{"id":11713,"date":"2020-07-12T11:50:53","date_gmt":"2020-07-12T08:50:53","guid":{"rendered":"https:\/\/www.methoda.co.il\/?post_type=services&#038;p=11713"},"modified":"2022-06-02T08:45:51","modified_gmt":"2022-06-02T05:45:51","slug":"%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8","status":"publish","type":"services","link":"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8","title":{"rendered":"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8"},"content":{"rendered":"<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Studies show that the trend of cyber attacks is expanding all over the world, and the quantity and sophistication of attacks is constantly rising and charging heavy prices from the affected organizations, hospitals, educational institutions and even small and medium-sized businesses that depend on information in business computers \/ systems.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">The results of these attacks:<\/span><\/span><\/p>\n<ol>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Direct economic damage<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> &#8211; loss of revenue due to downtime of the business, costs of repairing the damage and returning the systems to operation and sometimes payment to the attackers themselves. <\/span><span style=\"vertical-align: inherit;\">This happens in incidents of infidelity (RANSOMWARE) or destructive attack which aim to disable the business for economic motives (ransom demand) or ideological motives (Israel-hating hackers).<\/span><\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Indirect economic damage<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> &#8211; loss of large customers and business partners, and legal expenses. <\/span><span style=\"vertical-align: inherit;\">Attackers now use the tactic of attacking third-party vendors of their target organizations who are often less protected and easier to penetrate, and through them access to information and systems of the target organizations as well. <\/span><span style=\"vertical-align: inherit;\">As a result of this risk many organizations require their providers to meet information security requirements and present evidence to perform required activities on the subject.<\/span><\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Regulatory economic damage<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> &#8211; There is regulation to enforce the protection of citizens&#8217; information privacy both in Israel and abroad. In Israel there are regulations of the Ministry of Justice, and in Europe there are GDPR regulations with heavy fines for leaking customer information. <\/span><span style=\"vertical-align: inherit;\">Organizations that have leaked information are exposed to sanctions and fines from regulators and multiple investments in handling the work process with regulators.<\/span><\/span><\/li>\n<\/ol>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">The way to deal with such risks is to develop RESILIENCY against cyber attacks. <\/span><span style=\"vertical-align: inherit;\">This resilience is achieved by activating defense, control and recovery capabilities following an attack, and provides a high added value to the organization in its level of competitiveness and its ability to create business ventures and collaborations.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">In order for you to prepare yourself more effectively and better for cyber attacks and develop good resilience to this type of crisis, we will pass on to you over the coming period a number of basic recommendations that constitute BEST PRACTICE for protecting your business systems and services.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">If you need assistance in implementing these recommendations or advice and guidance in carrying out the activities required to meet the requirements of your business customers on the cyber issue, we will be happy to assist.<\/span><\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Method offers you services for dealing with cyber threats and streamlining the information protection system:<\/span><\/span><\/strong><\/p>\n<ul>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Existing status survey<\/span><\/span><\/li>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Risk management and recommendations for dealing with and reducing risk<\/span><\/span><\/li>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Implementation of Recommendations and Best Practice<\/span><\/span><\/li>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">DevSecOps &#8211; Be agile and secure<\/span><\/span><\/li>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Consulting for the selection of cloud services and their ongoing control<\/span><\/span><\/li>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Ongoing activities in accordance with the needs of the organization<\/span><\/span><\/li>\n<\/ul>\n<form class=\"wpcf7-form\" action=\"\/wp-admin\/admin-ajax.php?_panelsnonce=7c32fc4914#wpcf7-f11727-o1\" method=\"post\" novalidate=\"novalidate\"><input name=\"_wpcf7\" type=\"hidden\" value=\"11727\" \/><br \/>\n<input name=\"_wpcf7_version\" type=\"hidden\" value=\"5.1.1\" \/><br \/>\n<input name=\"_wpcf7_locale\" type=\"hidden\" value=\"en_US\" \/><br \/>\n<input name=\"_wpcf7_unit_tag\" type=\"hidden\" value=\"wpcf7-f11727-o1\" \/><br \/>\n<input name=\"_wpcf7_container_post\" type=\"hidden\" value=\"0\" \/><br \/>\n<input name=\"g-recaptcha-response\" type=\"hidden\" value=\"\" \/><br \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" name=\"your-subject\" type=\"hidden\" value=\"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8\" \/><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">full name<\/span><\/span><span class=\"wpcf7-form-control-wrap your-name\"><input class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" name=\"your-name\" size=\"40\" type=\"text\" value=\"Shimon\" aria-required=\"true\" aria-invalid=\"false\" \/><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Name of organization<\/span><\/span><span class=\"wpcf7-form-control-wrap your-company\"><input class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" name=\"your-company\" size=\"40\" type=\"text\" value=\"\" aria-required=\"true\" aria-invalid=\"false\" \/><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Email<\/span><\/span><span class=\"wpcf7-form-control-wrap your-email\"><input class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email\" name=\"your-email\" size=\"40\" type=\"email\" value=\"afekshi@methoda.com\" aria-required=\"true\" aria-invalid=\"false\" \/><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">phone<\/span><\/span><span class=\"wpcf7-form-control-wrap your-phone\"><input class=\"wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel\" name=\"your-phone\" size=\"40\" type=\"tel\" value=\"\" aria-required=\"true\" aria-invalid=\"false\" \/><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">More info<\/span><\/span><span class=\"wpcf7-form-control-wrap your-message\"><textarea class=\"wpcf7-form-control wpcf7-textarea\" cols=\"40\" name=\"your-message\" rows=\"10\" aria-invalid=\"false\"><\/textarea><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><input class=\"wpcf7-form-control wpcf7-submit\" type=\"submit\" value=\"Send\" \/><\/span><\/span><\/form>\n<p>&nbsp;<\/p>\n","protected":false},"template":"","class_list":["post-11713","services","type-services","status-publish","hentry","service_category-infrastructure-cloud-he"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Methoda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.methoda.com\/he\/services\/\u05d9\u05e9-\u05d7\u05d9\u05e1\u05d5\u05df-\u05dc\u05de\u05ea\u05e7\u05e4\u05ea-\u05e1\u05d9\u05d9\u05d1\u05e8\" \/>\n<meta property=\"og:locale\" content=\"he_IL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Methoda\" \/>\n<meta property=\"og:description\" content=\"Studies show that the trend of cyber attacks is expanding all over the world, and the quantity and sophistication of attacks is constantly rising and charging heavy prices from the affected organizations, hospitals, educational institutions and even small and medium-sized businesses that depend on information in business computers \/ systems. The results of these attacks: &hellip; Continue reading \u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.methoda.com\/he\/services\/\u05d9\u05e9-\u05d7\u05d9\u05e1\u05d5\u05df-\u05dc\u05de\u05ea\u05e7\u05e4\u05ea-\u05e1\u05d9\u05d9\u05d1\u05e8\" \/>\n<meta property=\"og:site_name\" content=\"Methoda\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-02T05:45:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8\",\"url\":\"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8\",\"name\":\"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Methoda\",\"isPartOf\":{\"@id\":\"https:\/\/www.methoda.com\/#website\"},\"datePublished\":\"2020-07-12T08:50:53+00:00\",\"dateModified\":\"2022-06-02T05:45:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8#breadcrumb\"},\"inLanguage\":\"he-IL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.methoda.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.methoda.com\/#website\",\"url\":\"https:\/\/www.methoda.com\/\",\"name\":\"Methoda\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.methoda.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.methoda.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"he-IL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.methoda.com\/#organization\",\"name\":\"Methoda\",\"url\":\"https:\/\/www.methoda.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/www.methoda.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.methoda.com\/wp-content\/uploads\/2022\/08\/apple-icon-144x144-1.png\",\"contentUrl\":\"https:\/\/www.methoda.com\/wp-content\/uploads\/2022\/08\/apple-icon-144x144-1.png\",\"width\":144,\"height\":144,\"caption\":\"Methoda\"},\"image\":{\"@id\":\"https:\/\/www.methoda.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Methoda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.methoda.com\/he\/services\/\u05d9\u05e9-\u05d7\u05d9\u05e1\u05d5\u05df-\u05dc\u05de\u05ea\u05e7\u05e4\u05ea-\u05e1\u05d9\u05d9\u05d1\u05e8","og_locale":"he_IL","og_type":"article","og_title":"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Methoda","og_description":"Studies show that the trend of cyber attacks is expanding all over the world, and the quantity and sophistication of attacks is constantly rising and charging heavy prices from the affected organizations, hospitals, educational institutions and even small and medium-sized businesses that depend on information in business computers \/ systems. The results of these attacks: &hellip; Continue reading \u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 &rarr;","og_url":"https:\/\/www.methoda.com\/he\/services\/\u05d9\u05e9-\u05d7\u05d9\u05e1\u05d5\u05df-\u05dc\u05de\u05ea\u05e7\u05e4\u05ea-\u05e1\u05d9\u05d9\u05d1\u05e8","og_site_name":"Methoda","article_modified_time":"2022-06-02T05:45:51+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8","url":"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8","name":"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Methoda","isPartOf":{"@id":"https:\/\/www.methoda.com\/#website"},"datePublished":"2020-07-12T08:50:53+00:00","dateModified":"2022-06-02T05:45:51+00:00","breadcrumb":{"@id":"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8#breadcrumb"},"inLanguage":"he-IL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.methoda.com\/he\/services\/%d7%99%d7%a9-%d7%97%d7%99%d7%a1%d7%95%d7%9f-%d7%9c%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.methoda.com\/"},{"@type":"ListItem","position":2,"name":"\u05d9\u05e9 \u05d7\u05d9\u05e1\u05d5\u05df \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8"}]},{"@type":"WebSite","@id":"https:\/\/www.methoda.com\/#website","url":"https:\/\/www.methoda.com\/","name":"Methoda","description":"","publisher":{"@id":"https:\/\/www.methoda.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.methoda.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"he-IL"},{"@type":"Organization","@id":"https:\/\/www.methoda.com\/#organization","name":"Methoda","url":"https:\/\/www.methoda.com\/","logo":{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/www.methoda.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.methoda.com\/wp-content\/uploads\/2022\/08\/apple-icon-144x144-1.png","contentUrl":"https:\/\/www.methoda.com\/wp-content\/uploads\/2022\/08\/apple-icon-144x144-1.png","width":144,"height":144,"caption":"Methoda"},"image":{"@id":"https:\/\/www.methoda.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.methoda.com\/he\/wp-json\/wp\/v2\/services\/11713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.methoda.com\/he\/wp-json\/wp\/v2\/services"}],"about":[{"href":"https:\/\/www.methoda.com\/he\/wp-json\/wp\/v2\/types\/services"}],"wp:attachment":[{"href":"https:\/\/www.methoda.com\/he\/wp-json\/wp\/v2\/media?parent=11713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}