Why is it important to combine an infrastructure survey with an information security survey?

A combination of an infrastructure survey and a security survey provide complementary information that an organization needs to effectively manage and protect its IT environment. An infrastructure survey provides important information about the technical aspects of the organization's IT environment, such as the existing hardware, software and network components. This information is essential for identifying performance issues and ensuring that an organization's IT environment can support its current and future business needs. […]
DRaas service and its advantages over local DR

If in the past DR solutions were expensive and not available to small and medium-sized organizations, today you can get a DRaas service at very low costs in a cost-benefit ratio. The main goal of the solution is to return the organization to a quick work routine with as little downtime and loss of information as possible. The DRaaS service allows replication of the servers in the organization to a secure off-site location. In case of […]
Completeness, availability and confidentiality of information

Proactive service as a mandatory condition for maintaining - confidentiality, integrity and availability of the information! Over the past two years we have worked very hard at Gini to adapt the service we provide to customers in accordance with the dramatic changes and the increase in threats. Proactive IT and cyber security service refers to the practice of taking preventative measures to identify and mitigate potential threats. This approach includes monitoring systems, identifying […]
The possible dangers of remote connection and methods of defense

Two things that are very popular when connecting from home, a VPN connection together with double authentication. So that's it, nowadays it's really not enough. 2FA two-step authentication is a security measure that adds an additional layer of protection to the authentication process, making it difficult for attackers to gain unauthorized access to an account or system of a user. While 2FA can be an effective way to increase the security of connections […]
Supply chain attack. What is it and how do you defend yourself?

A supply chain attack is a type of cyber attack that exploits a vulnerability in the service provider (supplier) to penetrate the organization it serves. There are a variety of ways to reduce the risk, below is a list that will definitely reduce the risk: Risk assessment: It is important to carry out a risk survey of the provider providing the service to make sure that it meets adequate security requirements. Security controls: make sure the [...]
How to request a budget from the management for information security and get out alive?

It is important that the role of the professional bodies is to assess any risk that may lead to damage to information, reputation and financial damage. It is the management that will decide whether it accepts the risk or handles it. There is no black and white in information security, in some cases it is possible to implement compensatory controls that will reduce the risk at reasonable costs. Here are some steps that can help you harness management to invest […]
LAZI virus in small and medium-sized businesses - a clear and immediate danger to business continuity

Many small and medium-sized business owners are suffering from the LAZI virus ("it-won't-happen-to-me") which calls into question their ability to survive a cyber attack. Is your business also infected with this dangerous virus? Guy Hochman - CEO of Genie Computing Services every day I Meets small and medium-sized business (SMB) owners and naturally, the issue of ransomware attacks, which has recently received a lot of media exposure, immediately comes up. To my surprise, many of them […]
Managers in a changing reality

The vaccines are already here, the atmosphere of the end of the course is already felt in the air, but the effects of the corona virus on the business world will not disappear in the foreseeable future. This is how you will prepare for the next day. Guy Hochman - CEO of Genie Computing Services The corona virus took us all by surprise. As business owners and CEOs of Hafchi Haim, we were required to come out of the shock, to abandon most of the conventions we knew about "how our business […]
Protection from cyber attacks and ransomware virus

In recent years, cyber attacks have become common in the business market. The attacks cause serious damage to the organization to the point of bankruptcy. We believe that increasing awareness and caution are a key tool in the organization's ability to defend itself against cyber attacks. We at genie want to help you take preventive actions using simple rules to prevent attacks on your business. Below are several training videos with […]
Ransomware questions and answers

E-mail is one of the main means by which the ransomware virus penetrates computers. How can I identify a suspicious email? A virus-carrying email will contain a legitimate-looking invoice or purchase receipt. The only way to distinguish that it is not a legitimate email is by carefully examining the email address from which the message was sent. The address will not be the same as […]
Information security - user tips

Information security - user tips Information security is a wide world. Essentially, its purpose is one: protecting computer systems from risks that threaten them. In general, it includes physical security of the building where the computing systems are located, the security of the computing equipment (hardware) as well as the security of the software and the information stored therein. In different computer systems, if they are public, in large organizations [...]
Tips for protecting your computer from hackers

In this way, you will significantly reduce the chance of a hacker attack on your computer. None of us wants to fall victim to a hacker attack on our personal computer. Such an attack can have many consequences, from disabling the computer's function, through rummaging through photos and personal documents, to stealing passwords that lead to really sensitive information, such as: entering the private email, the personal account on social networks and the bank account details [...]