{"id":12965,"date":"2024-11-26T00:17:03","date_gmt":"2024-11-25T21:17:03","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?page_id=12965"},"modified":"2024-11-26T18:13:31","modified_gmt":"2024-11-26T15:13:31","slug":"it-security-economics-2024","status":"publish","type":"page","link":"https:\/\/www.kaspersky.com.tr\/blog\/it-security-economics-2024\/","title":{"rendered":"BT G\u00fcvenli\u011fi Ekonomisi"},"content":{"rendered":"<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2024\/11\/25233705\/IT-Security-Economics-2024-Featured.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-12971\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2024\/11\/25233705\/IT-Security-Economics-2024-Featured.jpg\" alt=\"\" width=\"1500\" height=\"790\"><\/a><\/p>\n<h2>Tan\u0131t\u0131m<\/h2>\n<p>BT g\u00fcvenli\u011fi gereksinimleri s\u00fcrekli olarak de\u011fi\u015fiyor. Yapay zek\u00e2n\u0131n (AI), dijitalle\u015fmenin ve buluta adaptasyonun y\u00fckseli\u015fi sekt\u00f6rleri de\u011fi\u015ftiriyor ama bu y\u00fckseli\u015f ayn\u0131 zamanda da BT karar mercilerinin \u00fcstesinden gelmesi gereken yeni riskleri de ortaya \u00e7\u0131kar\u0131yor. BT G\u00fcvenli\u011fi Ekonomisi adl\u0131 bu rapor; bahsi ge\u00e7en de\u011fi\u015fimlerin, hem kamu hem de \u00f6zel sekt\u00f6rdeki b\u00fcy\u00fck veya k\u00fc\u00e7\u00fck fark etmeksizin her boyut ve sekt\u00f6rdeki t\u00fcm i\u015fletmelerin g\u00fcvenlik stratejilerini nas\u0131l etkiledi\u011fini ele al\u0131yor.<\/p>\n<p>Yapay zek\u00e2 ve otomasyon \u015firketlerin i\u015fleyi\u015fini \u015fekillendiriyor. Yapay zek\u00e2 her ne kadar inovasyonu ve verimi te\u015fvik etse de baz\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 da ortaya \u00e7\u0131kar\u0131yor. Daha karma\u015f\u0131k sald\u0131r\u0131lar yapmak i\u00e7in siber su\u00e7lular art\u0131k yapay zek\u00e2 kaynakl\u0131 ara\u00e7lar kullan\u0131yor bunun yan\u0131 s\u0131ra otomatikle\u015ftirilmi\u015f sistemler de bilgisayar korsanlar\u0131 i\u00e7in yeni giri\u015f noktalar\u0131n\u0131n yolunu a\u00e7\u0131yor<a href=\"#_ftn1\" target=\"_blank\" rel=\"nofollow noopener\" name=\"_ftnref1\">[1]<\/a>. BT ekipleri, yapay zek\u00e2n\u0131n yararlar\u0131yla ortamlar\u0131n\u0131 koruma ihtiyac\u0131n\u0131 dengeleyerek h\u0131zla kendilerini bu duruma adapte etmeli. Sekt\u00f6rlerin h\u0131zl\u0131 dijitalle\u015fme temposu, bu durumu daha da zorla\u015ft\u0131rarak g\u00fcvenlik ekiplerinin ger\u00e7ek zamanl\u0131 bir \u015fekilde tehditlerin bir ad\u0131m \u00f6n\u00fcnde olmas\u0131n\u0131n \u00f6nemini daha da art\u0131r\u0131yor.<\/p>\n<p>Her \u015eey Hizmet olarak (XaaS) \u015fablonuna do\u011fru kayma ve bulut altyap\u0131s\u0131, i\u015fletmelerin esneklik ve \u00f6l\u00e7eklenebilirlik sa\u011flayan abonelik tabanl\u0131 modellere ge\u00e7i\u015f yapmas\u0131na sebep oluyor. Fakat bu kayma beraberinde yeni riskler de getiriyor. Halk\u00e2 a\u00e7\u0131k, \u00f6zel ve hibrit bulut ortamlar\u0131; devasa boyutlardaki verilerin korunmas\u0131 i\u00e7in s\u00fcrekli olarak takip edilmeyi gerektiriyor ve bu durum, k\u0131s\u0131tl\u0131 BT kaynaklar\u0131na sahip k\u00fc\u00e7\u00fck i\u015fletmeler i\u00e7in \u00f6zellikle zorlay\u0131c\u0131 bir h\u00e2l al\u0131yor<a href=\"#_ftn2\" target=\"_blank\" rel=\"nofollow noopener\" name=\"_ftnref2\">[2]<\/a>. \u00c7oklu bulut ortamlar\u0131n\u0131n, g\u00fcvenlik gayretlerini karma\u015f\u0131kla\u015ft\u0131rmas\u0131 nedeniyle b\u00fcy\u00fck i\u015fletmeler de risklerden kurtulmu\u015f de\u011fil. Genelde hassas verilerle u\u011fra\u015fan kamu sekt\u00f6r\u00fc kurulu\u015flar\u0131n\u0131nsa bu risklerle ba\u015fa \u00e7\u0131karken y\u00f6netmeliklere de uyduklar\u0131ndan emin olmalar\u0131 gerekiyor.<\/p>\n<p>Tedarik zincirinin k\u00fcreselle\u015fmesi, BT g\u00fcvenli\u011fi i\u00e7in hem f\u0131rsat hem de zorluklar yarat\u0131yor<a href=\"#_ftn3\" target=\"_blank\" rel=\"nofollow noopener\" name=\"_ftnref3\">[3]<\/a>. K\u00fcresel a\u011flar verimi art\u0131r\u0131yor ama ayn\u0131 zamanda da g\u00fcvenlik a\u00e7\u0131klar\u0131 yarat\u0131yor. Tedarik zincirinin tek bir par\u00e7as\u0131nda meydana gelen ihlal, t\u00fcm sekt\u00f6rde dalgalanma yaparak d\u00fcnya \u00e7ap\u0131ndaki i\u015fletmeleri etkileyebiliyor. Bunun yan\u0131 s\u0131ra dayan\u0131kl\u0131l\u0131\u011f\u0131 art\u0131rmak i\u00e7in \u015firketlerin kendilerine daha yak\u0131n \u00fcr\u00fcnler \u00fcretmesiyle gitgide b\u00fcy\u00fcyen bir yerelle\u015ftirme e\u011filimi de mevcut. Bu her ne kadar k\u00fcresel riskleri azaltmaya yard\u0131mc\u0131 olsa da yerel faaliyetler, \u00f6zellikle sa\u011fl\u0131k, enerji ve devlet gibi kritik sekt\u00f6rler, yine de hedefli siber sald\u0131r\u0131lara maruz kal\u0131yor.<\/p>\n<p>Daha fazla g\u00f6zetimin ve tedarik\u00e7iler \u00fczerinde kontrol\u00fcn gereklili\u011fini kabullenen i\u015fletmelerin say\u0131s\u0131n\u0131n artmas\u0131yla tedarik zinciri dayan\u0131kl\u0131l\u0131\u011f\u0131, BT g\u00fcvenli\u011fi ekipleri i\u00e7in b\u00fcy\u00fck bir odak noktas\u0131 h\u00e2line geldi. Pandemi, k\u00fcresel tedarik zincirlerinin k\u0131r\u0131lganl\u0131\u011f\u0131n\u0131 a\u00e7\u0131\u011fa \u00e7\u0131kard\u0131 dolay\u0131s\u0131yla art\u0131k siber g\u00fcvenlik de bu konunun bir par\u00e7as\u0131 oldu. BT karar mercileri yaln\u0131zca kendi sistemlerini de\u011fil t\u00fcm tedarik zincirini korumak i\u00e7in \u00e7al\u0131\u015fmak zorundalar. Bu da sa\u011flay\u0131c\u0131lar\u0131n g\u00fcvenlik uygulamalar\u0131n\u0131 de\u011ferlendirmeyi, potansiyel riskleri izlemeyi ve t\u00fcm ortaklar\u0131n s\u0131k\u0131 g\u00fcvenlik protokollerine uydu\u011fundan emin olmay\u0131 gerektiriyor.<\/p>\n<p>Ge\u00e7ti\u011fimiz y\u0131llarda y\u00fcksek profilli siber sald\u0131r\u0131lar, sa\u011flam bir siber g\u00fcvenli\u011fin ne kadar \u00f6nemli oldu\u011funun alt\u0131n\u0131 \u00e7izdi. 2022 y\u0131l\u0131nda Lapsus$ bilgisayar korsan\u0131 grubu, aralar\u0131nda Microsoft ve Okta\u2019n\u0131n da bulundu\u011fu b\u00fcy\u00fck \u015firketleri hedef alarak hassas m\u00fc\u015fteri verilerini tehlikeye att\u0131 ve buralarda ciddi bir itibar kayb\u0131na sebep oldu<a href=\"#_ftn4\" target=\"_blank\" rel=\"nofollow noopener\" name=\"_ftnref4\">[4]<\/a>. Birle\u015fik Krall\u0131k tabanl\u0131 b\u00fcy\u00fck bir d\u0131\u015f tedarik\u00e7i \u015firket olan Capita, 2023 y\u0131l\u0131nda hem kamu hem de \u00f6zel sekt\u00f6rdeki m\u00fc\u015fterilerini etkileyen ve toparlanma gayretleri nedeniyle \u015firkete yakla\u015f\u0131k 25 milyon pounda mal olan bir siber sald\u0131r\u0131ya maruz kald\u0131<a href=\"#_ftn5\" target=\"_blank\" rel=\"nofollow noopener\" name=\"_ftnref5\">[5]<\/a>.<\/p>\n<p>K\u00fc\u00e7\u00fck ve orta \u00f6l\u00e7ekli i\u015fletmeler (KOB\u0130) i\u00e7in bu e\u011filimler olduk\u00e7a b\u00fcy\u00fck zorluklara sebep oluyor. \u00d6zellikle yapay zek\u00e2 ve bulut tabanl\u0131 sald\u0131r\u0131lar konu oldu\u011funda k\u0131s\u0131tl\u0131 b\u00fct\u00e7elere ve daha az BT personeline sahip olmak, karma\u015f\u0131k sald\u0131r\u0131lara kar\u015f\u0131 savunma yapmay\u0131 daha da zorla\u015ft\u0131r\u0131yor. Daha fazla kayna\u011fa sahip b\u00fcy\u00fck i\u015fletmeler, daha donan\u0131ml\u0131 fakat onlar\u0131n da birden fazla co\u011frafyada devasa altyap\u0131lar\u0131 g\u00fcvende tutman\u0131n karma\u015f\u0131kl\u0131\u011f\u0131yla ba\u015fa \u00e7\u0131kmalar\u0131 gerekiyor. S\u0131k\u0131 b\u00fct\u00e7e s\u0131n\u0131rlamalar\u0131yla \u00e7al\u0131\u015f\u0131rken kritik \u00f6neme sahip altyap\u0131lar\u0131 ve hassas bilgileri korumas\u0131 gereken kamu sekt\u00f6r\u00fc kurulu\u015flar\u0131 da bu sorunlarla kar\u015f\u0131 kar\u015f\u0131ya kal\u0131yor.<\/p>\n<p>Bu rapor; bahsi ge\u00e7en t\u00fcm bu zorluklar\u0131n detay\u0131na iniyor ve her boyuttaki i\u015fletmelerin, evrimle\u015fen g\u00fcvenlik \u00e7evrelerine nas\u0131l daha iyi haz\u0131rlanabilece\u011fine dair fikirler sunuyor. Yapay zek\u00e2, dijitalle\u015fme ve buluta ge\u00e7i\u015f; sekt\u00f6rleri yeniden \u015fekillendirmeye devam ederken BT karar mercilerinin, bu devasa e\u011filimlerin temposuna uyum sa\u011flayabilecek g\u00fcvenlik stratejilerine \u00f6nem vermesi gerekiyor.<\/p>\n<h2>Metodoloji<\/h2>\n<p>Bu \u00e7al\u0131\u015fma; \u00e7e\u015fitli boyutlardaki yani personel say\u0131s\u0131 500\u2019den az ve 500 ile 5.000 aras\u0131ndaki KOB\u0130\u2019ler ve 5.000\u2019den fazla* olan b\u00fcy\u00fck i\u015fletmelerde \u00e7al\u0131\u015fan karar mercileri ve BT uzmanlar\u0131yla yap\u0131lan r\u00f6portajlardan toplanan veriler baz al\u0131narak olu\u015fturulmu\u015ftur. Kaspersky\u2019nin faaliyet g\u00f6sterdi\u011fi 27 \u00fclke \u00e7ap\u0131nda, b\u00fcy\u00fck pazarlarda ger\u00e7ekle\u015ftirilmi\u015ftir. \u00c7al\u0131\u015fma kapsam\u0131; BT g\u00fcvenli\u011fi b\u00fct\u00e7elerinin, i\u015fe al\u0131mlar\u0131n\u0131n ve a\u00e7\u0131klar\u0131n\u0131n yan\u0131 s\u0131ra sekt\u00f6rlere \u00f6zel fikirlerin detayl\u0131 analizini i\u00e7ermektedir.<\/p>\n<h2>\u00d6nemli Noktalar<\/h2>\n<h2>BT G\u00fcvenli\u011fi Harcamalar\u0131nda Geni\u015f Kapsaml\u0131 Art\u0131\u015flar<\/h2>\n<p>Ankete g\u00f6re BT\u2019ye y\u00f6nelik b\u00fct\u00e7e da\u011f\u0131l\u0131mlar\u0131, her boyuttaki i\u015fletmelerde artt\u0131.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>\u015eirket boyutu<\/strong><\/td>\n<td><strong>Toplam BT b\u00fct\u00e7esi<\/strong><\/td>\n<td><strong>BT G\u00fcvenli\u011fi B\u00fct\u00e7esi<\/strong><\/td>\n<td><strong>BT G\u00fcvenli\u011finin Toplam BT Harcamalar\u0131na Oran\u0131<\/strong><\/td>\n<td><strong>BT G\u00fcvenli\u011fi Harcamalar\u0131nda Planlanan Art\u0131\u015f*<\/strong><\/td>\n<\/tr>\n<tr>\n<td>B\u00fcy\u00fck i\u015fletmeler<\/td>\n<td>$41,8M<\/td>\n<td>$5,7M<\/td>\n<td>%13,6<\/td>\n<td>+%8,5<\/td>\n<\/tr>\n<tr>\n<td>KOB\u0130\u2019ler (500 \u00fcst\u00fc \u00e7al\u0131\u015fanl\u0131)<\/td>\n<td>$10,5M<\/td>\n<td>$1,2M<\/td>\n<td>%11,6<\/td>\n<td>+%9,2<\/td>\n<\/tr>\n<tr>\n<td>KOB\u0130\u2019ler (500 alt\u0131 \u00e7al\u0131\u015fanl\u0131)<\/td>\n<td>$1,6M<\/td>\n<td>$0,2M<\/td>\n<td>%12,5<\/td>\n<td>+%8.8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>*\u0130ki y\u0131ll\u0131k de\u011fi\u015fimler<\/p>\n<p>Farkl\u0131 boyutlardaki organizasyonlarda BT g\u00fcvenli\u011fi harcamas\u0131n\u0131n k\u0131smen tutarl\u0131 oran\u0131 ile ilerideki iki y\u0131l i\u00e7inde beklenen %10\u2019luk art\u0131\u015f, \u00f6l\u00e7ek fark etmeksizin siber g\u00fcvenli\u011fin, toplam BT yat\u0131r\u0131m\u0131n\u0131n ayr\u0131lmaz bir par\u00e7as\u0131 oldu\u011funun kabullenildi\u011finin bir g\u00f6stergesidir.<\/p>\n<p>Dijital altyap\u0131lar daha da \u00f6nemli bir h\u00e2l ald\u0131k\u00e7a bu artan e\u011filim, g\u00fcvenli\u011fin yaln\u0131zca iste\u011fe ba\u011fl\u0131 bir harcama olmad\u0131\u011f\u0131n\u0131n ve aksine evrimle\u015fen BT ortamlar\u0131n\u0131 korumak i\u00e7in gerekli bir \u00f6nlem oldu\u011funun sekt\u00f6rlerce ortak bir \u015fekilde kabul edildi\u011finin alt\u0131n\u0131 \u00e7iziyor.<\/p>\n<h2>BT G\u00fcvenli\u011fi Maliyetleri KOB\u0130\u2019ler<\/h2>\n<table>\n<tbody>\n<tr>\n<td><strong>\u0130\u015fletme Boyutu<\/strong><\/td>\n<td><strong>Toplam BT Personeli<\/strong><\/td>\n<td><strong>BT G\u00fcvenli\u011fi Uzmanlar\u0131<\/strong><\/td>\n<td><strong>Ortalama \u00e7\u00f6z\u00fcm say\u0131s\u0131<\/strong><\/td>\n<td><strong>BT G\u00fcvenli\u011finin Toplam BT Personeline Oran\u0131<\/strong><\/td>\n<\/tr>\n<tr>\n<td>B\u00fcy\u00fck i\u015fletmeler<\/td>\n<td>105<\/td>\n<td>23<\/td>\n<td>15<\/td>\n<td>%21,9<\/td>\n<\/tr>\n<tr>\n<td>KOB\u0130\u2019ler (500 \u00fcst\u00fc \u00e7al\u0131\u015fanl\u0131)<\/td>\n<td>29<\/td>\n<td>9<\/td>\n<td>12<\/td>\n<td>%31<\/td>\n<\/tr>\n<tr>\n<td>KOB\u0130\u2019ler (500 alt\u0131 \u00e7al\u0131\u015fanl\u0131)<\/td>\n<td>12<\/td>\n<td>4<\/td>\n<td>9<\/td>\n<td>%33,3<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>BT g\u00fcvenli\u011fi sistemlerinin karma\u015f\u0131kl\u0131\u011f\u0131na ve boyutuna ra\u011fmen b\u00fcy\u00fck i\u015fletmelerde, toplam BT personellerinin BT g\u00fcvenli\u011fine oran\u0131 daha az. Bu da bu t\u00fcr i\u015fletmelerin, geli\u015fmi\u015f BT \u00e7\u00f6z\u00fcmlerine ve otomasyona yapt\u0131klar\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde yat\u0131r\u0131mlar\u0131n daha b\u00fcy\u00fck \u00f6l\u00e7ekli ekonomiler olu\u015fturarak uzman personel gereksinimini azaltt\u0131\u011f\u0131n\u0131 fakat g\u00fcvenilir g\u00fcvenlik kabiliyetlerini de korudu\u011funu g\u00f6steriyor.<\/p>\n<h2>E\u011fitim Eksikli\u011fi Ciddi Riskler Te\u015fkil Ediyor<\/h2>\n<table>\n<tbody>\n<tr>\n<td><strong>BT G\u00fcvenli\u011fi \u00c7\u00f6z\u00fcm\u00fc<\/strong><\/td>\n<td><strong>Kat\u0131l\u0131mc\u0131lar\u0131n her bir \u00e7\u00f6z\u00fcm\u00fc kullanma y\u00fczdesi (her sekt\u00f6r ve boyuttaki \u015firketlerin ortalamas\u0131)<\/strong><\/td>\n<\/tr>\n<tr>\n<td>U\u00e7 Nokta G\u00fcvenli\u011fi<\/td>\n<td>%100<\/td>\n<\/tr>\n<tr>\n<td>A\u011f G\u00fcvenli\u011fi<\/td>\n<td>%94<\/td>\n<\/tr>\n<tr>\n<td>Bulut G\u00fcvenli\u011fi<\/td>\n<td>%83<\/td>\n<\/tr>\n<tr>\n<td>G\u00fcvenlik Hizmetleri<\/td>\n<td>%75<\/td>\n<\/tr>\n<tr>\n<td>Siber G\u00fcvenlik Analitikleri, \u0130stihbarat, Yan\u0131t ve Denetim<\/td>\n<td>%69<\/td>\n<\/tr>\n<tr>\n<td>G\u00fcvenlik E\u011fitimi<\/td>\n<td>%53<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Boyut fark etmeksizin i\u015fletmelerin %100\u2019\u00fcn\u00fcn U\u00e7 Nokta Korumas\u0131\u2019n\u0131 uygulamas\u0131 ve neredeyse hepsinin A\u011f G\u00fcvenli\u011fi (%94), Bulut G\u00fcvenli\u011fi (%83) ve de G\u00fcvenlik Hizmetleri (%75) kullanmas\u0131, bu \u015firketlerin \u00e7ekirdek dijital altyap\u0131lar\u0131n\u0131 koruman\u0131n \u00f6neminin fark\u0131nda oldu\u011funu i\u015faret ediyor.<\/p>\n<p>Fakat G\u00fcvenlik E\u011fitimi\u2019ne ba\u015fvuranlar\u0131n oran\u0131 (%53) olduk\u00e7a d\u00fc\u015f\u00fck yani bir\u00e7ok \u015firket, hayati savunma katmanlar\u0131na sahip de\u011fil. Sosyal m\u00fchendisli\u011fin ve insan hatalar\u0131n\u0131n en b\u00fcy\u00fck g\u00fcvenlik a\u00e7\u0131klar\u0131ndan biri olmas\u0131 nedeniyle \u00e7al\u0131\u015fan e\u011fitiminin eksikli\u011fi, b\u00fcy\u00fck bir bo\u015flu\u011fun oldu\u011funu g\u00f6steriyor Yeterli e\u011fitim olmadan en geli\u015fmi\u015f teknolojik savunmalar bile en k\u00fc\u00e7\u00fck ve \u00f6nlenebilir hatalarla delinebilir.<\/p>\n<h2>Olaylara Genel Bak\u0131\u015f<\/h2>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2024\/11\/26173204\/IT-Security-Economics-2024-incidents-TR.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-12972\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2024\/11\/26173204\/IT-Security-Economics-2024-incidents-TR.png\" alt=\"\" width=\"1980\" height=\"1121\"><\/a><\/p>\n<p>BT g\u00fcvenli\u011fine milyonlarca dolar harcanm\u0131\u015f olmas\u0131na ve a\u011f g\u00fcvenli\u011finin her boyuttaki i\u015fletmelerce neredeyse evrensel bir \u015fekilde uygulanmas\u0131na ra\u011fmen bu \u015firketlerin \u00e7ok b\u00fcy\u00fck bir \u00e7o\u011funlu\u011fu, a\u011f sald\u0131r\u0131lar\u0131 bildirmeye devam ediyor. Sald\u0131r\u0131 bildirme konusunda listede %97 ile b\u00fcy\u00fck i\u015fletmeler ba\u015f\u0131 \u00e7ekerken %88 ile 500 ve \u00fcst\u00fc \u00e7al\u0131\u015fana sahip, %83 ile de 500 ve alt\u0131 \u00e7al\u0131\u015fana sahip KOB\u0130\u2019ler bulunuyor.<\/p>\n<p>G\u00fcvenli\u011fe b\u00fcy\u00fck \u00f6l\u00e7\u00fcde yat\u0131r\u0131m yapm\u0131\u015f i\u015fletmeler aras\u0131nda bile y\u00fcksek oranda sald\u0131r\u0131 olmas\u0131, tutarl\u0131 ve evrimle\u015fen bir tehdit ortam\u0131n\u0131n bulundu\u011funu vurguluyor. Yani a\u011f parametrelerini korumak \u00f6nemini koruyor olsa da sald\u0131rganlar, genelde geleneksel g\u00fcvenlik \u00f6nlemlerinin ba\u015fa \u00e7\u0131kamayaca\u011f\u0131 a\u00e7\u0131klardan yararlan\u0131yorlar ve sistemleri delmek i\u00e7in hem yeni hem de daha karma\u015f\u0131k yollar buluyorlar.<\/p>\n<p>B\u00fcy\u00fck i\u015fletmelere (%19) k\u0131yasla halka a\u00e7\u0131k bulut hizmetleri \u00fczerinden daha fazla veri h\u0131rs\u0131zl\u0131\u011f\u0131 bildiren 500 alt\u0131 \u00e7al\u0131\u015fana sahip KOB\u0130\u2019ler (%49), bu t\u00fcr sald\u0131r\u0131lara kar\u015f\u0131 \u00f6zellikle daha savunmas\u0131z bir durumda. Bu farkl\u0131l\u0131\u011f\u0131n sebebi, bu t\u00fcr KOB\u0130\u2019lerin halka a\u00e7\u0131k bulut hizmetlerini kontrol eden daha az say\u0131da s\u0131k\u0131 politikaya ve sisteme sahip olmas\u0131ndan dolay\u0131 hassas verilerin \u00e7al\u0131\u015fanlar taraf\u0131ndan g\u00fcvensiz ortamlarda eri\u015filmesinin ve saklanabilmesinin m\u00fcmk\u00fcn olmas\u0131ndan kaynaklan\u0131yor olabilir.<\/p>\n<p>Buna ek olarak 500 alt\u0131 \u00e7al\u0131\u015fan\u0131 olan KOB\u0130\u2019ler, b\u00fcy\u00fck i\u015fletmelerin verileri \u00fczerinde daha fazla kontrole sahip olmak i\u00e7in kulland\u0131\u011f\u0131 yerinde altyap\u0131 sistemlerine yat\u0131r\u0131m yapmak yerine halka a\u00e7\u0131k bulut \u00e7\u00f6z\u00fcmlerine g\u00fcvenmeye daha yatk\u0131n. Yeterli g\u00f6zetim olmadan \u00fc\u00e7\u00fcnc\u00fc parti hizmetlere bu denli g\u00fcvenmek, veri ihlali ve h\u0131rs\u0131zl\u0131\u011f\u0131 riskini art\u0131rabilir.<\/p>\n<p><strong>Yinelenen Bilgi<\/strong><\/p>\n<p>\u00d6zellikle daha k\u00fc\u00e7\u00fck firmalarda g\u00fcvenlik ihlallerine sebep olan bir di\u011fer \u00f6nemli fakt\u00f6r ise insan hatas\u0131d\u0131r. \u0130ster g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131n\u0131n eksikli\u011fi ister yetersiz e\u011fitim sebebiyle olsun, \u00e7al\u0131\u015fanlar taraf\u0131ndan yap\u0131lan hata ve ihmaller; i\u015fletmelerde meydana gelen g\u00fcvenlik ihlallerinin \u00f6nde gelen sebeplerindendir<a href=\"#_ftn7\" target=\"_blank\" rel=\"nofollow noopener\" name=\"_ftnref7\">[6]<\/a>.<\/p>\n<p>Yaln\u0131zca %53\u2019\u00fcn\u00fcn g\u00fcvenlik e\u011fitimine yat\u0131r\u0131m yapmas\u0131yla \u015firketlerinin bir\u00e7o\u011fu; sosyal m\u00fchendislik, oltalama ve di\u011fer insan kaynakl\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131na maruz kal\u0131yor. En iyi g\u00fcvenlik uygulamalar\u0131 konusunda \u00e7al\u0131\u015fanlar\u0131n e\u011fitimini art\u0131rmak, \u00f6nlenebilir hatalardan kaynaklanan olaylar\u0131n say\u0131s\u0131n\u0131 b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azaltabilir.<\/p>\n<h2>Boyuta G\u00f6re BT G\u00fcvenli\u011fi<\/h2>\n<h2>B\u00fcy\u00fck \u0130\u015fletmeler<\/h2>\n<table>\n<tbody>\n<tr>\n<td>BT b\u00fct\u00e7esi<\/td>\n<td>$41,8M<\/td>\n<\/tr>\n<tr>\n<td>BT g\u00fcvenli\u011fine harcanan<\/td>\n<td>$5,7M<\/td>\n<\/tr>\n<tr>\n<td>BT harcamas\u0131ndaki iki y\u0131ll\u0131k art\u0131\u015f<\/td>\n<td>+%8,5<\/td>\n<\/tr>\n<tr>\n<td>Ortalama olay say\u0131s\u0131<\/td>\n<td>12<\/td>\n<\/tr>\n<tr>\n<td>Ortalama \u015firket kay\u0131plar\u0131<\/td>\n<td>$6,2M (g\u00fcvenlik b\u00fct\u00e7elerinin 1,1 kat\u0131)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>KOB\u0130\u2019ler (500 \u00fcst\u00fc \u00e7al\u0131\u015fanl\u0131)<\/h2>\n<table>\n<tbody>\n<tr>\n<td>BT B\u00fct\u00e7esi<\/td>\n<td>$10,5<\/td>\n<\/tr>\n<tr>\n<td>BT g\u00fcvenli\u011fine harcanan<\/td>\n<td>$1,2M<\/td>\n<\/tr>\n<tr>\n<td>BT harcamas\u0131ndaki 2 y\u0131ll\u0131k art\u0131\u015f<\/td>\n<td>+%9,2<\/td>\n<\/tr>\n<tr>\n<td>Ortalama olay say\u0131s\u0131<\/td>\n<td>13<\/td>\n<\/tr>\n<tr>\n<td>Ortalama \u015firket kay\u0131plar\u0131<\/td>\n<td>$1,7M (g\u00fcvenlik b\u00fct\u00e7elerinin 1,4 kat\u0131)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>KOB\u0130\u2019ler (500 alt\u0131 \u00e7al\u0131\u015fanl\u0131)<\/h2>\n<table>\n<tbody>\n<tr>\n<td>BT B\u00fct\u00e7esi<\/td>\n<td>$1,6M<\/td>\n<\/tr>\n<tr>\n<td>BT g\u00fcvenli\u011fine harcanan<\/td>\n<td>$0,2M<\/td>\n<\/tr>\n<tr>\n<td>BT harcamas\u0131ndaki 2 y\u0131ll\u0131k art\u0131\u015f<\/td>\n<td>+%8,8<\/td>\n<\/tr>\n<tr>\n<td>Ortalama olay say\u0131s\u0131<\/td>\n<td>16<\/td>\n<\/tr>\n<tr>\n<td>Ortalama \u015firket kay\u0131plar\u0131<\/td>\n<td>$0,3M (g\u00fcvenlik b\u00fct\u00e7elerinin 1,5 kat\u0131)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Kaynaklar\u0131n\u0131n fazlal\u0131\u011f\u0131na ve geli\u015fmi\u015f g\u00fcvenlik altyap\u0131lar\u0131na ra\u011fmen boyutlar\u0131 ve karma\u015f\u0131kl\u0131klar\u0131 y\u00fcz\u00fcnden b\u00fcy\u00fck i\u015fletmeler, maliyetli g\u00fcvenlik ihlallerine kar\u015f\u0131 savunmas\u0131z kal\u0131yor. Bu t\u00fcr i\u015fletmeler, olaylar\u0131 daha h\u0131zl\u0131 tespit etme konusunda daha donan\u0131ml\u0131 olsalar da tehditlere yan\u0131t vermek ve etkisini azaltmak i\u00e7in saatler gerekebilir ve bu da geni\u015f kapsaml\u0131, karma\u015f\u0131k BT ortamlar\u0131n\u0131 y\u00f6netmenin zorlu\u011funun alt\u0131n\u0131 \u00e7iziyor.<\/p>\n<p>B\u00fct\u00e7e konusunda en orans\u0131z \u015fekilde etkilenen grup ise 500 ve alt\u0131 \u00e7al\u0131\u015fana sahip KOB\u0130\u2019ler. Bu t\u00fcr KOB\u0130\u2019lerin genelde g\u00fcvenilir siber g\u00fcvenlik politikalar\u0131na ve prosed\u00fcrlerine sahip olmamas\u0131 nedeniyle bu \u015firketler; \u00e7al\u0131\u015fanlar\u0131, halka a\u00e7\u0131k bulutta yanl\u0131\u015f yap\u0131land\u0131rmalar\u0131 ve \u00fcst d\u00fczey izinleri i\u00e7eren olaylara kar\u015f\u0131 savunmas\u0131z kal\u0131yorlar.<\/p>\n<p><strong>Yinelenen Bilgi<\/strong><\/p>\n<p>Buluta adaptasyon ve uzaktan \u00e7al\u0131\u015fma artmaya devam ettik\u00e7e, insan fakt\u00f6r\u00fc ve yetersiz bulut g\u00fcvenli\u011fi politikalar\u0131 \u00f6zellikle bu t\u00fcr k\u00fc\u00e7\u00fck i\u015fletmeler i\u00e7in kritik \u00f6neme sahip g\u00fcvenlik a\u00e7\u0131klar\u0131 olarak kalmaya devam ediyor. Bu noktalar da i\u015fletmelerin boyutlar\u0131na ve kaynaklar\u0131na g\u00f6re kar\u015f\u0131 kald\u0131klar\u0131 belirli tehditlere \u00f6zel haz\u0131rlanm\u0131\u015f g\u00fcvenlik stratejilerinin \u00f6nemini vurguluyor.<\/p>\n<h2>Sekt\u00f6re \u00d6zel Noktalar<\/h2>\n<h2>Kamu Hizmetleri (Devlet, E\u011fitim, Savunma)<\/h2>\n<ul>\n<li>BT B\u00fct\u00e7esi $8,2M<\/li>\n<li>BT g\u00fcvenli\u011fine harcanan $1M<\/li>\n<li>BT harcamas\u0131ndaki 2 y\u0131ll\u0131k art\u0131\u015f +%8,9<\/li>\n<li>Ortalama olay say\u0131s\u0131 18<\/li>\n<li>Ortalama \u015firket kay\u0131plar\u0131 $1,1M (g\u00fcvenlik b\u00fct\u00e7elerinin 1,1 kat\u0131)<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td><strong>En B\u00fcy\u00fck Kayg\u0131lar<\/strong><\/td>\n<td colspan=\"3\"><strong>En B\u00fcy\u00fck Zorluklar<\/strong><\/td>\n<\/tr>\n<tr>\n<td>%39 \u2013 Aksama s\u00fcresine\/\u00fcretkenlik kayb\u0131na maruz kalma<\/td>\n<td>%34 \u2013 M\u00fc\u015fteri hizmetlerine eri\u015fim kayb\u0131<\/td>\n<td>%33 \u2013 BT g\u00fcvenli\u011finin, i\u015fletme d\u00f6n\u00fc\u015f\u00fcm\u00fcne engel oldu\u011fu d\u00fc\u015f\u00fcn\u00fclmesi<\/td>\n<td>%32 \u2013 Yan\u0131tlama s\u00fcresinin uzun s\u00fcrmesi<\/td>\n<\/tr>\n<tr>\n<td>%34 \u2013 Karma\u015f\u0131k teknoloji ortamlar\u0131n\u0131 koruma maliyeti<\/td>\n<td>%45 \u2013 Bilgisayar d\u0131\u015f\u0131 cihazlar\u0131n d\u00e2hil olmas\u0131<\/td>\n<td>%36 \u2013 Platformlar aras\u0131 g\u00fcvenlik y\u00f6netimi<\/td>\n<td>%31 \u2013 Yanl\u0131\u015f faaliyet<\/td>\n<\/tr>\n<tr>\n<td>%24 \u2013 Veri korumas\u0131yla ilgili sorunlar<\/td>\n<td>%40 \u2013 Fiziksel kay\u0131p<\/td>\n<td>%35 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [\u00e7al\u0131\u015fanlar]<\/td>\n<td>%34 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [siber sald\u0131r\u0131lar]<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>$8,2M BT b\u00fct\u00e7esinin $1M\u2019l\u0131k k\u0131sm\u0131n\u0131n g\u00fcvenli\u011fe harcanmas\u0131yla bu sekt\u00f6r, boyutuna ve karma\u015f\u0131kl\u0131\u011f\u0131na k\u0131yasla k\u0131smen d\u00fc\u015f\u00fck bir g\u00fcvenlik yat\u0131r\u0131m\u0131na sahip. Olaylar\u0131n say\u0131s\u0131n\u0131n (18) y\u00fcksekli\u011fi ve ortalama \u015firket kay\u0131plar\u0131n\u0131n g\u00fcvenlik b\u00fct\u00e7esinin 1,1 kat\u0131 olan $1,1M olmas\u0131, bu i\u015fletmelerin s\u0131kl\u0131kla hedef h\u00e2line geldi\u011finin fakat \u00f6nleme ve yan\u0131t i\u00e7in gereken kaynaklara ve olgunlu\u011fa sahip olmad\u0131klar\u0131n\u0131n bir g\u00f6stergesi.<\/p>\n<p>Anti-DDoS, Tehdit \u0130stihbarat\u0131 (TI) ve A\u00e7\u0131k Y\u00f6netimi (VM) gibi \u00f6nemli \u00e7\u00f6z\u00fcmlerin \u00e7ok az uygulanmas\u0131 nedeniyle bu sekt\u00f6r s\u0131kl\u0131kla, \u00e7al\u0131\u015fan kaynakl\u0131 olaylarla ve veri h\u0131rs\u0131zl\u0131\u011f\u0131yla kar\u015f\u0131 kar\u015f\u0131ya kal\u0131yor. Uzun yan\u0131t s\u00fcreleriyse daha iyi bir olay y\u00f6netiminin ve kay\u0131plar\u0131 azaltmak i\u00e7in daha h\u0131zl\u0131 tespitin gerekli oldu\u011funa i\u015faret ediyor.<\/p>\n<h2>\u00dcretim<\/h2>\n<ul>\n<li>BT B\u00fct\u00e7esi $6M<\/li>\n<li>BT g\u00fcvenli\u011fine harcanan $0,7M<\/li>\n<li>BT harcamas\u0131ndaki 2 y\u0131ll\u0131k art\u0131\u015f +%8,4<\/li>\n<li>Ortalama olay say\u0131s\u0131 17<\/li>\n<li>Ortalama \u015firket kay\u0131plar\u0131 $1,8M (g\u00fcvenlik b\u00fct\u00e7elerinin 2,5 kat\u0131)<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td><strong>En B\u00fcy\u00fck Kayg\u0131lar<\/strong><\/td>\n<td colspan=\"3\"><strong>En B\u00fcy\u00fck Zorluklar<\/strong><\/td>\n<\/tr>\n<tr>\n<td>%43 \u2013 Aksama s\u00fcresine\/\u00fcretkenlik kayb\u0131na maruz kalma<\/td>\n<td>%44 \u2013 Uzun s\u00fcrede tespit<\/td>\n<td>%35 \u2013 M\u00fc\u015fteri hizmetlerine eri\u015fim kayb\u0131<\/td>\n<td>%33 \u2013 Yan\u0131tlama s\u00fcresinin uzun s\u00fcrmesi<\/td>\n<\/tr>\n<tr>\n<td>%38 \u2013 Veri korumas\u0131yla ilgili sorunlar<\/td>\n<td>%46 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [siber sald\u0131r\u0131lar]<\/td>\n<td>%36 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [\u00e7al\u0131\u015fanlar]<\/td>\n<td>%33 \u2013 Fiziksel kay\u0131p<\/td>\n<\/tr>\n<tr>\n<td>%33 \u2013 Karma\u015f\u0131k teknoloji ortamlar\u0131n\u0131 koruma maliyeti<\/td>\n<td>%47 \u2013 Bilgisayar d\u0131\u015f\u0131 cihazlar\u0131n d\u00e2hil olmas\u0131<\/td>\n<td>%33 \u2013 Platformlar aras\u0131 g\u00fcvenlik y\u00f6netimi<\/td>\n<td>%27 \u2013 Yanl\u0131\u015f faaliyet<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00dcretim sekt\u00f6r\u00fc daha k\u00fc\u00e7\u00fck bir BT b\u00fct\u00e7esiyle ($6M) ve \u00e7ok az bir miktar olan $0,7M g\u00fcvenlik harcamas\u0131yla faaliyet g\u00f6steriyor. Bu da olay ba\u015f\u0131 $1,8M ya da g\u00fcvenlik b\u00fct\u00e7elerinin 2,5 kat\u0131na denk gelen \u00f6nemli finansal kay\u0131plara yol a\u00e7\u0131yor. Kendisine benzer olgunluk seviyesindekilere g\u00f6re bu sekt\u00f6r her ne kadar Y\u00f6netilen Tespit ve Yan\u0131t (MDR) ile Tespit \u0130stihbarat\u0131 gibi \u00e7\u00f6z\u00fcmleri daha y\u00fcksek oranda kullansa da \u00f6zellikle nesnelerin interneti, \u015fifre h\u0131rs\u0131zl\u0131\u011f\u0131 ve y\u00fcksek d\u00fczey izin ihlallerini i\u00e7eren olaylar\u0131 tespit etme ve yan\u0131tlama konusunda b\u00fcy\u00fck zorluklar ya\u015f\u0131yor. Tehditlere yan\u0131t vermek i\u00e7in birka\u00e7 g\u00fcn\u00fcn gerekmesi, \u00fcretim faaliyetlerinin s\u00fcrekli sald\u0131r\u0131lara kar\u015f\u0131 ne kadar savunmas\u0131z oldu\u011funun alt\u0131n\u0131 \u00e7iziyor.<\/p>\n<h2>Otel, Restoran, Kafe ve Sa\u011fl\u0131k<\/h2>\n<ul>\n<li>BT B\u00fct\u00e7esi $5,4M<\/li>\n<li>BT g\u00fcvenli\u011fine harcanan $0,6M<\/li>\n<li>BT harcamas\u0131ndaki 2 y\u0131ll\u0131k art\u0131\u015f +%9,3<\/li>\n<li>Ortalama olay say\u0131s\u0131 18<\/li>\n<li>Ortalama \u015firket kay\u0131plar\u0131 $1,8M (g\u00fcvenlik b\u00fct\u00e7elerinin 2 kat\u0131)<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td><strong>En B\u00fcy\u00fck Kayg\u0131lar<\/strong><\/td>\n<td colspan=\"3\"><strong>En B\u00fcy\u00fck Zorluklar<\/strong><\/td>\n<\/tr>\n<tr>\n<td>%40 \u2013 Veri korumas\u0131yla ilgili sorunlar<\/td>\n<td>%44 \u2013 Cihaz veya verilerin fiziksel kayb\u0131<\/td>\n<td>%37 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [siber sald\u0131r\u0131lar]<\/td>\n<td>%33 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [\u00e7al\u0131\u015fanlar]<\/td>\n<\/tr>\n<tr>\n<td>%34 \u2013 Karma\u015f\u0131k teknoloji ortamlar\u0131n\u0131 koruma maliyeti<\/td>\n<td>%41 \u2013 Bilgisayar d\u0131\u015f\u0131 cihazlar\u0131n d\u00e2hil olmas\u0131<\/td>\n<td>%37 \u2013 Platformlar aras\u0131 g\u00fcvenlik y\u00f6netimi<\/td>\n<td>%29 \u2013 BT sistemlerindeki a\u00e7\u0131klar\u0131n tespiti<\/td>\n<\/tr>\n<tr>\n<td>%33 \u2013 Aksama s\u00fcresine\/\u00fcretkenlik kayb\u0131na maruz kalma<\/td>\n<td>%37 \u2013 Uzun s\u00fcrede tespit<\/td>\n<td>%34 \u2013 Yan\u0131tlama s\u00fcresinin uzun s\u00fcrmesi<\/td>\n<td>%32 \u2013 M\u00fc\u015fteri hizmetlerine eri\u015fim kayb\u0131<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Farkl\u0131 faaliyet gereksinimlerine sahip olmalar\u0131na ra\u011fmen otel, restoran, kafe ve sa\u011fl\u0131k sekt\u00f6rlerinin ayn\u0131 gruba d\u00e2hil edilme sebebi, benzer olay ve BT b\u00fct\u00e7esi istatistikleri bulunmas\u0131d\u0131r. Ortalama $5,4M BT b\u00fct\u00e7esi ve bunun $0,6M\u2019l\u0131k k\u0131sm\u0131n\u0131n g\u00fcvenli\u011fe harcanmas\u0131yla bu sekt\u00f6r, kar\u015f\u0131la\u015ft\u0131\u011f\u0131 tehditlere k\u0131yasla d\u00fc\u015f\u00fck b\u00fct\u00e7e sorunu ya\u015f\u0131yor. Ortalama olay say\u0131s\u0131n\u0131n 18 olmas\u0131na ra\u011fmen sekt\u00f6r\u00fcn g\u00fcvenlik olgunlu\u011fu, g\u00fcvenlik e\u011fitimine verilen \u00f6nem d\u0131\u015f\u0131nda d\u00fc\u015f\u00fck kalmaya devam ediyor. Bu sekt\u00f6rler \u00f6zellikle k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, halka a\u00e7\u0131k buluttaki g\u00fcvenlik a\u00e7\u0131klar\u0131 ve y\u00fcksek d\u00fczey izin ihlallerini i\u00e7eren olaylarla kar\u015f\u0131la\u015ft\u0131klar\u0131 i\u00e7in $1,8M\u2019l\u0131k (g\u00fcvenlik b\u00fct\u00e7elerinin 2 kat\u0131) ortalama kay\u0131plar da bu bo\u015flu\u011fu yans\u0131t\u0131yor. Tespit ve yan\u0131t s\u00fcreleri s\u0131kl\u0131kla haftalar s\u00fcrd\u00fc\u011f\u00fc i\u00e7in bu durum, i\u015fletmeleri uzun s\u00fcreli risklere maruz b\u0131rak\u0131yor.<\/p>\n<h2>Bankac\u0131l\u0131k, Mali Hizmetler ve Sigortac\u0131l\u0131k<\/h2>\n<ul>\n<li>BT B\u00fct\u00e7esi $8,3M<\/li>\n<li>BT g\u00fcvenli\u011fine harcanan $1,2M<\/li>\n<li>BT harcamas\u0131ndaki 2 y\u0131ll\u0131k art\u0131\u015f +%9,3<\/li>\n<li>Ortalama olay say\u0131s\u0131 8<\/li>\n<li>Ortalama \u015firket kay\u0131plar\u0131 $3,2M (g\u00fcvenlik b\u00fct\u00e7elerinin 2,7 kat\u0131)<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td><strong>En B\u00fcy\u00fck Kayg\u0131lar<\/strong><\/td>\n<td colspan=\"3\"><strong>En B\u00fcy\u00fck Zorluklar<\/strong><\/td>\n<\/tr>\n<tr>\n<td>%41 \u2013 Aksama s\u00fcresine\/\u00fcretkenlik kayb\u0131na maruz kalma<\/td>\n<td>%46 \u2013 Uzun s\u00fcrede tespit<\/td>\n<td>%42 \u2013 M\u00fc\u015fteri hizmetlerine eri\u015fim kayb\u0131<\/td>\n<td>%41 \u2013 D\u00e2hili hizmetlerine eri\u015fim kayb\u0131<\/td>\n<\/tr>\n<tr>\n<td>%36 \u2013 Karma\u015f\u0131k teknoloji ortamlar\u0131n\u0131 koruma maliyeti<\/td>\n<td>%43 \u2013 Platformlar aras\u0131 g\u00fcvenlik y\u00f6netimi<\/td>\n<td>%39 \u2013 Yanl\u0131\u015f faaliyet<\/td>\n<td>%35 \u2013 Bilgisayar d\u0131\u015f\u0131 cihazlar\u0131n d\u00e2hil olmas\u0131<\/td>\n<\/tr>\n<tr>\n<td>%27 \u2013 Bulut altyap\u0131s\u0131 adaptasyonu konusundaki sorunlar<\/td>\n<td>%45 \u2013 Sanalla\u015ft\u0131r\u0131lm\u0131\u015f ortamlar\u0131 etkileme<\/td>\n<td>%42 \u2013 \u00dc\u00e7\u00fcnc\u00fc parti bir taraf\u00e7a bar\u0131nd\u0131r\u0131lan BT altyap\u0131s\u0131n\u0131 etkileme<\/td>\n<td>%32 \u2013 Kullan\u0131lan \u00fc\u00e7\u00fcnc\u00fc parti bulut hizmetlerini etkileme<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Bankac\u0131l\u0131k, Mali Hizmetler ve Sigortac\u0131l\u0131k sekt\u00f6rleri; $1,2M b\u00fct\u00e7eyle ve SIEM (G\u00fcvenlik bilgi ve olay y\u00f6netimi) ile Geni\u015fletilmi\u015f Alg\u0131lama ve Yan\u0131t (XDR) gibi g\u00fcvenlik hizmetlerinin g\u00fcvenilir bir \u015fekilde uygulanmas\u0131yla g\u00fcvenlik yat\u0131r\u0131m\u0131nda \u00f6nde geliyor. Daha az olay\u0131n (8) yan\u0131 s\u0131ra daha h\u0131zl\u0131 tespit ve yan\u0131t s\u00fcreleriyle bu sekt\u00f6r, g\u00fcvenli\u011fe b\u00fcy\u00fck yat\u0131r\u0131m yapman\u0131n i\u015fe yarad\u0131\u011f\u0131n\u0131 g\u00f6steriyor. Buna ra\u011fmen olay ba\u015f\u0131 ortalama kay\u0131plar\u0131n $3,2M (g\u00fcvenlik b\u00fct\u00e7elerinin 2,7 kat\u0131) olmas\u0131, mali hizmetlerdeki risklerin ne kadar b\u00fcy\u00fck oldu\u011funu da yans\u0131t\u0131yor. Fakat bu sekt\u00f6r\u00fcn g\u00fcvenlik e\u011fitimine ve geli\u015fmi\u015f ara\u00e7lara odaklanmas\u0131, ihlallerin s\u0131kl\u0131\u011f\u0131n\u0131 ve etkisini azaltma konusunda iyi finanse edilmi\u015f g\u00fcvenlik programlar\u0131n\u0131n etkisinin de alt\u0131n\u0131 \u00e7iziyor.<\/p>\n<h2>BT ve Telekom<\/h2>\n<ul>\n<li>BT B\u00fct\u00e7esi $6,9M<\/li>\n<li>BT g\u00fcvenli\u011fine harcanan $1,1M<\/li>\n<li>BT harcamas\u0131ndaki 2 y\u0131ll\u0131k art\u0131\u015f +%8,9<\/li>\n<li>Ortalama olay say\u0131s\u0131 10<\/li>\n<li>Ortalama \u015firket kay\u0131plar\u0131 $2,8M (g\u00fcvenlik b\u00fct\u00e7elerinin 2,5 kat\u0131)<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td><strong>En B\u00fcy\u00fck Kayg\u0131lar<\/strong><\/td>\n<td colspan=\"3\"><strong>En B\u00fcy\u00fck Zorluklar<\/strong><\/td>\n<\/tr>\n<tr>\n<td>%38 \u2013 Karma\u015f\u0131k teknoloji ortamlar\u0131n\u0131 koruma maliyeti<\/td>\n<td>%46 \u2013 Bilgisayar d\u0131\u015f\u0131 cihazlar\u0131n d\u00e2hil olmas\u0131<\/td>\n<td>%39 \u2013 Sistemleri korunmas\u0131z b\u0131rakan CS hatalar\u0131<\/td>\n<td>%35 \u2013 Platformlar aras\u0131 g\u00fcvenlik y\u00f6netimi<\/td>\n<\/tr>\n<tr>\n<td>%34 \u2013 Aksama s\u00fcresine\/\u00fcretkenlik kayb\u0131na maruz kalma<\/td>\n<td>%49 \u2013 Uzun s\u00fcrede tespit<\/td>\n<td>%40 \u2013 Yan\u0131tlama s\u00fcresinin uzun s\u00fcrmesi<\/td>\n<td>%39 \u2013 M\u00fc\u015fteri hizmetlerine eri\u015fim kayb\u0131<\/td>\n<\/tr>\n<tr>\n<td>%32 \u2013 Veri korumas\u0131yla ilgili sorunlar<\/td>\n<td>%48 \u2013 Cihaz veya verilerin fiziksel kayb\u0131<\/td>\n<td>%34 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [siber sald\u0131r\u0131lar]<\/td>\n<td>%27 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [\u00e7al\u0131\u015fanlar]<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Olgun g\u00fcvenlik duru\u015fuyla BT ve Telekom sekt\u00f6r\u00fc g\u00fcvenli\u011fe $1,1M harc\u0131yor ve k\u0131smen az olayla (10) kar\u015f\u0131la\u015f\u0131yor. Fakat ihlaller meydana geldi\u011finde de ortalama $2,8M kay\u0131pla (g\u00fcvenlik b\u00fct\u00e7elerinin 2,5 kat\u0131) bu durum olduk\u00e7a maliyetli oluyor. Sekt\u00f6r\u00fcn; EDR, XDR ve Bulut Altyap\u0131s\u0131 Hak Y\u00f6netimi (CIEM) gibi geli\u015fmi\u015f g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini geni\u015f kapsaml\u0131 bir bi\u00e7imde kullanmas\u0131, s\u0131kl\u0131kla izinsiz giri\u015f olmas\u0131n\u0131 engelliyor fakat sekt\u00f6r hedef h\u00e2line geldi\u011finde de sald\u0131r\u0131lar\u0131n genelde karma\u015f\u0131k olmas\u0131 ve uzun s\u00fcreler tespit edilememesi b\u00fcy\u00fck mali kay\u0131plara ve faaliyetsel hasarlara sebep oluyor.<\/p>\n<p><a name=\"_Toc182553903\"><\/a><strong>\u0130\u015fletmeler Aras\u0131 (B2B) Hizmetler<\/strong><\/p>\n<ul>\n<li>BT B\u00fct\u00e7esi $2,2M<\/li>\n<li>BT g\u00fcvenli\u011fine harcanan $0,3M<\/li>\n<li>BT harcamas\u0131ndaki 2 y\u0131ll\u0131k art\u0131\u015f +%8,9<\/li>\n<li>Ortalama olay say\u0131s\u0131 11<\/li>\n<li>Ortalama \u015firket kay\u0131plar\u0131 $0,6M (g\u00fcvenlik b\u00fct\u00e7elerinin 2 kat\u0131)<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td><strong>En B\u00fcy\u00fck Kayg\u0131lar<\/strong><\/td>\n<td colspan=\"3\"><strong>En B\u00fcy\u00fck Zorluklar<\/strong><\/td>\n<\/tr>\n<tr>\n<td>%42 \u2013 Aksama s\u00fcresine\/\u00fcretkenlik kayb\u0131na maruz kalma<\/td>\n<td>%33 \u2013 Uzun s\u00fcrede tespit<\/td>\n<td>%31 \u2013 Yan\u0131tlama s\u00fcresinin uzun s\u00fcrmesi<\/td>\n<td>%31 \u2013 M\u00fc\u015fteri hizmetlerine eri\u015fim kayb\u0131<\/td>\n<\/tr>\n<tr>\n<td>%31 \u2013 Veri korumas\u0131yla ilgili sorunlar<\/td>\n<td>%39 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [\u00e7al\u0131\u015fanlar]<\/td>\n<td>%38 \u2013 Veri s\u0131z\u0131nt\u0131s\u0131 [siber sald\u0131r\u0131lar]<\/td>\n<td>%38 \u2013 Fiziksel kay\u0131p<\/td>\n<\/tr>\n<tr>\n<td>%28 \u2013 Karma\u015f\u0131k teknoloji ortamlar\u0131n\u0131 koruma maliyeti<\/td>\n<td>%43 \u2013 Platformlar aras\u0131 g\u00fcvenlik y\u00f6netimi<\/td>\n<td>%32 \u2013 Bilgisayar d\u0131\u015f\u0131 cihazlar\u0131n d\u00e2hil olmas\u0131<\/td>\n<td>%23 \u2013 Daha eski sistemlerin s\u00fcrd\u00fcr\u00fclmesi<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>$0,3M\u2019\u0131 g\u00fcvenli\u011fe ayr\u0131lan $2,2M\u2019l\u0131k daha d\u00fc\u015f\u00fck BT b\u00fct\u00e7esiyle B2B i\u015fletmeler daha az olayla (ortalama 11) kar\u015f\u0131 kar\u015f\u0131ya kal\u0131yor fakat kay\u0131plar\u0131n ($0,6M) g\u00fcvenlik b\u00fct\u00e7esine oran\u0131 (2 kat), az say\u0131da olay\u0131n bile b\u00fcy\u00fck hasarlara sebep olabilece\u011fini g\u00f6steriyor. Sekt\u00f6rler aras\u0131nda en d\u00fc\u015f\u00fck say\u0131da g\u00fcvenlik ekibi \u00fcyesine ve b\u00fct\u00e7esine sahip olmas\u0131yla bu alan, \u00e7o\u011fu g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcn\u00fc yetersiz bir \u015fekilde kullanarak kendisini veri ve \u015fifre h\u0131rs\u0131zl\u0131\u011f\u0131na kar\u015f\u0131 savunmas\u0131z b\u0131rak\u0131yor. Fakat bulut sistemlerine g\u00fcvenilmesi \u00f6nemli bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olsa da d\u00fc\u015f\u00fck bir profile sahip olmas\u0131 sald\u0131r\u0131 s\u0131kl\u0131\u011f\u0131n\u0131 azaltabilir.<\/p>\n<h2>Sonu\u00e7<\/h2>\n<p>BT g\u00fcvenli\u011finin evrimle\u015fen \u00e7evresi, her boyuttaki i\u015fletmeler i\u00e7in b\u00fcy\u00fck zorluklar te\u015fkil ediyor. Yapay zek\u00e2, dijitalle\u015fme ve buluta ge\u00e7i\u015f; sekt\u00f6rleri yeniden \u015fekillendirmeye devam ederken i\u015fletmelerin karma\u015f\u0131k siber sald\u0131r\u0131lara kar\u015f\u0131 tetikte kalmas\u0131 gerekiyor.<\/p>\n<p>Bu raporda toplanan veriler, bulut ortamlar\u0131n\u0131 korumaktan faaliyet teknolojilerinin g\u00fcvenli\u011fini sa\u011flamaya kadar, sa\u011flam siber g\u00fcvenlik stratejilerine yat\u0131r\u0131m yapman\u0131n \u00f6nemini vurguluyor.<\/p>\n<p>Faaliyetlerinin \u00f6l\u00e7ekleri nedeniyle b\u00fcy\u00fck i\u015fletmeler s\u0131kl\u0131kla karma\u015f\u0131k g\u00fcvenlik sorunlar\u0131yla kar\u015f\u0131la\u015fsalar da 500 alt\u0131 \u00e7al\u0131\u015fana sahip KOB\u0130\u2019ler ve kamu sekt\u00f6r\u00fc kurulu\u015flar\u0131, k\u0131s\u0131tl\u0131 kaynaklarla ve etkisi y\u00fcksek olaylarla ba\u015fa \u00e7\u0131kmak zorunda kal\u0131yor. \u00c7al\u0131\u015fan e\u011fitimiyle desteklenen geli\u015fmi\u015f g\u00fcvenlik \u00e7\u00f6z\u00fcmlerinin uygulanmas\u0131, risklerin etkisini azaltmak ve s\u00fcrekli de\u011fi\u015fen tehdit \u00e7evrelerinde direnci korumak i\u00e7in t\u00fcm sekt\u00f6rlerde \u00f6nemli oldu\u011funu g\u00f6steriyor.<\/p>\n<p>Bunun yan\u0131 s\u0131ra siber g\u00fcvenlik \u00e7\u00f6z\u00fcmlerine de yat\u0131r\u0131m yapmak ek bir yard\u0131m sa\u011fl\u0131yor. Kaspersky, t\u00fcm sekt\u00f6rlerde her boyuttan i\u015fletmeye destek sa\u011flamak i\u00e7in k\u00fcresel siber g\u00fcvenlikte kendi liderli\u011fini yans\u0131tan 5 Uzmanl\u0131k Merkezine sahip ve bunlar\u0131n her biri, karma\u015f\u0131k dijital tehditleri ele alma konusunda kritik \u00f6nem ta\u015f\u0131yor.<\/p>\n<ul>\n<li>K\u00fcresel Ara\u015ft\u0131rma ve Analiz Ekibi (GReAT), karma\u015f\u0131k sald\u0131r\u0131lara, siber casuslu\u011fa ve b\u00fcy\u00fck k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m e\u011filimlerine y\u00f6nelik ara\u015ft\u0131rmalar yap\u0131yor.<\/li>\n<li>Tehdit Ara\u015ft\u0131rma Merkezi, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kar\u015f\u0131tl\u0131\u011f\u0131 ve i\u00e7erik filtreleme konusunda uzman olman\u0131n yan\u0131 s\u0131ra aktif olarak tespit metodolojileri ve g\u00fcvenli yaz\u0131l\u0131m geli\u015ftirme uygulamalar\u0131 geli\u015ftiriyor.<\/li>\n<li>Yapay Zek\u00e2 Ara\u015ft\u0131rma Merkezi, yapay zek\u00e2 destekli tehdit tespitine ve siber g\u00fcvenli\u011fi iyile\u015ftirmek i\u00e7in \u00fcretken yapay zek\u00e2 \u00e7\u00f6z\u00fcmlerine odaklan\u0131yor.<\/li>\n<li>G\u00fcvenlik Hizmetleri Merkezi; y\u00f6netilen tespit, olay yan\u0131t\u0131 ve g\u00fcvenlik de\u011ferlendirmeleri sunuyor.<\/li>\n<li>ICS CERT Merkezi ise sekt\u00f6rel siber g\u00fcvenli\u011fe odaklanarak kritik altyap\u0131lar i\u00e7in uzman ara\u015ft\u0131rma ve dan\u0131\u015fma sa\u011fl\u0131yor.<\/li>\n<\/ul>\n<p>Birlikte bu merkezler, son teknoloji siber g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini ve hizmetlerini k\u00fcresel olarak sunmak i\u00e7in 5.000\u2019den fazla uzmandan yararlan\u0131yor.<\/p>\n<h2>\u00dcr\u00fcn \u00f6nerileri<\/h2>\n<ul>\n<li><a href=\"https:\/\/calculator.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">BT G\u00fcvenli\u011fi Hesaplay\u0131c\u0131<\/a> gibi uzman kaynaklar\u0131n\u0131 kullanarak \u00fclkeniz ile sekt\u00f6r\u00fcn\u00fcz\u00fc ilgilendiren siber ve veri risklerini tahmin edin ve b\u00fct\u00e7elendirin. Bu ara\u00e7, koruyucu \u00f6nlemlerinizin verimini en \u00fcste \u00e7\u0131karman\u0131za yard\u0131mc\u0131 olacakt\u0131r.<\/li>\n<\/ul>\n<ul>\n<li>\u015eirketinizi geni\u015f \u00e7apl\u0131 tehditlere kar\u015f\u0131 korumak i\u00e7in her boyuttan t\u00fcm sekt\u00f6rlerdeki i\u015fletmelere \u00f6zel ger\u00e7ek zamanl\u0131 koruma, tehdit g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fc ve EDR ile XDR\u2019\u0131n ara\u015ft\u0131rma ve yan\u0131t kabiliyetlerini sunan <a href=\"https:\/\/www.kaspersky.com\/next\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Next<\/a> \u00fcr\u00fcn hatt\u0131ndan \u00e7\u00f6z\u00fcmler kullan\u0131n. Mevcut ihtiya\u00e7 ve kaynaklar\u0131n\u0131za g\u00f6re size en uygun \u00fcr\u00fcn kategorisini se\u00e7ebilir ve siber g\u00fcvenlik ihtiya\u00e7lar\u0131n\u0131z\u0131n de\u011fi\u015fmesi h\u00e2linde kolayca ba\u015fka bir kategoriye ge\u00e7i\u015f yapabilirsiniz.<\/li>\n<\/ul>\n<ul>\n<li>Ek i\u015fe al\u0131m olmadan ek uzmanl\u0131k edinme, <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Managed Detection and Response<\/a> gibi bir y\u00f6netilen g\u00fcvenlik hizmeti sayesinde m\u00fcmk\u00fcn. Bu \u00e7\u00f6z\u00fcm, \u015firket, g\u00fcvenlik \u00e7al\u0131\u015fanlar\u0131na sahip olmasa bile karma\u015f\u0131k siber sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flamak i\u00e7in mevcut en geli\u015fmi\u015f otomatik g\u00fcvenlik hizmetlerinin sunulmas\u0131n\u0131 ve ger\u00e7ek zamanl\u0131 bir \u015fekilde her g\u00fcn 7\/24 toplanan \u015firket verilerinin analizini m\u00fcmk\u00fcn k\u0131l\u0131yor.<\/li>\n<\/ul>\n<ul>\n<li>\u0130\u015fletmenizi hedef alan siber tehditlerin detayl\u0131 g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fcn\u00fc Bilgi G\u00fcvenli\u011fi profesyonellerinize sa\u011flay\u0131n. G\u00fcncel <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Threat Intelligence<\/a>, bu profesyonellere t\u00fcm olay y\u00f6netimi d\u00f6ng\u00fcs\u00fc boyunca zengin ve anlaml\u0131 ba\u011flamlar sa\u011flayacak ve siber riskleri zaman\u0131nda tespit etmelerine yard\u0131mc\u0131 olacak.<\/li>\n<\/ul>\n<ul>\n<li>Buluta adaptasyonunuzu, dijital d\u00f6n\u00fc\u015f\u00fcm\u00fcn\u00fcz\u00fc ve DevOps uygulamalar\u0131n\u0131z\u0131 daha g\u00fcvenli bir h\u00e2le getirmek i\u00e7in di\u011fer g\u00f6revlerin ele al\u0131nabilmesi amac\u0131yla bilgi g\u00fcvenli\u011fi hizmetlerinizi rahatlatan, faaliyet ve altyap\u0131 maliyetlerini azaltan, g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fc art\u0131ran ve her bulut ortam\u0131na uygun olundu\u011fundan emin olan <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/cloud-workload-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Cloud Workload Security<\/a> ekosisteminden \u00e7\u00f6z\u00fcmler kullan\u0131n.<\/li>\n<\/ul>\n<ul>\n<li>Bilgilerini g\u00fcncel tutmak i\u00e7in \u00e7al\u0131\u015fanlar\u0131n\u0131z i\u00e7in ek siber g\u00fcvenlik kurslar\u0131na yat\u0131r\u0131m yap\u0131n. Uygulama odakl\u0131 <a href=\"https:\/\/xtraining.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\">Kaspersky Expert training<\/a> ile Bilgi G\u00fcvenli\u011fi profesyonelleri, \u015firketlerini karma\u015f\u0131k sald\u0131r\u0131lara kar\u015f\u0131 savunabilmek i\u00e7in somut becerilerini geli\u015ftirebilir.<\/li>\n<\/ul>\n<p><a href=\"#_ftnref1\" target=\"_blank\" rel=\"noopener\" name=\"_ftn1\">[1]<\/a> <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/kaspersky-more-than-36-million-ai-gaming-credentials-compromised-by-infostealers-in-3-years\" target=\"_blank\" rel=\"nofollow noopener\">Kaspersky: bilgi h\u0131rs\u0131zlar\u0131 y\u00fcz\u00fcnden 3 y\u0131lda 36 milyondan fazla yapay zek\u00e2 ve oyun kimlik bilgisi tehlikeye alt\u0131na girdi<\/a><\/p>\n<p><a href=\"#_ftnref2\" target=\"_blank\" rel=\"noopener\" name=\"_ftn2\">[2]<\/a><a href=\"https:\/\/therecord.media\/cloudsorcerer-apt-kaspersky-research\" target=\"_blank\" rel=\"nofollow noopener\">Kaspersky, Rus kurulu\u015flar\u0131nda casusluk yapmak i\u00e7in yeni bir grubun halka a\u00e7\u0131k bulut hizmetlerinin a\u00e7\u0131klar\u0131ndan yararland\u0131\u011f\u0131n\u0131 a\u00e7\u0131klad\u0131<\/a><\/p>\n<p><a href=\"#_ftnref3\" target=\"_blank\" rel=\"noopener\" name=\"_ftn3\">[3]<\/a><a href=\"https:\/\/backendnews.net\/kaspersky-highlights-ai-driven-security-risks-in-digital-supply-chains\/\" target=\"_blank\" rel=\"nofollow noopener\">Kaspersky, tedarik zincirlerinde yapay zek\u00e2 kaynakl\u0131 g\u00fcvenlik risklerinin alt\u0131n\u0131 \u00e7izdi<\/a><\/p>\n<p><a href=\"#_ftnref4\" target=\"_blank\" rel=\"nofollow noopener\" name=\"_ftn4\">[4]<\/a><a href=\"https:\/\/www.theverge.com\/22998479\/lapsus-hacking-group-cyberattacks-news-updates\" target=\"_blank\" rel=\"nofollow noopener\">Lapsus$ siber sald\u0131r\u0131lar\u0131: bilgisayar korsan\u0131 grubu hakk\u0131ndaki en g\u00fcncel haberler<\/a><\/p>\n<p><a href=\"#_ftnref5\" target=\"_blank\" rel=\"nofollow noopener\" name=\"_ftn5\">[5]<\/a><a href=\"https:\/\/www.theguardian.com\/business\/2023\/aug\/04\/cyber-attack-to-cost-outsourcing-firm-capita-up-to-25m\" target=\"_blank\" rel=\"nofollow noopener\">Siber sald\u0131r\u0131, d\u0131\u015f tedarik\u00e7i \u015firket Capita\u2019ya 25 milyon pounda mal olacak<\/a><\/p>\n<p>*KOB\u0130 = k\u00fc\u00e7\u00fck ve orta \u00f6l\u00e7ekli i\u015fletmeler<\/p>\n<p><a href=\"#_ftnref7\" target=\"_blank\" rel=\"noopener\" name=\"_ftn7\">[6]<\/a><a href=\"https:\/\/www.kaspersky.com\/blog\/human-factor-360-report-2023\/\" target=\"_blank\" rel=\"nofollow noopener\">Siber G\u00fcvenlikte \u0130nsan Fakt\u00f6r\u00fcn\u00fc Yeniden Tan\u0131mlama<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yapay zek\u00e2, dijitalle\u015fme ve bulut d\u00f6n\u00fc\u015f\u00fcm\u00fc d\u00f6neminde zorluklarla ba\u015fa \u00e7\u0131kma<\/p>\n","protected":false},"author":2706,"featured_media":12971,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"class_list":["post-12965","page","type-page","status-publish","has-post-thumbnail"],"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/it-security-economics-2024\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/it-security-economics-2024\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/it-security-economics-2024\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/it-security-economics-2024\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/it-security-economics-2024\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/it-security-economics-2024\/"}],"acf":[],"banners":"","is_landing":true,"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/pages\/12965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=12965"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/pages\/12965\/revisions"}],"predecessor-version":[{"id":12994,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/pages\/12965\/revisions\/12994"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/12971"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=12965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=12965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}