{"id":19505,"date":"2023-08-02T13:10:15","date_gmt":"2023-08-02T10:10:15","guid":{"rendered":"https:\/\/www.genie.co.il\/?post_type=products&#038;p=19505"},"modified":"2024-05-23T20:07:53","modified_gmt":"2024-05-23T17:07:53","slug":"targeted-survey-for-information-security","status":"publish","type":"products","link":"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/targeted-survey-for-information-security\/","title":{"rendered":"Focused computing and information security survey"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"19505\" class=\"elementor elementor-19505\" data-elementor-post-type=\"products\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab8ba7c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab8ba7c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0951d3\" data-id=\"c0951d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-808847b elementor-widget elementor-widget-heading\" data-id=\"808847b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Computer survey  <span class=\"red\"> and targeted information security<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896ec1a elementor-align-center elementor-widget elementor-widget-breadcrumbs\" data-id=\"896ec1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.genie.co.il\/en\/\">computing services<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e86becf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e86becf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;arrow&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 700 10\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M360 0L350 9.9 340 0 0 0 0 10 700 10 700 0\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a9fc14\" data-id=\"4a9fc14\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e05d248 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"e05d248\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4acdb5c\" data-id=\"4acdb5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f467f2d elementor-widget elementor-widget-image\" data-id=\"f467f2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"460\" src=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8.png\" class=\"attachment-large size-large wp-image-14383\" alt=\"\" srcset=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8.png 500w, https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8-300x276.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a0e41b3\" data-id=\"a0e41b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53bdf56 elementor-widget elementor-widget-text-editor\" data-id=\"53bdf56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>GENIE - focused survey for computing and information security<\/h3><p>One of the most tangible and immediate risks for any organization and business is the cyber threat. At any given moment you may discover that you are under an attack that the information security system did not stop effectively and that your business activity was severely damaged and even disabled.<\/p><p>Such an information event has serious consequences for the financial situation of the business, for its ability to continue providing a service or product to customers, and hence, the path to serious and irreversible image damage is shorter than ever. And this is where Genie comes into the picture, with a smart and focused service that will provide you in just 24 hours and at an accessible price, critical insights and practical recommendations for action that will allow you to ensure business continuity, even when an information event occurs.<\/p><h3>Apply the CIA methodology in your business<\/h3><p>A targeted survey for computing and information security in your business is performed by Genie&#039;s information security experts<br \/>The survey, intended for businesses with up to 150 users, is based on international and Israeli CIA-based methodologies: Confidentiality, Integrity and Availability - the confidentiality, integrity and availability of information which are the essential factors for the proper operation of any business.<\/p><h3>Accessible, short and focused - the survey that reveals the weak points<\/h3><p>A focused survey for computing and information security by Genie will allow you to identify the weak links in your computing and information security system and prepare optimally for any cyber attack and any information incident. This, through a series of tests that will focus on various aspects in the fields of computing and information security in your business:<\/p><ul><li>Examining downtime and data loss in the event of an information security incident<\/li><li>Compatibility of the existing information security system with the organizational requirements<\/li><li>Survival of the communication system and switches at the core of the organization<\/li><li>Examining the backup policy<\/li><li>Examining the on-premises and cloud Exchange server hardening<\/li><li>Physical security of the equipment and information stored in the core systems<\/li><li>Testing the organization&#039;s readiness for a shutdown event as a result of a cyber incident or force majeure<\/li><\/ul><h3>The results of the survey: conclusions and practical recommendations for action<\/h3><p>The focused survey for computing and information security, which will be carried out by Genie&#039;s highly experienced information security experts, is carried out during one business day, without any interruption to your current business activities.<\/p><p>Through it, you will understand where you are located on the information security continuum, without investing tens of thousands of shekels in a comprehensive information security and infrastructure survey.<\/p><p>At the end of the survey, you will be presented with a detailed and easy-to-understand findings report that will flood you with the threats that require preparation according to the level of importance and urgency. In addition, the report will include practical recommendations for implementation that will provide you with a comprehensive answer to the issue of the survival of the computing system and information security in your business, while referring to the business requirements and regulations required of you.<\/p><p>You can implement the survey recommendations through your IT managers, and\/or with the guidance and support of Genie&#039;s information security experts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddac565 elementor-position-inline-start triangle-box elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"ddac565\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-play\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tHere are the risks you face today with Genie&#039;s targeted survey  \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bb61fc elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bb61fc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e902fbb\" data-id=\"e902fbb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b64eaa elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"7b64eaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">For more information and a quote for a targeted survey for computing and information security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ed4fad elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"7ed4fad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.genie.co.il\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Click here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>This is within 24 hours all the weak points that exist in your computer system and information security, receive recommendations for action from GENIE UV and prepare optimally for any cyber attack and information incident.<\/p>","protected":false},"author":5,"featured_media":18451,"parent":18449,"template":"elementor_header_footer","class_list":["post-19505","products","type-products","status-publish","has-post-thumbnail","hentry","product_cat-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u05e1\u05e7\u05e8 \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05de\u05d5\u05e7\u05d3<\/title>\n<meta name=\"description\" content=\"\u05d6\u05d4\u05d5 \u05ea\u05d5\u05da 24 \u05e9\u05e2\u05d5\u05ea \u05d0\u05ea \u05db\u05dc \u05e0\u05e7\u05d5\u05d3\u05d5\u05ea \u05d4\u05ea\u05d5\u05e8\u05e4\u05d4 \u05d4\u05e7\u05d9\u05d9\u05de\u05d5\u05ea \u05d1\u05de\u05e2\u05e8\u05db\u05ea \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc\u05db\u05dd, \u05e7\u05d1\u05dc\u05d5 \u05d4\u05de\u05dc\u05e6\u05d5\u05ea \u05dc\u05e4\u05e2\u05d5\u05dc\u05d4 \u05de-GENIE UV \u05d5\u05d4\u05d9\u05e2\u05e8\u05db\u05d5 \u05d1\u05d0\u05d5\u05e4\u05df \u05de\u05d9\u05d9\u05d8\u05d1\u05d9 \u05dc\u05db\u05dc \u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d9\u05e8\u05d5\u05e2 \u05de\u05d9\u05d3\u05e2.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/targeted-survey-for-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05e1\u05e7\u05e8 \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05de\u05d5\u05e7\u05d3\" \/>\n<meta property=\"og:description\" content=\"\u05d6\u05d4\u05d5 \u05ea\u05d5\u05da 24 \u05e9\u05e2\u05d5\u05ea \u05d0\u05ea \u05db\u05dc \u05e0\u05e7\u05d5\u05d3\u05d5\u05ea \u05d4\u05ea\u05d5\u05e8\u05e4\u05d4 \u05d4\u05e7\u05d9\u05d9\u05de\u05d5\u05ea \u05d1\u05de\u05e2\u05e8\u05db\u05ea \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc\u05db\u05dd, \u05e7\u05d1\u05dc\u05d5 \u05d4\u05de\u05dc\u05e6\u05d5\u05ea \u05dc\u05e4\u05e2\u05d5\u05dc\u05d4 \u05de-GENIE UV \u05d5\u05d4\u05d9\u05e2\u05e8\u05db\u05d5 \u05d1\u05d0\u05d5\u05e4\u05df \u05de\u05d9\u05d9\u05d8\u05d1\u05d9 \u05dc\u05db\u05dc \u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d9\u05e8\u05d5\u05e2 \u05de\u05d9\u05d3\u05e2.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/targeted-survey-for-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/genie.support\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-23T17:07:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1667\" \/>\n\t<meta property=\"og:image:height\" content=\"1368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/targeted-survey-for-information-security\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/targeted-survey-for-information-security\\\/\",\"name\":\"\u05e1\u05e7\u05e8 \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05de\u05d5\u05e7\u05d3\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/targeted-survey-for-information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/targeted-survey-for-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"datePublished\":\"2023-08-02T10:10:15+00:00\",\"dateModified\":\"2024-05-23T17:07:53+00:00\",\"description\":\"\u05d6\u05d4\u05d5 \u05ea\u05d5\u05da 24 \u05e9\u05e2\u05d5\u05ea \u05d0\u05ea \u05db\u05dc \u05e0\u05e7\u05d5\u05d3\u05d5\u05ea \u05d4\u05ea\u05d5\u05e8\u05e4\u05d4 \u05d4\u05e7\u05d9\u05d9\u05de\u05d5\u05ea \u05d1\u05de\u05e2\u05e8\u05db\u05ea \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc\u05db\u05dd, \u05e7\u05d1\u05dc\u05d5 \u05d4\u05de\u05dc\u05e6\u05d5\u05ea \u05dc\u05e4\u05e2\u05d5\u05dc\u05d4 \u05de-GENIE UV \u05d5\u05d4\u05d9\u05e2\u05e8\u05db\u05d5 \u05d1\u05d0\u05d5\u05e4\u05df \u05de\u05d9\u05d9\u05d8\u05d1\u05d9 \u05dc\u05db\u05dc \u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d9\u05e8\u05d5\u05e2 \u05de\u05d9\u05d3\u05e2.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/targeted-survey-for-information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/targeted-survey-for-information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/targeted-survey-for-information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"width\":1667,\"height\":1368},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/targeted-survey-for-information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/information-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\u05e1\u05e7\u05e8 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"\u05e1\u05e7\u05e8 \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05de\u05d5\u05e7\u05d3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.genie.co.il\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"alternateName\":\"\u05d2'\u05d9\u05e0\u05d9\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"width\":190,\"height\":66,\"caption\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/genie.support\",\"https:\\\/\\\/x.com\\\/geniesupport\",\"https:\\\/\\\/www.instagram.com\\\/genie.computing.services\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/genie\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/computingservices\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Focused computing and information security survey","description":"This is within 24 hours all the weak points that exist in your computer system and information security, receive recommendations for action from GENIE UV and prepare optimally for any cyber attack and information incident.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/targeted-survey-for-information-security\/","og_locale":"en_US","og_type":"article","og_title":"\u05e1\u05e7\u05e8 \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05de\u05d5\u05e7\u05d3","og_description":"\u05d6\u05d4\u05d5 \u05ea\u05d5\u05da 24 \u05e9\u05e2\u05d5\u05ea \u05d0\u05ea \u05db\u05dc \u05e0\u05e7\u05d5\u05d3\u05d5\u05ea \u05d4\u05ea\u05d5\u05e8\u05e4\u05d4 \u05d4\u05e7\u05d9\u05d9\u05de\u05d5\u05ea \u05d1\u05de\u05e2\u05e8\u05db\u05ea \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc\u05db\u05dd, \u05e7\u05d1\u05dc\u05d5 \u05d4\u05de\u05dc\u05e6\u05d5\u05ea \u05dc\u05e4\u05e2\u05d5\u05dc\u05d4 \u05de-GENIE UV \u05d5\u05d4\u05d9\u05e2\u05e8\u05db\u05d5 \u05d1\u05d0\u05d5\u05e4\u05df \u05de\u05d9\u05d9\u05d8\u05d1\u05d9 \u05dc\u05db\u05dc \u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d9\u05e8\u05d5\u05e2 \u05de\u05d9\u05d3\u05e2.","og_url":"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/targeted-survey-for-information-security\/","og_site_name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","article_publisher":"https:\/\/www.facebook.com\/genie.support","article_modified_time":"2024-05-23T17:07:53+00:00","og_image":[{"width":1667,"height":1368,"url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@geniesupport","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/targeted-survey-for-information-security\/","url":"https:\/\/www.genie.co.il\/products\/information-security-survey\/targeted-survey-for-information-security\/","name":"Focused computing and information security survey","isPartOf":{"@id":"https:\/\/www.genie.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/targeted-survey-for-information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/targeted-survey-for-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","datePublished":"2023-08-02T10:10:15+00:00","dateModified":"2024-05-23T17:07:53+00:00","description":"This is within 24 hours all the weak points that exist in your computer system and information security, receive recommendations for action from GENIE UV and prepare optimally for any cyber attack and information incident.","breadcrumb":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/targeted-survey-for-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genie.co.il\/products\/information-security-survey\/targeted-survey-for-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/targeted-survey-for-information-security\/#primaryimage","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","width":1667,"height":1368},{"@type":"BreadcrumbList","@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/targeted-survey-for-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","item":"https:\/\/www.genie.co.il\/"},{"@type":"ListItem","position":2,"name":"\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","item":"https:\/\/www.genie.co.il\/products\/"},{"@type":"ListItem","position":3,"name":"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/information-security\/"},{"@type":"ListItem","position":4,"name":"\u05e1\u05e7\u05e8 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/products\/information-security-survey\/"},{"@type":"ListItem","position":5,"name":"\u05e1\u05e7\u05e8 \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05de\u05d5\u05e7\u05d3"}]},{"@type":"WebSite","@id":"https:\/\/www.genie.co.il\/#website","url":"https:\/\/www.genie.co.il\/","name":"genie computing services for businesses","description":"","publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genie.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.genie.co.il\/#organization","name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","alternateName":"\u05d2'\u05d9\u05e0\u05d9","url":"https:\/\/www.genie.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","width":190,"height":66,"caption":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"},"image":{"@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/genie.support","https:\/\/x.com\/geniesupport","https:\/\/www.instagram.com\/genie.computing.services\/","https:\/\/www.linkedin.com\/company\/genie\/","https:\/\/www.youtube.com\/user\/computingservices"]}]}},"_links":{"self":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/19505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products"}],"about":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/types\/products"}],"author":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/19505\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/18449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media\/18451"}],"wp:attachment":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media?parent=19505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}