{"id":10080,"date":"2021-09-27T13:22:03","date_gmt":"2021-09-27T10:22:03","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10080"},"modified":"2021-09-27T13:22:03","modified_gmt":"2021-09-27T10:22:03","slug":"back-to-office-checklist","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/back-to-office-checklist\/10080\/","title":{"rendered":"BT g\u00fcvenli\u011finin &#8220;ofise d\u00f6n\u00fc\u015f&#8221; plan\u0131"},"content":{"rendered":"<p>Er ya da ge\u00e7 \u00e7o\u011fu i\u015fletme, pandemi sonras\u0131 \u00e7al\u0131\u015fma d\u00fczeni \u00fczerinde d\u00fc\u015f\u00fcnmek zorunda kalacak. Pandeminin etkisiyle ya\u015fanan \u015fa\u015fk\u0131nl\u0131\u011f\u0131 hen\u00fcz \u00fczerinden atamam\u0131\u015f olan bir\u00e7ok \u015firket, yeni \u00e7al\u0131\u015fma ortam\u0131 ger\u00e7ekleriyle ba\u015fa \u00e7\u0131kma konusunda hen\u00fcz son kararlar\u0131n\u0131 vermemi\u015f olsa da, ofise k\u0131smen d\u00f6n\u00fc\u015f bile BT ve BT g\u00fcvenlik ekiplerinin baz\u0131 \u00f6nlemler almas\u0131n\u0131 gerektiriyor.<\/p>\n<p>Evden \u00e7al\u0131\u015fmaya ge\u00e7i\u015f zordu ancak ilgin\u00e7 bir \u015fekilde ofise d\u00f6n\u00fc\u015f de bir o kadar zor olabilir. \u0130\u015fletmelerin yapt\u0131\u011f\u0131 baz\u0131 de\u011fi\u015fiklikleri geri almalar\u0131 gerekecek, ki bu da en az onlar\u0131 uygulamaya almak kadar i\u015f y\u00fck\u00fcn\u00fc beraberinde getirebilir. Ayr\u0131ca, \u015firket i\u00e7i hizmet g\u00fcvenli\u011fini yeniden kontrol etmeleri ve \u00e7al\u0131\u015fanlar\u0131n kapanma s\u0131ras\u0131nda al\u0131\u015ft\u0131klar\u0131 yaz\u0131l\u0131mlar konusundaki ihtiya\u00e7lar\u0131n\u0131 kar\u015f\u0131lamalar\u0131 gerekecek. Stres alt\u0131ndaki BT g\u00fcvenli\u011fi y\u00f6neticilerinin \u00f6ncelikleri belirlemesine yard\u0131mc\u0131 olmak i\u00e7in i\u015fletmelere y\u00f6nelik baz\u0131 siber g\u00fcvenlik eylemlerini listeledik.<\/p>\n<h2>1. Evden \u00e7al\u0131\u015fma s\u0131ras\u0131ndaki ge\u00e7ici siber g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini kullanmaya devam edin<\/h2>\n<p>\u00c7al\u0131\u015fanlar\u0131n evden \u00e7al\u0131\u015fma s\u00fcrecinde kurumsal u\u00e7 noktalar\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in bir\u00e7ok \u015firket, g\u00fcvenlik kontrolleri ve uzak bilgisayarlar\u0131n merkezi yama y\u00f6netimi, VPN eri\u015fimine ek yapma veya geni\u015fletme ve \u00f6zel fark\u0131ndal\u0131k e\u011fitimi sunma gibi ek koruma \u00f6nlemlerini uygulamaya ald\u0131. U\u00e7 noktalardaki tespit ve yan\u0131t arac\u0131lar\u0131, a\u011f \u00e7evre bo\u015fluklar\u0131n\u0131 belirleme ve kapatma konusunda \u00f6nemli rol oynad\u0131.<\/p>\n<p>\u0130\u015f g\u00fcc\u00fcn\u00fcz ister evden ofise d\u00f6n\u00fcyor, isterse sadece s\u0131k seyahat ediyor olsun, u\u00e7 noktalarda VPN, EDR ve izinsiz giri\u015f tespit sistemleri kullanmak, \u00e7al\u0131\u015fanlar\u0131n g\u00fcvenli bir \u015fekilde ofise d\u00f6nmelerini sa\u011flar.<\/p>\n<h2>2. Uzaktan \u00e7al\u0131\u015fanlar i\u00e7in devre d\u0131\u015f\u0131 b\u0131rakt\u0131\u011f\u0131n\u0131z t\u00fcm g\u00fcvenlik denetimlerini tekrar uygulamaya al\u0131n<\/h2>\n<p>Uzaktan \u00e7al\u0131\u015fanlar\u0131n, \u00f6zellikle ki\u015fisel cihazlar\u0131ndan \u015firket a\u011f\u0131na ba\u011flanabilmesini sa\u011flamak i\u00e7in baz\u0131 i\u015fletmeler A\u011f Kabul Kontrol\u00fc (Network Admission Control \u2013 NAC) gibi siber g\u00fcvenlik kontrollerini gev\u015fetti veya devre d\u0131\u015f\u0131 b\u0131rakt\u0131. NAC, \u015firket a\u011f\u0131na eri\u015fim izni vermeden \u00f6nce bilgisayarlar\u0131n g\u00fcncel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m korumas\u0131 gibi kurumsal g\u00fcvenlik gereksinimleriyle uyumlu olup olmad\u0131\u011f\u0131n\u0131n kontrol\u00fcn\u00fc sa\u011flar.<\/p>\n<p>\u00c7al\u0131\u015fanlar ofise d\u00f6nd\u00fcklerinde ve \u015firket a\u011f\u0131na ba\u011fland\u0131\u011f\u0131nda makinelerinin herhangi bir risk olu\u015fturmas\u0131 ihtimaline kar\u015f\u0131 i\u00e7 sistemleri korumak amac\u0131yla NAC a\u00e7\u0131lmal\u0131d\u0131r. Ancak bilgisayarlar yakla\u015f\u0131k 18 ayd\u0131r \u015firket a\u011f\u0131ndan uzak olduklar\u0131 i\u00e7in baz\u0131 g\u00fcncellemeleri ka\u00e7\u0131rm\u0131\u015f olabilirler. Bu, NAC\u2019\u0131n g\u00fcncellenmeyen onlarca hatta y\u00fczlerce makine i\u00e7in etkinle\u015ftirilmesinin bir\u00e7ok hataya neden olabilece\u011fi anlam\u0131na gelir. Sonu\u00e7 olarak, hizmeti etkinle\u015ftirmek, k\u00fc\u00e7\u00fck personel gruplar\u0131 i\u00e7in ad\u0131m ad\u0131m ince ayar yap\u0131lmas\u0131 s\u00fcrecine d\u00f6n\u00fc\u015febilir.<\/p>\n<p>\u0130\u015fletmelerin bu t\u00fcr sorunlar\u0131 \u00f6ng\u00f6rmesi ve kaynaklar\u0131, son teslim tarihlerini, hata d\u00fczeltmelerini ve hatta BT entegrat\u00f6rlerinin yard\u0131m\u0131n\u0131 i\u00e7eren bir plana sahip olmas\u0131 gerekir.<\/p>\n<h2>3. \u015eirket i\u00e7i sistemleri g\u00fcncelleyin<\/h2>\n<p>\u015eirket i\u00e7i kritik hizmetleri kontrol etmeyi unutmay\u0131n. Ofiste yama uygulanmam\u0131\u015f sunucular varsa, BT g\u00fcvenlik ekibinin \u015firket i\u00e7ine almadan \u00f6nce bunlar hakk\u0131nda bilgi sahibi olmas\u0131 gerekir.<\/p>\n<p>Herkes ofisteki masas\u0131ndan \u00e7al\u0131\u015f\u0131rken bilgisayarlar\u0131m\u0131z s\u00fcrekli \u015firket a\u011f\u0131na ba\u011fl\u0131yd\u0131 ve 7\/24 koruma ve politika kontrol\u00fc alt\u0131ndayd\u0131. Dolay\u0131s\u0131yla, bir bilgisayardaki a\u00e7\u0131ktan faydalanarak a\u011fa s\u0131z\u0131lmas\u0131 ve savunmas\u0131z bir sunucunun g\u00fcvenli\u011finin ihlal edilmesi riski \u00e7ok daha d\u00fc\u015f\u00fckt\u00fc.<\/p>\n<p>Herkesin ofise d\u00f6n\u00fcp diz\u00fcst\u00fc bilgisayarlar\u0131n\u0131 \u015firket a\u011f\u0131na ayn\u0131 anda ba\u011flamas\u0131yla, yaln\u0131zca bir yama uygulanmam\u0131\u015f etki alan\u0131 denetleyicisi bile, \u00f6rne\u011fin \u00e7al\u0131\u015fanlar\u0131n hesap bilgilerine ve parolalar\u0131na geni\u015f \u00e7apl\u0131 eri\u015fim elde edilmesini sa\u011flayabilir. Dikkatli bir BT g\u00fcvenlik ekibi, sorunu zaman\u0131nda tespit etmeli ve ciddi sorunlar\u0131n \u00fcstesinden gelmelidir, ancak bunu yapmak bile, a\u011f\u0131n tekrar organize edilmesi ve t\u00fcm parolalar\u0131n de\u011fi\u015ftirilmesi gibi ek i\u015f y\u00fck\u00fcn\u00fc beraberinde getirir.<\/p>\n<h2>4. Tasarruf etmeye ama ayn\u0131 zamanda harcama yapmaya da haz\u0131r olun<\/h2>\n<p>\u00c7al\u0131\u015fanlar\u0131 ofise \u00e7a\u011f\u0131rmak, i\u015fverenlerin bir miktar tasarruf etmesini sa\u011flayacak. \u00d6rne\u011fin Kaspersky olarak, personelimizin \u00e7o\u011funun evden \u00e7al\u0131\u015fmas\u0131n\u0131 sa\u011flamak ad\u0131na VPN t\u00fcnellerinin say\u0131s\u0131n\u0131 1.000\u2019den 5.000\u2019in \u00fczerine \u00e7\u0131kard\u0131k. Ekibimiz ofise d\u00f6nd\u00fc\u011f\u00fcnde b\u00fcy\u00fck olas\u0131l\u0131kla bu maliyeti azaltaca\u011f\u0131z.<\/p>\n<p>Benzer \u015fekilde \u015firketler, Slack veya Microsoft Teams gibi abonelik tabanl\u0131 bulut \u00e7\u00f6z\u00fcmlerinin kullan\u0131m\u0131n\u0131 azaltabilir. Personelin ofisten \u00e7al\u0131\u015fmas\u0131 ile \u015firketlerin \u00e7ok fazla bulut lisans\u0131na ihtiyac\u0131 kalmayacak ve baz\u0131 hizmetleri yerel kaynak olarak geri getirebilecekler. Ayn\u0131 strateji, karantina s\u0131ras\u0131nda ihtiya\u00e7 duyulan ancak geleneksel belge imza s\u00fcre\u00e7lerine d\u00f6n\u00fc\u015fle de\u011fi\u015ftirilebilecek (veya \u00f6l\u00e7eklenebilecek) olan elektronik imza uygulamalar\u0131 i\u00e7in de ge\u00e7erlidir.<\/p>\n<p>Verilen bu b\u00fct\u00e7eleri, dijital i\u015f istasyonlar\u0131n\u0131, \u00e7al\u0131\u015fanlar\u0131n mesailerini ofis ve ba\u015fka bir yerde ge\u00e7irme aras\u0131nda b\u00f6lebilecekleri \u015fekilde d\u00fczenlemeye harcamay\u0131 d\u00fc\u015f\u00fcn\u00fcn. S\u00f6z konusu konsept yeni de\u011fil, ancak <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/6-trends-on-the-gartner-hype-cycle-for-the-digital-workplace-2020\/\" target=\"_blank\" rel=\"noopener nofollow\">Gartner\u2019\u0131n belirtti\u011fi \u00fczere<\/a> pandemi bunu daha yayg\u0131n hale getirdi. Sanal masa\u00fcst\u00fc altyap\u0131s\u0131ndan (VDI) bir hizmet olarak masa\u00fcst\u00fcne (DaaS) kadar, uzaktan \u00e7al\u0131\u015fma teknolojileri asl\u0131nda \u00e7al\u0131\u015fma alanlar\u0131n\u0131 buluta ta\u015f\u0131yabilir, bu da onlar\u0131 ba\u011fl\u0131 herhangi bir cihazdan eri\u015filebilir hale getirebilir. Sanal masa\u00fcstlerinin da\u011f\u0131t\u0131m\u0131, y\u00f6netimi, d\u00fczeltilmesi ve korunmas\u0131 uzak bilgisayarlara k\u0131yasla \u00e7ok daha kolayd\u0131r.<\/p>\n<h2>5. \u00c7al\u0131\u015fanlar\u0131n uzaktan \u00e7al\u0131\u015f\u0131rken kulland\u0131\u011f\u0131 ara\u00e7lar\u0131 ve ayarlar\u0131 koruyun<\/h2>\n<p>Uzaktan \u00e7al\u0131\u015fanlar, sohbet, video konferans, planlama, CRM ve \u00e7ok daha fazla ihtiyaca y\u00f6nelik yeni ileti\u015fim ve i\u015f birli\u011fi ara\u00e7lar\u0131n\u0131 kullanma konusunda uzmanla\u015ft\u0131lar. Bu ara\u00e7lar \u00e7al\u0131\u015fanlar\u0131n ihtiya\u00e7lar\u0131n\u0131 kar\u015f\u0131lad\u0131ysa, bunlar\u0131 kullanmaya devam etmek isteyeceklerdir. Pandemi s\u00fcrecinde ya\u015fanan deneyimler sonucunda, ankete kat\u0131lanlar\u0131n %74\u2019\u00fc daha<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/11\/12034625\/2020_Kaspersky_Own-Your-Future_report.pdf\"> esnek ve rahat \u00e7al\u0131\u015fma ko\u015fullar\u0131 istediklerini belirtti<\/a>.<\/p>\n<p>Bu t\u00fcr yenilikleri yasaklamak pek de mant\u0131kl\u0131 bir tercih olmayabilir. Bir bak\u0131ma g\u00f6lge BT\u2019nin b\u00fcy\u00fcmesini, yani personelin BT onay\u0131 olmayan uygulamalar\u0131 kullanmas\u0131n\u0131 tetikleyebilir. \u015eirketler ya yeni hizmetleri onaylamaya ya da alternatif \u00f6nerilerde bulunmaya ve bunlar\u0131 savunmaya haz\u0131r olmal\u0131d\u0131r. \u00d6zel \u00e7\u00f6z\u00fcmler, bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcndeki \u00f6zel bulut ke\u015fif \u00f6zelliklerini veya bulut eri\u015fim g\u00fcvenli\u011fi arac\u0131lar\u0131n\u0131 kullanarak, kurulu\u015flar\u0131n bulut hizmetlerine eri\u015fimi y\u00f6netmesine ve ilgili g\u00fcvenlik ilkelerini uygulamas\u0131na yard\u0131mc\u0131 olabilir.<\/p>\n<p>BT g\u00fcvenli\u011fi i\u015fin yap\u0131lmas\u0131na engel olmamal\u0131, imkan sa\u011flamal\u0131d\u0131r. B\u00fcy\u00fck \u00e7apl\u0131 bir davran\u0131\u015f de\u011fi\u015fikli\u011fini g\u00f6rmezden gelmek, \u00e7al\u0131\u015fan\u0131n \u015firkete bak\u0131\u015f a\u00e7\u0131s\u0131na zarar verebilirken, esnek \u00e7al\u0131\u015fma ve \u00e7al\u0131\u015fanlara uygun hizmetlere izin vermek tam tersi y\u00f6nde etki g\u00f6sterebilir. Bu, gelecekteki adaylar ve \u00e7al\u0131\u015fanlar i\u00e7in de ge\u00e7erlidir. Bunun \u00f6rne\u011fini <a href=\"https:\/\/www.theverge.com\/2021\/6\/4\/22491629\/apple-employees-push-back-return-office-internal-letter-tim-cook\" target=\"_blank\" rel=\"noopener nofollow\">Apple\u2019da<\/a> g\u00f6rd\u00fck; baz\u0131 \u00e7al\u0131\u015fanlar, Tim Cook ve y\u00f6neticilerden \u201cbir ekibin, uzaktan \u00e7al\u0131\u015fma ve \u00e7al\u0131\u015fma ortam\u0131 konusundaki esneklik kararlar\u0131n\u0131, i\u015fe alma kararlar\u0131 kadar \u00f6zerk olarak vermelerini\u201d isteyen a\u00e7\u0131k bir mektup yazd\u0131.<\/p>\n<p>Pandemi ve k\u00fcresel olarak uzaktan \u00e7al\u0131\u015fmaya ge\u00e7i\u015fler, \u015firketler ve BT departmanlar\u0131 a\u00e7\u0131s\u0131ndan ka\u00e7amayacaklar\u0131 bir m\u00fccadele anlam\u0131na geliyordu. T\u00fcm zorluklara ra\u011fmen bu paha bi\u00e7ilmez bir deneyim ve gelecek i\u00e7in olduk\u00e7a \u00f6nemli bir ders \u00e7\u0131kar\u0131lmas\u0131n\u0131 sa\u011fl\u0131yor.<\/p>\n<p>Pandeminin en \u00f6nemli \u00e7\u0131kar\u0131mlar\u0131ndan biri, i\u015fletmelerin ne kadar h\u0131zl\u0131 de\u011fi\u015febilece\u011finin g\u00f6r\u00fclmesi oldu. Bu deneyimden \u00e7ok \u015fey \u00f6\u011frenen BT g\u00fcvenli\u011fi, se\u00e7enekler sunmal\u0131 ve devam eden esnekli\u011fi desteklemelidir. Hangi \u015fekilde olursa olsun ofisten \u00e7al\u0131\u015fmaya ak\u0131ll\u0131 ve g\u00fcvenli bir d\u00f6n\u00fc\u015f, \u015firketlerin bu trendin zirvesinde kalmas\u0131na ve i\u015f s\u00fcre\u00e7lerinden en iyi \u015fekilde yararlanmas\u0131na yard\u0131mc\u0131 olabilir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0130\u015fyerine geri d\u00f6n\u00fc\u015f\u00fcn siber g\u00fcvenlik kontrol listesi.<\/p>\n","protected":false},"author":2498,"featured_media":10081,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2449,2475,2145],"class_list":{"0":"post-10080","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-hibrit-calisma","10":"tag-strateji","11":"tag-uzaktan-calisma"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/back-to-office-checklist\/10080\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/back-to-office-checklist\/23354\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/back-to-office-checklist\/18821\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/back-to-office-checklist\/25416\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/back-to-office-checklist\/23488\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/back-to-office-checklist\/22902\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/back-to-office-checklist\/26040\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/back-to-office-checklist\/25616\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/back-to-office-checklist\/31512\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/back-to-office-checklist\/42048\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/back-to-office-checklist\/17727\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/back-to-office-checklist\/15327\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/back-to-office-checklist\/27406\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/back-to-office-checklist\/27615\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/back-to-office-checklist\/24353\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/back-to-office-checklist\/29722\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/back-to-office-checklist\/29516\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/hibrit-calisma\/","name":"hibrit \u00e7al\u0131\u015fma"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2498"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10080"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10080\/revisions"}],"predecessor-version":[{"id":10083,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10080\/revisions\/10083"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10081"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}