{"id":18391,"date":"2023-03-28T10:00:08","date_gmt":"2023-03-28T07:00:08","guid":{"rendered":"https:\/\/www.genie.co.il\/?p=18391"},"modified":"2023-04-04T10:05:49","modified_gmt":"2023-04-04T07:05:49","slug":"supply-chain-attack","status":"publish","type":"post","link":"https:\/\/www.genie.co.il\/en\/supply-chain-attack\/","title":{"rendered":"Supply chain attack. What is it and how do you defend yourself?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"18391\" class=\"elementor elementor-18391\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22f85d93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"22f85d93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-195b509b\" data-id=\"195b509b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a546dc3 elementor-widget elementor-widget-text-editor\" data-id=\"7a546dc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A supply chain attack is a type of cyber attack that exploits a vulnerability in the service provider (supplier) to penetrate the organization it serves.<\/p><p><strong>There are a variety of ways to reduce the risk, below is a list that will definitely reduce the risk:<\/strong><\/p><ul><li><strong>Risk assessment:<\/strong> It is important to conduct a risk survey of the service provider to ensure that it meets adequate security requirements.<\/li><li><strong>Security controls:<\/strong> The ways of connecting to the computing environment that are made after setting an acceptable standard, such as encryption, two-step verification and security audits, must be verified.<\/li><li><strong>Monitoring and updating systems regularly:<\/strong> It is recommended to implement measures that will allow monitoring of suspicious actions, such as session recording systems.<\/li><\/ul><p>Also, make sure that the systems are continuously updated under an orderly procedure.<\/p><ul><li><strong>Response to the event:<\/strong> It is important to build a response plan that will make it possible to reduce the harm as much as possible in the event of an incident, steps to isolate and contain the attack and who the factors should be reported to.<\/li><li><strong>awareness:<\/strong> It is important to teach the employees about the dangers that exist in the supply chain attack and who they report to in case of suspicion.<\/li><li><strong>limited access:<\/strong> It is important to make sure that the access given to that provider is given according to its specific needs.<\/li><li><strong>Encryption and secure protocols:<\/strong> It is important to ensure that all data transmissions are encrypted and use secure protocols, such as HTTPS or SFTP.<\/li><\/ul><p>The supply chain attack is very common and it is important to consider this issue.<\/p><p><strong>Author: Zabri Idan, VP of expert services and information security at Genie<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4 \u200b\u200b\u05d4\u05d9\u05d0 \u05e1\u05d5\u05d2 \u05e9\u05dc \u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05de\u05e0\u05e6\u05dc\u05ea \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d0\u05e6\u05dc \u05e0\u05d5\u05ea\u05df \u05d4\u05e9\u05d9\u05e8\u05d5\u05ea ( \u05d4\u05e1\u05e4\u05e7) \u05d1\u05db\u05d3\u05d9 \u05dc\u05d7\u05d3\u05d5\u05e8 \u05dc\u05d0\u05e8\u05d2\u05d5\u05df \u05e9\u05d0\u05d5\u05ea\u05d5 \u05d4\u05d5\u05d0 \u05de\u05e9\u05e8\u05ea. \u05d9\u05e9\u05e0\u05dd \u05de\u05d2\u05d5\u05d5\u05df \u05d3\u05e8\u05db\u05d9\u05dd \u05dc\u05e6\u05de\u05e6\u05dd \u05d0\u05ea \u05d4\u05e1\u05d9\u05db\u05d5\u05df, \u05dc\u05d4\u05dc\u05df \u05e8\u05e9\u05d9\u05de\u05d4 \u05e9\u05d1\u05d4\u05d7\u05dc\u05d8 \u05ea\u05e6\u05de\u05e6\u05dd \u05d0\u05ea \u05d4\u05e1\u05d9\u05db\u05d5\u05df: \u05d4\u05e2\u05e8\u05db\u05ea \u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd: \u05d7\u05e9\u05d5\u05d1 \u05dc\u05d1\u05e6\u05e2 \u05e1\u05e7\u05e8 \u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05dc\u05e1\u05e4\u05e7 \u05d4\u05e0\u05d5\u05ea\u05df \u05d4\u05e9\u05d9\u05e8\u05d5\u05ea \u05d1\u05db\u05d3\u05d9 \u05dc\u05d5\u05d5\u05d3\u05d0 \u05db\u05d9 \u05d4\u05d5\u05d0 \u05e2\u05d5\u05de\u05d3 \u05d1\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4 \u05e0\u05d0\u05d5\u05ea\u05d5\u05ea. \u05d1\u05e7\u05e8\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4: \u05d9\u05e9 \u05dc\u05d5\u05d5\u05d3\u05d0 \u05d0\u05ea [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":18392,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[111],"tags":[161,131],"class_list":["post-18391","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-articles","tag-genie","tag-131"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4. \u05de\u05d4 \u05d6\u05d4 \u05d5\u05db\u05d9\u05e6\u05d3 \u05de\u05ea\u05d2\u05d5\u05e0\u05e0\u05d9\u05dd?<\/title>\n<meta name=\"description\" content=\"\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df \u05de\u05e0\u05db&quot;\u05dc genie \u05de\u05d3\u05d1\u05e8 \u05e2\u05dc \u05e1\u05d5\u05d2\u05d9\u05d9\u05ea \u05de\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u05e9\u05d6\u05db\u05ea\u05d4 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05dc\u05d7\u05e9\u05d9\u05e4\u05d4 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9\u05ea \u05e8\u05d1\u05d4\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genie.co.il\/en\/supply-chain-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4. \u05de\u05d4 \u05d6\u05d4 \u05d5\u05db\u05d9\u05e6\u05d3 \u05de\u05ea\u05d2\u05d5\u05e0\u05e0\u05d9\u05dd?\" \/>\n<meta property=\"og:description\" content=\"\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df \u05de\u05e0\u05db&quot;\u05dc genie \u05de\u05d3\u05d1\u05e8 \u05e2\u05dc \u05e1\u05d5\u05d2\u05d9\u05d9\u05ea \u05de\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u05e9\u05d6\u05db\u05ea\u05d4 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05dc\u05d7\u05e9\u05d9\u05e4\u05d4 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9\u05ea \u05e8\u05d1\u05d4\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genie.co.il\/en\/supply-chain-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/genie.support\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-28T07:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-04T07:05:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/cyber-g79ff6ad02_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eyal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:site\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eyal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/\"},\"author\":{\"name\":\"Eyal\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/person\\\/1025ced5f0bbcccec1753c418a98c8be\"},\"headline\":\"\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4. \u05de\u05d4 \u05d6\u05d4 \u05d5\u05db\u05d9\u05e6\u05d3 \u05de\u05ea\u05d2\u05d5\u05e0\u05e0\u05d9\u05dd?\",\"datePublished\":\"2023-03-28T07:00:08+00:00\",\"dateModified\":\"2023-04-04T07:05:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/\"},\"wordCount\":4,\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cyber-g79ff6ad02_1280.jpg\",\"keywords\":[\"genie\",\"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\"],\"articleSection\":[\"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/\",\"name\":\"\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4. \u05de\u05d4 \u05d6\u05d4 \u05d5\u05db\u05d9\u05e6\u05d3 \u05de\u05ea\u05d2\u05d5\u05e0\u05e0\u05d9\u05dd?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cyber-g79ff6ad02_1280.jpg\",\"datePublished\":\"2023-03-28T07:00:08+00:00\",\"dateModified\":\"2023-04-04T07:05:49+00:00\",\"description\":\"\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df \u05de\u05e0\u05db\\\"\u05dc genie \u05de\u05d3\u05d1\u05e8 \u05e2\u05dc \u05e1\u05d5\u05d2\u05d9\u05d9\u05ea \u05de\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u05e9\u05d6\u05db\u05ea\u05d4 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05dc\u05d7\u05e9\u05d9\u05e4\u05d4 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9\u05ea \u05e8\u05d1\u05d4\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cyber-g79ff6ad02_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cyber-g79ff6ad02_1280.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/supply-chain-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/cyber-security-articles\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4. \u05de\u05d4 \u05d6\u05d4 \u05d5\u05db\u05d9\u05e6\u05d3 \u05de\u05ea\u05d2\u05d5\u05e0\u05e0\u05d9\u05dd?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.genie.co.il\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"alternateName\":\"\u05d2'\u05d9\u05e0\u05d9\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"width\":190,\"height\":66,\"caption\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/genie.support\",\"https:\\\/\\\/x.com\\\/geniesupport\",\"https:\\\/\\\/www.instagram.com\\\/genie.computing.services\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/genie\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/computingservices\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/person\\\/1025ced5f0bbcccec1753c418a98c8be\",\"name\":\"Eyal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"caption\":\"Eyal\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply chain attack. What is it and how do you defend yourself?","description":"\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df \u05de\u05e0\u05db\"\u05dc genie \u05de\u05d3\u05d1\u05e8 \u05e2\u05dc \u05e1\u05d5\u05d2\u05d9\u05d9\u05ea \u05de\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u05e9\u05d6\u05db\u05ea\u05d4 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05dc\u05d7\u05e9\u05d9\u05e4\u05d4 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9\u05ea \u05e8\u05d1\u05d4","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genie.co.il\/en\/supply-chain-attack\/","og_locale":"en_US","og_type":"article","og_title":"\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4. \u05de\u05d4 \u05d6\u05d4 \u05d5\u05db\u05d9\u05e6\u05d3 \u05de\u05ea\u05d2\u05d5\u05e0\u05e0\u05d9\u05dd?","og_description":"\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df \u05de\u05e0\u05db\"\u05dc genie \u05de\u05d3\u05d1\u05e8 \u05e2\u05dc \u05e1\u05d5\u05d2\u05d9\u05d9\u05ea \u05de\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u05e9\u05d6\u05db\u05ea\u05d4 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05dc\u05d7\u05e9\u05d9\u05e4\u05d4 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9\u05ea \u05e8\u05d1\u05d4","og_url":"https:\/\/www.genie.co.il\/en\/supply-chain-attack\/","og_site_name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","article_publisher":"https:\/\/www.facebook.com\/genie.support","article_published_time":"2023-03-28T07:00:08+00:00","article_modified_time":"2023-04-04T07:05:49+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/cyber-g79ff6ad02_1280.jpg","type":"image\/jpeg"}],"author":"Eyal","twitter_card":"summary_large_image","twitter_creator":"@geniesupport","twitter_site":"@geniesupport","twitter_misc":{"Written by":"Eyal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/#article","isPartOf":{"@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/"},"author":{"name":"Eyal","@id":"https:\/\/www.genie.co.il\/#\/schema\/person\/1025ced5f0bbcccec1753c418a98c8be"},"headline":"\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4. \u05de\u05d4 \u05d6\u05d4 \u05d5\u05db\u05d9\u05e6\u05d3 \u05de\u05ea\u05d2\u05d5\u05e0\u05e0\u05d9\u05dd?","datePublished":"2023-03-28T07:00:08+00:00","dateModified":"2023-04-04T07:05:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/"},"wordCount":4,"publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"image":{"@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/cyber-g79ff6ad02_1280.jpg","keywords":["genie","\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"],"articleSection":["\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/","url":"https:\/\/www.genie.co.il\/supply-chain-attack\/","name":"Supply chain attack. What is it and how do you defend yourself?","isPartOf":{"@id":"https:\/\/www.genie.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/cyber-g79ff6ad02_1280.jpg","datePublished":"2023-03-28T07:00:08+00:00","dateModified":"2023-04-04T07:05:49+00:00","description":"\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df \u05de\u05e0\u05db\"\u05dc genie \u05de\u05d3\u05d1\u05e8 \u05e2\u05dc \u05e1\u05d5\u05d2\u05d9\u05d9\u05ea \u05de\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u05e9\u05d6\u05db\u05ea\u05d4 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05dc\u05d7\u05e9\u05d9\u05e4\u05d4 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9\u05ea \u05e8\u05d1\u05d4","breadcrumb":{"@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genie.co.il\/supply-chain-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/#primaryimage","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/cyber-g79ff6ad02_1280.jpg","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/cyber-g79ff6ad02_1280.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.genie.co.il\/supply-chain-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","item":"https:\/\/www.genie.co.il\/"},{"@type":"ListItem","position":2,"name":"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/cyber-security-articles\/"},{"@type":"ListItem","position":3,"name":"\u05de\u05ea\u05e7\u05e4\u05ea \u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4. \u05de\u05d4 \u05d6\u05d4 \u05d5\u05db\u05d9\u05e6\u05d3 \u05de\u05ea\u05d2\u05d5\u05e0\u05e0\u05d9\u05dd?"}]},{"@type":"WebSite","@id":"https:\/\/www.genie.co.il\/#website","url":"https:\/\/www.genie.co.il\/","name":"genie computing services for businesses","description":"","publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genie.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.genie.co.il\/#organization","name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","alternateName":"\u05d2'\u05d9\u05e0\u05d9","url":"https:\/\/www.genie.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","width":190,"height":66,"caption":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"},"image":{"@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/genie.support","https:\/\/x.com\/geniesupport","https:\/\/www.instagram.com\/genie.computing.services\/","https:\/\/www.linkedin.com\/company\/genie\/","https:\/\/www.youtube.com\/user\/computingservices"]},{"@type":"Person","@id":"https:\/\/www.genie.co.il\/#\/schema\/person\/1025ced5f0bbcccec1753c418a98c8be","name":"Eyal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","caption":"Eyal"}}]}},"_links":{"self":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts\/18391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/comments?post=18391"}],"version-history":[{"count":0,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts\/18391\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media\/18392"}],"wp:attachment":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media?parent=18391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/categories?post=18391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/tags?post=18391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}