{"id":19410,"date":"2023-06-22T08:19:21","date_gmt":"2023-06-22T05:19:21","guid":{"rendered":"https:\/\/www.genie.co.il\/?post_type=products&#038;p=19410"},"modified":"2024-05-23T19:58:39","modified_gmt":"2024-05-23T16:58:39","slug":"information-security-procedures","status":"publish","type":"products","link":"https:\/\/www.genie.co.il\/en\/products\/information-security-procedures\/","title":{"rendered":"Information security procedures"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"19410\" class=\"elementor elementor-19410\" data-elementor-post-type=\"products\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab8ba7c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab8ba7c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0951d3\" data-id=\"c0951d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-808847b elementor-widget elementor-widget-heading\" data-id=\"808847b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Procedures <span class=\"red\">Cyber Security<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896ec1a elementor-align-center elementor-widget elementor-widget-breadcrumbs\" data-id=\"896ec1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.genie.co.il\/en\/\">computing services<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-de1321b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"de1321b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd8f521\" data-id=\"fd8f521\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-31ef722 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"31ef722\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-db8d762\" data-id=\"db8d762\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd80fca elementor-widget elementor-widget-image\" data-id=\"bd80fca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"656\" src=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2-1024x840.png\" class=\"attachment-large size-large wp-image-19429\" alt=\"\" srcset=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2-1024x840.png 1024w, https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2-300x246.png 300w, https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2-768x630.png 768w, https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2-1536x1260.png 1536w, https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png 1667w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8801b1d\" data-id=\"8801b1d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2562c02 elementor-widget elementor-widget-heading\" data-id=\"2562c02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Be sure you are protected - Genie&#039;s training and control system <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-4df5f1c elementor-widget elementor-widget-text-editor\" data-id=\"4df5f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In order to harness the employees to the task of data protection and to optimize the process of assimilating the procedures, Genie will hold trainings and trainings in your organization that will raise employees&#039; awareness of the importance of information security, will illustrate to them how significant they are in preventing security breaches and cyber attacks and will provide them with tools to deal with an information incident in real time.<br \/>In addition, an information security manager at Genie will perform a monthly control of your organization, to make sure that you meet all the requirements of the security procedures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-306f14b elementor-position-inline-start elementor-widget__width-auto triangle elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"306f14b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-play\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dcc12c triangle-text elementor-widget elementor-widget-text-editor\" data-id=\"1dcc12c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The information security procedures that are also required by virtue of privacy protection regulations and carried out by Genie will engage your employees in the task of protecting your valuable organizational information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d9533a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d9533a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5fea429\" data-id=\"5fea429\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9003292 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9003292\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bba3a8e\" data-id=\"bba3a8e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c72902 elementor-widget elementor-widget-heading\" data-id=\"3c72902\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Genie - the experts in information security procedures  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4d91c19\" data-id=\"4d91c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae58b9b elementor-widget__width-auto elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"ae58b9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The information security procedures, which are also required by virtue of the privacy protection regulations, are a critical tool for the proper functioning of any organization and without them, the information security system is incomplete.<\/p><p>Strict compliance with these procedures will help you prevent disclosure of valuable business information, unauthorized use, change, deletion or leakage of information in good faith or on purpose - actions that may endanger the reputation you have gained, lead to loss of revenue and customers, drag you into legal proceedings and in extreme cases, question business continuity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3f84cdb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"3f84cdb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a64fc86\" data-id=\"a64fc86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-893ac62 elementor-widget elementor-widget-heading\" data-id=\"893ac62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Accurate characterization - the condition for any effective procedure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bf138f2\" data-id=\"bf138f2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-772c348 elementor-widget__width-auto elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"772c348\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To formulate simple and easy-to-understand procedures and rules, Genie&#039;s information security experts will perform an in-depth characterization of the information security needs of each department and unit in the organization. At the end of the characterization, &quot;do and don&#039;t&quot; rules, procedures, guidelines and access permissions will be formulated for you to protect the data and the corporate IT systems against external cyber attacks and information breaches from within the organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0682a4b elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0682a4b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;arrow&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 700 10\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M360 0L350 9.9 340 0 0 0 0 10 700 10 700 0\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-738d772\" data-id=\"738d772\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1752cec elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1752cec\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-d39a756\" data-id=\"d39a756\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae82f0d elementor-widget elementor-widget-heading\" data-id=\"ae82f0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"genie\">What do Genie&#039;s data security procedures focus on?\n <\/span> <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a70bb5b elementor-widget elementor-widget-text-editor\" data-id=\"a70bb5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Access control<br \/><\/strong>Procedures that determine who is authorized to access information and sensitive systems, how access is granted and how it is restricted.<\/p><p><strong>data encryption<br \/><\/strong>Procedures for protecting sensitive data, by converting it into an unreadable code that can only be deciphered by authorized users.<\/p><p><strong>Backup and restore<br \/><\/strong>Procedures for regular backup of data and systems and their recovery in the event of an information disaster, or data loss.<\/p><p><strong>Response to events<br \/><\/strong>Procedures for identifying security incidents such as data breaches, malware or cyber attack and for rapid response.<\/p><p><strong>Risk assessment<br \/><\/strong>Procedures for identifying and evaluating the potential risks to the organization&#039;s information and systems and implementing appropriate controls to reduce these risks.<\/p><p><strong>obedience<br \/><\/strong>Procedures for ensuring that the organization complies with relevant laws and regulations, such as HIPAA, GDPR and SOC2.<\/p><p><strong>Employee training<br \/><\/strong>Procedures for training employees on information security policies, procedures and best practices.<\/p><p><strong>network security<br \/><\/strong>Procedures for protecting the corporate network from unauthorized access, using firewalls, intrusion detection\/prevention systems and VPNs.<\/p><p><strong>Mobile device security<br \/><\/strong>Procedures for protecting mobile devices used to access organization data, using mobile device management software and remote wipe capabilities.<\/p><p><strong>Audit and regular security audit<br \/><\/strong>Procedures for regular testing and auditing of the organization&#039;s security position, to identify weak points and treat them.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-edda33c\" data-id=\"edda33c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-736d527 elementor-widget elementor-widget-image\" data-id=\"736d527\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/elementor\/thumbs\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2-1-q8bnl7m3mucuq7is7asuj4xbb4iuc5qs865cfq81bs.png\" title=\"Information security procedures\" alt=\"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d938f88 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d938f88\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5fd6bfe\" data-id=\"5fd6bfe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbd7c4b elementor-position-inline-start triangle-box elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"dbd7c4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-play\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEngage all users in the organization on the mission of information security with Genie&#039;s information security procedures\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bb61fc elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bb61fc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e902fbb\" data-id=\"e902fbb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b64eaa elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"7b64eaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">For more information and a quote for the characterization and implementation of information security procedures \n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ed4fad elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"7ed4fad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.genie.co.il\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Click here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The information security procedures that are also required by virtue of privacy protection regulations and carried out by Genie will engage your employees in the task of protecting your valuable organizational information.<\/p>","protected":false},"author":5,"featured_media":19429,"parent":0,"template":"elementor_header_footer","class_list":["post-19410","products","type-products","status-publish","has-post-thumbnail","hentry","product_cat-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2<\/title>\n<meta name=\"description\" content=\"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05e0\u05d3\u05e8\u05e9\u05d9\u05dd \u05d2\u05dd \u05de\u05ea\u05d5\u05e7\u05e3 \u05ea\u05e7\u05e0\u05d5\u05ea \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea \u05d5\u05de\u05d1\u05d5\u05e6\u05e2\u05d9\u05dd \u05e2&quot;\u05d9 ,Genie \u05d9\u05e8\u05ea\u05de\u05d5 \u05d0\u05ea \u05d4\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05e9\u05dc\u05db\u05dd \u05dc\u05de\u05e9\u05d9\u05de\u05ea \u05d4\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 \u05d4\u05d9\u05e7\u05e8 \u05e9\u05dc\u05db\u05dd.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genie.co.il\/en\/products\/information-security-procedures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\" \/>\n<meta property=\"og:description\" content=\"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05e0\u05d3\u05e8\u05e9\u05d9\u05dd \u05d2\u05dd \u05de\u05ea\u05d5\u05e7\u05e3 \u05ea\u05e7\u05e0\u05d5\u05ea \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea \u05d5\u05de\u05d1\u05d5\u05e6\u05e2\u05d9\u05dd \u05e2&quot;\u05d9 ,Genie \u05d9\u05e8\u05ea\u05de\u05d5 \u05d0\u05ea \u05d4\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05e9\u05dc\u05db\u05dd \u05dc\u05de\u05e9\u05d9\u05de\u05ea \u05d4\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 \u05d4\u05d9\u05e7\u05e8 \u05e9\u05dc\u05db\u05dd.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genie.co.il\/en\/products\/information-security-procedures\/\" \/>\n<meta property=\"og:site_name\" content=\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/genie.support\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-23T16:58:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1667\" \/>\n\t<meta property=\"og:image:height\" content=\"1368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-procedures\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-procedures\\\/\",\"name\":\"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-procedures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-procedures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"datePublished\":\"2023-06-22T05:19:21+00:00\",\"dateModified\":\"2024-05-23T16:58:39+00:00\",\"description\":\"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05e0\u05d3\u05e8\u05e9\u05d9\u05dd \u05d2\u05dd \u05de\u05ea\u05d5\u05e7\u05e3 \u05ea\u05e7\u05e0\u05d5\u05ea \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea \u05d5\u05de\u05d1\u05d5\u05e6\u05e2\u05d9\u05dd \u05e2\\\"\u05d9 ,Genie \u05d9\u05e8\u05ea\u05de\u05d5 \u05d0\u05ea \u05d4\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05e9\u05dc\u05db\u05dd \u05dc\u05de\u05e9\u05d9\u05de\u05ea \u05d4\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 \u05d4\u05d9\u05e7\u05e8 \u05e9\u05dc\u05db\u05dd.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-procedures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-procedures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-procedures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"width\":1667,\"height\":1368},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-procedures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/information-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.genie.co.il\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"alternateName\":\"\u05d2'\u05d9\u05e0\u05d9\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"width\":190,\"height\":66,\"caption\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/genie.support\",\"https:\\\/\\\/x.com\\\/geniesupport\",\"https:\\\/\\\/www.instagram.com\\\/genie.computing.services\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/genie\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/computingservices\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information security procedures","description":"The information security procedures that are also required by virtue of privacy protection regulations and carried out by Genie will engage your employees in the task of protecting your valuable organizational information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genie.co.il\/en\/products\/information-security-procedures\/","og_locale":"en_US","og_type":"article","og_title":"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","og_description":"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05e0\u05d3\u05e8\u05e9\u05d9\u05dd \u05d2\u05dd \u05de\u05ea\u05d5\u05e7\u05e3 \u05ea\u05e7\u05e0\u05d5\u05ea \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea \u05d5\u05de\u05d1\u05d5\u05e6\u05e2\u05d9\u05dd \u05e2\"\u05d9 ,Genie \u05d9\u05e8\u05ea\u05de\u05d5 \u05d0\u05ea \u05d4\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05e9\u05dc\u05db\u05dd \u05dc\u05de\u05e9\u05d9\u05de\u05ea \u05d4\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 \u05d4\u05d9\u05e7\u05e8 \u05e9\u05dc\u05db\u05dd.","og_url":"https:\/\/www.genie.co.il\/en\/products\/information-security-procedures\/","og_site_name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","article_publisher":"https:\/\/www.facebook.com\/genie.support","article_modified_time":"2024-05-23T16:58:39+00:00","og_image":[{"width":1667,"height":1368,"url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@geniesupport","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.genie.co.il\/products\/information-security-procedures\/","url":"https:\/\/www.genie.co.il\/products\/information-security-procedures\/","name":"Information security procedures","isPartOf":{"@id":"https:\/\/www.genie.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-procedures\/#primaryimage"},"image":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-procedures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","datePublished":"2023-06-22T05:19:21+00:00","dateModified":"2024-05-23T16:58:39+00:00","description":"The information security procedures that are also required by virtue of privacy protection regulations and carried out by Genie will engage your employees in the task of protecting your valuable organizational information.","breadcrumb":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-procedures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genie.co.il\/products\/information-security-procedures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/products\/information-security-procedures\/#primaryimage","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/06\/Genie_Site_Icons_\u05e0\u05d4\u05dc\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","width":1667,"height":1368},{"@type":"BreadcrumbList","@id":"https:\/\/www.genie.co.il\/products\/information-security-procedures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","item":"https:\/\/www.genie.co.il\/"},{"@type":"ListItem","position":2,"name":"\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","item":"https:\/\/www.genie.co.il\/products\/"},{"@type":"ListItem","position":3,"name":"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/information-security\/"},{"@type":"ListItem","position":4,"name":"\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"}]},{"@type":"WebSite","@id":"https:\/\/www.genie.co.il\/#website","url":"https:\/\/www.genie.co.il\/","name":"genie computing services for businesses","description":"","publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genie.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.genie.co.il\/#organization","name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","alternateName":"\u05d2'\u05d9\u05e0\u05d9","url":"https:\/\/www.genie.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","width":190,"height":66,"caption":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"},"image":{"@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/genie.support","https:\/\/x.com\/geniesupport","https:\/\/www.instagram.com\/genie.computing.services\/","https:\/\/www.linkedin.com\/company\/genie\/","https:\/\/www.youtube.com\/user\/computingservices"]}]}},"_links":{"self":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/19410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products"}],"about":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/types\/products"}],"author":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/19410\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media\/19429"}],"wp:attachment":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media?parent=19410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}