{"id":5713,"date":"2015-11-30T13:18:16","date_gmt":"2015-11-30T13:18:16","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=5713"},"modified":"2015-11-30T13:26:54","modified_gmt":"2015-11-30T13:26:54","slug":"calisanlarin-bulut-servislerini-guvenle-kullanabilmeleri-icin-5-ipucu","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/calisanlarin-bulut-servislerini-guvenle-kullanabilmeleri-icin-5-ipucu\/","title":{"rendered":"\u00c7al\u0131\u015fanlar\u0131n bulut servislerini g\u00fcvenle kullanabilmeleri i\u00e7in 5 ipucu"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">G\u00fcn\u00fcm\u00fczde art\u0131k \u015firket \u00e7al\u0131\u015fanlar\u0131 i\u015flerini daha verimli bir \u015fekilde tamamlayabilmek i\u00e7in s\u0131k s\u0131k <strong><a href=\"https:\/\/www.ihs.com.tr\/sunucu-kiralama\/bulut-sunucu.html\" target=\"_blank\">bulut<\/a> servislerini ve uygulamalar\u0131n\u0131<\/strong> tercih ediyorlar. Ancak bu da baz\u0131 durumlar \u00f6nemli bilgilerin riskli servislerde yer almas\u0131 anlam\u0131na geliyor. Bu riski minimize etmek IT ekibinin g\u00f6reviyken, bir yandan da i\u015fi yava\u015flatmadan, \u00e7al\u0131\u015fanlar\u0131n h\u0131z\u0131n\u0131 kesmeden bunu yapmak durumunda kal\u0131yorlar.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Ancak \u00e7al\u0131\u015fanlar\u0131n kulland\u0131\u011f\u0131 bir \u00e7ok bulut servis i\u015flerinin \u00e7ok verimli halletmelerine yard\u0131mc\u0131 oluyorken, bir yandan da bu kolayl\u0131kla birlikte <strong>daha az k\u0131s\u0131t ve daha \u00e7ok risk i\u00e7eren servislere<\/strong> y\u00f6nelebiliyorlar. \u0130\u015flerini h\u0131zl\u0131 bitirmeye y\u00f6neldiklerinde ise en son ak\u0131llar\u0131na gelen \u015fey ise g\u00fcvenlik oluyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">B\u00f6yle bir d\u00fcnyada ise IT ekiplerinin i\u015fi \u00e7ok zor. \u00c7\u00fcnk\u00fc \u00e7ok h\u0131zl\u0131 bir \u015fekilde inovasyonu takip edip yeni i\u015f modellerine destek olabilmeli, ve ayn\u0131 zamanda da g\u00fcvenli\u011fi riske etmeden \u015firket bilgilerini korumalar\u0131 bekleniyor. Bulut servislerini sahiplenmeye devam ederken, bir yandan da do\u011fru standartlar\u0131 korumak ad\u0131na lider organizasyonlar \u015fu ad\u0131mlar\u0131 at\u0131yorlar:<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7erik Tablosu<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69f09fd154927\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\" id=\"ez-toc-cssicon-toggle-item-69f09fd154927\" aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.ihs.com.tr\/blog\/calisanlarin-bulut-servislerini-guvenle-kullanabilmeleri-icin-5-ipucu\/#1-Disarida-neler-oldugunu-kesfedin\" >1. D\u0131\u015far\u0131da neler oldu\u011funu ke\u015ffedin<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.ihs.com.tr\/blog\/calisanlarin-bulut-servislerini-guvenle-kullanabilmeleri-icin-5-ipucu\/#2-Zarar-vermeden-once-riskli-uygulamalari-tespit-edebilmeli\" >2. Zarar vermeden \u00f6nce riskli uygulamalar\u0131 tespit edebilmeli<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.ihs.com.tr\/blog\/calisanlarin-bulut-servislerini-guvenle-kullanabilmeleri-icin-5-ipucu\/#3-Kullanicilari-ve-davranislarini-anlamali\" >3. Kullan\u0131c\u0131lar\u0131 ve davran\u0131\u015flar\u0131n\u0131 anlamal\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.ihs.com.tr\/blog\/calisanlarin-bulut-servislerini-guvenle-kullanabilmeleri-icin-5-ipucu\/#4-Proaktif-olmali\" >4. Proaktif olmal\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.ihs.com.tr\/blog\/calisanlarin-bulut-servislerini-guvenle-kullanabilmeleri-icin-5-ipucu\/#5-Calisanlara-kullanabilecekleri-guvenilir-bulut-uygulamalari-sunulmali\" >5. \u00c7al\u0131\u015fanlara kullanabilecekleri, g\u00fcvenilir bulut uygulamalar\u0131 sunulmal\u0131<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"1-Disarida-neler-oldugunu-kesfedin\"><\/span><span style=\"font-size: 14pt;\">1. D\u0131\u015far\u0131da neler oldu\u011funu ke\u015ffedin<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\"><a href=\"https:\/\/www.ihs.com.tr\/sunucu-kiralama\/bulut-sunucu.html\" target=\"_blank\">Bulut<\/a> servislerinin kullan\u0131m\u0131n\u0131 kontrol edebilmek i\u00e7in IT ekipleri a\u011f trafi\u011fini izlemeli ve hangi uygulamalar\u0131n kullan\u0131ld\u0131\u011f\u0131n\u0131 \u00f6\u011frenmeli. Hangi uygulamalar\u0131n kullan\u0131ld\u0131\u011f\u0131n\u0131 \u00f6\u011frendikten sonra da riski azaltabilmek i\u00e7in bu uygulamalar\u0131 ve kullan\u0131mlar\u0131 inceleyerek g\u00fcvenilirli\u011fi <strong>\u015f\u00fcpheli olan uygulamalar\u0131<\/strong> kullan\u0131mlar\u0131n\u0131 \u015firket i\u00e7erisinde azaltmal\u0131 veya s\u0131n\u0131rland\u0131rmal\u0131.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"2-Zarar-vermeden-once-riskli-uygulamalari-tespit-edebilmeli\"><\/span><span style=\"font-size: 14pt;\">2. Zarar vermeden \u00f6nce riskli uygulamalar\u0131 tespit edebilmeli<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">IT ekipleri hangi uygulamalar\u0131n kullan\u0131ld\u0131\u011f\u0131n\u0131 \u00f6l\u00e7\u00fcmledikten ve inceledikten sonra bunlar aras\u0131nda <strong>riskli olanlar\u0131 da mutlaka ay\u0131rt edebilmeli<\/strong>. Baz\u0131lar\u0131 sadece g\u00f6zlem yap\u0131lmas\u0131 ve kullan\u0131m\u0131ndan ka\u00e7\u0131n\u0131lmas\u0131 gerekirken, di\u011ferlerinin ise an\u0131nda kesilmesi gerekebilir.<\/span><\/p>\n<p><a href=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/11\/cloud-it-1.jpg\" data-rel=\"penci-gallery-image-content\" ><img decoding=\"async\" class=\"aligncenter size-full wp-image-5714\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/11\/cloud-it-1.jpg\" alt=\"cloud-it-1\" width=\"600\" height=\"399\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/11\/cloud-it-1.jpg 600w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/11\/cloud-it-1-300x200.jpg 300w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/11\/cloud-it-1-165x110.jpg 165w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/11\/cloud-it-1-270x180.jpg 270w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/11\/cloud-it-1-480x320.jpg 480w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"3-Kullanicilari-ve-davranislarini-anlamali\"><\/span><span style=\"font-size: 14pt;\">3. Kullan\u0131c\u0131lar\u0131 ve davran\u0131\u015flar\u0131n\u0131 anlamal\u0131<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Bir \u00e7ok \u00e7al\u0131\u015fan i\u015flerini h\u0131zl\u0131 ve verimli tamamlamak i\u00e7in izin verilmemi\u015f bulut servislerini kullan\u0131yor. Hatta baz\u0131lar\u0131 \u015firket verilerini kendi cihazlar\u0131na da ta\u015f\u0131yor ve gizli bilgilere \u00f6zen g\u00f6stermeden \u00e7o\u011faltabiliyor. Bu gibi durumlar\u0131 anlayabilmek i\u00e7in IT ekipleri \u00e7ok daha detayl\u0131 analizler yapmal\u0131, bu hareketlerin <strong>alt\u0131nda yatan motivasyonlar\u0131 incelemeli<\/strong> ve \u00e7al\u0131\u015fanlarla daha \u00e7ok zaman ge\u00e7irerek bu kullan\u0131mlar\u0131 do\u011fru y\u00f6nlendirebilmeli.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"4-Proaktif-olmali\"><\/span><span style=\"font-size: 14pt;\">4. Proaktif olmal\u0131<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">IT ekipleri proaktif bir \u015fekilde g\u00fcvenlik tehditleriyle ilgili olarak \u00e7al\u0131\u015fanlar\u0131 uyarabilmeli. \u00d6rne\u011fin izinsiz bir bulut uygulamas\u0131 kullan\u0131ld\u0131\u011f\u0131da <strong>e-posta ile bir uyar\u0131 mesaj\u0131 gitmeli<\/strong> ve kullan\u0131lan servisin izinsiz, g\u00fcvenlik riski olan ve \u015firket bilgilerini tehlikeye sokan bir servis oldu\u011fu, ve alternatifleri anlat\u0131lmal\u0131.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">E\u011fer ayn\u0131 ki\u015fi \u0131srarla bu riskli servisi kullanmaya devam ediyorsa, eri\u015fimi yine benzer \u015fekilde haber verilerek kesilmeli.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"5-Calisanlara-kullanabilecekleri-guvenilir-bulut-uygulamalari-sunulmali\"><\/span><span style=\"font-size: 14pt;\">5. \u00c7al\u0131\u015fanlara kullanabilecekleri, g\u00fcvenilir bulut uygulamalar\u0131 sunulmal\u0131<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Ve elbette, \u00e7al\u0131\u015fanlar\u0131n hayat\u0131n\u0131 kolayla\u015ft\u0131rmak i\u00e7in onlara g\u00fcvenebilecekleri ve i\u015flerini g\u00f6rebilecekleri uygulamalar da sunulmal\u0131 ve yol g\u00f6sterilmeli.<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>G\u00fcn\u00fcm\u00fczde art\u0131k \u015firket \u00e7al\u0131\u015fanlar\u0131 i\u015flerini daha verimli bir \u015fekilde tamamlayabilmek i\u00e7in s\u0131k s\u0131k bulut servislerini ve uygulamalar\u0131n\u0131 tercih ediyorlar. Ancak bu da&hellip;<\/p>\n","protected":false},"author":3,"featured_media":5725,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5713"}],"version-history":[{"count":3,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5713\/revisions"}],"predecessor-version":[{"id":5724,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5713\/revisions\/5724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/5725"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}