{"id":10532,"date":"2024-11-13T16:42:55","date_gmt":"2024-11-13T14:42:55","guid":{"rendered":"https:\/\/www.y-tech.net\/?p=10532"},"modified":"2024-11-13T16:50:48","modified_gmt":"2024-11-13T14:50:48","slug":"from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security","status":"publish","type":"post","link":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/","title":{"rendered":"From Digital Menu to IT Nightmare: When Disney Faced the Cost of Lax Security"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: left;\">Disney&#8217;s recent security breach dramatically highlights the critical importance of professional access management within managed IT services. A former senior menu manager exploited a basic failure in managing the lifecycle of employee permissions, gaining access to the company&#8217;s systems and causing significant disruptions.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">This incident exposes a common vulnerability in many organizations: while substantial resources are allocated to defend against external cyber threats, internal access management\u2014an essential component of managed IT services\u2014often remains unsecured. At Disney, the employee&#8217;s permissions were not revoked after their departure, allowing them to make malicious changes to the company&#8217;s digital menu systems.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">&#8220;This event illustrates how poor access management can lead to significant damages,&#8221; explains Eli Cohen, cybersecurity expert and CEO of Y-Tech. &#8220;When an organization implements professional managed IT services, access management processes include real-time automation for provisioning, updating, and revoking permissions, fully synchronized with the HR system.&#8221;<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">The damage extended beyond menu disruptions: fonts were altered to gibberish, allergen warnings were removed, and QR codes redirected to political content. It took Disney weeks to rectify the issues, underscoring the high cost of lapses in access management.<\/p>\n<figure id=\"attachment_10528\" aria-describedby=\"caption-attachment-10528\" style=\"width: 800px\" class=\"wp-caption alignnone\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-10528 size-full\" title=\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 IT - \u05d4\u05e4\u05e7\u05ea \u05dc\u05e7\u05d7\u05d9\u05dd \u05de\u05d4\u05de\u05e7\u05e8\u05d4 \u05e9\u05dc\u05d9 \u05d3\u05d9\u05e1\u05e0\u05d9-compress\" src=\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9-IT-\u05d4\u05e4\u05e7\u05ea-\u05dc\u05e7\u05d7\u05d9\u05dd-\u05de\u05d4\u05de\u05e7\u05e8\u05d4-\u05e9\u05dc\u05d9-\u05d3\u05d9\u05e1\u05e0\u05d9-compress.webp\" alt=\"\" width=\"800\" height=\"448\" srcset=\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9-IT-\u05d4\u05e4\u05e7\u05ea-\u05dc\u05e7\u05d7\u05d9\u05dd-\u05de\u05d4\u05de\u05e7\u05e8\u05d4-\u05e9\u05dc\u05d9-\u05d3\u05d9\u05e1\u05e0\u05d9-compress.webp 800w, https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9-IT-\u05d4\u05e4\u05e7\u05ea-\u05dc\u05e7\u05d7\u05d9\u05dd-\u05de\u05d4\u05de\u05e7\u05e8\u05d4-\u05e9\u05dc\u05d9-\u05d3\u05d9\u05e1\u05e0\u05d9-compress-300x168.webp 300w, https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9-IT-\u05d4\u05e4\u05e7\u05ea-\u05dc\u05e7\u05d7\u05d9\u05dd-\u05de\u05d4\u05de\u05e7\u05e8\u05d4-\u05e9\u05dc\u05d9-\u05d3\u05d9\u05e1\u05e0\u05d9-compress-768x430.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-10528\" class=\"wp-caption-text\">&#8220;When an organization implements professional managed IT services, the access management framework includes automated processes for real-time provisioning, updating, and revoking permissions, fully synchronized with the HR system.&#8221; \u2014 Eli Cohen, CEO of Y-Tech<\/figcaption><\/figure>\n<p dir=\"ltr\" style=\"text-align: left;\">Cybersecurity experts recommend several critical steps within the framework of managed IT services:<\/p>\n<ul dir=\"ltr\" style=\"text-align: left;\">\n<li>Implementation of advanced IAM (Identity and Access Management) systems<\/li>\n<li>Automation of access management processes<\/li>\n<li>Regular reviews of existing permissions<\/li>\n<li>Tight integration between HR and IT systems<\/li>\n<li>Real-time monitoring of unusual activities<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: left;\">&#8220;In the cloud era, where employees connect to organizational systems from anywhere, access management has become increasingly complex,&#8221; adds [Israel Israeli], a senior IT consultant. &#8220;Professional managed IT services provide the essential layer of control, monitoring, and security that every organization needs.&#8221;<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">Disney&#8217;s incident serves as a warning to all organizations: investing in managed IT services, particularly professional access management, is not a luxury\u2014it is a strategic necessity to protect company assets and ensure uninterrupted operations.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">\n","protected":false},"excerpt":{"rendered":"<p>Disney&#8217;s recent incident, where a former employee disrupted the organization\u2019s systems, underscores the critical importance of proper access management within managed IT services. In this article, we explore how similar issues can be prevented through IAM processes, automation, and real-time monitoring. Don\u2019t miss these critical recommendations for IT managers and decision-makers!<\/p>\n","protected":false},"author":25,"featured_media":10525,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[25],"tags":[77,79,78],"class_list":["post-10532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-access-management","tag-cybersecurity","tag-managed-it-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Failures: Lessons from Disney<\/title>\n<meta name=\"description\" content=\"Disney&#039;s case, where a former employee exploited access management failures to disrupt IT systems, highlights the critical need for professional access management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Failures: Lessons from Disney\" \/>\n<meta property=\"og:description\" content=\"Disney&#039;s case, where a former employee exploited access management failures to disrupt IT systems, highlights the critical need for professional access management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/\" \/>\n<meta property=\"og:site_name\" content=\"y-tech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ytech.services\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-13T14:42:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T14:50:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9-IT-\u05d4\u05e4\u05e7\u05ea-\u05dc\u05e7\u05d7\u05d9\u05dd-\u05de\u05d4\u05de\u05e7\u05e8\u05d4-\u05e9\u05dc\u05d9-\u05d3\u05d9\u05e1\u05e0\u05d9-compress.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"448\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"adim@y-tech.net\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"IT Failures: Lessons from Disney\" \/>\n<meta name=\"twitter:description\" content=\"Disney&#039;s case, where a former employee exploited access management failures to disrupt IT systems, highlights the critical need for professional access management.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9-IT-\u05d4\u05e4\u05e7\u05ea-\u05dc\u05e7\u05d7\u05d9\u05dd-\u05de\u05d4\u05de\u05e7\u05e8\u05d4-\u05e9\u05dc\u05d9-\u05d3\u05d9\u05e1\u05e0\u05d9-compress.webp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adim@y-tech.net\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/\"},\"author\":{\"name\":\"adim@y-tech.net\",\"@id\":\"https:\/\/www.y-tech.net\/#\/schema\/person\/ce2b890255d89bedcf21b59fd0fe5ee2\"},\"headline\":\"From Digital Menu to IT Nightmare: When Disney Faced the Cost of Lax Security\",\"datePublished\":\"2024-11-13T14:42:55+00:00\",\"dateModified\":\"2024-11-13T14:50:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/\"},\"wordCount\":365,\"publisher\":{\"@id\":\"https:\/\/www.y-tech.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/AI-\u05d3\u05d9\u05e1\u05e0\u05d9.webp\",\"keywords\":[\"Access Management\",\"Cybersecurity\",\"Managed IT Services\"],\"articleSection\":[\"NEWS\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/\",\"url\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/\",\"name\":\"IT Failures: Lessons from Disney\",\"isPartOf\":{\"@id\":\"https:\/\/www.y-tech.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/AI-\u05d3\u05d9\u05e1\u05e0\u05d9.webp\",\"datePublished\":\"2024-11-13T14:42:55+00:00\",\"dateModified\":\"2024-11-13T14:50:48+00:00\",\"description\":\"Disney's case, where a former employee exploited access management failures to disrupt IT systems, highlights the critical need for professional access management.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#primaryimage\",\"url\":\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/AI-\u05d3\u05d9\u05e1\u05e0\u05d9.webp\",\"contentUrl\":\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/AI-\u05d3\u05d9\u05e1\u05e0\u05d9.webp\",\"width\":1024,\"height\":1024,\"caption\":\"\u05db\u05e9\u05dc\u05d9 IT \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea: \u05d4\u05dc\u05e7\u05d7\u05d9\u05dd \u05de\u05d4\u05de\u05e7\u05e8\u05d4 \u05d4\u05d7\u05de\u05d5\u05e8 \u05e9\u05dc \u05d3\u05d9\u05e1\u05e0\u05d9\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.y-tech.net\/#website\",\"url\":\"https:\/\/www.y-tech.net\/\",\"name\":\"Y-TECH\",\"description\":\"\u05e9\u05e8\u05d5\u05ea\u05d9 IT \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05e0\u05d5\u05d4\u05dc\u05d9\u05dd \u05d1\u05e8\u05de\u05d4 \u05d4\u05d2\u05d1\u05d5\u05d4\u05d4 \u05d1\u05d9\u05d5\u05ea\u05e8\",\"publisher\":{\"@id\":\"https:\/\/www.y-tech.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.y-tech.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.y-tech.net\/#organization\",\"name\":\"y-tech\",\"url\":\"https:\/\/www.y-tech.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.y-tech.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2023\/12\/ytech-logo.svg\",\"contentUrl\":\"https:\/\/www.y-tech.net\/wp-content\/uploads\/2023\/12\/ytech-logo.svg\",\"width\":150,\"height\":66,\"caption\":\"y-tech\"},\"image\":{\"@id\":\"https:\/\/www.y-tech.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ytech.services\",\"https:\/\/www.youtube.com\/watch?v=oX_vn_lvWWE\",\"https:\/\/www.linkedin.com\/company\/y-tech-solutions?trk=company_name\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.y-tech.net\/#\/schema\/person\/ce2b890255d89bedcf21b59fd0fe5ee2\",\"name\":\"adim@y-tech.net\",\"url\":\"https:\/\/www.y-tech.net\/en\/author\/adimy-tech-net\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Failures: Lessons from Disney","description":"Disney's case, where a former employee exploited access management failures to disrupt IT systems, highlights the critical need for professional access management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/","og_locale":"en_US","og_type":"article","og_title":"IT Failures: Lessons from Disney","og_description":"Disney's case, where a former employee exploited access management failures to disrupt IT systems, highlights the critical need for professional access management.","og_url":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/","og_site_name":"y-tech","article_publisher":"https:\/\/www.facebook.com\/ytech.services","article_published_time":"2024-11-13T14:42:55+00:00","article_modified_time":"2024-11-13T14:50:48+00:00","og_image":[{"width":800,"height":448,"url":"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9-IT-\u05d4\u05e4\u05e7\u05ea-\u05dc\u05e7\u05d7\u05d9\u05dd-\u05de\u05d4\u05de\u05e7\u05e8\u05d4-\u05e9\u05dc\u05d9-\u05d3\u05d9\u05e1\u05e0\u05d9-compress.webp","type":"image\/webp"}],"author":"adim@y-tech.net","twitter_card":"summary_large_image","twitter_title":"IT Failures: Lessons from Disney","twitter_description":"Disney's case, where a former employee exploited access management failures to disrupt IT systems, highlights the critical need for professional access management.","twitter_image":"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9-IT-\u05d4\u05e4\u05e7\u05ea-\u05dc\u05e7\u05d7\u05d9\u05dd-\u05de\u05d4\u05de\u05e7\u05e8\u05d4-\u05e9\u05dc\u05d9-\u05d3\u05d9\u05e1\u05e0\u05d9-compress.webp","twitter_misc":{"Written by":"adim@y-tech.net","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#article","isPartOf":{"@id":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/"},"author":{"name":"adim@y-tech.net","@id":"https:\/\/www.y-tech.net\/#\/schema\/person\/ce2b890255d89bedcf21b59fd0fe5ee2"},"headline":"From Digital Menu to IT Nightmare: When Disney Faced the Cost of Lax Security","datePublished":"2024-11-13T14:42:55+00:00","dateModified":"2024-11-13T14:50:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/"},"wordCount":365,"publisher":{"@id":"https:\/\/www.y-tech.net\/#organization"},"image":{"@id":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/AI-\u05d3\u05d9\u05e1\u05e0\u05d9.webp","keywords":["Access Management","Cybersecurity","Managed IT Services"],"articleSection":["NEWS"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/","url":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/","name":"IT Failures: Lessons from Disney","isPartOf":{"@id":"https:\/\/www.y-tech.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#primaryimage"},"image":{"@id":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/AI-\u05d3\u05d9\u05e1\u05e0\u05d9.webp","datePublished":"2024-11-13T14:42:55+00:00","dateModified":"2024-11-13T14:50:48+00:00","description":"Disney's case, where a former employee exploited access management failures to disrupt IT systems, highlights the critical need for professional access management.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.y-tech.net\/en\/from-digital-menu-to-it-nightmare-when-disney-faced-the-cost-of-lax-security\/#primaryimage","url":"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/AI-\u05d3\u05d9\u05e1\u05e0\u05d9.webp","contentUrl":"https:\/\/www.y-tech.net\/wp-content\/uploads\/2024\/11\/AI-\u05d3\u05d9\u05e1\u05e0\u05d9.webp","width":1024,"height":1024,"caption":"\u05db\u05e9\u05dc\u05d9 IT \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea: \u05d4\u05dc\u05e7\u05d7\u05d9\u05dd \u05de\u05d4\u05de\u05e7\u05e8\u05d4 \u05d4\u05d7\u05de\u05d5\u05e8 \u05e9\u05dc \u05d3\u05d9\u05e1\u05e0\u05d9"},{"@type":"WebSite","@id":"https:\/\/www.y-tech.net\/#website","url":"https:\/\/www.y-tech.net\/","name":"Y-TECH","description":"\u05e9\u05e8\u05d5\u05ea\u05d9 IT \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05de\u05e0\u05d5\u05d4\u05dc\u05d9\u05dd \u05d1\u05e8\u05de\u05d4 \u05d4\u05d2\u05d1\u05d5\u05d4\u05d4 \u05d1\u05d9\u05d5\u05ea\u05e8","publisher":{"@id":"https:\/\/www.y-tech.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.y-tech.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.y-tech.net\/#organization","name":"y-tech","url":"https:\/\/www.y-tech.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.y-tech.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.y-tech.net\/wp-content\/uploads\/2023\/12\/ytech-logo.svg","contentUrl":"https:\/\/www.y-tech.net\/wp-content\/uploads\/2023\/12\/ytech-logo.svg","width":150,"height":66,"caption":"y-tech"},"image":{"@id":"https:\/\/www.y-tech.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ytech.services","https:\/\/www.youtube.com\/watch?v=oX_vn_lvWWE","https:\/\/www.linkedin.com\/company\/y-tech-solutions?trk=company_name"]},{"@type":"Person","@id":"https:\/\/www.y-tech.net\/#\/schema\/person\/ce2b890255d89bedcf21b59fd0fe5ee2","name":"adim@y-tech.net","url":"https:\/\/www.y-tech.net\/en\/author\/adimy-tech-net\/"}]}},"_links":{"self":[{"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/posts\/10532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/comments?post=10532"}],"version-history":[{"count":0,"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/posts\/10532\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/media\/10525"}],"wp:attachment":[{"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/media?parent=10532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/categories?post=10532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.y-tech.net\/en\/wp-json\/wp\/v2\/tags?post=10532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}