{"id":19519,"date":"2023-08-02T13:42:12","date_gmt":"2023-08-02T10:42:12","guid":{"rendered":"https:\/\/www.genie.co.il\/?post_type=products&#038;p=19519"},"modified":"2024-05-23T20:09:04","modified_gmt":"2024-05-23T17:09:04","slug":"computing-and-communication-infrastructure-surveys","status":"publish","type":"products","link":"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/","title":{"rendered":"Computing and communication infrastructure surveys"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"19519\" class=\"elementor elementor-19519\" data-elementor-post-type=\"products\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab8ba7c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab8ba7c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0951d3\" data-id=\"c0951d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-808847b elementor-widget elementor-widget-heading\" data-id=\"808847b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Security surveys  <span class=\"red\"> Information and infrastructure<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896ec1a elementor-align-center elementor-widget elementor-widget-breadcrumbs\" data-id=\"896ec1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.genie.co.il\/en\/\">computing services<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e86becf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e86becf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;arrow&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 700 10\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M360 0L350 9.9 340 0 0 0 0 10 700 10 700 0\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a9fc14\" data-id=\"4a9fc14\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e05d248 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"e05d248\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4acdb5c\" data-id=\"4acdb5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f467f2d elementor-widget elementor-widget-image\" data-id=\"f467f2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"460\" src=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8.png\" class=\"attachment-large size-large wp-image-14383\" alt=\"\" srcset=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8.png 500w, https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8-300x276.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a0e41b3\" data-id=\"a0e41b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53bdf56 elementor-widget elementor-widget-text-editor\" data-id=\"53bdf56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>GENIE - Information security and infrastructure survey<\/h3><p>In recent years, cyber attacks and information security incidents have become a tangible and immediate threat to every organization and every business - and not by chance. Cyber terrorism has the ability to disable your business activity, cause heavy financial damages, harm your ability to provide service to customers and has serious consequences on the business image - to the point of risking business continuity.<\/p><p>Because the question is not &quot;will you experience a data security incident&quot; but &quot;when will you experience it&quot;, don&#039;t wait for tomorrow. Order a Genie information security and infrastructure survey today that will allow you to invest your information security resources in the weakest and most vulnerable links.<\/p><h3>End-to-end information security and infrastructure survey<\/h3><p>Genie&#039;s information security and infrastructure survey provides you with a pro-active approach to reducing security risks and potential failures in the cyber and IT field.<\/p><p>With the help of the survey, you will know whether the information protection system, the training you have given to the employees and the procedures you have established, will prove themselves in the moment of truth, you will identify potential security risks that could lead to data breaches, cyber attacks and other incidents in the IT field and you will make sure that you meet the regulatory requirements in your field of activity.<\/p><p>The comprehensive survey for information and infrastructure security carried out by Genie is based on a methodology that is updated frequently, on the accumulated experience from similar surveys carried out in organizations in Israel and around the world, and it concerns all levels of security and all business and management processes in your organization:<\/p><ul><li>Mapping critical information assets, the leakage of which would endanger the existence of the organization<\/li><li>Checking databases, networks, backup procedures, user management, the set of permissions,<\/li><li>Access to resources for the organization&#039;s employees and outsourced parties<\/li><li>Checking information security policies and procedures and their compliance with various regulations<\/li><li>Testing the hardware in the production environment<\/li><li>Testing the software - licensing compliance and compliance with business requirements<\/li><li>Examining the architecture of the network and operating systems<\/li><li>The structure of the firewall, the existing legality and its ability to reduce security incidents<\/li><li>Analysis of wired, wireless, passive and active communication infrastructures<\/li><li>Preparedness for a ransom event, in terms of protection and quick recovery<\/li><li>Exchange MS \u2013 the structure of the email system and its level of hardening<\/li><li>Checking the existing information security tools and the level of hardening of servers, endpoints,<\/li><li>Communication equipment and mobile devices<\/li><li>GPO - examination of the organization&#039;s policy for network settings, security, ports, enabling features and more<\/li><li>Information security and physical survival - preparedness for situations of fire, theft, electrical damage, natural damage and indirect damage<\/li><li>Checking the training policy in the organization and the employees&#039; awareness of the information security rules.<\/li><\/ul><h3>How to conduct the survey in Genie and its products<\/h3><p>An information security and infrastructure survey carried out by Genie&#039;s highly experienced information security experts does not harm the day-to-day operations of your organization. The survey includes questioning key personnel in the organization, examining documents and procedures, testing the systems in all departments of the organization for the purpose of assessing risks and reducing the &quot;attack surface&quot;. for possible cyber attacks.<\/p><p>At the end of the survey, Genie will present you with a detailed and friendly report of findings intended even for managers who do not control the taps of information security technology. The report will show you the gaps that exist between what is desired and what is found in the field of information security in your organization - both at the technological level and at the level of organizational culture. The report will detail the weak points and provide practical recommendations on the required actions, according to the level of risk, urgency and potential damage expected to your organization on the financial, operational and image level.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddac565 elementor-position-inline-end triangle-box elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"ddac565\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-play\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tReduce your cyber and IT security risks today with Genie&#039;s Information Security and Infrastructure Survey \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bb61fc elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bb61fc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e902fbb\" data-id=\"e902fbb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b64eaa elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"7b64eaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">For more information and a quote for an information security and infrastructure survey<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ed4fad elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"7ed4fad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.genie.co.il\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Click here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Don&#039;t wait for the next information event. With Genie&#039;s Information Security and Infrastructure Survey, you will implement a proactive approach to risk assessment and reduce potential cyber and IT security failures in your organization.<\/p>","protected":false},"author":5,"featured_media":18451,"parent":18449,"template":"elementor_header_footer","class_list":["post-19519","products","type-products","status-publish","has-post-thumbnail","hentry","product_cat-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u05e1\u05e7\u05e8\u05d9 \u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea<\/title>\n<meta name=\"description\" content=\"\u05d0\u05dc \u05ea\u05d7\u05db\u05d5 \u05dc\u05d0\u05d9\u05e8\u05d5\u05e2 \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d1\u05d0. \u05e2\u05dd \u05e1\u05e7\u05e8 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5\u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05e9\u05dc \u05d2&#039;\u05d9\u05e0\u05d9, \u05ea\u05d9\u05d9\u05e9\u05de\u05d5 \u05d2\u05d9\u05e9\u05d4 \u05e4\u05e8\u05d5-\u05d0\u05e7\u05d8\u05d9\u05d1\u05d9\u05ea \u05dc\u05d4\u05e2\u05e8\u05db\u05ea \u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05d5\u05dc\u05e6\u05de\u05e6\u05d5\u05dd \u05db\u05e9\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05e4\u05d5\u05d8\u05e0\u05e6\u05d9\u05d0\u05dc\u05d9\u05d9\u05dd \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d4-IT \u05d1\u05d0\u05e8\u05d2\u05d5\u05df \u05e9\u05dc\u05db\u05dd.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05e1\u05e7\u05e8\u05d9 \u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\" \/>\n<meta property=\"og:description\" content=\"\u05d0\u05dc \u05ea\u05d7\u05db\u05d5 \u05dc\u05d0\u05d9\u05e8\u05d5\u05e2 \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d1\u05d0. \u05e2\u05dd \u05e1\u05e7\u05e8 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5\u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05e9\u05dc \u05d2&#039;\u05d9\u05e0\u05d9, \u05ea\u05d9\u05d9\u05e9\u05de\u05d5 \u05d2\u05d9\u05e9\u05d4 \u05e4\u05e8\u05d5-\u05d0\u05e7\u05d8\u05d9\u05d1\u05d9\u05ea \u05dc\u05d4\u05e2\u05e8\u05db\u05ea \u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05d5\u05dc\u05e6\u05de\u05e6\u05d5\u05dd \u05db\u05e9\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05e4\u05d5\u05d8\u05e0\u05e6\u05d9\u05d0\u05dc\u05d9\u05d9\u05dd \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d4-IT \u05d1\u05d0\u05e8\u05d2\u05d5\u05df \u05e9\u05dc\u05db\u05dd.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/\" \/>\n<meta property=\"og:site_name\" content=\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/genie.support\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-23T17:09:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1667\" \/>\n\t<meta property=\"og:image:height\" content=\"1368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/computing-and-communication-infrastructure-surveys\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/computing-and-communication-infrastructure-surveys\\\/\",\"name\":\"\u05e1\u05e7\u05e8\u05d9 \u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/computing-and-communication-infrastructure-surveys\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/computing-and-communication-infrastructure-surveys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"datePublished\":\"2023-08-02T10:42:12+00:00\",\"dateModified\":\"2024-05-23T17:09:04+00:00\",\"description\":\"\u05d0\u05dc \u05ea\u05d7\u05db\u05d5 \u05dc\u05d0\u05d9\u05e8\u05d5\u05e2 \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d1\u05d0. \u05e2\u05dd \u05e1\u05e7\u05e8 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5\u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05e9\u05dc \u05d2'\u05d9\u05e0\u05d9, \u05ea\u05d9\u05d9\u05e9\u05de\u05d5 \u05d2\u05d9\u05e9\u05d4 \u05e4\u05e8\u05d5-\u05d0\u05e7\u05d8\u05d9\u05d1\u05d9\u05ea \u05dc\u05d4\u05e2\u05e8\u05db\u05ea \u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05d5\u05dc\u05e6\u05de\u05e6\u05d5\u05dd \u05db\u05e9\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05e4\u05d5\u05d8\u05e0\u05e6\u05d9\u05d0\u05dc\u05d9\u05d9\u05dd \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d4-IT \u05d1\u05d0\u05e8\u05d2\u05d5\u05df \u05e9\u05dc\u05db\u05dd.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/computing-and-communication-infrastructure-surveys\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/computing-and-communication-infrastructure-surveys\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/computing-and-communication-infrastructure-surveys\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png\",\"width\":1667,\"height\":1368},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/computing-and-communication-infrastructure-surveys\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/information-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\u05e1\u05e7\u05e8 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/information-security-survey\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"\u05e1\u05e7\u05e8\u05d9 \u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.genie.co.il\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"alternateName\":\"\u05d2'\u05d9\u05e0\u05d9\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"width\":190,\"height\":66,\"caption\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/genie.support\",\"https:\\\/\\\/x.com\\\/geniesupport\",\"https:\\\/\\\/www.instagram.com\\\/genie.computing.services\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/genie\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/computingservices\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computing and communication infrastructure surveys","description":"Don&#039;t wait for the next information event. With Genie&#039;s Information Security and Infrastructure Survey, you will implement a proactive approach to risk assessment and reduce potential cyber and IT security failures in your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/","og_locale":"en_US","og_type":"article","og_title":"\u05e1\u05e7\u05e8\u05d9 \u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea","og_description":"\u05d0\u05dc \u05ea\u05d7\u05db\u05d5 \u05dc\u05d0\u05d9\u05e8\u05d5\u05e2 \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05d1\u05d0. \u05e2\u05dd \u05e1\u05e7\u05e8 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5\u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05e9\u05dc \u05d2'\u05d9\u05e0\u05d9, \u05ea\u05d9\u05d9\u05e9\u05de\u05d5 \u05d2\u05d9\u05e9\u05d4 \u05e4\u05e8\u05d5-\u05d0\u05e7\u05d8\u05d9\u05d1\u05d9\u05ea \u05dc\u05d4\u05e2\u05e8\u05db\u05ea \u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05d5\u05dc\u05e6\u05de\u05e6\u05d5\u05dd \u05db\u05e9\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05e4\u05d5\u05d8\u05e0\u05e6\u05d9\u05d0\u05dc\u05d9\u05d9\u05dd \u05d1\u05ea\u05d7\u05d5\u05dd \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d4-IT \u05d1\u05d0\u05e8\u05d2\u05d5\u05df \u05e9\u05dc\u05db\u05dd.","og_url":"https:\/\/www.genie.co.il\/en\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/","og_site_name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","article_publisher":"https:\/\/www.facebook.com\/genie.support","article_modified_time":"2024-05-23T17:09:04+00:00","og_image":[{"width":1667,"height":1368,"url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@geniesupport","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/","url":"https:\/\/www.genie.co.il\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/","name":"Computing and communication infrastructure surveys","isPartOf":{"@id":"https:\/\/www.genie.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/#primaryimage"},"image":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","datePublished":"2023-08-02T10:42:12+00:00","dateModified":"2024-05-23T17:09:04+00:00","description":"Don&#039;t wait for the next information event. With Genie&#039;s Information Security and Infrastructure Survey, you will implement a proactive approach to risk assessment and reduce potential cyber and IT security failures in your organization.","breadcrumb":{"@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genie.co.il\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/#primaryimage","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2023\/03\/Genie_Site_Icons_\u05e1\u05e7\u05e8\u05d9-\u05d0\u05d1\u05d8\u05d7\u05ea-\u05de\u05d9\u05d3\u05e2.png","width":1667,"height":1368},{"@type":"BreadcrumbList","@id":"https:\/\/www.genie.co.il\/products\/information-security-survey\/computing-and-communication-infrastructure-surveys\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","item":"https:\/\/www.genie.co.il\/"},{"@type":"ListItem","position":2,"name":"\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","item":"https:\/\/www.genie.co.il\/products\/"},{"@type":"ListItem","position":3,"name":"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/information-security\/"},{"@type":"ListItem","position":4,"name":"\u05e1\u05e7\u05e8 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/products\/information-security-survey\/"},{"@type":"ListItem","position":5,"name":"\u05e1\u05e7\u05e8\u05d9 \u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea"}]},{"@type":"WebSite","@id":"https:\/\/www.genie.co.il\/#website","url":"https:\/\/www.genie.co.il\/","name":"genie computing services for businesses","description":"","publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genie.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.genie.co.il\/#organization","name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","alternateName":"\u05d2'\u05d9\u05e0\u05d9","url":"https:\/\/www.genie.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","width":190,"height":66,"caption":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"},"image":{"@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/genie.support","https:\/\/x.com\/geniesupport","https:\/\/www.instagram.com\/genie.computing.services\/","https:\/\/www.linkedin.com\/company\/genie\/","https:\/\/www.youtube.com\/user\/computingservices"]}]}},"_links":{"self":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/19519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products"}],"about":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/types\/products"}],"author":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/19519\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/18449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media\/18451"}],"wp:attachment":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media?parent=19519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}