{"id":308,"date":"2025-03-05T04:07:24","date_gmt":"2025-03-05T04:07:24","guid":{"rendered":"https:\/\/sec-it.co.il\/?p=308"},"modified":"2025-07-23T09:37:50","modified_gmt":"2025-07-23T09:37:50","slug":"%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa","status":"publish","type":"post","link":"https:\/\/sec-it.co.il\/en\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/","title":{"rendered":"Employee awareness \u2013 the first line of defense before any information security system"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"308\" class=\"elementor elementor-308\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aec913d e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"aec913d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d628016 elementor-widget elementor-widget-text-editor\" data-id=\"d628016\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn the digital age, cyberattacks are becoming more widespread, sophisticated, and accessible than ever before. Today, even non-hackers can carry out an attack using attack services sold online. As a result,\u00a0<strong>Employee awareness<\/strong>\u00a0is becoming a critical factor, and information security managers are faced with a significant challenge - how to optimally utilize the defense budget?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c88719e elementor-widget elementor-widget-heading\" data-id=\"c88719e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Advanced security systems are not enough without employee awareness\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-832cc11 elementor-widget elementor-widget-text-editor\" data-id=\"832cc11\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMany organizations invest large sums in\u00a0<a href=\"https:\/\/sec-it.co.il\/en\/%d7%90%d7%91%d7%98%d7%97%d7%aa-%d7%9e%d7%99%d7%93%d7%a2-%d7%9c%d7%a2%d7%a1%d7%a7%d7%99%d7%9d-%d7%a7%d7%98%d7%a0%d7%99%d7%9d-%d7%9e%d7%93%d7%a8%d7%99%d7%9a-%d7%9c%d7%9e%d7%a0%d7%9b%d7%9c%d7%99%d7%9d\/\">information security solutions<\/a>, such as firewalls, advanced antivirus, and intrusion detection systems (IDS\/IPS), but forget the weakest link: the human factor.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df8ec1b elementor-widget elementor-widget-text-editor\" data-id=\"df8ec1b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tVisits to various organizations reveal worrying phenomena such as: \n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bdd62e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1bdd62e\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Passwords pasted on computer screens<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Unlocked and unattended workstations Employees sharing sensitive information in good faith in hallway or phone conversations.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Without awareness, any advanced information security system is just an empty shell.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b043b6 elementor-widget elementor-widget-heading\" data-id=\"4b043b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How do you strengthen security awareness in an organization?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c5903c elementor-widget elementor-widget-text-editor\" data-id=\"4c5903c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEducation and training are key! Every employee in an organization, without exception, needs to understand the importance of information security from day one. This can be achieved through:\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89bcaaa elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"89bcaaa\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Learning and attack simulations \u2013 to illustrate threats in an experiential way.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Clear policy documents \u2013 clear guidelines on what is allowed and what is not allowed.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ongoing training and practical exercises \u2013 making information security part of the organizational culture<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Controlled Phishing (Phishing Simulation) \u2013 Identifying and mitigating social engineering risks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7cc887 elementor-widget elementor-widget-heading\" data-id=\"e7cc887\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Employee awareness = the organization's first line of defense\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71a89f1 elementor-widget elementor-widget-text-editor\" data-id=\"71a89f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA security system can identify and respond to threats, but a skilled and aware employee can prevent them in advance. Investing in awareness will save an organization from financial damage, data breaches, and legal risks.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57d73f6 elementor-widget elementor-widget-text-editor\" data-id=\"57d73f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tRemember: Information security awareness is not a \u201cnice-to-have\u201d \u2013 it is the core component of protecting your organization.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e4ea7f elementor-widget elementor-widget-text-editor\" data-id=\"7e4ea7f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCybersecurity and IT \u2013 Two Words, One Solution\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u05d1\u05e2\u05d9\u05d3\u05df \u05d4\u05d3\u05d9\u05d2\u05d9\u05d8\u05dc\u05d9, \u05d4\u05ea\u05e7\u05e4\u05d5\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05d5\u05e4\u05db\u05d5\u05ea \u05dc\u05e0\u05e4\u05d5\u05e6\u05d5\u05ea, \u05de\u05ea\u05d5\u05d7\u05db\u05de\u05d5\u05ea \u05d5\u05e0\u05d2\u05d9\u05e9\u05d5\u05ea \u05d9\u05d5\u05ea\u05e8 \u05de\u05d0\u05d9 \u05e4\u05e2\u05dd. \u05db\u05d9\u05d5\u05dd, \u05d0\u05e4\u05d9\u05dc\u05d5 \u05de\u05d9 \u05e9\u05d0\u05d9\u05e0\u05d5 \u05d4\u05d0\u05e7\u05e8 \u05d9\u05db\u05d5\u05dc \u05dc\u05d1\u05e6\u05e2 \u05de\u05ea\u05e7\u05e4\u05d4 \u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05ea\u05e7\u05d9\u05e4\u05d4 \u05d4\u05e0\u05de\u05db\u05e8\u05d9\u05dd \u05d1\u05e8\u05e9\u05ea. \u05db\u05ea\u05d5\u05e6\u05d0\u05d4 \u05de\u05db\u05da,\u00a0\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd\u00a0\u05d4\u05d5\u05e4\u05db\u05ea \u05dc\u05d2\u05d5\u05e8\u05dd \u05e7\u05e8\u05d9\u05d8\u05d9, \u05d5\u05de\u05e0\u05d4\u05dc\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05e0\u05d9\u05e6\u05d1\u05d9\u05dd \u05d1\u05e4\u05e0\u05d9 \u05d0\u05ea\u05d2\u05e8 \u05de\u05e9\u05de\u05e2\u05d5\u05ea\u05d9 \u2013 \u05d0\u05d9\u05da \u05dc\u05e0\u05e6\u05dc \u05d0\u05ea \u05ea\u05e7\u05e6\u05d9\u05d1 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d1\u05e6\u05d5\u05e8\u05d4 \u05d4\u05d0\u05d5\u05e4\u05d8\u05d9\u05de\u05dc\u05d9\u05ea? \u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4 \u05de\u05ea\u05e7\u05d3\u05de\u05d5\u05ea \u05d0\u05d9\u05e0\u05df \u05de\u05e1\u05e4\u05d9\u05e7\u05d5\u05ea \u05dc\u05dc\u05d0 \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e8\u05d1\u05d9\u05dd \u05de\u05e9\u05e7\u05d9\u05e2\u05d9\u05dd \u05e1\u05db\u05d5\u05de\u05d9\u05dd \u05d2\u05d3\u05d5\u05dc\u05d9\u05dd \u05d1\u00a0\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2, \u05db\u05d2\u05d5\u05df \u05d7\u05d5\u05de\u05d5\u05ea \u05d0\u05e9, \u05d0\u05e0\u05d8\u05d9-\u05d5\u05d9\u05e8\u05d5\u05e1 \u05de\u05ea\u05e7\u05d3\u05dd \u05d5\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05d2\u05d9\u05dc\u05d5\u05d9 \u05d7\u05d3\u05d9\u05e8\u05d5\u05ea (IDS\/IPS), \u05d0\u05da \u05e9\u05d5\u05db\u05d7\u05d9\u05dd \u05d0\u05ea \u05d4\u05d7\u05d5\u05dc\u05d9\u05d4 \u05d4\u05d7\u05dc\u05e9\u05d4 \u05d1\u05d9\u05d5\u05ea\u05e8: \u05d4\u05d2\u05d5\u05e8\u05dd \u05d4\u05d0\u05e0\u05d5\u05e9\u05d9.\u05d1\u05d9\u05e7\u05d5\u05e8\u05d9\u05dd \u05d1\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e9\u05d5\u05e0\u05d9\u05dd \u05d7\u05d5\u05e9\u05e4\u05d9\u05dd \u05ea\u05d5\u05e4\u05e2\u05d5\u05ea \u05de\u05d3\u05d0\u05d9\u05d2\u05d5\u05ea \u05db\u05d2\u05d5\u05df: \u05e1\u05d9\u05e1\u05de\u05d0\u05d5\u05ea \u05de\u05d5\u05d3\u05d1\u05e7\u05d5\u05ea \u05e2\u05dc \u05de\u05e1\u05db\u05d9 \u05de\u05d7\u05e9\u05d1 \u05ea\u05d7\u05e0\u05d5\u05ea \u05e2\u05d1\u05d5\u05d3\u05d4 \u05dc\u05d0 \u05e0\u05e2\u05d5\u05dc\u05d5\u05ea \u05d5\u05dc\u05dc\u05d0 \u05d4\u05e9\u05d2\u05d7\u05d4\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05e9\u05de\u05e9\u05ea\u05e4\u05d9\u05dd \u05de\u05d9\u05d3\u05e2 \u05e8\u05d2\u05d9\u05e9 \u05d1\u05ea\u05d5\u05dd \u05dc\u05d1 \u05d1\u05e9\u05d9\u05d7\u05d5\u05ea \u05de\u05e1\u05d3\u05e8\u05d5\u05df \u05d0\u05d5 \u05d1\u05d8\u05dc\u05e4\u05d5\u05df \u05dc\u05dc\u05d0 \u05de\u05d5\u05d3\u05e2\u05d5\u05ea, \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05ea\u05e7\u05d3\u05de\u05ea \u05d4\u05d9\u05d0 \u05e8\u05e7 \u05e7\u05dc\u05d9\u05e4\u05d4 \u05e8\u05d9\u05e7\u05d4. \u05d0\u05d9\u05da \u05de\u05d7\u05d6\u05e7\u05d9\u05dd \u05d0\u05ea \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d1\u05d0\u05e8\u05d2\u05d5\u05df? \u05d7\u05d9\u05e0\u05d5\u05da \u05d5\u05d4\u05d3\u05e8\u05db\u05d4 \u05d4\u05dd \u05d4\u05de\u05e4\u05ea\u05d7! \u05db\u05dc \u05e2\u05d5\u05d1\u05d3 \u05d1\u05d0\u05e8\u05d2\u05d5\u05df, \u05dc\u05dc\u05d0 \u05d9\u05d5\u05e6\u05d0 \u05de\u05df \u05d4\u05db\u05dc\u05dc, \u05e6\u05e8\u05d9\u05da \u05dc\u05d4\u05d1\u05d9\u05df \u05d0\u05ea \u05d7\u05e9\u05d9\u05d1\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05db\u05d1\u05e8 \u05de\u05d9\u05d5\u05de\u05d5 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df. \u05e0\u05d9\u05ea\u05df \u05dc\u05d4\u05e9\u05d9\u05d2 \u05d6\u05d0\u05ea \u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea: \u05dc\u05d5\u05de\u05d3\u05d5\u05ea \u05d5\u05e1\u05d9\u05de\u05d5\u05dc\u05e6\u05d9\u05d5\u05ea \u05ea\u05e7\u05d9\u05e4\u05d4 \u2013 \u05dc\u05d4\u05de\u05d7\u05e9\u05ea \u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05d1\u05d0\u05d5\u05e4\u05df \u05d7\u05d5\u05d5\u05d9\u05d9\u05ea\u05d9 \u05de\u05e1\u05de\u05db\u05d9 \u05de\u05d3\u05d9\u05e0\u05d9\u05d5\u05ea \u05d1\u05e8\u05d5\u05e8\u05d9\u05dd \u2013 \u05d4\u05e0\u05d7\u05d9\u05d5\u05ea \u05d1\u05e8\u05d5\u05e8\u05d5\u05ea \u05dc\u05d2\u05d1\u05d9 \u05de\u05d4 \u05de\u05d5\u05ea\u05e8 \u05d5\u05de\u05d4 \u05d0\u05e1\u05d5\u05e8 \u05d4\u05d3\u05e8\u05db\u05d5\u05ea \u05e9\u05d5\u05d8\u05e4\u05d5\u05ea \u05d5\u05ea\u05e8\u05d2\u05d9\u05dc\u05d9\u05dd \u05de\u05e2\u05e9\u05d9\u05d9\u05dd \u2013 \u05d4\u05e4\u05d9\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05dc\u05d7\u05dc\u05e7 \u05de\u05d4\u05ea\u05e8\u05d1\u05d5\u05ea \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea \u05e4\u05d9\u05e9\u05d9\u05e0\u05d2 \u05de\u05d1\u05d5\u05e7\u05e8 (Phishing Simulation) \u2013 \u05d6\u05d9\u05d4\u05d5\u05d9 \u05d5\u05d4\u05e7\u05d8\u05e0\u05ea \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05d4\u05e0\u05d3\u05e1\u05d4 \u05d7\u05d1\u05e8\u05ea\u05d9\u05ea \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd = \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05e9\u05dc \u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d9\u05db\u05d5\u05dc\u05d4 \u05dc\u05d6\u05d4\u05d5\u05ea \u05d5\u05dc\u05d4\u05d2\u05d9\u05d1 \u05dc\u05d0\u05d9\u05d5\u05de\u05d9\u05dd, \u05d0\u05d1\u05dc \u05e2\u05d5\u05d1\u05d3 \u05de\u05d9\u05d5\u05de\u05df \u05d5\u05de\u05d5\u05d3\u05e2 \u05d9\u05db\u05d5\u05dc \u05dc\u05de\u05e0\u05d5\u05e2 \u05d0\u05d5\u05ea\u05dd \u05de\u05e8\u05d0\u05e9. \u05d4\u05e9\u05e7\u05e2\u05d4 \u05d1\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05ea\u05d7\u05e1\u05d5\u05da \u05dc\u05d0\u05e8\u05d2\u05d5\u05df \u05e0\u05d6\u05e7\u05d9\u05dd \u05db\u05dc\u05db\u05dc\u05d9\u05d9\u05dd, \u05e4\u05e8\u05d9\u05e6\u05d5\u05ea \u05e0\u05ea\u05d5\u05e0\u05d9\u05dd \u05d5\u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05de\u05e9\u05e4\u05d8\u05d9\u05d9\u05dd. \u05d6\u05db\u05d5\u05e8: \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d4\u05d9\u05d0 \u05dc\u05d0 \u201c\u05ea\u05d5\u05e1\u05e4\u05ea \u05e0\u05d7\u05de\u05d3\u05d4\u201d \u2013 \u05d4\u05d9\u05d0 \u05d4\u05de\u05e8\u05db\u05d9\u05d1 \u05d4\u05de\u05e8\u05db\u05d6\u05d9 \u05d1\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05e9\u05dc\u05da. \u05d0\u05d1\u05d8\u05d7\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5-IT \u2013 \u05e9\u05e0\u05d9 \u05e2\u05d5\u05dc\u05de\u05d5\u05ea, \u05e4\u05ea\u05e8\u05d5\u05df \u05d0\u05d7\u05d3<\/p>","protected":false},"author":2,"featured_media":217,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[23],"tags":[],"class_list":["post-308","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-23"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u2013 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 - IdanZabari Consultant<\/title>\n<meta name=\"description\" content=\"\u05d2\u05dc\u05d4 \u05de\u05d3\u05d5\u05e2 \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d4\u05d9\u05d0 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05d5\u05d4\u05d7\u05e9\u05d5\u05d1 \u05d1\u05d9\u05d5\u05ea\u05e8 \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2. \u05e9\u05e4\u05e8 \u05d0\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea \u05e2\u05dd \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05de\u05d5\u05d3\u05e2\u05d9\u05dd \u05d5\u05de\u05d9\u05d5\u05de\u05e0\u05d9\u05dd.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sec-it.co.il\/en\/\u05ea\u05d0\u05d9\u05de\u05d5\u05ea-\u05de\u05e2\u05e8\u05db\u05d5\u05ea-\u05d5\u05ea\u05d5\u05db\u05e0\u05d5\u05ea\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u2013 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 - IdanZabari Consultant\" \/>\n<meta property=\"og:description\" content=\"\u05d2\u05dc\u05d4 \u05de\u05d3\u05d5\u05e2 \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d4\u05d9\u05d0 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05d5\u05d4\u05d7\u05e9\u05d5\u05d1 \u05d1\u05d9\u05d5\u05ea\u05e8 \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2. \u05e9\u05e4\u05e8 \u05d0\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea \u05e2\u05dd \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05de\u05d5\u05d3\u05e2\u05d9\u05dd \u05d5\u05de\u05d9\u05d5\u05de\u05e0\u05d9\u05dd.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sec-it.co.il\/en\/\u05ea\u05d0\u05d9\u05de\u05d5\u05ea-\u05de\u05e2\u05e8\u05db\u05d5\u05ea-\u05d5\u05ea\u05d5\u05db\u05e0\u05d5\u05ea\/\" \/>\n<meta property=\"og:site_name\" content=\"IdanZabari Consultant\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/idan.zabari.7\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-05T04:07:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T09:37:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/programming-background-with-person-working-with-codes-computer-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"797\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Idan Zabari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/programming-background-with-person-working-with-codes-computer-11.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Idan Zabari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u2013 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 - IdanZabari Consultant","description":"\u05d2\u05dc\u05d4 \u05de\u05d3\u05d5\u05e2 \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d4\u05d9\u05d0 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05d5\u05d4\u05d7\u05e9\u05d5\u05d1 \u05d1\u05d9\u05d5\u05ea\u05e8 \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2. \u05e9\u05e4\u05e8 \u05d0\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea \u05e2\u05dd \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05de\u05d5\u05d3\u05e2\u05d9\u05dd \u05d5\u05de\u05d9\u05d5\u05de\u05e0\u05d9\u05dd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sec-it.co.il\/en\/\u05ea\u05d0\u05d9\u05de\u05d5\u05ea-\u05de\u05e2\u05e8\u05db\u05d5\u05ea-\u05d5\u05ea\u05d5\u05db\u05e0\u05d5\u05ea\/","og_locale":"en_US","og_type":"article","og_title":"\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u2013 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 - IdanZabari Consultant","og_description":"\u05d2\u05dc\u05d4 \u05de\u05d3\u05d5\u05e2 \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d4\u05d9\u05d0 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05d5\u05d4\u05d7\u05e9\u05d5\u05d1 \u05d1\u05d9\u05d5\u05ea\u05e8 \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2. \u05e9\u05e4\u05e8 \u05d0\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea \u05e2\u05dd \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05de\u05d5\u05d3\u05e2\u05d9\u05dd \u05d5\u05de\u05d9\u05d5\u05de\u05e0\u05d9\u05dd.","og_url":"https:\/\/sec-it.co.il\/en\/\u05ea\u05d0\u05d9\u05de\u05d5\u05ea-\u05de\u05e2\u05e8\u05db\u05d5\u05ea-\u05d5\u05ea\u05d5\u05db\u05e0\u05d5\u05ea\/","og_site_name":"IdanZabari Consultant","article_publisher":"https:\/\/www.facebook.com\/idan.zabari.7","article_published_time":"2025-03-05T04:07:24+00:00","article_modified_time":"2025-07-23T09:37:50+00:00","og_image":[{"width":797,"height":532,"url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/programming-background-with-person-working-with-codes-computer-11.jpg","type":"image\/jpeg"}],"author":"Idan Zabari","twitter_card":"summary_large_image","twitter_image":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/programming-background-with-person-working-with-codes-computer-11.jpg","twitter_misc":{"Written by":"Idan Zabari","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/#article","isPartOf":{"@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/"},"author":{"name":"Idan Zabari","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/cfd7ba754ca3d9c3abf2ba2999f8c280"},"headline":"\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u2013 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","datePublished":"2025-03-05T04:07:24+00:00","dateModified":"2025-07-23T09:37:50+00:00","mainEntityOfPage":{"@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/"},"wordCount":6,"commentCount":0,"publisher":{"@id":"https:\/\/sec-it.co.il\/#organization"},"image":{"@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/#primaryimage"},"thumbnailUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/programming-background-with-person-working-with-codes-computer-11.jpg","articleSection":["\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/","url":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/","name":"\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u2013 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 - IdanZabari Consultant","isPartOf":{"@id":"https:\/\/sec-it.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/#primaryimage"},"image":{"@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/#primaryimage"},"thumbnailUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/programming-background-with-person-working-with-codes-computer-11.jpg","datePublished":"2025-03-05T04:07:24+00:00","dateModified":"2025-07-23T09:37:50+00:00","description":"\u05d2\u05dc\u05d4 \u05de\u05d3\u05d5\u05e2 \u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d4\u05d9\u05d0 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05d5\u05d4\u05d7\u05e9\u05d5\u05d1 \u05d1\u05d9\u05d5\u05ea\u05e8 \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2. \u05e9\u05e4\u05e8 \u05d0\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea \u05e2\u05dd \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05de\u05d5\u05d3\u05e2\u05d9\u05dd \u05d5\u05de\u05d9\u05d5\u05de\u05e0\u05d9\u05dd.","breadcrumb":{"@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/#primaryimage","url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/programming-background-with-person-working-with-codes-computer-11.jpg","contentUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/programming-background-with-person-working-with-codes-computer-11.jpg","width":797,"height":532,"caption":"\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u2013 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"},{"@type":"BreadcrumbList","@id":"https:\/\/sec-it.co.il\/%d7%aa%d7%90%d7%99%d7%9e%d7%95%d7%aa-%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%95%d7%aa%d7%95%d7%9b%d7%a0%d7%95%d7%aa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sec-it.co.il\/"},{"@type":"ListItem","position":2,"name":"\u05de\u05d5\u05d3\u05e2\u05d5\u05ea \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u2013 \u05e7\u05d5 \u05d4\u05d4\u05d2\u05e0\u05d4 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05dc\u05e4\u05e0\u05d9 \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"}]},{"@type":"WebSite","@id":"https:\/\/sec-it.co.il\/#website","url":"https:\/\/sec-it.co.il\/","name":"IdanZabari Consultant","description":"","publisher":{"@id":"https:\/\/sec-it.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sec-it.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sec-it.co.il\/#organization","name":"IdanZabari Consultant","url":"https:\/\/sec-it.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/blog1.jpg","contentUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/blog1.jpg","width":517,"height":244,"caption":"IdanZabari Consultant"},"image":{"@id":"https:\/\/sec-it.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/idan.zabari.7","https:\/\/www.linkedin.com\/in\/idan-zabari\/"]},{"@type":"Person","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/cfd7ba754ca3d9c3abf2ba2999f8c280","name":"Idan Zabari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5a419db52cf16c061d540c62de30ee19bea96079b9901c8724b52c1ecb2958d2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5a419db52cf16c061d540c62de30ee19bea96079b9901c8724b52c1ecb2958d2?s=96&d=mm&r=g","caption":"Idan Zabari"}}]}},"_links":{"self":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts\/308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/comments?post=308"}],"version-history":[{"count":0,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts\/308\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/media\/217"}],"wp:attachment":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/media?parent=308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/categories?post=308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/tags?post=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}