{"id":8134,"date":"2016-08-29T09:20:12","date_gmt":"2016-08-29T07:20:12","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=8134"},"modified":"2016-09-01T11:22:08","modified_gmt":"2016-09-01T09:22:08","slug":"web-siteniz-varsa-siber-guvenlik-riski-de-vardir","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/web-siteniz-varsa-siber-guvenlik-riski-de-vardir\/","title":{"rendered":"Web Siteniz Varsa Siber G\u00fcvenlik Riski De Vard\u0131r"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">K\u00fc\u00e7\u00fck i\u015fletme sahibi olmak zor i\u015ftir. Siber g\u00fcvenlik bak\u0131m\u0131ndan bu \u015firketlerin web sitelerini sald\u0131r\u0131lardan korumak ise \u00e7ok zor bir i\u015ftir. Fakat bu zorluk g\u00fcvenilir bir ortakla kolayca a\u015f\u0131labilir.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">K\u00fc\u00e7\u00fck \u015firketler internet \u00fczerinde kendilerinden \u00e7ok daha b\u00fcy\u00fck \u015firketlerle rekabet etmek zorunda. Siber su\u00e7lular ise bu alanda f\u0131rsat kollamakta. Siber g\u00fcvenlik s\u00f6z konusu oldu\u011funda web sitelerinin ve \u015firketlerinin b\u00fcy\u00fckl\u00fc\u011f\u00fc veya k\u00fc\u00e7\u00fckl\u00fc\u011f\u00fc fark etmiyor. Siber sald\u0131rganlar her hedefe ayn\u0131 g\u00f6zle bak\u0131yor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Her ne kadar internet sayesinde KOB\u0130\u2019ler kendilerinden b\u00fcy\u00fck rakipleriyle rekabet edebilir hale geldiyse de, veriyi korumak s\u00f6z konusu oldu\u011funda KOB\u0130\u2019ler b\u00fcy\u00fck rakiplerinden birka\u00e7 ad\u0131m geride kal\u0131yor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Symantec\u2019in haz\u0131rlad\u0131\u011f\u0131 <strong>2016 \u0130nternet G\u00fcvenli\u011fi Tehdit Raporu<\/strong>\u2019na g\u00f6re 2015 y\u0131l\u0131 boyunca her g\u00fcn 1 milyonun \u00fczerinde web sald\u0131r\u0131s\u0131 oldu. Raporda web sitesi y\u00f6neticileri gerekli siber g\u00fcvenlik \u00f6nlemlerini almad\u0131klar\u0131 i\u00e7in siber su\u00e7lular\u0131n yasal web sitelerindeki a\u00e7\u0131klardan faydaland\u0131\u011f\u0131 ifade ediliyor. \u00c7al\u0131\u015fmada yasal web sitelerinin %75\u2019inde yamalanmam\u0131\u015f g\u00fcvenlik a\u00e7\u0131klar\u0131 oldu\u011fu bilgisi de yer almakta.<\/span><\/p>\n<p><a href=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/07\/siber-g\u00fcvenlik.jpg\" data-rel=\"penci-gallery-image-content\" rel=\"attachment wp-att-8137\"><img decoding=\"async\" class=\"size-medium wp-image-8137\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/07\/siber-g\u00fcvenlik-300x186.jpg\" alt=\"Hacker typing on a laptop\" width=\"300\" height=\"186\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/07\/siber-g\u00fcvenlik-300x186.jpg 300w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/07\/siber-g\u00fcvenlik-1024x634.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span style=\"font-size: 14pt;\">Bu siber g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n neler oldu\u011funa g\u00f6z atmak gerekirse, en ba\u015fta gelen a\u00e7\u0131k k\u00fc\u00e7\u00fck \u015firketlerde \u00e7al\u0131\u015fan milyonlarca insan.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">PWC\u2019nin 2015 tarihli ve \u201cBirbirine Ba\u011fl\u0131 D\u00fcnyada Siber Risklerin Y\u00f6netilmesi\u201d ba\u015fl\u0131kl\u0131 \u00e7al\u0131\u015fmas\u0131nda siber g\u00fcvenlik vakalar\u0131ndaki ba\u015f akt\u00f6rlerin \u015firket \u00e7al\u0131\u015fanlar\u0131 oldu\u011fu ifadesi yer almakta. Accenture and HfS Research\u2019\u00fcn 2016 tarihli raporuna g\u00f6re bu vakalarla ilgili ki\u015filerin %48\u2019inin kurum i\u00e7i veri h\u0131rs\u0131zl\u0131\u011f\u0131ndan \u015f\u00fcphelendi\u011fi ifade ediliyor. Hatta bu ki\u015filerin %69\u2019u \u201cbir \u00f6nceki y\u0131l da benzer bir kurum i\u00e7i veri h\u0131rs\u0131zl\u0131\u011f\u0131 ya da h\u0131rs\u0131zl\u0131k te\u015febb\u00fcs\u00fc ya\u015fad\u0131klar\u0131n\u0131\u201d s\u00f6yl\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Di\u011fer bir zay\u0131f nokta ise parolalar. ABD ve Bat\u0131 Avrupa\u2019daki veri h\u0131rs\u0131zl\u0131\u011f\u0131 olaylar\u0131n\u0131 inceleyen SplashData en \u00e7ok kullan\u0131lan parolan\u0131n \u00fcst \u00fcste be\u015f y\u0131ld\u0131r \u201c123456\u201d oldu\u011funu s\u00f6yl\u00fcyor. G\u00fcvenli parolalar olu\u015fturmamak \u015firketleri ve bu \u015firketlerin web sitelerini sald\u0131r\u0131ya a\u00e7\u0131k hale getiriyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Di\u011fer tehditler ise sosyal davran\u0131\u015flardan ziyade teknik konularla ilgili. \u00d6rne\u011fin DDoS\u2019u ele alal\u0131m. DDoS sald\u0131r\u0131lar\u0131nda sald\u0131rganlar bir bilgisayar a\u011f\u0131 \u00fczerinden web sitelerini kald\u0131rabileceklerinden \u00e7ok daha fazla istemle bombard\u0131mana tutuyorlar.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">\u015eirketler DDoS bombard\u0131man\u0131yla u\u011fra\u015f\u0131rken hackerlar sistemin di\u011fer alanlar\u0131na sald\u0131r\u0131yor. Sald\u0131r\u0131 web sitelerinin eri\u015filebilirli\u011fini, daha da \u00f6nemlisi sat\u0131\u015flar\u0131n\u0131 ve gelirlerini olumsuz anlamda etkiliyor. \u0130yice korkutucu olan\u0131 ise baz\u0131 siber su\u00e7lular\u0131n bu a\u00e7\u0131ktan faydalanarak web sitesinin yeniden aya\u011fa kald\u0131r\u0131lmas\u0131 i\u00e7in fidye isteyebilmeleri.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Yeni Teknolojiler, Yeni G\u00fcvenlik A\u00e7\u0131klar\u0131<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Yeni teknolojilerin h\u0131zla kullan\u0131ma girmesi beraberinde bir\u00e7ok g\u00fcvenlik sorununu da getiriyor. \u00d6rne\u011fin bulut KOB\u0130\u2019ler i\u00e7in olduk\u00e7a avantajl\u0131 bir alan. <a href=\"https:\/\/www.ihs.com.tr\/sunucu-kiralama\/bulut-sunucu.html\" target=\"_blank\">Bulut<\/a> sayesinde bir\u00e7ok k\u00fc\u00e7\u00fck \u015firket art\u0131k daha \u00f6nceleri yaln\u0131zca b\u00fcy\u00fck \u015firketlerin kullanabildi\u011fi bilgi i\u015flem ve veri depolama kaynaklar\u0131na eri\u015febiliyor.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-8136 size-medium\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/07\/siber-g\u00fcvenlik-ortaklar\u0131-300x171.jpg\" alt=\"siber g\u00fcvenlik ortaklar\u0131\" width=\"300\" height=\"171\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/07\/siber-g\u00fcvenlik-ortaklar\u0131-300x171.jpg 300w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/07\/siber-g\u00fcvenlik-ortaklar\u0131-1024x585.jpg 1024w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/07\/siber-g\u00fcvenlik-ortaklar\u0131.jpg 1140w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-size: 14pt;\">Ancak, KOB\u0130\u2019lerin buluta ge\u00e7meden \u00f6nce mutlaka y\u00f6neti\u015fim ve g\u00fcvenlik ilkelerine \u00f6ncelik veren ortaklarla \u00e7al\u0131\u015fmas\u0131 gerekiyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><a href=\"https:\/\/www.ihsteknoloji.com\/airwatch-mobil-cihaz-yonetimi\/\" target=\"_blank\">Mobilite<\/a> ve BYOD trendleri ve veriyi bu cihazlara g\u00f6nderen uygulamalar, siber su\u00e7lular i\u00e7in bir ba\u015fka potansiyel istismar noktas\u0131 te\u015fkil ediyor. 2015 y\u0131l\u0131nda yeni mobil g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n 1 milyar insan\u0131 etkiledi\u011fi tahmin ediliyor. <a href=\"https:\/\/www.ihsteknoloji.com\/airwatch-mobil-cihaz-yonetimi\/\" target=\"_blank\">AirWatch Mobil Cihaz y\u00f6netimi<\/a> sayesinde bu a\u00e7\u0131klar\u0131n \u00f6n\u00fcne ge\u00e7ebilirsiniz.<br \/>\n<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Dolay\u0131s\u0131yla siber g\u00fcvenlik alan\u0131na yap\u0131lan yat\u0131r\u0131m art\u0131k hi\u00e7 olmad\u0131\u011f\u0131 kadar \u00f6nemli bir hal alm\u0131\u015f durumda. Sald\u0131r\u0131lar\u0131n yap\u0131labilece\u011fi alanlar artt\u0131k\u00e7a siber su\u00e7lular\u0131n kulland\u0131\u011f\u0131 teknikler de art\u0131yor. KOB\u0130\u2019lerin bu duruma kar\u015f\u0131 proaktif bir tutum belirlemeleri gerekmekte.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Ne var ki k\u00fc\u00e7\u00fck \u015firketlerde ciddi bir IT ve g\u00fcvenlik kayna\u011f\u0131 sorunu var. Bu \u015firketlerden baz\u0131lar\u0131 \u201cben kimsenin sald\u0131rmayaca\u011f\u0131 kadar k\u00fc\u00e7\u00fc\u011f\u00fcm\u201d diye d\u00fc\u015f\u00fcnebiliyor. Baz\u0131lar\u0131 ise sadece ekonomik kayg\u0131lar g\u00fcderek g\u00fcvenli\u011fe yap\u0131lan yat\u0131r\u0131m\u0131n geri d\u00f6n\u00fc\u015f\u00fcn\u00fcn az oldu\u011funu \u00f6ne s\u00fcr\u00fcyor. Sonu\u00e7: 2016 y\u0131l\u0131nda KOB\u0130\u2019lerin %40\u2019\u0131 IT b\u00fct\u00e7elerinin yaln\u0131zca %10\u2019unu g\u00fcvenli\u011fe ay\u0131rd\u0131.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Halbuki siber g\u00fcvenlik konusu asl\u0131nda o kadar pahal\u0131 de\u011fil. Standartlar\u0131n, ilkelerin ve ara\u00e7lar\u0131n makul bir \u015fekilde bir arada kullan\u0131lmas\u0131yla \u015firketleri ve m\u00fc\u015fterileri siber sald\u0131r\u0131lardan koruyacak bir strateji geli\u015ftirmek m\u00fcmk\u00fcn.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Tabii bu strateji tek ba\u015f\u0131na uygulanamaz. \u00d6zellikle k\u00fc\u00e7\u00fck \u015firketlerin mutlaka <a href=\"https:\/\/www.ihs.com.tr\" target=\"_blank\">g\u00fcvenilir ortaklarla<\/a> \u00e7al\u0131\u015fmas\u0131 gerekmekte. Bir\u00e7ok k\u00fc\u00e7\u00fck kurulu\u015fun g\u00fcvenlik tehditlerine kar\u015f\u0131 ilk ve en sa\u011flam savunma hatt\u0131n\u0131 <a href=\"https:\/\/www.ihs.com.tr\" target=\"_blank\">web hosting<\/a> hizmetleri olu\u015fturmakta.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>K\u00fc\u00e7\u00fck i\u015fletme sahibi olmak zor i\u015ftir. Siber g\u00fcvenlik bak\u0131m\u0131ndan bu \u015firketlerin web sitelerini sald\u0131r\u0131lardan korumak ise \u00e7ok zor bir i\u015ftir. Fakat bu&hellip;<\/p>\n","protected":false},"author":3,"featured_media":8485,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8134"}],"version-history":[{"count":3,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8134\/revisions"}],"predecessor-version":[{"id":8464,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8134\/revisions\/8464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/8485"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}