{"id":5785,"date":"2025-08-01T04:43:05","date_gmt":"2025-08-01T04:43:05","guid":{"rendered":"https:\/\/sec-it.co.il\/?p=5785"},"modified":"2025-08-01T07:53:59","modified_gmt":"2025-08-01T07:53:59","slug":"golden-rules-survive-ransomware-management-tips","status":"publish","type":"post","link":"https:\/\/sec-it.co.il\/en\/golden-rules-survive-ransomware-management-tips\/","title":{"rendered":"5 Golden Rules for Surviving a Ransomware Attack \u2013 What Executives Must Do Before Their Business Collapses"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"5785\" class=\"elementor elementor-5785\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-705f8f2 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"705f8f2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-628396a elementor-widget elementor-widget-text-editor\" data-id=\"628396a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">By: Expert in Cyber Risk &amp; IT Governance \n(Based on Verizon DBIR, ENISA Threat Landscape, IBM Cost of a Data Breach)<\/p><p><b><span data-contrast=\"auto\">The Calm Before the Storm<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p class=\"translation-block\">This past May, I received a call at 3:00 a.m. from the CEO of a midsized manufacturing company. \nOn his screen was a message: \n\u201cYour files are encrypted. Pay 2 million USD in Bitcoin.\u201d<\/p><p class=\"translation-block\">Production lines were shut down. Systems were paralyzed. International customers were left without deliveries. Within hours, the incident escalated from an IT issue to an existential crisis.<\/p><p class=\"translation-block\">This story, like hundreds of others, proves one simple truth: In most ransomware crises, the biggest damage doesn\u2019t come from the hacker\u2014it comes from unprepared leadership.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9564eb elementor-widget elementor-widget-heading\" data-id=\"b9564eb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">1. Know the Price \u2013 The Numbers Don\u2019t Lie <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7db0a2a elementor-widget elementor-widget-text-editor\" data-id=\"7db0a2a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW96801336 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW96801336 BCX0\">According to <\/span><\/span><span class=\"TextRun SCXW96801336 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW96801336 BCX0\">report<\/span><\/span><span class=\"TextRun SCXW96801336 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW96801336 BCX0\"> According to the IBM Cost of a Data Breach 2024 Report:<\/span><\/span><span class=\"TextRun SCXW96801336 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW96801336 BCX0\">:<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86e67d3 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"86e67d3\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The average cost of a ransomware attack: $5.13M (not including ransom payments).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> 66% of affected organizations experienced downtime lasting more than a week. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cbf589 elementor-widget elementor-widget-text-editor\" data-id=\"8cbf589\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">The Verizon DBIR 2024 shows that 74% of incidents begin with human or managerial error\u2014not advanced technical exploits.<\/p><p><b><span data-contrast=\"auto\">\u05e1\u05d5\u05db\u05e0\u05d5\u05ea \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05e9\u05dc \u05d4\u05d0\u05d9\u05d7\u05d5\u05d3 \u05d4\u05d0\u05d9\u05e8\u05d5\u05e4\u05d9<\/span><\/b><b><span data-contrast=\"auto\">\u00a0 (ENISA)<\/span><\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ae57c0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0ae57c0\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">83% of organizations hit by ransomware suffer longterm reputational damage. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">25% never fully return to preattack business levels. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-592aa56 elementor-widget elementor-widget-heading\" data-id=\"592aa56\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">2. The 5 Golden Rules <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f6cc49 elementor-widget elementor-widget-heading\" data-id=\"7f6cc49\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Rule 1 \u2013 Accountability Lies With Leadership, Not IT\u00a0<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b56fbe8 elementor-widget elementor-widget-text-editor\" data-id=\"b56fbe8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Cyber risk management is a boardlevel issue. \n\nIf the CEO and CFO aren\u2019t directly engaged, nothing will change.\n\nAsk yourself: Who reports to you personally on cyber readiness, and how often?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-106fde2 elementor-widget elementor-widget-heading\" data-id=\"106fde2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">What to do tomorrow morning:\u00a0<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e59e54 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1e59e54\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Schedule quarterly board sessions dedicated to cyber risk governance. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Define a business KPI for cyber readiness (not a technical metric). <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6f3cba elementor-widget elementor-widget-heading\" data-id=\"a6f3cba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Rule 2 \u2013 Annual Crisis Simulation: Not on Paper \u2013 In Real Life\u00a0<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b012557 elementor-widget elementor-widget-text-editor\" data-id=\"b012557\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">The company I assisted believed it had a \u201cdisaster recovery plan.\u201d \nOn the day of the attack, it turned out that plan was just a document\u2014no one had ever tested it.<\/p><p class=\"translation-block\">IBM research: Organizations that run ransomware simulations at least once a year reduce incident costs by 43%.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe38e05 elementor-widget elementor-widget-heading\" data-id=\"fe38e05\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">What to do tomorrow morning:\u00a0<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1623c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1a1623c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Approve a budget for a fullscale simulation that mimics a total shutdown. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Make participation by senior executives mandatory\u2014not just IT staff. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c47d7f7 elementor-widget elementor-widget-heading\" data-id=\"c47d7f7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Rule 3 \u2013 Map and Prioritize Critical Assets\u00a0<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4475e6 elementor-widget elementor-widget-text-editor\" data-id=\"e4475e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">During a crisis, the first 48 hours are everything. \nIf you don\u2019t know your five most critical business assets, you\u2019ll waste precious time.<\/p><p class=\"translation-block\">Verizon research: 80% of time during an incident is spent just figuring out \u201cwhat\u2019s down\u201d rather than fixing the issue.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec0f219 elementor-widget elementor-widget-text-editor\" data-id=\"ec0f219\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What to do tomorrow morning:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5bc96d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e5bc96d\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Create a prioritized list of critical assets: what must come back online first. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Get executive approval and review it annually. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d8a0b6 elementor-widget elementor-widget-heading\" data-id=\"3d8a0b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Rule 4 \u2013 Transparency and Communication During a Crisis\u00a0<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f6024a elementor-widget elementor-widget-text-editor\" data-id=\"4f6024a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">In one recent case, the CEO tried to hide the incident.<\/span><span data-contrast=\"auto\">.<\/span>\u00a0<br \/><span data-contrast=\"auto\">The result: rumors spread internally, customers panicked, and the crisis tripled in scale.<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p class=\"translation-block\">ENISA: Organizations that communicate openly from day one retain 70% more customers compared to those that conceal incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cec4f9 elementor-widget elementor-widget-text-editor\" data-id=\"3cec4f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b><span data-contrast=\"auto\">What to do tomorrow morning<\/span><\/b><b><span data-contrast=\"auto\">:<\/span><\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38d7620 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"38d7620\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prepare a written communication playbook in advance. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Get executive approval and review it annually. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eba847c elementor-widget elementor-widget-heading\" data-id=\"eba847c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Rule 5 \u2013 Backups and Isolation \u2013 This Is Business Insurance\u00a0<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ef28a5 elementor-widget elementor-widget-text-editor\" data-id=\"7ef28a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">In the report<\/span><span data-contrast=\"auto\"> IBM <\/span><span data-contrast=\"auto\">It was found that 39% of affected companies were unable to restore a backup, even though they thought they had one.<\/span><span data-contrast=\"auto\">.<\/span>\u00a0<br \/><span data-contrast=\"auto\">The reason? No executive oversight of backup testing<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a423d6 elementor-widget elementor-widget-heading\" data-id=\"2a423d6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">What to do tomorrow morning:<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60b8a09 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"60b8a09\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Demand a quarterly executive report showing when a full restore was last tested. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Verify that backups are physically and logically isolated from the production network. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-045e077 elementor-widget elementor-widget-heading\" data-id=\"045e077\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What Happens When You Don\u2019t Act? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91000c6 elementor-widget elementor-widget-text-editor\" data-id=\"91000c6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW190821742 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW190821742 BCX0\">In the manufacturing company from the opening story<\/span><\/span><span class=\"TextRun SCXW190821742 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW190821742 BCX0\">:<\/span><\/span><span class=\"EOP SCXW190821742 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5897238 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5897238\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">18 days of downtime. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Lost contracts worth 7M ILS. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">4 senior executives resigned. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1a101c elementor-widget elementor-widget-text-editor\" data-id=\"c1a101c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">In the end, they paid the ransom\u2014and paid the reputational price as well.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1be677 elementor-widget elementor-widget-heading\" data-id=\"a1be677\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Final Message \u2013 \u201cRansomware Is Not a Technology Problem\u201d <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e68308 elementor-widget elementor-widget-text-editor\" data-id=\"4e68308\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Ransomware is a leadership stress test. \nOrganizations that treat it as an IT problem fail. \nThose that understand it\u2019s a business crisis\u2014and prepare accordingly\u2014survive, and often emerge stronger.<\/p><p><span class=\"TextRun SCXW23903246 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW23903246 BCX0\">If you\u2019re an executive, here are 5 actions you can start tomorrow morning<\/span><\/span><span class=\"TextRun SCXW23903246 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW23903246 BCX0\">:<\/span><\/span><span class=\"EOP SCXW23903246 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b03a4b elementor-widget elementor-widget-text-editor\" data-id=\"6b03a4b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"EOP SCXW23903246 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"><span class=\"TextRun SCXW46605917 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW46605917 BCX0\">1.\u00a0 <span class=\"TextRun SCXW95465560 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW95465560 BCX0\">Put cyber risk on the board agenda<\/span><\/span><span class=\"TextRun SCXW95465560 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW95465560 BCX0\">.<\/span><\/span><span class=\"EOP SCXW95465560 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/span><\/span><\/span><\/p><p>2. <span class=\"TextRun SCXW171949925 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW171949925 BCX0\">Fund a realworld simulation exercise<\/span><\/span><span class=\"TextRun SCXW171949925 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW171949925 BCX0\">.<\/span><\/span><span class=\"EOP SCXW171949925 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p>3.\u00a0 <span class=\"TextRun SCXW121259434 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW121259434 BCX0\">Know your critical assets<\/span><\/span><span class=\"TextRun SCXW121259434 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW121259434 BCX0\">.<\/span><\/span><span class=\"EOP SCXW121259434 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p>4. <span class=\"TextRun SCXW225749861 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW225749861 BCX0\">Prepare a crisis communication plan<\/span><\/span><span class=\"TextRun SCXW225749861 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW225749861 BCX0\">.<\/span><\/span><span class=\"EOP SCXW225749861 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p>5. <span class=\"TextRun SCXW127234184 BCX0\" lang=\"HE-IL\" xml:lang=\"HE-IL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW127234184 BCX0\">Demand frequent recovery testing<\/span><\/span><span class=\"TextRun SCXW127234184 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW127234184 BCX0\">.<\/span><\/span><span class=\"EOP SCXW127234184 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7a06b9 elementor-widget elementor-widget-text-editor\" data-id=\"f7a06b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">No company is immune. There are only prepared companies. \nThe choice is yours.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u05de\u05d0\u05ea: \u05de\u05d5\u05de\u05d7\u05d4 \u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5-IT\u00a0\u05de\u05d1\u05d5\u05e1\u05e1 \u05e2\u05dc \u05de\u05d7\u05e7\u05e8\u05d9\u00a0 Verizon DBIR, ENISA Threat Landscape, IBM Cost of a Data Breach))\u00a0 \u05d4\u05e9\u05e7\u05d8 \u05e9\u05dc\u05e4\u05e0\u05d9 \u05d4\u05e1\u05e2\u05e8\u05d4\u00a0 \u05d1\u05d7\u05d5\u05d3\u05e9 \u05de\u05d0\u05d9 \u05d4\u05d0\u05d7\u05e8\u05d5\u05df \u05e7\u05d9\u05d1\u05dc\u05ea\u05d9 \u05d8\u05dc\u05e4\u05d5\u05df \u05d1-03:00 \u05dc\u05e4\u05e0\u05d5\u05ea \u05d1\u05d5\u05e7\u05e8 \u05de\u05de\u05e0\u05db&quot;\u05dc \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea \u05d9\u05d9\u05e6\u05d5\u05e8 \u05d9\u05e9\u05e8\u05d0\u05dc\u05d9\u05ea \u05d1\u05d9\u05e0\u05d5\u05e0\u05d9\u05ea.\u00a0\u05e2\u05dc \u05d4\u05de\u05e1\u05da \u05e9\u05dc\u05d5 \u05d4\u05d5\u05e4\u05d9\u05e2\u05d4 \u05d4\u05d5\u05d3\u05e2\u05d4: \u201cYour files are encrypted. Pay 2 million USD in Bitcoin.\u201d\u00a0 \u05d4\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e9\u05d5\u05ea\u05e7\u05d5, \u05e4\u05e1 \u05d4\u05d9\u05d9\u05e6\u05d5\u05e8 \u05e0\u05e2\u05e6\u05e8, \u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05de\u05d7\u05d5&quot;\u05dc \u05dc\u05d0 \u05e7\u05d9\u05d1\u05dc\u05d5 \u05e1\u05d7\u05d5\u05e8\u05d4. \u05ea\u05d5\u05da \u05e9\u05e2\u05d5\u05ea \u2013 \u05d4\u05e4\u05d2\u05d9\u05e2\u05d4 \u05d4\u05e4\u05db\u05d4 \u05de\u05d0\u05d9\u05e8\u05d5\u05e2 IT \u05dc\u05de\u05e9\u05d1\u05e8 \u05e7\u05d9\u05d5\u05de\u05d9.\u00a0\u05d4\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d4\u05d1\u05d9\u05e0\u05d4 \u05de\u05d0\u05d5\u05d7\u05e8 \u05de\u05d3\u05d9: \u05dc\u05d0 \u05d4\u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d4 \u05db\u05e9\u05dc\u05d4, \u05d0\u05dc\u05d0 \u05d0\u05d7\u05e8\u05d9\u05d5\u05ea \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea \u05e9\u05dc\u05d0 \u05e0\u05dc\u05e7\u05d7\u05d4 \u05d1\u05e8\u05e6\u05d9\u05e0\u05d5\u05ea.\u00a0 \u05d4\u05e1\u05d9\u05e4\u05d5\u05e8 \u05d4\u05d6\u05d4, \u05db\u05de\u05d5 \u05de\u05d0\u05d5\u05ea \u05d0\u05d7\u05e8\u05d9\u05dd, \u05de\u05d5\u05db\u05d9\u05d7: \u05e8\u05d5\u05d1 \u05d4\u05e0\u05d6\u05e7\u05d9\u05dd \u05dc\u05d0 \u05e0\u05d2\u05e8\u05de\u05d9\u05dd \u05de\u05d4\u05d4\u05d0\u05e7\u05e8 \u2013 \u05d0\u05dc\u05d0 \u05de\u05d4\u05e2\u05d3\u05e8 \u05de\u05d5\u05db\u05e0\u05d5\u05ea \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea.\u00a0 1. \u05dc\u05d4\u05d1\u05d9\u05df \u05d0\u05ea \u05d4\u05de\u05d7\u05d9\u05e8 \u2013 \u05d4\u05e0\u05ea\u05d5\u05e0\u05d9\u05dd \u05dc\u05d0 \u05de\u05e9\u05e7\u05e8\u05d9\u05dd \u05dc\u05e4\u05d9 \u05d3\u05d5&quot;\u05d7 IBM Cost of a Data Breach 2024: \u05e2\u05dc\u05d5\u05ea \u05de\u05de\u05d5\u05e6\u05e2\u05ea \u05e9\u05dc \u05d0\u05d9\u05e8\u05d5\u05e2 \u05db\u05d5\u05e4\u05e8\u05d4: 5.13 \u05de\u05d9\u05dc\u05d9\u05d5\u05df \u05d3\u05d5\u05dc\u05e8 (\u05dc\u05d0 \u05db\u05d5\u05dc\u05dc \u05db\u05d5\u05e4\u05e8). 66% \u05de\u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5 \u05d7\u05d5\u05d5 \u05d4\u05e9\u05d1\u05ea\u05d4 \u05e9\u05dc \u05d9\u05d5\u05ea\u05e8 \u05de\u05e9\u05d1\u05d5\u05e2. \u05d3\u05d5&quot;\u05d7 Verizon DBIR 2024 \u05e7\u05d5\u05d1\u05e2 \u05e9-74% \u05de\u05d4\u05d0\u05d9\u05e8\u05d5\u05e2\u05d9\u05dd \u05de\u05ea\u05d7\u05d9\u05dc\u05d9\u05dd \u05de\u05e9\u05d2\u05d9\u05d0\u05d4 \u05d0\u05e0\u05d5\u05e9\u05d9\u05ea \u05d0\u05d5 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea, \u05d5\u05dc\u05d0 \u05de\u05e4\u05e8\u05d9\u05e6\u05d4 \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05ea \u05de\u05ea\u05d5\u05d7\u05db\u05de\u05ea.\u00a0 \u05e1\u05d5\u05db\u05e0\u05d5\u05ea \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05e9\u05dc \u05d4\u05d0\u05d9\u05d7\u05d5\u05d3 \u05d4\u05d0\u05d9\u05e8\u05d5\u05e4\u05d9\u00a0 (ENISA) 83% \u05de\u05d4\u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5\u05ea \u05de\u05db\u05d5\u05e4\u05e8\u05d4 \u05d7\u05d5\u05d5\u05ea \u05e4\u05d2\u05d9\u05e2\u05d4 \u05d0\u05e8\u05d5\u05db\u05ea \u05d8\u05d5\u05d5\u05d7 \u05d1\u05de\u05d5\u05e0\u05d9\u05d8\u05d9\u05df. 25% \u05dc\u05d0 \u05d7\u05d5\u05d6\u05e8\u05d5\u05ea \u05dc\u05e2\u05d5\u05dc\u05dd \u05dc\u05d4\u05d9\u05e7\u05e4\u05d9 \u05d4\u05e4\u05e2\u05d9\u05dc\u05d5\u05ea \u05d4\u05e7\u05d5\u05d3\u05de\u05d9\u05dd. 2. \u05d7\u05de\u05e9\u05ea \u05db\u05dc\u05dc\u05d9 \u05d4\u05d6\u05d4\u05d1 \u05db\u05dc\u05dc 1 \u2013 \u05d4\u05d0\u05d7\u05e8\u05d9\u05d5\u05ea \u05d4\u05d9\u05d0 \u05e9\u05dc \u05d4\u05d4\u05e0\u05d4\u05dc\u05d4, \u05dc\u05d0 \u05e9\u05dc \u05d4-IT\u00a0 \u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05d5\u05d0 \u05e0\u05d5\u05e9\u05d0 \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df.\u00a0\u05d0\u05dd \u05d4-CEO \u05d5\u05d4-CFO \u05dc\u05d0 \u05e2\u05d5\u05e1\u05e7\u05d9\u05dd \u05d1\u05d6\u05d4 \u05d1\u05d0\u05d5\u05e4\u05df \u05e7\u05d1\u05d5\u05e2, \u05d6\u05d4 \u05dc\u05d0 \u05d9\u05e7\u05e8\u05d4.\u00a0\u05e9\u05d0\u05dc\u05d4 \u05dc\u05de\u05e0\u05db&quot;\u05dc: \u05de\u05d9 \u05de\u05d3\u05d5\u05d5\u05d7 \u05dc\u05da \u05d0\u05d9\u05e9\u05d9\u05ea \u05e2\u05dc \u05de\u05d5\u05db\u05e0\u05d5\u05ea \u05dc\u05d0\u05d9\u05e8\u05d5\u05e2\u05d9 \u05db\u05d5\u05e4\u05e8\u05d4, \u05d5\u05d1\u05d0\u05d9\u05d6\u05d5 \u05ea\u05d3\u05d9\u05e8\u05d5\u05ea?\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8:\u00a0 \u05dc\u05e7\u05d1\u05d5\u05e2 \u05d9\u05e9\u05d9\u05d1\u05ea \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df \u05e8\u05d1\u05e2\u05d5\u05e0\u05d9\u05ea \u05d9\u05d9\u05e2\u05d5\u05d3\u05d9\u05ea \u05dc\u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8. \u05dc\u05d4\u05d2\u05d3\u05d9\u05e8 KPI \u05e2\u05e1\u05e7\u05d9 \u05dc\u05de\u05d3\u05d3 \u05de\u05d5\u05db\u05e0\u05d5\u05ea (\u05d5\u05dc\u05d0 \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9). \u05db\u05dc\u05dc 2 \u2013 \u05ea\u05e8\u05d7\u05d9\u05e9 \u05d0\u05d9\u05de\u05d5\u05df \u05e9\u05e0\u05ea\u05d9: \u05dc\u05d0 \u05e2\u05dc \u05d4\u05e0\u05d9\u05d9\u05e8 \u2013 \u05e2\u05dc \u05d4\u05de\u05e6\u05d9\u05d0\u05d5\u05ea\u00a0 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e9\u05d0\u05d5\u05ea\u05d4 \u05dc\u05d9\u05d5\u05d5\u05d9\u05ea\u05d9 \u05d7\u05e9\u05d1\u05d4 \u05e9\u05d9\u05e9 &quot;\u05ea\u05d5\u05db\u05e0\u05d9\u05ea \u05d4\u05ea\u05d0\u05d5\u05e9\u05e9\u05d5\u05ea&quot;.\u00a0\u05d1\u05d9\u05d5\u05dd \u05d4\u05d0\u05de\u05ea \u05d4\u05ea\u05d1\u05e8\u05e8: \u05d4\u05de\u05e1\u05de\u05da \u05e7\u05d9\u05d9\u05dd \u2013 \u05d0\u05d1\u05dc \u05d0\u05e3 \u05d0\u05d7\u05d3 \u05dc\u05d0 \u05ea\u05e8\u05d2\u05dc \u05d0\u05d5\u05ea\u05d5.\u00a0 \u05de\u05d7\u05e7\u05e8 IBM: \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e9\u05de\u05ea\u05e8\u05d2\u05dc\u05d9\u05dd \u05d0\u05d9\u05e8\u05d5\u05e2\u05d9 \u05db\u05d5\u05e4\u05e8\u05d4 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4 \u2013 \u05de\u05e6\u05de\u05e6\u05de\u05d9\u05dd \u05d0\u05ea \u05e2\u05dc\u05d5\u05ea \u05d4\u05d0\u05d9\u05e8\u05d5\u05e2 \u05d1-43%.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8:\u00a0 \u05dc\u05d0\u05e9\u05e8 \u05ea\u05e7\u05e6\u05d9\u05d1 \u05dc\u05d0\u05d9\u05de\u05d5\u05df \u05e9\u05e0\u05ea\u05d9 \u05e9\u05de\u05d3\u05de\u05d4 \u05d4\u05e9\u05d1\u05ea\u05d4 \u05de\u05dc\u05d0\u05d4. \u05dc\u05d7\u05d9\u05d9\u05d1 \u05d4\u05e9\u05ea\u05ea\u05e4\u05d5\u05ea \u05d4\u05e0\u05d4\u05dc\u05d4 \u05d1\u05db\u05d9\u05e8\u05d4, \u05dc\u05d0 \u05e8\u05e7 \u05d0\u05e0\u05e9\u05d9 IT. \u05db\u05dc\u05dc 3 \u2013 \u05de\u05d9\u05e4\u05d5\u05d9 \u05d5\u05ea\u05e2\u05d3\u05d5\u05e3 \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd\u00a0 \u05d1\u05de\u05e9\u05d1\u05e8, 48 \u05e9\u05e2\u05d5\u05ea \u05d4\u05e8\u05d0\u05e9\u05d5\u05e0\u05d5\u05ea \u05e7\u05d5\u05d1\u05e2\u05d5\u05ea.\u00a0\u05de\u05d9 \u05e9\u05dc\u05d0 \u05d9\u05d5\u05d3\u05e2 \u05de\u05d4\u05dd 5 \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd \u05dc\u05e2\u05e1\u05e7 \u2013 \u05de\u05d1\u05d6\u05d1\u05d6 \u05d6\u05de\u05df \u05d9\u05e7\u05e8.\u00a0 \u05de\u05d7\u05e7\u05e8 Verizon: 80% \u05de\u05d4\u05d6\u05de\u05df \u05d1\u05d0\u05d9\u05e8\u05d5\u05e2 \u05de\u05d5\u05e9\u05e7\u05e2 \u05d1\u05dc\u05d4\u05d1\u05d9\u05df &quot;\u05de\u05d4 \u05e0\u05e4\u05dc&quot; \u05d5\u05dc\u05d0 \u05d1\u05dc\u05d4\u05e6\u05d9\u05dc.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d4\u05d2\u05d3\u05d9\u05e8 \u05e8\u05e9\u05d9\u05de\u05ea \u05e0\u05db\u05e1\u05d9\u05dd \u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd \u05e2\u05dd \u05d3\u05d9\u05e8\u05d5\u05d2: \u05de\u05d4 \u05d7\u05d9\u05d9\u05d1 \u05dc\u05e2\u05dc\u05d5\u05ea \u05e8\u05d0\u05e9\u05d5\u05df. \u05dc\u05d0\u05e9\u05e8 \u05d0\u05d5\u05ea\u05d4 \u05d1\u05d3\u05e8\u05d2 \u05d4\u05e0\u05d4\u05dc\u05d4 \u2013 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4. \u05db\u05dc\u05dc 4 \u2013 \u05e9\u05e7\u05d9\u05e4\u05d5\u05ea \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea \u05d1\u05de\u05e9\u05d1\u05e8\u00a0 \u05d1\u05de\u05e9\u05d1\u05e8 \u05d4\u05d0\u05d7\u05e8\u05d5\u05df \u05e9\u05dc\u05d9\u05d5\u05d5\u05d9\u05ea\u05d9, \u05d4\u05de\u05e0\u05db&quot;\u05dc \u05e0\u05d9\u05e1\u05d4 \u05dc\u05d4\u05e1\u05ea\u05d9\u05e8 \u05d0\u05ea \u05d4\u05d0\u05d9\u05e8\u05d5\u05e2.\u00a0\u05d4\u05ea\u05d5\u05e6\u05d0\u05d4: \u05d4\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d4\u05ea\u05d7\u05d9\u05dc\u05d5 \u05dc\u05d4\u05e4\u05d9\u05e5 \u05e9\u05de\u05d5\u05e2\u05d5\u05ea, \u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05d1\u05e8\u05d7\u05d5, \u05d5\u05d4\u05de\u05e9\u05d1\u05e8 \u05d2\u05d3\u05dc \u05e4\u05d9 \u05e9\u05dc\u05d5\u05e9\u05d4.\u00a0 \u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e9\u05e7\u05d5\u05e4\u05d5\u05ea \u05de\u05d4\u05e8\u05d2\u05e2 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05e9\u05d5\u05de\u05e8\u05d5\u05ea \u05e2\u05dc 70% \u05d9\u05d5\u05ea\u05e8 \u05de\u05d4\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05de\u05d0\u05e9\u05e8 \u05d0\u05dc\u05d5 \u05e9\u05de\u05e1\u05ea\u05d9\u05e8\u05d5\u05ea. (ENISA:)\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d4\u05db\u05d9\u05df \u05ea\u05e1\u05e8\u05d9\u05d8 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9 \u05db\u05ea\u05d5\u05d1 \u05de\u05e8\u05d0\u05e9. \u05dc\u05d0\u05e9\u05e8 \u05d0\u05d5\u05ea\u05d4 \u05d1\u05d3\u05e8\u05d2 \u05d4\u05e0\u05d4\u05dc\u05d4 \u2013 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4. \u05db\u05dc\u05dc 5 \u2013 \u05d2\u05d9\u05d1\u05d5\u05d9 \u05d5\u05d1\u05d9\u05d3\u05d5\u05d3 \u2013 \u05d6\u05d4 \u05dc\u05d0 IT, \u05d6\u05d4 \u05d1\u05d9\u05d8\u05d5\u05d7 \u05d7\u05d9\u05d9\u05dd\u00a0 \u05d1\u05d3\u05d5&quot;\u05d7 IBM \u05e0\u05de\u05e6\u05d0 \u05e9-39% \u05de\u05d4\u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5 \u05dc\u05d0 \u05d4\u05e6\u05dc\u05d9\u05d7\u05d5 \u05dc\u05e9\u05d7\u05d6\u05e8 \u05d2\u05d9\u05d1\u05d5\u05d9, \u05dc\u05de\u05e8\u05d5\u05ea \u05e9\u05d7\u05e9\u05d1\u05d5 \u05e9\u05d9\u05e9 \u05dc\u05d4\u05df.\u00a0\u05d4\u05e1\u05d9\u05d1\u05d4: \u05dc\u05d0 \u05d4\u05d9\u05d4 \u05ea\u05d4\u05dc\u05d9\u05da \u05d1\u05d3\u05d9\u05e7\u05d4 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9 \u05e9\u05dc \u05d4\u05d2\u05d9\u05d1\u05d5\u05d9\u05d9\u05dd.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d3\u05e8\u05d5\u05e9 \u05d3\u05d5\u05d7 \u05d4\u05e0\u05d4\u05dc\u05d4 \u05e8\u05d1\u05e2\u05d5\u05e0\u05d9 \u05e9\u05de\u05e8\u05d0\u05d4 \u05de\u05ea\u05d9 \u05d1\u05d5\u05e6\u05e2 \u05e9\u05d7\u05d6\u05d5\u05e8 \u05de\u05dc\u05d0 \u05d1\u05e4\u05d5\u05e2\u05dc. \u05dc\u05d5\u05d5\u05d3\u05d0 \u05e9\u05d4\u05d2\u05d9\u05d1\u05d5\u05d9 \u05de\u05d1\u05d5\u05d3\u05d3 \u05de\u05e8\u05e9\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4. \u05de\u05d4 \u05e7\u05d5\u05e8\u05d4 \u05db\u05e9\u05dc\u05d0 \u05e4\u05d5\u05e2\u05dc\u05d9\u05dd? \u05d1\u05d7\u05d1\u05e8\u05d4 \u05d4\u05ea\u05e2\u05e9\u05d9\u05d9\u05ea\u05d9\u05ea \u05de\u05d4\u05e1\u05d9\u05e4\u05d5\u05e8 \u05d1\u05e4\u05ea\u05d9\u05d7\u05d4:\u00a0 18 \u05d9\u05de\u05d9 \u05d4\u05e9\u05d1\u05ea\u05d4. \u05d0\u05d5\u05d1\u05d3\u05df \u05d7\u05d5\u05d6\u05d9\u05dd \u05d1\u05d4\u05d9\u05e7\u05e3 7 \u05de\u05d9\u05dc\u05d9\u05d5\u05df \u20aa. 4 \u05de\u05e0\u05d4\u05dc\u05d9\u05dd \u05d1\u05db\u05d9\u05e8\u05d9\u05dd \u05d4\u05ea\u05e4\u05d8\u05e8\u05d5. \u05d1\u05e1\u05d5\u05e3, \u05d4\u05dd \u05e9\u05d9\u05dc\u05de\u05d5 \u05d0\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u2013 \u05d5\u05d2\u05dd \u05d0\u05ea \u05d4\u05de\u05d7\u05d9\u05e8 \u05d4\u05ea\u05d3\u05de\u05d9\u05ea\u05d9.\u00a0 \u05de\u05e1\u05e8 \u05dc\u05e1\u05d9\u05d5\u05dd \u2013 &quot;\u05db\u05d5\u05e4\u05e8\u05d4 \u05d4\u05d9\u05d0 \u05dc\u05d0 \u05d1\u05e2\u05d9\u05d4 \u05e9\u05dc \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d4&quot; \u05db\u05d5\u05e4\u05e8\u05d4 \u05d4\u05d9\u05d0 \u05de\u05d1\u05d7\u05df \u05de\u05e0\u05d4\u05d9\u05d2\u05d5\u05ea.\u00a0\u05de\u05d9 \u05e9\u05de\u05d8\u05e4\u05dc \u05d1\u05d4 \u05e8\u05e7 \u05d3\u05e8\u05da \u05de\u05d7\u05dc\u05e7\u05ea \u05d4-IT \u2013 \u05e0\u05db\u05e9\u05dc.\u00a0\u05de\u05d9 \u05e9\u05de\u05d1\u05d9\u05df \u05e9\u05d6\u05d4 \u05de\u05e9\u05d1\u05e8 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9, \u05d5\u05de\u05db\u05d9\u05df \u05d0\u05ea \u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05d1\u05d4\u05ea\u05d0\u05dd \u2013 \u05e9\u05d5\u05e8\u05d3, \u05d5\u05dc\u05e2\u05d9\u05ea\u05d9\u05dd \u05d9\u05d5\u05e6\u05d0 \u05de\u05d7\u05d5\u05d6\u05e7. \u05d0\u05dd \u05d0\u05ea\u05dd \u05de\u05e0\u05d4\u05dc\u05d9\u05dd \u2013 \u05d9\u05e9 5 \u05e4\u05e2\u05d5\u05dc\u05d5\u05ea \u05e9\u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8 \u05d0\u05e4\u05e9\u05e8 \u05dc\u05e2\u05e9\u05d5\u05ea:\u00a0 1.\u00a0 \u05dc\u05d4\u05db\u05e0\u05d9\u05e1 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05dc\u05d3\u05d9\u05d5\u05df \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df.\u00a0 2. \u05dc\u05d0\u05e9\u05e8 \u05ea\u05e7\u05e6\u05d9\u05d1 \u05dc\u05ea\u05e8\u05d2\u05d5\u05dc \u05d0\u05de\u05d9\u05ea\u05d9.\u00a0 3.\u00a0 \u05dc\u05d4\u05db\u05d9\u05e8 \u05d0\u05ea \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd.\u00a0 4. \u05dc\u05d4\u05db\u05d9\u05df \u05de\u05e1\u05e8 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9 \u05de\u05e8\u05d0\u05e9.\u00a0 5. \u05dc\u05d3\u05e8\u05d5\u05e9 \u05d1\u05d3\u05d9\u05e7\u05d5\u05ea \u05e9\u05d7\u05d6\u05d5\u05e8 \u05e7\u05d1\u05d5\u05e2\u05d5\u05ea.\u00a0 \u05d0\u05d9\u05df \u05d0\u05e8\u05d2\u05d5\u05df \u05d7\u05e1\u05d9\u05df. \u05d9\u05e9 \u05d0\u05e8\u05d2\u05d5\u05df \u05de\u05d5\u05db\u05df.\u00a0\u05d4\u05d1\u05d7\u05d9\u05e8\u05d4 \u2013 \u05e9\u05dc\u05db\u05dd.\u00a0<\/p>","protected":false},"author":2,"featured_media":5795,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[23],"tags":[],"class_list":["post-5785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-23"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 \u05db\u05dc\u05dc\u05d9 \u05d6\u05d4\u05d1 \u05dc\u05d4\u05d9\u05e9\u05e8\u05d3\u05d5\u05ea \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8\u05d4 \u2013 \u05de\u05d4 \u05e9\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d7\u05d9\u05d9\u05d1\u05ea \u05dc\u05e2\u05e9\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05e2\u05e1\u05e7 \u05d9\u05d9\u05e4\u05d5\u05dc - IdanZabari Consultant<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sec-it.co.il\/en\/golden-rules-survive-ransomware-management-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 \u05db\u05dc\u05dc\u05d9 \u05d6\u05d4\u05d1 \u05dc\u05d4\u05d9\u05e9\u05e8\u05d3\u05d5\u05ea \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8\u05d4 \u2013 \u05de\u05d4 \u05e9\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d7\u05d9\u05d9\u05d1\u05ea \u05dc\u05e2\u05e9\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05e2\u05e1\u05e7 \u05d9\u05d9\u05e4\u05d5\u05dc - IdanZabari Consultant\" \/>\n<meta property=\"og:description\" content=\"\u05de\u05d0\u05ea: \u05de\u05d5\u05de\u05d7\u05d4 \u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5-IT\u00a0\u05de\u05d1\u05d5\u05e1\u05e1 \u05e2\u05dc \u05de\u05d7\u05e7\u05e8\u05d9\u00a0 Verizon DBIR, ENISA Threat Landscape, IBM Cost of a Data Breach))\u00a0 \u05d4\u05e9\u05e7\u05d8 \u05e9\u05dc\u05e4\u05e0\u05d9 \u05d4\u05e1\u05e2\u05e8\u05d4\u00a0 \u05d1\u05d7\u05d5\u05d3\u05e9 \u05de\u05d0\u05d9 \u05d4\u05d0\u05d7\u05e8\u05d5\u05df \u05e7\u05d9\u05d1\u05dc\u05ea\u05d9 \u05d8\u05dc\u05e4\u05d5\u05df \u05d1-03:00 \u05dc\u05e4\u05e0\u05d5\u05ea \u05d1\u05d5\u05e7\u05e8 \u05de\u05de\u05e0\u05db&quot;\u05dc \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea \u05d9\u05d9\u05e6\u05d5\u05e8 \u05d9\u05e9\u05e8\u05d0\u05dc\u05d9\u05ea \u05d1\u05d9\u05e0\u05d5\u05e0\u05d9\u05ea.\u00a0\u05e2\u05dc \u05d4\u05de\u05e1\u05da \u05e9\u05dc\u05d5 \u05d4\u05d5\u05e4\u05d9\u05e2\u05d4 \u05d4\u05d5\u05d3\u05e2\u05d4: \u201cYour files are encrypted. Pay 2 million USD in Bitcoin.\u201d\u00a0 \u05d4\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e9\u05d5\u05ea\u05e7\u05d5, \u05e4\u05e1 \u05d4\u05d9\u05d9\u05e6\u05d5\u05e8 \u05e0\u05e2\u05e6\u05e8, \u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05de\u05d7\u05d5&quot;\u05dc \u05dc\u05d0 \u05e7\u05d9\u05d1\u05dc\u05d5 \u05e1\u05d7\u05d5\u05e8\u05d4. \u05ea\u05d5\u05da \u05e9\u05e2\u05d5\u05ea \u2013 \u05d4\u05e4\u05d2\u05d9\u05e2\u05d4 \u05d4\u05e4\u05db\u05d4 \u05de\u05d0\u05d9\u05e8\u05d5\u05e2 IT \u05dc\u05de\u05e9\u05d1\u05e8 \u05e7\u05d9\u05d5\u05de\u05d9.\u00a0\u05d4\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d4\u05d1\u05d9\u05e0\u05d4 \u05de\u05d0\u05d5\u05d7\u05e8 \u05de\u05d3\u05d9: \u05dc\u05d0 \u05d4\u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d4 \u05db\u05e9\u05dc\u05d4, \u05d0\u05dc\u05d0 \u05d0\u05d7\u05e8\u05d9\u05d5\u05ea \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea \u05e9\u05dc\u05d0 \u05e0\u05dc\u05e7\u05d7\u05d4 \u05d1\u05e8\u05e6\u05d9\u05e0\u05d5\u05ea.\u00a0 \u05d4\u05e1\u05d9\u05e4\u05d5\u05e8 \u05d4\u05d6\u05d4, \u05db\u05de\u05d5 \u05de\u05d0\u05d5\u05ea \u05d0\u05d7\u05e8\u05d9\u05dd, \u05de\u05d5\u05db\u05d9\u05d7: \u05e8\u05d5\u05d1 \u05d4\u05e0\u05d6\u05e7\u05d9\u05dd \u05dc\u05d0 \u05e0\u05d2\u05e8\u05de\u05d9\u05dd \u05de\u05d4\u05d4\u05d0\u05e7\u05e8 \u2013 \u05d0\u05dc\u05d0 \u05de\u05d4\u05e2\u05d3\u05e8 \u05de\u05d5\u05db\u05e0\u05d5\u05ea \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea.\u00a0 1. \u05dc\u05d4\u05d1\u05d9\u05df \u05d0\u05ea \u05d4\u05de\u05d7\u05d9\u05e8 \u2013 \u05d4\u05e0\u05ea\u05d5\u05e0\u05d9\u05dd \u05dc\u05d0 \u05de\u05e9\u05e7\u05e8\u05d9\u05dd \u05dc\u05e4\u05d9 \u05d3\u05d5&quot;\u05d7 IBM Cost of a Data Breach 2024: \u05e2\u05dc\u05d5\u05ea \u05de\u05de\u05d5\u05e6\u05e2\u05ea \u05e9\u05dc \u05d0\u05d9\u05e8\u05d5\u05e2 \u05db\u05d5\u05e4\u05e8\u05d4: 5.13 \u05de\u05d9\u05dc\u05d9\u05d5\u05df \u05d3\u05d5\u05dc\u05e8 (\u05dc\u05d0 \u05db\u05d5\u05dc\u05dc \u05db\u05d5\u05e4\u05e8). 66% \u05de\u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5 \u05d7\u05d5\u05d5 \u05d4\u05e9\u05d1\u05ea\u05d4 \u05e9\u05dc \u05d9\u05d5\u05ea\u05e8 \u05de\u05e9\u05d1\u05d5\u05e2. \u05d3\u05d5&quot;\u05d7 Verizon DBIR 2024 \u05e7\u05d5\u05d1\u05e2 \u05e9-74% \u05de\u05d4\u05d0\u05d9\u05e8\u05d5\u05e2\u05d9\u05dd \u05de\u05ea\u05d7\u05d9\u05dc\u05d9\u05dd \u05de\u05e9\u05d2\u05d9\u05d0\u05d4 \u05d0\u05e0\u05d5\u05e9\u05d9\u05ea \u05d0\u05d5 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea, \u05d5\u05dc\u05d0 \u05de\u05e4\u05e8\u05d9\u05e6\u05d4 \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05ea \u05de\u05ea\u05d5\u05d7\u05db\u05de\u05ea.\u00a0 \u05e1\u05d5\u05db\u05e0\u05d5\u05ea \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05e9\u05dc \u05d4\u05d0\u05d9\u05d7\u05d5\u05d3 \u05d4\u05d0\u05d9\u05e8\u05d5\u05e4\u05d9\u00a0 (ENISA) 83% \u05de\u05d4\u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5\u05ea \u05de\u05db\u05d5\u05e4\u05e8\u05d4 \u05d7\u05d5\u05d5\u05ea \u05e4\u05d2\u05d9\u05e2\u05d4 \u05d0\u05e8\u05d5\u05db\u05ea \u05d8\u05d5\u05d5\u05d7 \u05d1\u05de\u05d5\u05e0\u05d9\u05d8\u05d9\u05df. 25% \u05dc\u05d0 \u05d7\u05d5\u05d6\u05e8\u05d5\u05ea \u05dc\u05e2\u05d5\u05dc\u05dd \u05dc\u05d4\u05d9\u05e7\u05e4\u05d9 \u05d4\u05e4\u05e2\u05d9\u05dc\u05d5\u05ea \u05d4\u05e7\u05d5\u05d3\u05de\u05d9\u05dd. 2. \u05d7\u05de\u05e9\u05ea \u05db\u05dc\u05dc\u05d9 \u05d4\u05d6\u05d4\u05d1 \u05db\u05dc\u05dc 1 \u2013 \u05d4\u05d0\u05d7\u05e8\u05d9\u05d5\u05ea \u05d4\u05d9\u05d0 \u05e9\u05dc \u05d4\u05d4\u05e0\u05d4\u05dc\u05d4, \u05dc\u05d0 \u05e9\u05dc \u05d4-IT\u00a0 \u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05d5\u05d0 \u05e0\u05d5\u05e9\u05d0 \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df.\u00a0\u05d0\u05dd \u05d4-CEO \u05d5\u05d4-CFO \u05dc\u05d0 \u05e2\u05d5\u05e1\u05e7\u05d9\u05dd \u05d1\u05d6\u05d4 \u05d1\u05d0\u05d5\u05e4\u05df \u05e7\u05d1\u05d5\u05e2, \u05d6\u05d4 \u05dc\u05d0 \u05d9\u05e7\u05e8\u05d4.\u00a0\u05e9\u05d0\u05dc\u05d4 \u05dc\u05de\u05e0\u05db&quot;\u05dc: \u05de\u05d9 \u05de\u05d3\u05d5\u05d5\u05d7 \u05dc\u05da \u05d0\u05d9\u05e9\u05d9\u05ea \u05e2\u05dc \u05de\u05d5\u05db\u05e0\u05d5\u05ea \u05dc\u05d0\u05d9\u05e8\u05d5\u05e2\u05d9 \u05db\u05d5\u05e4\u05e8\u05d4, \u05d5\u05d1\u05d0\u05d9\u05d6\u05d5 \u05ea\u05d3\u05d9\u05e8\u05d5\u05ea?\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8:\u00a0 \u05dc\u05e7\u05d1\u05d5\u05e2 \u05d9\u05e9\u05d9\u05d1\u05ea \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df \u05e8\u05d1\u05e2\u05d5\u05e0\u05d9\u05ea \u05d9\u05d9\u05e2\u05d5\u05d3\u05d9\u05ea \u05dc\u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8. \u05dc\u05d4\u05d2\u05d3\u05d9\u05e8 KPI \u05e2\u05e1\u05e7\u05d9 \u05dc\u05de\u05d3\u05d3 \u05de\u05d5\u05db\u05e0\u05d5\u05ea (\u05d5\u05dc\u05d0 \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9). \u05db\u05dc\u05dc 2 \u2013 \u05ea\u05e8\u05d7\u05d9\u05e9 \u05d0\u05d9\u05de\u05d5\u05df \u05e9\u05e0\u05ea\u05d9: \u05dc\u05d0 \u05e2\u05dc \u05d4\u05e0\u05d9\u05d9\u05e8 \u2013 \u05e2\u05dc \u05d4\u05de\u05e6\u05d9\u05d0\u05d5\u05ea\u00a0 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e9\u05d0\u05d5\u05ea\u05d4 \u05dc\u05d9\u05d5\u05d5\u05d9\u05ea\u05d9 \u05d7\u05e9\u05d1\u05d4 \u05e9\u05d9\u05e9 &quot;\u05ea\u05d5\u05db\u05e0\u05d9\u05ea \u05d4\u05ea\u05d0\u05d5\u05e9\u05e9\u05d5\u05ea&quot;.\u00a0\u05d1\u05d9\u05d5\u05dd \u05d4\u05d0\u05de\u05ea \u05d4\u05ea\u05d1\u05e8\u05e8: \u05d4\u05de\u05e1\u05de\u05da \u05e7\u05d9\u05d9\u05dd \u2013 \u05d0\u05d1\u05dc \u05d0\u05e3 \u05d0\u05d7\u05d3 \u05dc\u05d0 \u05ea\u05e8\u05d2\u05dc \u05d0\u05d5\u05ea\u05d5.\u00a0 \u05de\u05d7\u05e7\u05e8 IBM: \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e9\u05de\u05ea\u05e8\u05d2\u05dc\u05d9\u05dd \u05d0\u05d9\u05e8\u05d5\u05e2\u05d9 \u05db\u05d5\u05e4\u05e8\u05d4 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4 \u2013 \u05de\u05e6\u05de\u05e6\u05de\u05d9\u05dd \u05d0\u05ea \u05e2\u05dc\u05d5\u05ea \u05d4\u05d0\u05d9\u05e8\u05d5\u05e2 \u05d1-43%.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8:\u00a0 \u05dc\u05d0\u05e9\u05e8 \u05ea\u05e7\u05e6\u05d9\u05d1 \u05dc\u05d0\u05d9\u05de\u05d5\u05df \u05e9\u05e0\u05ea\u05d9 \u05e9\u05de\u05d3\u05de\u05d4 \u05d4\u05e9\u05d1\u05ea\u05d4 \u05de\u05dc\u05d0\u05d4. \u05dc\u05d7\u05d9\u05d9\u05d1 \u05d4\u05e9\u05ea\u05ea\u05e4\u05d5\u05ea \u05d4\u05e0\u05d4\u05dc\u05d4 \u05d1\u05db\u05d9\u05e8\u05d4, \u05dc\u05d0 \u05e8\u05e7 \u05d0\u05e0\u05e9\u05d9 IT. \u05db\u05dc\u05dc 3 \u2013 \u05de\u05d9\u05e4\u05d5\u05d9 \u05d5\u05ea\u05e2\u05d3\u05d5\u05e3 \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd\u00a0 \u05d1\u05de\u05e9\u05d1\u05e8, 48 \u05e9\u05e2\u05d5\u05ea \u05d4\u05e8\u05d0\u05e9\u05d5\u05e0\u05d5\u05ea \u05e7\u05d5\u05d1\u05e2\u05d5\u05ea.\u00a0\u05de\u05d9 \u05e9\u05dc\u05d0 \u05d9\u05d5\u05d3\u05e2 \u05de\u05d4\u05dd 5 \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd \u05dc\u05e2\u05e1\u05e7 \u2013 \u05de\u05d1\u05d6\u05d1\u05d6 \u05d6\u05de\u05df \u05d9\u05e7\u05e8.\u00a0 \u05de\u05d7\u05e7\u05e8 Verizon: 80% \u05de\u05d4\u05d6\u05de\u05df \u05d1\u05d0\u05d9\u05e8\u05d5\u05e2 \u05de\u05d5\u05e9\u05e7\u05e2 \u05d1\u05dc\u05d4\u05d1\u05d9\u05df &quot;\u05de\u05d4 \u05e0\u05e4\u05dc&quot; \u05d5\u05dc\u05d0 \u05d1\u05dc\u05d4\u05e6\u05d9\u05dc.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d4\u05d2\u05d3\u05d9\u05e8 \u05e8\u05e9\u05d9\u05de\u05ea \u05e0\u05db\u05e1\u05d9\u05dd \u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd \u05e2\u05dd \u05d3\u05d9\u05e8\u05d5\u05d2: \u05de\u05d4 \u05d7\u05d9\u05d9\u05d1 \u05dc\u05e2\u05dc\u05d5\u05ea \u05e8\u05d0\u05e9\u05d5\u05df. \u05dc\u05d0\u05e9\u05e8 \u05d0\u05d5\u05ea\u05d4 \u05d1\u05d3\u05e8\u05d2 \u05d4\u05e0\u05d4\u05dc\u05d4 \u2013 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4. \u05db\u05dc\u05dc 4 \u2013 \u05e9\u05e7\u05d9\u05e4\u05d5\u05ea \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea \u05d1\u05de\u05e9\u05d1\u05e8\u00a0 \u05d1\u05de\u05e9\u05d1\u05e8 \u05d4\u05d0\u05d7\u05e8\u05d5\u05df \u05e9\u05dc\u05d9\u05d5\u05d5\u05d9\u05ea\u05d9, \u05d4\u05de\u05e0\u05db&quot;\u05dc \u05e0\u05d9\u05e1\u05d4 \u05dc\u05d4\u05e1\u05ea\u05d9\u05e8 \u05d0\u05ea \u05d4\u05d0\u05d9\u05e8\u05d5\u05e2.\u00a0\u05d4\u05ea\u05d5\u05e6\u05d0\u05d4: \u05d4\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d4\u05ea\u05d7\u05d9\u05dc\u05d5 \u05dc\u05d4\u05e4\u05d9\u05e5 \u05e9\u05de\u05d5\u05e2\u05d5\u05ea, \u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05d1\u05e8\u05d7\u05d5, \u05d5\u05d4\u05de\u05e9\u05d1\u05e8 \u05d2\u05d3\u05dc \u05e4\u05d9 \u05e9\u05dc\u05d5\u05e9\u05d4.\u00a0 \u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e9\u05e7\u05d5\u05e4\u05d5\u05ea \u05de\u05d4\u05e8\u05d2\u05e2 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05e9\u05d5\u05de\u05e8\u05d5\u05ea \u05e2\u05dc 70% \u05d9\u05d5\u05ea\u05e8 \u05de\u05d4\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05de\u05d0\u05e9\u05e8 \u05d0\u05dc\u05d5 \u05e9\u05de\u05e1\u05ea\u05d9\u05e8\u05d5\u05ea. (ENISA:)\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d4\u05db\u05d9\u05df \u05ea\u05e1\u05e8\u05d9\u05d8 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9 \u05db\u05ea\u05d5\u05d1 \u05de\u05e8\u05d0\u05e9. \u05dc\u05d0\u05e9\u05e8 \u05d0\u05d5\u05ea\u05d4 \u05d1\u05d3\u05e8\u05d2 \u05d4\u05e0\u05d4\u05dc\u05d4 \u2013 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4. \u05db\u05dc\u05dc 5 \u2013 \u05d2\u05d9\u05d1\u05d5\u05d9 \u05d5\u05d1\u05d9\u05d3\u05d5\u05d3 \u2013 \u05d6\u05d4 \u05dc\u05d0 IT, \u05d6\u05d4 \u05d1\u05d9\u05d8\u05d5\u05d7 \u05d7\u05d9\u05d9\u05dd\u00a0 \u05d1\u05d3\u05d5&quot;\u05d7 IBM \u05e0\u05de\u05e6\u05d0 \u05e9-39% \u05de\u05d4\u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5 \u05dc\u05d0 \u05d4\u05e6\u05dc\u05d9\u05d7\u05d5 \u05dc\u05e9\u05d7\u05d6\u05e8 \u05d2\u05d9\u05d1\u05d5\u05d9, \u05dc\u05de\u05e8\u05d5\u05ea \u05e9\u05d7\u05e9\u05d1\u05d5 \u05e9\u05d9\u05e9 \u05dc\u05d4\u05df.\u00a0\u05d4\u05e1\u05d9\u05d1\u05d4: \u05dc\u05d0 \u05d4\u05d9\u05d4 \u05ea\u05d4\u05dc\u05d9\u05da \u05d1\u05d3\u05d9\u05e7\u05d4 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9 \u05e9\u05dc \u05d4\u05d2\u05d9\u05d1\u05d5\u05d9\u05d9\u05dd.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d3\u05e8\u05d5\u05e9 \u05d3\u05d5\u05d7 \u05d4\u05e0\u05d4\u05dc\u05d4 \u05e8\u05d1\u05e2\u05d5\u05e0\u05d9 \u05e9\u05de\u05e8\u05d0\u05d4 \u05de\u05ea\u05d9 \u05d1\u05d5\u05e6\u05e2 \u05e9\u05d7\u05d6\u05d5\u05e8 \u05de\u05dc\u05d0 \u05d1\u05e4\u05d5\u05e2\u05dc. \u05dc\u05d5\u05d5\u05d3\u05d0 \u05e9\u05d4\u05d2\u05d9\u05d1\u05d5\u05d9 \u05de\u05d1\u05d5\u05d3\u05d3 \u05de\u05e8\u05e9\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4. \u05de\u05d4 \u05e7\u05d5\u05e8\u05d4 \u05db\u05e9\u05dc\u05d0 \u05e4\u05d5\u05e2\u05dc\u05d9\u05dd? \u05d1\u05d7\u05d1\u05e8\u05d4 \u05d4\u05ea\u05e2\u05e9\u05d9\u05d9\u05ea\u05d9\u05ea \u05de\u05d4\u05e1\u05d9\u05e4\u05d5\u05e8 \u05d1\u05e4\u05ea\u05d9\u05d7\u05d4:\u00a0 18 \u05d9\u05de\u05d9 \u05d4\u05e9\u05d1\u05ea\u05d4. \u05d0\u05d5\u05d1\u05d3\u05df \u05d7\u05d5\u05d6\u05d9\u05dd \u05d1\u05d4\u05d9\u05e7\u05e3 7 \u05de\u05d9\u05dc\u05d9\u05d5\u05df \u20aa. 4 \u05de\u05e0\u05d4\u05dc\u05d9\u05dd \u05d1\u05db\u05d9\u05e8\u05d9\u05dd \u05d4\u05ea\u05e4\u05d8\u05e8\u05d5. \u05d1\u05e1\u05d5\u05e3, \u05d4\u05dd \u05e9\u05d9\u05dc\u05de\u05d5 \u05d0\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u2013 \u05d5\u05d2\u05dd \u05d0\u05ea \u05d4\u05de\u05d7\u05d9\u05e8 \u05d4\u05ea\u05d3\u05de\u05d9\u05ea\u05d9.\u00a0 \u05de\u05e1\u05e8 \u05dc\u05e1\u05d9\u05d5\u05dd \u2013 &quot;\u05db\u05d5\u05e4\u05e8\u05d4 \u05d4\u05d9\u05d0 \u05dc\u05d0 \u05d1\u05e2\u05d9\u05d4 \u05e9\u05dc \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d4&quot; \u05db\u05d5\u05e4\u05e8\u05d4 \u05d4\u05d9\u05d0 \u05de\u05d1\u05d7\u05df \u05de\u05e0\u05d4\u05d9\u05d2\u05d5\u05ea.\u00a0\u05de\u05d9 \u05e9\u05de\u05d8\u05e4\u05dc \u05d1\u05d4 \u05e8\u05e7 \u05d3\u05e8\u05da \u05de\u05d7\u05dc\u05e7\u05ea \u05d4-IT \u2013 \u05e0\u05db\u05e9\u05dc.\u00a0\u05de\u05d9 \u05e9\u05de\u05d1\u05d9\u05df \u05e9\u05d6\u05d4 \u05de\u05e9\u05d1\u05e8 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9, \u05d5\u05de\u05db\u05d9\u05df \u05d0\u05ea \u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05d1\u05d4\u05ea\u05d0\u05dd \u2013 \u05e9\u05d5\u05e8\u05d3, \u05d5\u05dc\u05e2\u05d9\u05ea\u05d9\u05dd \u05d9\u05d5\u05e6\u05d0 \u05de\u05d7\u05d5\u05d6\u05e7. \u05d0\u05dd \u05d0\u05ea\u05dd \u05de\u05e0\u05d4\u05dc\u05d9\u05dd \u2013 \u05d9\u05e9 5 \u05e4\u05e2\u05d5\u05dc\u05d5\u05ea \u05e9\u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8 \u05d0\u05e4\u05e9\u05e8 \u05dc\u05e2\u05e9\u05d5\u05ea:\u00a0 1.\u00a0 \u05dc\u05d4\u05db\u05e0\u05d9\u05e1 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05dc\u05d3\u05d9\u05d5\u05df \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df.\u00a0 2. \u05dc\u05d0\u05e9\u05e8 \u05ea\u05e7\u05e6\u05d9\u05d1 \u05dc\u05ea\u05e8\u05d2\u05d5\u05dc \u05d0\u05de\u05d9\u05ea\u05d9.\u00a0 3.\u00a0 \u05dc\u05d4\u05db\u05d9\u05e8 \u05d0\u05ea \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd.\u00a0 4. \u05dc\u05d4\u05db\u05d9\u05df \u05de\u05e1\u05e8 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9 \u05de\u05e8\u05d0\u05e9.\u00a0 5. \u05dc\u05d3\u05e8\u05d5\u05e9 \u05d1\u05d3\u05d9\u05e7\u05d5\u05ea \u05e9\u05d7\u05d6\u05d5\u05e8 \u05e7\u05d1\u05d5\u05e2\u05d5\u05ea.\u00a0 \u05d0\u05d9\u05df \u05d0\u05e8\u05d2\u05d5\u05df \u05d7\u05e1\u05d9\u05df. \u05d9\u05e9 \u05d0\u05e8\u05d2\u05d5\u05df \u05de\u05d5\u05db\u05df.\u00a0\u05d4\u05d1\u05d7\u05d9\u05e8\u05d4 \u2013 \u05e9\u05dc\u05db\u05dd.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sec-it.co.il\/en\/golden-rules-survive-ransomware-management-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"IdanZabari Consultant\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/idan.zabari.7\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-01T04:43:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-01T07:53:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/08\/Ransomware-Attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"552\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Idan Zabari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Idan Zabari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 \u05db\u05dc\u05dc\u05d9 \u05d6\u05d4\u05d1 \u05dc\u05d4\u05d9\u05e9\u05e8\u05d3\u05d5\u05ea \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8\u05d4 \u2013 \u05de\u05d4 \u05e9\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d7\u05d9\u05d9\u05d1\u05ea \u05dc\u05e2\u05e9\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05e2\u05e1\u05e7 \u05d9\u05d9\u05e4\u05d5\u05dc - IdanZabari Consultant","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sec-it.co.il\/en\/golden-rules-survive-ransomware-management-tips\/","og_locale":"en_US","og_type":"article","og_title":"5 \u05db\u05dc\u05dc\u05d9 \u05d6\u05d4\u05d1 \u05dc\u05d4\u05d9\u05e9\u05e8\u05d3\u05d5\u05ea \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8\u05d4 \u2013 \u05de\u05d4 \u05e9\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d7\u05d9\u05d9\u05d1\u05ea \u05dc\u05e2\u05e9\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05e2\u05e1\u05e7 \u05d9\u05d9\u05e4\u05d5\u05dc - IdanZabari Consultant","og_description":"\u05de\u05d0\u05ea: \u05de\u05d5\u05de\u05d7\u05d4 \u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5-IT\u00a0\u05de\u05d1\u05d5\u05e1\u05e1 \u05e2\u05dc \u05de\u05d7\u05e7\u05e8\u05d9\u00a0 Verizon DBIR, ENISA Threat Landscape, IBM Cost of a Data Breach))\u00a0 \u05d4\u05e9\u05e7\u05d8 \u05e9\u05dc\u05e4\u05e0\u05d9 \u05d4\u05e1\u05e2\u05e8\u05d4\u00a0 \u05d1\u05d7\u05d5\u05d3\u05e9 \u05de\u05d0\u05d9 \u05d4\u05d0\u05d7\u05e8\u05d5\u05df \u05e7\u05d9\u05d1\u05dc\u05ea\u05d9 \u05d8\u05dc\u05e4\u05d5\u05df \u05d1-03:00 \u05dc\u05e4\u05e0\u05d5\u05ea \u05d1\u05d5\u05e7\u05e8 \u05de\u05de\u05e0\u05db&quot;\u05dc \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea \u05d9\u05d9\u05e6\u05d5\u05e8 \u05d9\u05e9\u05e8\u05d0\u05dc\u05d9\u05ea \u05d1\u05d9\u05e0\u05d5\u05e0\u05d9\u05ea.\u00a0\u05e2\u05dc \u05d4\u05de\u05e1\u05da \u05e9\u05dc\u05d5 \u05d4\u05d5\u05e4\u05d9\u05e2\u05d4 \u05d4\u05d5\u05d3\u05e2\u05d4: \u201cYour files are encrypted. Pay 2 million USD in Bitcoin.\u201d\u00a0 \u05d4\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e9\u05d5\u05ea\u05e7\u05d5, \u05e4\u05e1 \u05d4\u05d9\u05d9\u05e6\u05d5\u05e8 \u05e0\u05e2\u05e6\u05e8, \u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05de\u05d7\u05d5&quot;\u05dc \u05dc\u05d0 \u05e7\u05d9\u05d1\u05dc\u05d5 \u05e1\u05d7\u05d5\u05e8\u05d4. \u05ea\u05d5\u05da \u05e9\u05e2\u05d5\u05ea \u2013 \u05d4\u05e4\u05d2\u05d9\u05e2\u05d4 \u05d4\u05e4\u05db\u05d4 \u05de\u05d0\u05d9\u05e8\u05d5\u05e2 IT \u05dc\u05de\u05e9\u05d1\u05e8 \u05e7\u05d9\u05d5\u05de\u05d9.\u00a0\u05d4\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d4\u05d1\u05d9\u05e0\u05d4 \u05de\u05d0\u05d5\u05d7\u05e8 \u05de\u05d3\u05d9: \u05dc\u05d0 \u05d4\u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d4 \u05db\u05e9\u05dc\u05d4, \u05d0\u05dc\u05d0 \u05d0\u05d7\u05e8\u05d9\u05d5\u05ea \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea \u05e9\u05dc\u05d0 \u05e0\u05dc\u05e7\u05d7\u05d4 \u05d1\u05e8\u05e6\u05d9\u05e0\u05d5\u05ea.\u00a0 \u05d4\u05e1\u05d9\u05e4\u05d5\u05e8 \u05d4\u05d6\u05d4, \u05db\u05de\u05d5 \u05de\u05d0\u05d5\u05ea \u05d0\u05d7\u05e8\u05d9\u05dd, \u05de\u05d5\u05db\u05d9\u05d7: \u05e8\u05d5\u05d1 \u05d4\u05e0\u05d6\u05e7\u05d9\u05dd \u05dc\u05d0 \u05e0\u05d2\u05e8\u05de\u05d9\u05dd \u05de\u05d4\u05d4\u05d0\u05e7\u05e8 \u2013 \u05d0\u05dc\u05d0 \u05de\u05d4\u05e2\u05d3\u05e8 \u05de\u05d5\u05db\u05e0\u05d5\u05ea \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea.\u00a0 1. \u05dc\u05d4\u05d1\u05d9\u05df \u05d0\u05ea \u05d4\u05de\u05d7\u05d9\u05e8 \u2013 \u05d4\u05e0\u05ea\u05d5\u05e0\u05d9\u05dd \u05dc\u05d0 \u05de\u05e9\u05e7\u05e8\u05d9\u05dd \u05dc\u05e4\u05d9 \u05d3\u05d5&quot;\u05d7 IBM Cost of a Data Breach 2024: \u05e2\u05dc\u05d5\u05ea \u05de\u05de\u05d5\u05e6\u05e2\u05ea \u05e9\u05dc \u05d0\u05d9\u05e8\u05d5\u05e2 \u05db\u05d5\u05e4\u05e8\u05d4: 5.13 \u05de\u05d9\u05dc\u05d9\u05d5\u05df \u05d3\u05d5\u05dc\u05e8 (\u05dc\u05d0 \u05db\u05d5\u05dc\u05dc \u05db\u05d5\u05e4\u05e8). 66% \u05de\u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5 \u05d7\u05d5\u05d5 \u05d4\u05e9\u05d1\u05ea\u05d4 \u05e9\u05dc \u05d9\u05d5\u05ea\u05e8 \u05de\u05e9\u05d1\u05d5\u05e2. \u05d3\u05d5&quot;\u05d7 Verizon DBIR 2024 \u05e7\u05d5\u05d1\u05e2 \u05e9-74% \u05de\u05d4\u05d0\u05d9\u05e8\u05d5\u05e2\u05d9\u05dd \u05de\u05ea\u05d7\u05d9\u05dc\u05d9\u05dd \u05de\u05e9\u05d2\u05d9\u05d0\u05d4 \u05d0\u05e0\u05d5\u05e9\u05d9\u05ea \u05d0\u05d5 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9\u05ea, \u05d5\u05dc\u05d0 \u05de\u05e4\u05e8\u05d9\u05e6\u05d4 \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05ea \u05de\u05ea\u05d5\u05d7\u05db\u05de\u05ea.\u00a0 \u05e1\u05d5\u05db\u05e0\u05d5\u05ea \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05e9\u05dc \u05d4\u05d0\u05d9\u05d7\u05d5\u05d3 \u05d4\u05d0\u05d9\u05e8\u05d5\u05e4\u05d9\u00a0 (ENISA) 83% \u05de\u05d4\u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5\u05ea \u05de\u05db\u05d5\u05e4\u05e8\u05d4 \u05d7\u05d5\u05d5\u05ea \u05e4\u05d2\u05d9\u05e2\u05d4 \u05d0\u05e8\u05d5\u05db\u05ea \u05d8\u05d5\u05d5\u05d7 \u05d1\u05de\u05d5\u05e0\u05d9\u05d8\u05d9\u05df. 25% \u05dc\u05d0 \u05d7\u05d5\u05d6\u05e8\u05d5\u05ea \u05dc\u05e2\u05d5\u05dc\u05dd \u05dc\u05d4\u05d9\u05e7\u05e4\u05d9 \u05d4\u05e4\u05e2\u05d9\u05dc\u05d5\u05ea \u05d4\u05e7\u05d5\u05d3\u05de\u05d9\u05dd. 2. \u05d7\u05de\u05e9\u05ea \u05db\u05dc\u05dc\u05d9 \u05d4\u05d6\u05d4\u05d1 \u05db\u05dc\u05dc 1 \u2013 \u05d4\u05d0\u05d7\u05e8\u05d9\u05d5\u05ea \u05d4\u05d9\u05d0 \u05e9\u05dc \u05d4\u05d4\u05e0\u05d4\u05dc\u05d4, \u05dc\u05d0 \u05e9\u05dc \u05d4-IT\u00a0 \u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05d5\u05d0 \u05e0\u05d5\u05e9\u05d0 \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df.\u00a0\u05d0\u05dd \u05d4-CEO \u05d5\u05d4-CFO \u05dc\u05d0 \u05e2\u05d5\u05e1\u05e7\u05d9\u05dd \u05d1\u05d6\u05d4 \u05d1\u05d0\u05d5\u05e4\u05df \u05e7\u05d1\u05d5\u05e2, \u05d6\u05d4 \u05dc\u05d0 \u05d9\u05e7\u05e8\u05d4.\u00a0\u05e9\u05d0\u05dc\u05d4 \u05dc\u05de\u05e0\u05db&quot;\u05dc: \u05de\u05d9 \u05de\u05d3\u05d5\u05d5\u05d7 \u05dc\u05da \u05d0\u05d9\u05e9\u05d9\u05ea \u05e2\u05dc \u05de\u05d5\u05db\u05e0\u05d5\u05ea \u05dc\u05d0\u05d9\u05e8\u05d5\u05e2\u05d9 \u05db\u05d5\u05e4\u05e8\u05d4, \u05d5\u05d1\u05d0\u05d9\u05d6\u05d5 \u05ea\u05d3\u05d9\u05e8\u05d5\u05ea?\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8:\u00a0 \u05dc\u05e7\u05d1\u05d5\u05e2 \u05d9\u05e9\u05d9\u05d1\u05ea \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df \u05e8\u05d1\u05e2\u05d5\u05e0\u05d9\u05ea \u05d9\u05d9\u05e2\u05d5\u05d3\u05d9\u05ea \u05dc\u05e0\u05d9\u05d4\u05d5\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9 \u05e1\u05d9\u05d9\u05d1\u05e8. \u05dc\u05d4\u05d2\u05d3\u05d9\u05e8 KPI \u05e2\u05e1\u05e7\u05d9 \u05dc\u05de\u05d3\u05d3 \u05de\u05d5\u05db\u05e0\u05d5\u05ea (\u05d5\u05dc\u05d0 \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9). \u05db\u05dc\u05dc 2 \u2013 \u05ea\u05e8\u05d7\u05d9\u05e9 \u05d0\u05d9\u05de\u05d5\u05df \u05e9\u05e0\u05ea\u05d9: \u05dc\u05d0 \u05e2\u05dc \u05d4\u05e0\u05d9\u05d9\u05e8 \u2013 \u05e2\u05dc \u05d4\u05de\u05e6\u05d9\u05d0\u05d5\u05ea\u00a0 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e9\u05d0\u05d5\u05ea\u05d4 \u05dc\u05d9\u05d5\u05d5\u05d9\u05ea\u05d9 \u05d7\u05e9\u05d1\u05d4 \u05e9\u05d9\u05e9 &quot;\u05ea\u05d5\u05db\u05e0\u05d9\u05ea \u05d4\u05ea\u05d0\u05d5\u05e9\u05e9\u05d5\u05ea&quot;.\u00a0\u05d1\u05d9\u05d5\u05dd \u05d4\u05d0\u05de\u05ea \u05d4\u05ea\u05d1\u05e8\u05e8: \u05d4\u05de\u05e1\u05de\u05da \u05e7\u05d9\u05d9\u05dd \u2013 \u05d0\u05d1\u05dc \u05d0\u05e3 \u05d0\u05d7\u05d3 \u05dc\u05d0 \u05ea\u05e8\u05d2\u05dc \u05d0\u05d5\u05ea\u05d5.\u00a0 \u05de\u05d7\u05e7\u05e8 IBM: \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e9\u05de\u05ea\u05e8\u05d2\u05dc\u05d9\u05dd \u05d0\u05d9\u05e8\u05d5\u05e2\u05d9 \u05db\u05d5\u05e4\u05e8\u05d4 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4 \u2013 \u05de\u05e6\u05de\u05e6\u05de\u05d9\u05dd \u05d0\u05ea \u05e2\u05dc\u05d5\u05ea \u05d4\u05d0\u05d9\u05e8\u05d5\u05e2 \u05d1-43%.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8:\u00a0 \u05dc\u05d0\u05e9\u05e8 \u05ea\u05e7\u05e6\u05d9\u05d1 \u05dc\u05d0\u05d9\u05de\u05d5\u05df \u05e9\u05e0\u05ea\u05d9 \u05e9\u05de\u05d3\u05de\u05d4 \u05d4\u05e9\u05d1\u05ea\u05d4 \u05de\u05dc\u05d0\u05d4. \u05dc\u05d7\u05d9\u05d9\u05d1 \u05d4\u05e9\u05ea\u05ea\u05e4\u05d5\u05ea \u05d4\u05e0\u05d4\u05dc\u05d4 \u05d1\u05db\u05d9\u05e8\u05d4, \u05dc\u05d0 \u05e8\u05e7 \u05d0\u05e0\u05e9\u05d9 IT. \u05db\u05dc\u05dc 3 \u2013 \u05de\u05d9\u05e4\u05d5\u05d9 \u05d5\u05ea\u05e2\u05d3\u05d5\u05e3 \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd\u00a0 \u05d1\u05de\u05e9\u05d1\u05e8, 48 \u05e9\u05e2\u05d5\u05ea \u05d4\u05e8\u05d0\u05e9\u05d5\u05e0\u05d5\u05ea \u05e7\u05d5\u05d1\u05e2\u05d5\u05ea.\u00a0\u05de\u05d9 \u05e9\u05dc\u05d0 \u05d9\u05d5\u05d3\u05e2 \u05de\u05d4\u05dd 5 \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd \u05dc\u05e2\u05e1\u05e7 \u2013 \u05de\u05d1\u05d6\u05d1\u05d6 \u05d6\u05de\u05df \u05d9\u05e7\u05e8.\u00a0 \u05de\u05d7\u05e7\u05e8 Verizon: 80% \u05de\u05d4\u05d6\u05de\u05df \u05d1\u05d0\u05d9\u05e8\u05d5\u05e2 \u05de\u05d5\u05e9\u05e7\u05e2 \u05d1\u05dc\u05d4\u05d1\u05d9\u05df &quot;\u05de\u05d4 \u05e0\u05e4\u05dc&quot; \u05d5\u05dc\u05d0 \u05d1\u05dc\u05d4\u05e6\u05d9\u05dc.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d4\u05d2\u05d3\u05d9\u05e8 \u05e8\u05e9\u05d9\u05de\u05ea \u05e0\u05db\u05e1\u05d9\u05dd \u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd \u05e2\u05dd \u05d3\u05d9\u05e8\u05d5\u05d2: \u05de\u05d4 \u05d7\u05d9\u05d9\u05d1 \u05dc\u05e2\u05dc\u05d5\u05ea \u05e8\u05d0\u05e9\u05d5\u05df. \u05dc\u05d0\u05e9\u05e8 \u05d0\u05d5\u05ea\u05d4 \u05d1\u05d3\u05e8\u05d2 \u05d4\u05e0\u05d4\u05dc\u05d4 \u2013 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4. \u05db\u05dc\u05dc 4 \u2013 \u05e9\u05e7\u05d9\u05e4\u05d5\u05ea \u05d5\u05ea\u05e7\u05e9\u05d5\u05e8\u05ea \u05d1\u05de\u05e9\u05d1\u05e8\u00a0 \u05d1\u05de\u05e9\u05d1\u05e8 \u05d4\u05d0\u05d7\u05e8\u05d5\u05df \u05e9\u05dc\u05d9\u05d5\u05d5\u05d9\u05ea\u05d9, \u05d4\u05de\u05e0\u05db&quot;\u05dc \u05e0\u05d9\u05e1\u05d4 \u05dc\u05d4\u05e1\u05ea\u05d9\u05e8 \u05d0\u05ea \u05d4\u05d0\u05d9\u05e8\u05d5\u05e2.\u00a0\u05d4\u05ea\u05d5\u05e6\u05d0\u05d4: \u05d4\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d4\u05ea\u05d7\u05d9\u05dc\u05d5 \u05dc\u05d4\u05e4\u05d9\u05e5 \u05e9\u05de\u05d5\u05e2\u05d5\u05ea, \u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05d1\u05e8\u05d7\u05d5, \u05d5\u05d4\u05de\u05e9\u05d1\u05e8 \u05d2\u05d3\u05dc \u05e4\u05d9 \u05e9\u05dc\u05d5\u05e9\u05d4.\u00a0 \u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e9\u05e7\u05d5\u05e4\u05d5\u05ea \u05de\u05d4\u05e8\u05d2\u05e2 \u05d4\u05e8\u05d0\u05e9\u05d5\u05df \u05e9\u05d5\u05de\u05e8\u05d5\u05ea \u05e2\u05dc 70% \u05d9\u05d5\u05ea\u05e8 \u05de\u05d4\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05de\u05d0\u05e9\u05e8 \u05d0\u05dc\u05d5 \u05e9\u05de\u05e1\u05ea\u05d9\u05e8\u05d5\u05ea. (ENISA:)\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d4\u05db\u05d9\u05df \u05ea\u05e1\u05e8\u05d9\u05d8 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9 \u05db\u05ea\u05d5\u05d1 \u05de\u05e8\u05d0\u05e9. \u05dc\u05d0\u05e9\u05e8 \u05d0\u05d5\u05ea\u05d4 \u05d1\u05d3\u05e8\u05d2 \u05d4\u05e0\u05d4\u05dc\u05d4 \u2013 \u05d0\u05d7\u05ea \u05dc\u05e9\u05e0\u05d4. \u05db\u05dc\u05dc 5 \u2013 \u05d2\u05d9\u05d1\u05d5\u05d9 \u05d5\u05d1\u05d9\u05d3\u05d5\u05d3 \u2013 \u05d6\u05d4 \u05dc\u05d0 IT, \u05d6\u05d4 \u05d1\u05d9\u05d8\u05d5\u05d7 \u05d7\u05d9\u05d9\u05dd\u00a0 \u05d1\u05d3\u05d5&quot;\u05d7 IBM \u05e0\u05de\u05e6\u05d0 \u05e9-39% \u05de\u05d4\u05d7\u05d1\u05e8\u05d5\u05ea \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5 \u05dc\u05d0 \u05d4\u05e6\u05dc\u05d9\u05d7\u05d5 \u05dc\u05e9\u05d7\u05d6\u05e8 \u05d2\u05d9\u05d1\u05d5\u05d9, \u05dc\u05de\u05e8\u05d5\u05ea \u05e9\u05d7\u05e9\u05d1\u05d5 \u05e9\u05d9\u05e9 \u05dc\u05d4\u05df.\u00a0\u05d4\u05e1\u05d9\u05d1\u05d4: \u05dc\u05d0 \u05d4\u05d9\u05d4 \u05ea\u05d4\u05dc\u05d9\u05da \u05d1\u05d3\u05d9\u05e7\u05d4 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9 \u05e9\u05dc \u05d4\u05d2\u05d9\u05d1\u05d5\u05d9\u05d9\u05dd.\u00a0 \u05de\u05d4 \u05dc\u05e2\u05e9\u05d5\u05ea \u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8: \u05dc\u05d3\u05e8\u05d5\u05e9 \u05d3\u05d5\u05d7 \u05d4\u05e0\u05d4\u05dc\u05d4 \u05e8\u05d1\u05e2\u05d5\u05e0\u05d9 \u05e9\u05de\u05e8\u05d0\u05d4 \u05de\u05ea\u05d9 \u05d1\u05d5\u05e6\u05e2 \u05e9\u05d7\u05d6\u05d5\u05e8 \u05de\u05dc\u05d0 \u05d1\u05e4\u05d5\u05e2\u05dc. \u05dc\u05d5\u05d5\u05d3\u05d0 \u05e9\u05d4\u05d2\u05d9\u05d1\u05d5\u05d9 \u05de\u05d1\u05d5\u05d3\u05d3 \u05de\u05e8\u05e9\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4. \u05de\u05d4 \u05e7\u05d5\u05e8\u05d4 \u05db\u05e9\u05dc\u05d0 \u05e4\u05d5\u05e2\u05dc\u05d9\u05dd? \u05d1\u05d7\u05d1\u05e8\u05d4 \u05d4\u05ea\u05e2\u05e9\u05d9\u05d9\u05ea\u05d9\u05ea \u05de\u05d4\u05e1\u05d9\u05e4\u05d5\u05e8 \u05d1\u05e4\u05ea\u05d9\u05d7\u05d4:\u00a0 18 \u05d9\u05de\u05d9 \u05d4\u05e9\u05d1\u05ea\u05d4. \u05d0\u05d5\u05d1\u05d3\u05df \u05d7\u05d5\u05d6\u05d9\u05dd \u05d1\u05d4\u05d9\u05e7\u05e3 7 \u05de\u05d9\u05dc\u05d9\u05d5\u05df \u20aa. 4 \u05de\u05e0\u05d4\u05dc\u05d9\u05dd \u05d1\u05db\u05d9\u05e8\u05d9\u05dd \u05d4\u05ea\u05e4\u05d8\u05e8\u05d5. \u05d1\u05e1\u05d5\u05e3, \u05d4\u05dd \u05e9\u05d9\u05dc\u05de\u05d5 \u05d0\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 \u2013 \u05d5\u05d2\u05dd \u05d0\u05ea \u05d4\u05de\u05d7\u05d9\u05e8 \u05d4\u05ea\u05d3\u05de\u05d9\u05ea\u05d9.\u00a0 \u05de\u05e1\u05e8 \u05dc\u05e1\u05d9\u05d5\u05dd \u2013 &quot;\u05db\u05d5\u05e4\u05e8\u05d4 \u05d4\u05d9\u05d0 \u05dc\u05d0 \u05d1\u05e2\u05d9\u05d4 \u05e9\u05dc \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d4&quot; \u05db\u05d5\u05e4\u05e8\u05d4 \u05d4\u05d9\u05d0 \u05de\u05d1\u05d7\u05df \u05de\u05e0\u05d4\u05d9\u05d2\u05d5\u05ea.\u00a0\u05de\u05d9 \u05e9\u05de\u05d8\u05e4\u05dc \u05d1\u05d4 \u05e8\u05e7 \u05d3\u05e8\u05da \u05de\u05d7\u05dc\u05e7\u05ea \u05d4-IT \u2013 \u05e0\u05db\u05e9\u05dc.\u00a0\u05de\u05d9 \u05e9\u05de\u05d1\u05d9\u05df \u05e9\u05d6\u05d4 \u05de\u05e9\u05d1\u05e8 \u05e0\u05d9\u05d4\u05d5\u05dc\u05d9, \u05d5\u05de\u05db\u05d9\u05df \u05d0\u05ea \u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05d1\u05d4\u05ea\u05d0\u05dd \u2013 \u05e9\u05d5\u05e8\u05d3, \u05d5\u05dc\u05e2\u05d9\u05ea\u05d9\u05dd \u05d9\u05d5\u05e6\u05d0 \u05de\u05d7\u05d5\u05d6\u05e7. \u05d0\u05dd \u05d0\u05ea\u05dd \u05de\u05e0\u05d4\u05dc\u05d9\u05dd \u2013 \u05d9\u05e9 5 \u05e4\u05e2\u05d5\u05dc\u05d5\u05ea \u05e9\u05de\u05d7\u05e8 \u05d1\u05d1\u05d5\u05e7\u05e8 \u05d0\u05e4\u05e9\u05e8 \u05dc\u05e2\u05e9\u05d5\u05ea:\u00a0 1.\u00a0 \u05dc\u05d4\u05db\u05e0\u05d9\u05e1 \u05e1\u05d9\u05d9\u05d1\u05e8 \u05dc\u05d3\u05d9\u05d5\u05df \u05d3\u05d9\u05e8\u05e7\u05d8\u05d5\u05e8\u05d9\u05d5\u05df.\u00a0 2. \u05dc\u05d0\u05e9\u05e8 \u05ea\u05e7\u05e6\u05d9\u05d1 \u05dc\u05ea\u05e8\u05d2\u05d5\u05dc \u05d0\u05de\u05d9\u05ea\u05d9.\u00a0 3.\u00a0 \u05dc\u05d4\u05db\u05d9\u05e8 \u05d0\u05ea \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d9\u05dd.\u00a0 4. \u05dc\u05d4\u05db\u05d9\u05df \u05de\u05e1\u05e8 \u05ea\u05e7\u05e9\u05d5\u05e8\u05ea\u05d9 \u05de\u05e8\u05d0\u05e9.\u00a0 5. \u05dc\u05d3\u05e8\u05d5\u05e9 \u05d1\u05d3\u05d9\u05e7\u05d5\u05ea \u05e9\u05d7\u05d6\u05d5\u05e8 \u05e7\u05d1\u05d5\u05e2\u05d5\u05ea.\u00a0 \u05d0\u05d9\u05df \u05d0\u05e8\u05d2\u05d5\u05df \u05d7\u05e1\u05d9\u05df. \u05d9\u05e9 \u05d0\u05e8\u05d2\u05d5\u05df \u05de\u05d5\u05db\u05df.\u00a0\u05d4\u05d1\u05d7\u05d9\u05e8\u05d4 \u2013 \u05e9\u05dc\u05db\u05dd.\u00a0","og_url":"https:\/\/sec-it.co.il\/en\/golden-rules-survive-ransomware-management-tips\/","og_site_name":"IdanZabari Consultant","article_publisher":"https:\/\/www.facebook.com\/idan.zabari.7","article_published_time":"2025-08-01T04:43:05+00:00","article_modified_time":"2025-08-01T07:53:59+00:00","og_image":[{"width":800,"height":552,"url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/08\/Ransomware-Attack.jpg","type":"image\/jpeg"}],"author":"Idan Zabari","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Idan Zabari","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/#article","isPartOf":{"@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/"},"author":{"name":"Idan Zabari","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/cfd7ba754ca3d9c3abf2ba2999f8c280"},"headline":"5 \u05db\u05dc\u05dc\u05d9 \u05d6\u05d4\u05d1 \u05dc\u05d4\u05d9\u05e9\u05e8\u05d3\u05d5\u05ea \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8\u05d4 \u2013 \u05de\u05d4 \u05e9\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d7\u05d9\u05d9\u05d1\u05ea \u05dc\u05e2\u05e9\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05e2\u05e1\u05e7 \u05d9\u05d9\u05e4\u05d5\u05dc","datePublished":"2025-08-01T04:43:05+00:00","dateModified":"2025-08-01T07:53:59+00:00","mainEntityOfPage":{"@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/"},"wordCount":46,"commentCount":0,"publisher":{"@id":"https:\/\/sec-it.co.il\/#organization"},"image":{"@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/08\/Ransomware-Attack.jpg","articleSection":["\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/","url":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/","name":"5 \u05db\u05dc\u05dc\u05d9 \u05d6\u05d4\u05d1 \u05dc\u05d4\u05d9\u05e9\u05e8\u05d3\u05d5\u05ea \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8\u05d4 \u2013 \u05de\u05d4 \u05e9\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d7\u05d9\u05d9\u05d1\u05ea \u05dc\u05e2\u05e9\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05e2\u05e1\u05e7 \u05d9\u05d9\u05e4\u05d5\u05dc - IdanZabari Consultant","isPartOf":{"@id":"https:\/\/sec-it.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/#primaryimage"},"image":{"@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/08\/Ransomware-Attack.jpg","datePublished":"2025-08-01T04:43:05+00:00","dateModified":"2025-08-01T07:53:59+00:00","breadcrumb":{"@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/#primaryimage","url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/08\/Ransomware-Attack.jpg","contentUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/08\/Ransomware-Attack.jpg","width":800,"height":552,"caption":"Ransomware Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/sec-it.co.il\/golden-rules-survive-ransomware-management-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sec-it.co.il\/"},{"@type":"ListItem","position":2,"name":"5 \u05db\u05dc\u05dc\u05d9 \u05d6\u05d4\u05d1 \u05dc\u05d4\u05d9\u05e9\u05e8\u05d3\u05d5\u05ea \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8\u05d4 \u2013 \u05de\u05d4 \u05e9\u05d4\u05e0\u05d4\u05dc\u05d4 \u05d7\u05d9\u05d9\u05d1\u05ea \u05dc\u05e2\u05e9\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05e2\u05e1\u05e7 \u05d9\u05d9\u05e4\u05d5\u05dc"}]},{"@type":"WebSite","@id":"https:\/\/sec-it.co.il\/#website","url":"https:\/\/sec-it.co.il\/","name":"IdanZabari Consultant","description":"","publisher":{"@id":"https:\/\/sec-it.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sec-it.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sec-it.co.il\/#organization","name":"IdanZabari Consultant","url":"https:\/\/sec-it.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/blog1.jpg","contentUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/blog1.jpg","width":517,"height":244,"caption":"IdanZabari Consultant"},"image":{"@id":"https:\/\/sec-it.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/idan.zabari.7","https:\/\/www.linkedin.com\/in\/idan-zabari\/"]},{"@type":"Person","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/cfd7ba754ca3d9c3abf2ba2999f8c280","name":"Idan Zabari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5a419db52cf16c061d540c62de30ee19bea96079b9901c8724b52c1ecb2958d2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5a419db52cf16c061d540c62de30ee19bea96079b9901c8724b52c1ecb2958d2?s=96&d=mm&r=g","caption":"Idan Zabari"}}]}},"_links":{"self":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts\/5785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/comments?post=5785"}],"version-history":[{"count":0,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts\/5785\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/media\/5795"}],"wp:attachment":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/media?parent=5785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/categories?post=5785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/tags?post=5785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}