fbpx
Search
Close this search box.

Completeness, availability and confidentiality of information

Proactive service as a mandatory condition for maintaining - confidentiality, integrity and availability of the information! Over the past two years we have worked very hard at Gini to adapt the service we provide to customers in accordance with the dramatic changes and the increase in threats. Proactive IT and cyber security service refers to the practice of taking preventative measures to identify and mitigate potential threats. This approach includes monitoring systems, identifying […]

The possible dangers of remote connection and methods of defense

Dangers of remote connection

Two things that are very popular when connecting from home, a VPN connection together with double authentication. So that's it, nowadays it's really not enough. 2FA two-step authentication is a security measure that adds an additional layer of protection to the authentication process, making it difficult for attackers to gain unauthorized access to an account or system of a user. While 2FA can be an effective way to increase the security of connections […]

Supply chain attack. What is it and how do you defend yourself?

A supply chain attack is a type of cyber attack that exploits a vulnerability in the service provider (supplier) to penetrate the organization it serves. There are a variety of ways to reduce the risk, below is a list that will definitely reduce the risk: Risk assessment: It is important to carry out a risk survey of the provider providing the service to make sure that it meets adequate security requirements. Security controls: make sure the [...]

How to request a budget from the management for information security and get out alive?

It is important that the role of the professional bodies is to assess any risk that may lead to damage to information, reputation and financial damage. It is the management that will decide whether it accepts the risk or handles it. There is no black and white in information security, in some cases it is possible to implement compensatory controls that will reduce the risk at reasonable costs. Here are some steps that can help you harness management to invest […]

LAZI virus in small and medium-sized businesses - a clear and immediate danger to business continuity

Many small and medium-sized business owners are suffering from the LAZI virus ("it-won't-happen-to-me") which calls into question their ability to survive a cyber attack. Is your business also infected with this dangerous virus? Guy Hochman - CEO of Genie Computing Services every day I Meets small and medium-sized business (SMB) owners and naturally, the issue of ransomware attacks, which has recently received a lot of media exposure, immediately comes up. To my surprise, many of them […]

Managers in a changing reality

The vaccines are already here, the atmosphere of the end of the course is already felt in the air, but the effects of the corona virus on the business world will not disappear in the foreseeable future. This is how you will prepare for the next day. Guy Hochman - CEO of Genie Computing Services The corona virus took us all by surprise. As business owners and CEOs of Hafchi Haim, we were required to come out of the shock, to abandon most of the conventions we knew about "how our business […]

Protection from cyber attacks and ransomware virus

genie שירותי מחשוב לעסקים - וירוס כופר

In recent years, cyber attacks have become common in the business market. The attacks cause serious damage to the organization to the point of bankruptcy. We believe that increasing awareness and caution are a key tool in the organization's ability to defend itself against cyber attacks. We at genie want to help you take preventive actions using simple rules to prevent attacks on your business. Below are several training videos with […]

Ransomware questions and answers

E-mail is one of the main means by which the ransomware virus penetrates computers. How can I identify a suspicious email? A virus-carrying email will contain a legitimate-looking invoice or purchase receipt. The only way to distinguish that it is not a legitimate email is by carefully examining the email address from which the message was sent. The address will not be the same as […]

Information security - user tips

אבטחת מידע - טיפים למשתמש

Information security - user tips Information security is a wide world. Essentially, its purpose is one: protecting computer systems from risks that threaten them. In general, it includes physical security of the building where the computing systems are located, the security of the computing equipment (hardware) as well as the security of the software and the information stored therein. In different computer systems, if they are public, in large organizations [...]

Tips for protecting your computer from hackers

טיפים להגנה על המחשב מפני האקרים

In this way, you will significantly reduce the chance of a hacker attack on your computer. None of us wants to fall victim to a hacker attack on our personal computer. Such an attack can have many consequences, from disabling the computer's function, through rummaging through photos and personal documents, to stealing passwords that lead to really sensitive information, such as: entering the private email, the personal account on social networks and the bank account details [...]

Is your computer really secure?

האם המחשב שלך באמת מאובטח?

Is your computer really secure? Identity theft is a problem that has grown significantly in recent years. Today we can all take examples even from the credit card companies and various banks, which have to deal with identity forgers on a daily basis in order to prevent theft of funds. What we really need to remember, is that if large companies are exposed to different hacker hacks, then how […]

Penetration testing and free data security tools

בדיקת חדירות - ג'יני שירותי מחשוב

What is information security? Information security means protecting computer systems against threats and risks that could harm them. When we talk about information security, we mean both physical security and virtual security. That is, keeping the components of the case on the one hand, and keeping the information stored on the computer on the other hand. We can always find those people who underestimate the importance of their information security. Sometimes […]

Do you have any questions?

Fill out the form and our representative will work with you:

Skip to content