imagine a successful high-tech company in Tel Aviv that suddenly discovers it has been hacked by attackers. Its confidential information is stolen, and customers begin losing trust. Panic ensues, and they decide to hire an offensive cyber expert at a cost of 120,000 shekels a month. Is this a true solution or just a band-aid on a painful wound?
From the moment the expert steps in, he is tasked with identifying vulnerabilities and fixing the situation. However, what the company didn't anticipate is that restoring the situation would require much more than a technical fix — it involves rebuilding customer trust and recreating the company's image.

What Do Courts Really Focus On?
When companies approach courts after a cyber breach, judges focus on whether the company took all reasonable measures to protect its data. This includes securing systems and regularly updating security software. If a company can prove it did everything required, it might avoid severe legal consequences.
For many companies, the need to show they're doing their utmost begins with building their security systems. This involves training employees, creating clear work procedures, and keeping tools updated.
In some cases, companies are required to demonstrate that they also regularly checked their security systems. Courts are not impressed by empty promises; they want to see tangible actions.
When Is This Relevant — A Checklist
- ✓Installing updated security software
- ✓Training employees to recognize threats
- ✓Periodic security system checks
- ✓Risk management and frequent assessments
- ✓Creating clear data protection procedures
- ✓Collaborating with external experts
The Law That Applies
The Privacy Protection Law requires companies to safeguard their clients' personal data. Violating the law may result in hefty fines and damage to the company's reputation. When deciding to hire a cyber expert, companies should ensure they are fulfilling their obligations under this law.

Questions Everyone Asks — But No One Asks the Lawyer
Real Situations — Which Side Are You On?
- ✓An IT manager discovers that systems haven't been updated for months. Verdict: Immediate action required.
- ✓A marketing director holds unencrypted client lists. Verdict: High risk.
- ✓A new employee, untrained, is tasked with handling client data. Verdict: Security failure.
What to Do Right Now
The first step is to review existing security procedures and ensure they meet modern standards. Don't sign expensive contracts without consulting a cyber expert.
If you neglect this issue, you'll find yourself in a situation where not only is your data at risk, but so is your business's ability to survive.
