<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>גיא הוכמן - מנכ&quot;ל genie שירותי מחשוב לעסקים</title>
	<atom:link href="https://www.genie.co.il/en/tag/guy-hochman/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.genie.co.il/en/tag/guy-hochman/</link>
	<description></description>
	<lastbuilddate>Tue, 22 Oct 2024 13:38:39 +0000</lastbuilddate>
	<language>en-US</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.genie.co.il/wp-content/uploads/2021/05/fav-200x200.png</url>
	<title>גיא הוכמן - מנכ&quot;ל genie שירותי מחשוב לעסקים</title>
	<link>https://www.genie.co.il/en/tag/guy-hochman/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>חוק הגנת הפרטיות &#8211;  כדאי שתיקחו אותו אישית</title>
		<link>https://www.genie.co.il/en/privacy-protection-law/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 04 Apr 2021 12:47:33 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=14358</guid>

					<description><![CDATA[<p>גיא הוכמן – מנכ&#34;ל Genie  בעיכוב קליל ואופייני שנמשך שנים, אושר בקריאה ראשונה בישראל התיקון לחוק הגנת הפרטיות. החוק מגדיר את נושא הגנת המידע, מבטל תקנות מיושנות ומקנה סמכויות משמעותיות יותר לרגולטור באופן שמתקרב לחוק הפרטיות של האיחוד האירופי (GDPR), אך עדיין לא מעניק לאזרחים שליטה מלאה בשימוש שנעשה במידע שלהם. במאמר זה אעסוק בעקרונות [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/privacy-protection-law/">חוק הגנת הפרטיות &#8211;  כדאי שתיקחו אותו אישית</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>גיא הוכמן – מנכ&quot;ל Genie </strong></p>
<p>בעיכוב קליל ואופייני שנמשך שנים, אושר בקריאה ראשונה בישראל התיקון לחוק הגנת הפרטיות. החוק מגדיר את נושא הגנת המידע, מבטל תקנות מיושנות ומקנה סמכויות משמעותיות יותר לרגולטור באופן שמתקרב לחוק הפרטיות של האיחוד האירופי (GDPR), אך עדיין לא מעניק לאזרחים שליטה מלאה בשימוש שנעשה במידע שלהם.</p>
<p>במאמר זה אעסוק בעקרונות החוק, במטרותיו ובהשפעותיו על הארגונים והעסקים שמשתמשים במאגרי מידע. היערכות נכונה תאפשר לכם לכבד את פרטיות הלקוחות שלכם ולחסוך מעצמכם קנסות כבדים, אישום פלילי ופגיעה במוניטין</p>
<p>Your customers live, buy and hang out online and on social networks and you, as marketers who know how to leverage their consumer behavior, benefit from valuable big data, which allows you to get to know your customers and sell more to them. But all this goodness has a price: the possibility of violating their privacy.</p>
<p><strong>Privacy protection - a law with teeth<br />
</strong>&quot;A person shall not harm the privacy of another, without his consent.&quot; This is the language of the Basic Law on Human Dignity and Freedom from 1981 which states that violation of privacy is a criminal offense and a civil wrong. In 2017, the Knesset approved the privacy protection regulations, which detail the manner in which the information security obligation is applied to any entity that manages or processes a database of personal information.</p>
<p>In fact, the privacy protection regulations are a revolution in information security regulation in Israel. They impose on you, business owners, companies and organizations that hold databases containing personal information, administrative, technological and legal obligations regarding the way you secure the information - and this according to the sensitivity of the information in your possession:</p>
<p>· Security level for the database with a single authority.<br />
· Basic security level for information, such as: full name, phone, address.<br />
· Medium security level - social security number, medical information, financial information, consumption habits, political opinions, beliefs and more.<br />
High level of security - business and public databases that are designed to collect information for the purpose of providing it to others, or that contain sensitive information about 100,000 people or more, or that the number of authorized persons to access this information exceeds 100.</p>
<p>For each level of security, the law defines regulations detailing the manner of application that will ensure the privacy of the record holders:<br />
Writing an information security procedure, performing physical controls to protect the information, such as access control or security cameras, response procedures to information security incidents, mapping the computer systems connected to the databases, how information security is managed, and more.</p>
<p><strong>Do not meet the requirements of the law? You will find that his bite hurts.<br />
</strong>The enforcement of the Privacy Protection Law is already felt on the ground and the members of the Authority for the Protection of Privacy are no slouch... The authority has administrative enforcement capabilities in all sectors of the economy and the authority to investigate criminal investigations, up to the point of filing charges.</p>
<p>Therefore, if you want to avoid heavy fines and a criminal record, get ready today to protect your customers&#039; privacy. Our privacy protection teams at Genie, which include highly experienced information security managers and legal advisors, will accompany you in the planning and implementation of privacy protection solutions, in a structured process that includes 5 steps - until you meet the requirements of the law:</p>
<p><strong>1. Mapping the databases<br />
</strong>Mapping all the computer systems and databases that are in the possession of the organization and contain sensitive information to which the Privacy Protection Law refers: databases of customers, leads, employees, suppliers and more (yes, even an innocent Excel file on the laptop of Tzipi from sales, may complicate you...).</p>
<p><strong>2. Checking the level of information security<br />
</strong>Identifying the level of information security required in the relevant databases.</p>
<p><strong>3. Gap survey<br />
</strong>Finding the gaps between what is present and what is desired in the organization&#039;s information security systems.</p>
<p><strong>4. Application and implementation<br />
</strong>Writing a procedure for the protection of information and implementing information security tools to comply with the requirements of the Privacy Protection Law.</p>
<p><strong>5. Management folder<br />
</strong>Preparation of a management folder to respond to information incidents and to present the information protection system in a surprise audit<br />
of the Authority for the Protection of Privacy.</p>
<p>Successfully!<br />
<strong>Guy Hochman - CEO </strong><strong>Genie</strong><strong> </strong></p><p>The post <a href="https://www.genie.co.il/en/privacy-protection-law/">חוק הגנת הפרטיות &#8211;  כדאי שתיקחו אותו אישית</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</title>
		<link>https://www.genie.co.il/en/data-recovery/</link>
		
		<dc:creator><![CDATA[doron baharav]]></dc:creator>
		<pubdate>Mon, 01 Mar 2021 12:13:09 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=14271</guid>

					<description><![CDATA[<p>Would you agree to store all your capital in the basements of the most secure bank in the world, in the most advanced safe of its kind, knowing that at the moment of truth, when you need money urgently, there is no guarantee that you will have the key? Guy Hochman - CEO of Genie Computing Services As a business owner, you are aware of the importance of backup, which is why you chose one of the backup systems offered on the market. You make sure to back up your business information [...]</p>
<p>The post <a href="https://www.genie.co.il/en/data-recovery/">גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Would you agree to store all your capital in the basements of the most secure bank in the world, in the most advanced safe of its kind, knowing that at the moment of truth, when you need money urgently, there is no guarantee that you will have the key?</p>
<p><strong>Guy Hochman - CEO </strong><strong>Genie Computing Services</strong></p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-14276" src="https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-600x400.jpg" alt="גיא הוכמן" width="889" height="500" srcset="https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-300x169.jpg 300w, https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-1024x576.jpg 1024w, https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-600x338.jpg 600w" sizes="(max-width: 889px) 100vw, 889px" /></p>
<p>As a business owner, you are aware of the importance of backup, which is why you chose one of the backup systems offered on the market. You make sure to back up your business information in the cloud, with tape backups and a local backup to a physical computer, and you even receive a daily report that proves that the information has indeed been backed up. In return, you enjoy the peace of mind that comes from knowing that at the moment of truth, you can &quot;press a button&quot; and return the situation to normal. All of this was true as long as the threats you faced were physical: fire, flood, theft, natural disasters and war damage. Then came the ransomware.</p>
<h3>Reproducibility - the difference between a &quot;slight hit on the wing&quot; and a crash</h3>
<p>As integrators who support companies in all sectors of the economy, we meet quite a few business owners who have experienced a ransomware virus and find out too late that this backup system is important, but without the ability to recover information efficiently and quickly, they are expected to have long and frustrating days of complete shutdown and severe damage to business income and reputation.</p>
<p>Therefore, as business owners, you must change the dialogue with your backup provider and examine not only the backup capabilities it makes available to you, but also the recovery capabilities. why? Because ransomware attacks in business are more common than you imagine, so it is likely that sooner or later, you will need these capabilities very much. That&#039;s how you do it right.</p>
<h3>10 good tips for managing an optimal backup and recovery setup</h3>
<ol>
<li><strong> Check the log regularly<br />
</strong>In many cases some user adds a folder or information in a location that is not configured for regular backup. This information, which is sometimes critical to the functioning of the organization, is not regularly backed up and this is discovered too late. Therefore, regularly check the log that shows the content of the backed up information and pay attention to whether all the relevant information is backed up.</li>
</ol>
<ol start="2">
<li><strong> Perform recovery tests<br />
</strong>Make data recovery tests a regular procedure, because a successful recovery indicates a full and proper backup. Regularly conduct sample tests, mainly for information that is defined as critical to the organization. In each test, different information was recovered and thus, over time, all the information will receive a test confirming that it can be recovered.</li>
</ol>
<ol start="3">
<li><strong> Create a backup log<br />
</strong>Document in the backup log all the sample recovery tests you have performed, so that you do not repeat, again and again, recovery tests for the same data and you do not miss other data.</li>
</ol>
<ol start="4">
<li><strong> Make a local backup<br />
</strong>Back up your information both in an external backup system and in a physical backup system in the business itself. The local backup will enable faster recovery than a cloud backup and will significantly shorten business downtime.</li>
</ol>
<ol start="5">
<li><strong> Disconnect the local backup system from the network<br />
</strong>A backup system that is connected to the network is exposed to ransomware attacks just like the information on the organization&#039;s servers. Such an &quot;infected&quot; backup cannot be used by you to restore the information.</li>
</ol>
<ol start="6">
<li><strong> We viewed the information in the backup<br />
</strong>Ransom attacks focus on the most significant weak point in the corporate network and in many cases it is the backup system. Therefore, make sure that the information in the backup is also compressed and encrypted at the highest level.</li>
</ol>
<ol start="7">
<li><strong> Custom backup and restore<br />
</strong>Every business has different types of information. Each type of information requires different backup and recovery levels, a unique backup policy, a different backup volume and a definition for the tools with which the backup will be performed. Therefore, be sure to customize the backup and recovery setup for your business.</li>
</ol>
<ol start="8">
<li><strong> backup procedure<br />
</strong>Write a mandatory backup procedure that defines the backup days, backup hours, the number of backups required each day, month or year and the recovery test plan. Appoint a person in charge of backups and make sure that the procedure is continued, even in cases where he leaves his position.</li>
</ol>
<ol start="9">
<li><strong> Define a dedicated budget section<br />
</strong>Backup and restore are not a luxury. They may be your only lifeline during a cyber attack on your business. Therefore, remember that for every shekel you try to save in this area, you may pay compound interest, to restore the circles of destruction.</li>
</ol>
<ol start="10">
<li><strong> don&#039;t wait for tomorrow<br />
</strong>Apply the recommendations today and you will be better prepared for the information crisis that, sooner or later, will affect your business as well.</li>
</ol>
<p>Do you want to be better prepared for information events through an optimal backup and recovery setup that is customized for your business? The Genie team and I are here for you. Together we will create a detailed backup plan, characterize the best backup and recovery solution, define backup procedures and accompany you hand in hand, in case of an information incident.</p><p>The post <a href="https://www.genie.co.il/en/data-recovery/">גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>וירוס לזל&#034;י בעסקים קטנים ובינוניים &#8211; סכנה ברורה ומיידית להמשכיות העסקית</title>
		<link>https://www.genie.co.il/en/business-continuity-smb/</link>
		
		<dc:creator><![CDATA[doron baharav]]></dc:creator>
		<pubdate>Wed, 20 Jan 2021 08:36:14 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=13581</guid>

					<description><![CDATA[<p>בעלי עסקים קטנים ובינוניים רבים סובלים מווירוס לזל&#34;י (&#34;לי-זה-לא-יקרה&#34;) שמעמיד בספק את יכולתם לשרוד מתקפת סייבר. האם גם העסק שלכם נגוע בווירוס המסוכן הזה? גיא הוכמן – מנכ&#34;ל Genie שירותי מחשוב מדי יום אני פוגש בעלי עסקים קטנים ובינוניים (SMB) ובאופן טבעי, סוגיית מתקפות הכופר שזכתה לאחרונה לחשיפה תקשורתית רבה, עולה מיד. להפתעתי, רבים מהם [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/business-continuity-smb/">וירוס לזל&quot;י בעסקים קטנים ובינוניים &#8211; סכנה ברורה ומיידית להמשכיות העסקית</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Many small and medium-sized business owners suffer from a virus that puts into doubt</strong><br />
<strong>Your ability to survive a cyber attack. Is your business also infected with this dangerous virus?</strong></p>
<p><strong>Guy Hochman - CEO </strong><strong>Genie Computing Services</strong></p>
<p>Every day I meet small and medium business (SMB) owners and naturally, the issue of ransomware attacks, which has recently received a lot of media exposure, immediately comes up.<br />
To my surprise, many of them tend to think that cyber terrorism is mainly directed at large organizations and corporations that hold sensitive databases and therefore they may be more &quot;blackmailed&quot; for ransom demands. Other business owners are aware of the existence of the danger, but prefer to rely on luck or on basic security software, because &quot;quality information security requires huge budgets&quot;. These worldviews are clear symptoms of the presence of the Lezli virus in the management culture.</p>
<h3>Small and medium-sized businesses are highly sensitive to cyber incidents</h3>
<p>Reality proves that small and medium-sized businesses are as vulnerable to cyber attacks as the large organizations, but the essential difference is that in most cases, a large organization has the resources and capabilities to deal with the threat and recover from the damage<br />
The business, marketing and image skills - capabilities that do not exist in SMB.<br />
The business continuity of a small or medium-sized business affected by a cyber incident is questionable, therefore the meaning of optimal information security in these businesses becomes a matter of being or not. However, all is not bleak. Significant technological developments that have taken place in the world of information security in recent years, allow every business owner to benefit from effective information security solutions that are adapted to small and medium-sized businesses, significantly reduce the level of risk and above all, are available to them at accessible prices.</p>
<h3>A story from life about a good night&#039;s sleep and waking up to a harsh reality</h3>
<p>One of our clients, a CPA firm that employs dozens of employees, commissioned an information security survey and received from us several recommendations for risk management: some critical for immediate implementation and some with a lower urgency, such as protection of endpoints, servers and authorization mapping.<br />
The client gladly accepted the recommendations, understood the advantages inherent in them and discovered that with an annual budget of only about NIS 20,000, he could significantly improve the information protection system in his office.<br />
The client took the time to make the decision and &quot;slept on it&quot; for three months. The awakening was difficult: during this period the firm experienced a ransomware attack that led to the shutdown of operations and direct damages worth millions of shekels: strategic clients left for competing CPA firms, the employees continued to receive their wages and financial reports that were not submitted on time resulted in severe image damage. The Genie team immediately engaged in the task and restored the information system and at the end of the event, the client approved all the recommendations included in the survey.</p>
<h3>Define a budget section for information security issues</h3>
<p>The correct approach to information security in the small and medium-sized business is to define a budget section for the issues of information security and protection<br />
The cyber - as I have seen in similar businesses in Germany and England, where the &quot;we will kidnap and then deal with it&quot; approach is almost non-existent.<br />
Just as you budget for security services, rental expenses, IT services and the purchase of office equipment, so you must budget for the protection of the core of your activity - the business information.<br />
Remember that any amount budgeted for this important purpose is nothing compared to the duplicate amounts you will have to allocate to deal with a cyber attack that will meet you in the future and to restore the circles of destruction it will sow around it: loss of customers and markets, damage to reputation and exposure to lawsuits.</p>
<h3>don&#039;t wait for tomorrow Order a security survey to rank the risks</h3>
<p>Reality proves that the protection of the small and medium-sized business cannot be limited to a sophisticated alarm system and the installation of bars... A security survey that will show you the security weaknesses in your business will allow you to prepare accordingly and protect the valuable business information. Remember that compliance with information security requirements has another significant advantage: it will open doors for you to cooperate with entities that require compliance with an informed information security policy from their suppliers.<br />
We, at Genie, have been dealing with information protection, IT and cyber matters for 20 years and know how to adapt the information security solutions to the budget available to you. The creative technological solutions we will make available to you will improve the resilience of the business against cyber attacks and allow you to sleep better at night.</p><p>The post <a href="https://www.genie.co.il/en/business-continuity-smb/">וירוס לזל&quot;י בעסקים קטנים ובינוניים &#8211; סכנה ברורה ומיידית להמשכיות העסקית</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>מנהלים במציאות משתנה</title>
		<link>https://www.genie.co.il/en/managers-in-a-changing-reality/</link>
		
		<dc:creator><![CDATA[doron baharav]]></dc:creator>
		<pubdate>Tue, 22 Dec 2020 06:32:48 +0000</pubdate>
				<category><![CDATA[כתבות כלליות]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=13573</guid>

					<description><![CDATA[<p>The vaccines are already here, the atmosphere of the end of the course is already felt in the air, but the effects of the corona virus on the business world will not disappear in the foreseeable future. This is how you will prepare for the next day. Guy Hochman - CEO of Genie Computing Services The corona virus took us all by surprise. As business owners and CEOs of Hafchi Haim, we were required to come out of the shock, to abandon most of the conventions we knew about &quot;how our business […]</p>
<p>The post <a href="https://www.genie.co.il/en/managers-in-a-changing-reality/">מנהלים במציאות משתנה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The vaccines are already here, the atmosphere of the end of the course is already felt in the air, but the effects of a virus<br />
The corona on the business world will not disappear in the foreseeable future. This is how you will prepare for the next day.</p>
<p><strong>Guy Hochman - CEO of Genie Computing Services</strong></p>
<p>The corona virus took us all by surprise. As business owners and CEOs of Hafezi Haim, we were required to overcome the shock, abandon most of the conventions we knew about &quot;how our business works&quot; and ensure business continuity - all this in an environment of uncertainty. Within a few days, many businesses went into emergency mode, moved employees to work from home, They established decentralized service and sales centers, discovered or strengthened the e-commerce system and changed the operation and logistics system from end to end. Other businesses, which could not or did not manage to quickly adapt to the required changes and maintain business continuity, suffered a severe blow.</p>
<p><strong>The post-corona era is here</strong><br />
Today, after adapting the organization&#039;s systems to the new situation, CEOs in all sectors of the economy face a new dilemma: whether and how to return from the emergency routine to the comfortable and familiar routine that characterized the business world just before the outbreak of the epidemic, and will the changes forced upon us by the corona crisis remain forever?<br />
The corona virus &quot;moved the cheese&quot; to the business sector and accelerated processes that would have matured slowly in the coming decade. Common managerial conventions such as &quot;working from home hurts the employee&#039;s productivity&quot; or &quot;a long working day in the office indicates the efficiency and dedication of the employee&quot; turned out to be inaccurate, to say the least. The crisis proved that it is possible to manage employees remotely, maintain their productivity and even increase their satisfaction - but, however, not everything is rosy.</p>
<p><strong>Work from home - the chopper that became a challenge</strong><br />
Many companies find it difficult to preserve the corporate culture that characterized them before the crisis. Many managers feel impaired in teamwork, information sharing and the ability to brainstorm remotely. On the other hand, even the employees who &quot;realized the dream&quot; and work from home, feel very well the blurring of the boundaries between the professional and personal space, thirst for interaction with co-workers and the feeling of &quot;togetherness&quot;. Therefore, in the post-Corona era, we are all required to recalculate our course, in three key organizational areas:</p>
<p><strong>■ Cultivating positions of trust</strong><br />
Until the corona broke into our lives, we were very comfortable seeing all our employees report to the office every morning and fulfill their tasks. In the post-corona period, we must develop more positions of trust among employees and instill in them the feeling that we see and appreciate their efforts - even when they are not in the office. Another layer that requires special attention during this period is the recruitment of new employees, while examining the candidates&#039; ability to work independently and remotely.</p>
<p><strong>■ Measurement mechanisms and employee evaluation</strong><br />
Who is more effective? An employee who stays in the office from birth to death, or an employee who is at home, works via Zoom and takes care of his children at the same time? As managers in the post-corona period, we must develop measurement and evaluation mechanisms that will allow us to measure the productivity of employees and evaluate their performance - regardless of their physical location and the number of weekly working hours.</p>
<p><strong>■ Information security</strong><br />
The compulsion to move employees to work from home and remote connection significantly increased the risk of business information leakage from the organization&#039;s computer systems and cyber attacks. Therefore, we must invest more resources than ever in a managed and secure environment that will protect the access points that are outside the corporate security circles and connected to the core systems, without proper monitoring or security.</p>
<p><strong>Moving forward to the 2021 model - flexible work week</strong><br />
As CEO, it is clear to me that the traditional employment model has lost its relevance and that I must adopt a different model that will accompany me and my people in the coming years. In my opinion, the solution lies in moving to a flexible work week, which will contribute to the cooperation between the employees and their productivity, and also provide a response to the emotional difficulties experienced while working alone from home .</p>
<p>This model will allow employees with individual assignments to continue working from home and will create a defined framework, in which teams will meet in the office on regular days for routine work, or to hold brainstorming sessions where personal interaction is essential.<br />
But beyond the existing technical solutions, the year 2021 is expected to challenge every CEO: beyond the management and business development tasks, we will all be required to invest a lot of thought and resources to maintain employee cohesion, to strengthen the sense of team and to foster the common goal. Good luck!</p><p>The post <a href="https://www.genie.co.il/en/managers-in-a-changing-reality/">מנהלים במציאות משתנה</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>עבודה בטוחה ומאובטחת מהבית</title>
		<link>https://www.genie.co.il/en/work-from-home/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Tue, 21 Jul 2020 08:13:33 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=13505</guid>

					<description><![CDATA[<p>בשעת חירום ישראל נמצאת במצב חירום. עובדים רבים נדרשים להישאר בביתם, בקרבת המרחב המוגן ובנוסף, עובדים רבים פונו מביתם לישובים אחרים ולבתי מלון. סיטואציה זו מחייבת את המעסיקים להיערך לתנאים החדשים והמאתגרים ולאפשר עבודה מרחוק באמצעות פתרונות IT מתקדמים ומאובטחים. בעוד שבתקופת הקורונה, מעסיקים רבים (גם אלו שנערכו לתרחישי DR) מצאו את עצמם במשרדים עם [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/work-from-home/">עבודה בטוחה ומאובטחת מהבית</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="13505" class="elementor elementor-13505" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-4c382a4d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="4c382a4d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67f821b7" data-id="67f821b7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3b22c276 elementor-widget elementor-widget-text-editor" data-id="3b22c276" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h2>בשעת חירום</h2><p>ישראל נמצאת במצב חירום. עובדים רבים נדרשים להישאר בביתם, בקרבת המרחב המוגן ובנוסף, עובדים רבים פונו מביתם לישובים אחרים ולבתי מלון. סיטואציה זו מחייבת את המעסיקים להיערך לתנאים החדשים והמאתגרים ולאפשר עבודה מרחוק באמצעות פתרונות IT מתקדמים ומאובטחים.</p><p>בעוד שבתקופת הקורונה, מעסיקים רבים (גם אלו שנערכו לתרחישי DR) מצאו את עצמם במשרדים עם מערכות מחשוב מתקדמות אך ריקים מעובדים, נדרשו לשנות תפיסות מחשבתיות וטכנולוגיות תוך כדי תנועה, הפעם, המשק הישראלי נכנס למצב החירום כשהוא בשל יותר ומוכן יותר לעבודה מרחוק, עם מגוון פתרונות יעילים ומאובטחים לעבודה מהבית.</p><p><img decoding="async" class="size-medium wp-image-10015 aligncenter" src="https://www.genie.co.il/wp-content/uploads/2019/02/GUY-300x300.jpg" alt="" width="200" height="200" srcset="https://www.genie.co.il/wp-content/uploads/2019/02/GUY-300x300.jpg 300w, https://www.genie.co.il/wp-content/uploads/2019/02/GUY-150x150.jpg 150w, https://www.genie.co.il/wp-content/uploads/2019/02/GUY.jpg 350w" sizes="(max-width: 200px) 100vw, 200px" /></p><p style="text-align: center;"><a href="https://www.genie.co.il/en/?s=%D7%92%D7%99%D7%90+%D7%94%D7%95%D7%9B%D7%9E%D7%9F" target="_blank" rel="noopener noreferrer"><strong>Guy Hochman</strong></a></p><h4 style="font-weight: 400;"><span style="color: #ff6600;"><strong>6 פעולות קריטיות שיאפשרו לכם<br />להתאים את הארגון שלכם לעבודה מרחוק</strong></span></h4><p>הכי חשוב שתהיו קשובים למציאות בה כולנו חיים.זיהיתם מצב חירום שעלול למנוע מהעובדים להגיע למשרדי הארגון ולאיים על ההמשכיות העסקית? ודאו שמנהל הרשת שלכם מבצע את הפעולות הבאות באופן מידי:</p><ul><li>התאמת מכשיר הפיירוול למספר המשתמשים המתחברים מרחוק, הן ברמת תכונות המכשיר למספר המשתמשים המתחברים מרחוק בו זמנית והן ברמת הThroughout.</li><li>הרחבת קו האינטרנט לרוחב פס המתאים למספר רב של משתמשים בו-זמנית.</li><li>אספקת מחשב נייד לכל עובד שאין ברשותו מחשב ביתי.</li><li>הקמת מערך שרתי טרמינל לטובת ההתחברות מרחוק</li><li>Implementation of anti-virus on every new computer.</li><li>Connecting all users to the cloud backup system and monitoring the performance of the backups.</li></ul><h3>אל תחכו למצב החירום הבא.<br />היערכו עוד היום עם תשתית להמשכיות עסקית</h3><p>אם הארגון שלכם עדיין לא ערוך באופן מיטבי לעבודה מהבית, נשמח להעמיד לרשותכם את הניסיון העשיר שצברנו ביישום והטמעה של מהלכים מורכבים אלו שבימי שיגרה עשויים להימשך חודשים רבים. היכולות הטכנולוגיות והחשיבה מחוץ לקופסה שאנו מביאים איתנו, יאפשרו לכם להתאים את הארגון שלכם לכל תרחיש, ליצור עבור העובדים שלכם סביבת עבודה ביתית ומאובטחת ומעל הכול, להבטיח המשכיות עסקית.</p><p><strong>למידע נוסף וליישום פתרונות המשכיות עסקית בזמן חירום, <a href="https://www.genie.co.il/en/contact/">You can contact us here</a> </strong></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.genie.co.il/en/work-from-home/">עבודה בטוחה ומאובטחת מהבית</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>אסטרטגיית המשכיות עסקית &#8211;  חיסון יעיל לעסקים מפני השפעות חיצוניות</title>
		<link>https://www.genie.co.il/en/business-continuity-strategy/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Wed, 11 Mar 2020 07:44:08 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=13407</guid>

					<description><![CDATA[<p>The rapid spread of the corona virus has presented us with an unfamiliar scenario, which challenges our ability as company and business owners to preserve our business activities and makes us all start to miss the virtual viruses... this is how you maintain business continuity despite unexpected threats. Business continuity is an issue that worries business owners all over the world, therefore many of them prepare in advance for damage to the information infrastructures and organizational databases [...]</p>
<p>The post <a href="https://www.genie.co.il/en/business-continuity-strategy/">אסטרטגיית המשכיות עסקית &#8211;  חיסון יעיל לעסקים מפני השפעות חיצוניות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><strong>The rapid spread of the corona virus has presented us with an unfamiliar scenario, which challenges our ability as company and business owners to preserve our business activities and makes us all start to miss the virtual viruses... this is how you maintain business continuity despite unexpected threats.</strong></h2>
<p>Business continuity is an issue that worries business owners all over the world, therefore many of them prepare in advance for damage to the information infrastructures and organizational databases as a result of a natural disaster, a technical malfunction or the intrusion of a virtual virus - but life never ceases to surprise. For the first time in the history of the modern world, a live and kicking virus managed to significantly damage global business activity, reduce the production capacity of factories around the world, stop supply lines, disrupt service systems and significantly reduce the demand for products and services.</p>
<h3><span style="color: #ff6600;"><strong>Flashing warning sign</strong></span></h3>
<p>The pests and viruses we deal with every day. The way the corona virus is treated is also reminiscent of the procedures for treating the virtual virus: locating the cause of the infection, disconnecting it from the corporate information system, isolating it and eliminating it.</p>
<p>&quot;This scenario is a warning sign for all business owners,&quot; he says <a href="https://www.genie.co.il/en/tag/guy-hochman/" target="_blank" rel="noopener noreferrer"><strong>Guy Hochman </strong></a>- CEO of Genie Computing Services and explains: &quot;The outbreak that the world is experiencing these days is intended to remind us all that the scenario may repeat itself and pose a tangible threat to the ability of business organizations to survive another epidemic. Therefore, do not rely on the improvisational ability or the creativity of you and your employees. If you are life-saving and want to ensure the survival of your business even in an extreme scenario, start formulating a business continuity strategy today!&quot;</p>
<h3><strong><span style="color: #ff6600;">Business continuity plan - the solution for the next crisis</span></strong></h3>
<p>The goal of a business continuity strategy is to define in advance what are the most essential functions for the continued proper functioning of the organization and its ability to continue providing services and products to its customers.<br />
Prioritize in order of importance and activate them quickly at the moment of truth. As part of formulating the strategy, Genie&#039;s business continuity experts will help you define the following critical issues and provide them with a comprehensive and effective technological solution:</p>
<ul>
<li>What are the most essential assets for the existence of the organization, which may be damaged at the moment of truth?</li>
<li>Which automatic processes that exist in the organization may go wrong and require the definition of alternative processes?</li>
<li>Who are the most essential employees for the organization during the crisis?</li>
<li>Whether to copy the business activity to the employees&#039; homes and/or to alternative sites in their areas <span style="color: #333333;">Not yet imposed<br />
Total shutdown and how to do it?</span></li>
<li>How to allow employees to continue their duties, even in the case of home isolation?</li>
</ul>
<ul>
<li>How to maintain and enforce the strict information security policy used in the organization, even when working remotely?</li>
<li>How to enable secure remote access to essential applications and databases for employees from their home?</li>
<li>Who are the suppliers that our activity depends on and how prepared are they for a scenario of isolation or a general curfew?</li>
<li>How to continue to provide clients with as efficient a service as possible, even when the office is not functioning?</li>
<li>What is the maximum downtime until business continuity is achieved, without irreversible economic or image damage?</li>
</ul>
<p><img decoding="async" class="size-medium wp-image-10015 alignright" src="https://www.genie.co.il/wp-content/uploads/2019/02/GUY-300x300.jpg" alt="" width="200" height="200" srcset="https://www.genie.co.il/wp-content/uploads/2019/02/GUY-300x300.jpg 300w, https://www.genie.co.il/wp-content/uploads/2019/02/GUY-150x150.jpg 150w, https://www.genie.co.il/wp-content/uploads/2019/02/GUY.jpg 350w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>&quot;A full professional answer to these difficult questions&quot; he explains <a href="https://www.genie.co.il/en/tag/guy-hochman/" target="_blank" rel="noopener noreferrer"><strong>Guy Hochman</strong></a>,<br />
&quot;It is the basis for creating a functioning technological and human system that will ensure business continuity.<br />
This is through the creation of secure interfaces that will allow employees to continue their work even from home.<br />
Tools for conference calls, creating emergency communication procedures, operating an information center and telephone support<br />
For the company&#039;s customers to maintain their loyalty even in an emergency and no less important<br />
- Formulating a support plan for employees experiencing stress and mental distress.&quot;</p>
<p style="font-weight: 400;">Apparently, the day will not be far when entire organizations will be forced to work from home<br />
In some organizations, this was already the case, from the beginning of March 2020.</p>
<h4 style="font-weight: 400;"><span style="color: #ff6600;"><strong>Examples of simple actions that the network manager of any organization is responsible for performing, during times of crisis for the purpose of working from home:</strong></span></h4>
<ul>
<li style="font-weight: 400;">Adapting the Firewall device to the number of users connecting remotely, both at the level of the device&#039;s features to the number of users connecting remotely at the same time and at the Throughout level.</li>
<li style="font-weight: 400;">Adjusting the Internet line to a bandwidth suitable for a large user input.</li>
<li>Supplying laptops to those who do not have a computer at home.</li>
<li>Establishing an array of terminal servers for the benefit of remote connection.</li>
<li style="font-weight: 400;">Implementation of anti-virus on every new computer.</li>
<li style="font-weight: 400;">Connecting all users to the cloud backup system and monitoring the performance of the backups.</li>
</ul>
<p style="font-weight: 400;"><strong>For all consultation and help in the organization&#039;s readiness and in finding continuity solutions, <a href="https://www.genie.co.il/en/contact/">You can contact us</a>.</strong></p><p>The post <a href="https://www.genie.co.il/en/business-continuity-strategy/">אסטרטגיית המשכיות עסקית &#8211;  חיסון יעיל לעסקים מפני השפעות חיצוניות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>בחירות מקוונות? אולי כשהפוליטיקאים יפסיקו לפזר הבטחות</title>
		<link>https://www.genie.co.il/en/online-elections/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Tue, 03 Mar 2020 07:36:56 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=13389</guid>

					<description><![CDATA[<p>ישראל 2020 &#8211; Startup nation, מובילה עולמית בתחום הסייבר שפיתחה את כיפת ברזל וכמעט הגיעה לירח,  אבל עדיין עורכת בחירות עם פתקים ארכאיים. מדוע המדינה אינה מתקדמת לבחירות מקוונות? דמיינו עוד יום בחירות. אתם קמים בבוקר, נכנסים לאפליקציית &#34;ישראל בוחרת&#34; באמצעות הטלפון החכם או המחשב, מזדהים באמצעות מספר תעודת הזהות, מקבלים סיסמת אימות במסרון ומקליקים [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/online-elections/">בחירות מקוונות? אולי כשהפוליטיקאים יפסיקו לפזר הבטחות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><strong>Israel 2020 - Startup nation, a world leader in the cyber field that developed the Iron Dome and almost reached the moon, but still conducts elections with archaic ballots. Why is the country not moving forward to online elections?</strong></h3>
<p>Imagine another election day. You get up in the morning, enter the &quot;Israel Votes&quot; application using your smartphone or computer, identify yourself using your ID card number, receive a verification password in a text message and click on the button representing your preferred party. This way, easily and simply, you fulfill your civic duty, from wherever you are - without standing in line at the polls and without fearing the corona virus.</p>
<h4><span style="color: #ff9900;"><strong>Online voting - many advantages, one disadvantage.</strong></span></h4>
<p>Just like in digital banking, the credit market, online shopping or the gov.il available government project that makes government offices accessible to the public via the Internet, professionally conducted online voting has many advantages. Online voting saves the economy an expensive Sabbath day, can prevent forgeries and corruption and offers the electorate an available, easy and convenient interface that may increase voting rates. In addition, online voting provides immediate results and saves paper, human resources and logistics. If so, why is such an advanced, up-to-date and friendly approach not adopted by the State of Israel and other countries in the world?</p>
<p><a href="https://www.genie.co.il/en/?s=%D7%92%D7%99%D7%90+%D7%94%D7%95%D7%9B%D7%9E%D7%9F" target="_blank" rel="noopener noreferrer"><strong>Guy Hochman</strong></a>, the CEO of Genie Computing Services explains: &quot;Online voting has one huge drawback that drops the ground from under the feet of its supporters: the State of Israel, with all the good intentions, is not yet ripe for online elections and seeing, many online projects managed by the state and/or sub-providers On her behalf, they presented magnificent failures in information security.&quot;</p>
<p>Indeed, the country&#039;s short digital history proves this beyond any doubt: as early as 2008, a computer failure occurred in the Labor Party primaries, as a result of which the elections had to be held again, this time by manual voting. Since then we have been exposed to failures in the security of the government biometric database servers and to repeated failures in the presentation of the results of the local elections. Just recently, the country was shocked by the news of a serious security breach in the &quot;Elector&quot; application that exposed the voter register of the State of Israel for all to see.</p>
<h4><span style="color: #ff9900;"><strong>The solution for securing information in elections, as of today: notes and envelopes</strong></span></h4>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-10015 alignleft" style="margin: 10px;" src="https://www.genie.co.il/wp-content/uploads/2019/02/GUY-300x300.jpg" alt="" width="300" height="300" srcset="https://www.genie.co.il/wp-content/uploads/2019/02/GUY-300x300.jpg 300w, https://www.genie.co.il/wp-content/uploads/2019/02/GUY-150x150.jpg 150w, https://www.genie.co.il/wp-content/uploads/2019/02/GUY.jpg 350w" sizes="(max-width: 300px) 100vw, 300px" /><br />
The weak points of the online voting systems begin with physical limitations, such as the inability to detect illegal influence and/or a physical threat on the voter sitting at home and debating which party to vote for and the lack of tools to detect identity theft, where the vote is made by a person who is not the registered voter.</p>
<p>It is true that these weak points can be overcome through an interim solution: voting in a digital ballot box, which incorporates personal identification of the voter by members of the polling committee. However, both online voting and voting in digital ballot boxes constitute a center of attraction for all hostile hackers inside and outside the country, who wish to influence The most dramatic damage potential of the security breaches is the possibility of a quick and immediate loss of public trust in the democratic &quot;system&quot; - and on this issue, there is no compromise.</p>
<h4><span style="color: #ff9900;"><strong>Is it possible to create a hack-resistant online voting system?</strong></span></h4>
<p>Many countries in the world that have considered or experimented with national or municipal online voting, among them Estonia, Canada, Australia, France and Finland, have discovered that the method exposes them to security breaches, server failures, suspicion of the handling of voting data, and the collapse of computer systems.</p>
<p>According to Hochman, there is no doubt that online votes are challenging: &quot;Every day we deal with corporate information security issues for Genie customers, and provide them with a variety of security solutions with the strictest standards, which allow them to protect their valuable corporate information from cyber threats. Even in the global business world, Credit, insurance and leading banks manage billions of digital interactions with their customers every day at the highest level of security, without customers having to go to branches to sign documents or withdraw funds. Therefore, despite all the challenges, professional planning and proper preparation can make an online voting system available to any country reliable and safe to use&quot;</p>
<p>In conclusion, despite the many advantages and all the good intentions, as long as the State of Israel does not treat its information systems with the same degree of seriousness as is practiced in leading business and financial organizations, the online elections will not come to fruition and will not replace the current, cumbersome and outdated election procedure.</p><p>The post <a href="https://www.genie.co.il/en/online-elections/">בחירות מקוונות? אולי כשהפוליטיקאים יפסיקו לפזר הבטחות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>מחשוב ענן: לא הכל. לא בבת אחת / IT NEWS</title>
		<link>https://www.genie.co.il/en/from-media27/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 14 Feb 2019 10:04:22 +0000</pubdate>
				<category><![CDATA[מן התקשורת]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=9727</guid>

					<description><![CDATA[<p>Created on 04.05.15 &quot;There is no doubt that the cloud computing model offers companies and organizations a more attractive alternative than relying on a traditional server center,&quot; says Guy Hochman, CEO of genie. &quot;In two to three years, the cloud will be the central platform for information systems for most businesses in the world and in Israel. But it is impossible to &#039;jump&#039; into this situation overnight, without organization and intermediate stages. As of today, this is a worldview that is [...]</p>
<p>The post <a href="https://www.genie.co.il/en/from-media27/">מחשוב ענן: לא הכל. לא בבת אחת / IT NEWS</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="created"><time datetime="2015-04-05T14:42:16+03:00">Created on 05.4.15</time></div>
<div class="slot product-slot text clearfix">
<p class="clearfix">&quot;There is no doubt that the cloud computing model offers companies and organizations a more attractive alternative than relying on a traditional server center,&quot; says Guy Hochman, CEO of genie. &quot;In two to three years, the cloud will be the central platform for information systems for most businesses in the world and in Israel. But it is impossible to &#039;jump&#039; into this situation overnight, without organization and intermediate stages. As of today, this is a world view that is maturing and crystallizing, not yet a &#039;simple and mature service&#039; as they are trying to sell it.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9728" src="https://www.genie.co.il/wp-content/uploads/2019/02/צילום_מסך_2015.04.05_ב.15.00.19_copy.png" alt="" width="660" height="447" srcset="https://www.genie.co.il/wp-content/uploads/2019/02/צילום_מסך_2015.04.05_ב.15.00.19_copy.png 660w, https://www.genie.co.il/wp-content/uploads/2019/02/צילום_מסך_2015.04.05_ב.15.00.19_copy-300x203.png 300w, https://www.genie.co.il/wp-content/uploads/2019/02/צילום_מסך_2015.04.05_ב.15.00.19_copy-600x406.png 600w" sizes="(max-width: 660px) 100vw, 660px" /></p>
<p><a title="Cloud computing for business" href="http://www.itnews.co.il/gen/?p=2067" target="_blank" rel="nofollow noopener">To read the full article.</a></p>
</div><p>The post <a href="https://www.genie.co.il/en/from-media27/">מחשוב ענן: לא הכל. לא בבת אחת / IT NEWS</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>10 בסולם D.R &#8211; פתרון DR לעסקים</title>
		<link>https://www.genie.co.il/en/earthquake/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 30 Dec 2018 10:51:02 +0000</pubdate>
				<category><![CDATA[כתבות בנושא IT]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[המשכיות עסקית]]></category>
		<category><![CDATA[המשרד הממוחשב]]></category>
		<category><![CDATA[פתרון DR]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8241</guid>

					<description><![CDATA[<p>רעש אדמה חזק הוא לא סיבה לכך שגם עסק יעבור זעזוע ויאבד מידע ארגוני יקר. ארגונים שלא השקיעו בשרידות העסקית לאחר תרחישים דומים – נפגעו בצורה משמעותית. חיזוי הרעידה המדויקת הבאה הוא קצת בעייתי; להתגונן מפניה – הכרחי ולא מסובך.  12 פעמים במשך חמישה ימים &#8211; זהו מאזן הביניים של רעידות האדמה שפקדו את ישראל [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/earthquake/">10 בסולם D.R &#8211; פתרון DR לעסקים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>
<p><strong>A strong earthquake is no reason for a business to go through a shock and lose valuable organizational information. Organizations that did not invest in business survival after similar scenarios - were significantly harmed.</strong></p>
<p><strong>Predicting the exact next quake is a bit problematic; Defending against it is necessary and not complicated. </strong></p>
</div>
<div>12 times over five days - this is the interim balance of the earthquakes that hit Israel in the beginning and middle of July.</div>
<div>The tremors caused considerable economic damage to the economy. The concern of experts openly speaks of the fact that the latest tremors are only a prelude to an even stronger earthquake, one that may cause extensive damage and significant damage to property and even to life. If there&#039;s one thing these tremors have already proven, it&#039;s the fact that it&#039;s best not to run into them when you&#039;re not ready. If this is true of the house<br />
yours, why wouldn&#039;t the same be true for your business?</div>
<div><strong>Background noise?</strong></div>
<div>And indeed, the issue of the earthquakes, which appeared in the main headlines of the news releases, has raised questions in recent days regarding the issue of business information security in both large and small organizations, such as:</div>
<div><strong><br />
Does the DR solution you have chosen for your business include a double power supply enclosure against a strong earthquake?  </strong></div>
<div>Unfortunately, earthquakes cannot be accurately predicted, neither in their time nor in intensity, therefore, in the case of particularly strong earthquakes, a standard backup system may not withstand the load and lose the organizational information. The meaning of this is clear: a real possibility of organizational collapse. This has happened many times in the past, because organizations trusted a solution that is defined as &quot;good&quot;, instead of looking for the &quot;perfect&quot; solution.</div>
<div><strong>To the servers - peace</strong></div>
<div>So how do you really choose between a &quot;good&quot; solution and a &quot;perfect&quot; solution?</div>
<div>
<p>solutions <a href="https://www.genie.co.il/en/business-continuity/">disaster recovery (DR)</a> Using cloud backup provides a wide envelope of protection for corporate information. The problem is that, sometimes, managers define business continuity definitions for an organization, which do not align with particularly severe earthquake damage scenarios. So, in fact, redundancy definitions are defined for the organization at a good level, but not perfect; one that covers a large area, but not total, and one that fails One small one may cause significant damage to its business continuity, as reflected in electricity and fuel outages that disable the regular supply of energy.</p>
<p>&nbsp;</p>
</div>
<div>TIER 4 - the highest level of redundancy available today, guarantees the business the perfect cover against any Richter scale; The security network that provides an underground backup with a double power supply and a secondary backup system, immediate availability of close to 100% through electrical systems, air conditioning and more. It is, then, two independent voltage feeds, generator backup and continued regular voltage supply, even in the event of an extreme earthquake. The real payoff for the DR solutions is the return of the business to business in a short period of time, after the occurrence of an earthquake, when the information is backed up remotely and encrypted in its entirety, without the organization losing even the smallest piece of information.</div>
<div>A TIER 4 organization is guaranteed that when its owner gets a worried phone call in the middle of the night about an earthquake that just happened, it will send everyone back to a restful sleep. This is the guarantee that even a noisy and moving earth can leave behind a quiet business with a return to routine activity, and with servers that won&#039;t feel like they&#039;ve been through an earthquake.</div><p>The post <a href="https://www.genie.co.il/en/earthquake/">10 בסולם D.R &#8211; פתרון DR לעסקים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>משאירים את הסחיטה לפירות</title>
		<link>https://www.genie.co.il/en/the-moroccan-sting/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 27 Dec 2018 10:06:54 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[וירוס כופר]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8195</guid>

					<description><![CDATA[<p>כמו רבים אחרים, גם אני צפיתי השבוע במהדורות החדשות שסיקרה בהרחבה את &#34;העוקץ המרוקני&#34; – כפי שכינתה זאת משטרת ישראל; גל התקפות כופר באינסטגרם, אשר פגע עד כה במספר רב של ישראלים שנפלו קורבן לסחיטה של אלפי שקלים, תחת האיום שסרטונים מיניים בהם השתתפו – יפורסמו במקומות שונים. השיטה פשוטה, אבל עדיין לא נעשה די [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/the-moroccan-sting/">משאירים את הסחיטה לפירות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Like many others, I also watched the news this week that extensively covered the &quot;Moroccan sting&quot; - as the Israeli police called it; The wave of extortion attacks on Instagram, which has so far affected a large number of Israelis who have fallen victim to extortion of thousands of shekels, under the threat that sexual videos in which they participated - will be published in various places.<br />
The method is simple, but still not enough has been done to prevent it in terms of awareness and important precautions that were not taken. The numbers of Israelis who fell into the trap are the proof that the threat is far from internalized: a supposedly young and attractive girl, holds conversations with the victim, acquires his trust after a certain period of time and the conversation turns romantic. From here it&#039;s a short way to an intimate video call during which the &quot;girl&quot; reveals herself to the victim, which gives him the freedom to expose himself to her in an explicit sexual way.</p>
<p style="text-align: justify;">In most cases, in such a situation, an additional video will no longer be necessary; The scam is revealed, followed by the financial demand and the threat to publish the video, if the victim refuses to pay the extortion fee.<br />
Along with the statement that the blackmail method is simple, I must say that it has also been refined and become more &quot;invested&quot;. Until recently, more than half of the ransom calls were quite identical calls, threatening to publish sexual content of the victim, when in some cases, the victim heard intimate general details about him from the attacker, and assumed that one or another video of his past was indeed in the possession of the attacker, but in reality, they did not exist at all Such videos! The attacker&#039;s working assumption was that some of the victims would disregard and reject the threat, while another part would panic, surrender and pay...</p>
<p>The police instructions not to address these messages, encouraged the attackers to switch to threats of sexual content with &quot;meat&quot;, literally. Now the pressure on the victim is great, and hence his tendency to lose his temper and make more mistakes, apart from the series of mistakes he made when he was tempted from the beginning to believe that the attacker is indeed who he claims to be.</p>
<p style="text-align: justify;">What to do? The best solution was not to do it in the first place, not to be tempted, and then no problems would arise either. And the step is taken, and despite the pressure, I say from my experience that still, and in any case, it is not recommended to give in to the extortionists&#039; demands; Not because they are unable to carry out their threat, but for the simple reason that there is no guarantee that they will keep their word and not ask for additional funds. This has happened countless times and will happen again in the future. Attackers know how to detect pressure from a victim and may well take advantage of the situation to their advantage for extortion or more extortions. It is important to contact and complain to the police, report this to the content platforms where the sensitive content was published and ask for it to be removed.</p>
<p>And again, the best solution is prevention and taking precautions. It&#039;s worth remembering: as long as you haven&#039;t met the party with whom you talked, and as long as you don&#039;t have real and certain details and means of identification about him, he is a potential suspect for extorting information from you.<br />
You should be careful now not to pay the price later, literally...</p><p>The post <a href="https://www.genie.co.il/en/the-moroccan-sting/">משאירים את הסחיטה לפירות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>