{"id":10615,"date":"2022-04-12T13:05:41","date_gmt":"2022-04-12T10:05:41","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10615"},"modified":"2022-04-12T13:05:41","modified_gmt":"2022-04-12T10:05:41","slug":"anti-ransomware-strategy","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/anti-ransomware-strategy\/10615\/","title":{"rendered":"Fidye yaz\u0131l\u0131mlara kar\u015f\u0131 koruma stratejisi"},"content":{"rendered":"<p>Fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131 art\u0131k man\u015fetlerde yer alm\u0131yor. Yeni kurban raporlar\u0131yla, <a href=\"https:\/\/securelist.com\/the-story-of-the-year-ransomware-in-the-headlines\/105138\/\" target=\"_blank\" rel=\"noopener\">her g\u00fcn<\/a> kar\u015f\u0131la\u015f\u0131yoruz. Yani, \u015firketlerin bu tehdide kar\u015f\u0131 korunmak i\u00e7in iyi planlanm\u0131\u015f \u00e7ok katmanl\u0131 bir stratejiye sahip olmalar\u0131 her zamankinden daha \u00f6nemli.<\/p>\n<h2>Sald\u0131rganlar\u0131n giri\u015f noktalar\u0131n\u0131 kapat\u0131n<\/h2>\n<p>\u00c7o\u011fu fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131 olduk\u00e7a standart: ya bir \u00e7al\u0131\u015fan sosyal m\u00fchendislik kurban\u0131 olup bir e-posta eki a\u00e7ar ya da sald\u0131rganlar \u015firket sistemlerine uzaktan eri\u015fim sa\u011flar (parola s\u0131z\u0131nt\u0131lar\u0131, giri\u015f kimlik bilgilerinin zorla veya ilk eri\u015fim arac\u0131lar\u0131ndan sat\u0131n al\u0131nmas\u0131 yoluyla). Bazen sunucu taraf\u0131 yaz\u0131l\u0131mlar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalan\u0131rlar. Bu nedenle, bir\u00e7ok sorunu a\u015fa\u011f\u0131daki y\u00f6ntemlerle ortadan kald\u0131rabilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">Bilgi g\u00fcvenli\u011fi ve dijital hijyen konusunda<\/a>, \u00e7al\u0131\u015fanlar\u0131 e\u011fitmek. \u0130nsanlar bir kimlik av\u0131 e-postas\u0131n\u0131 ge\u00e7erli olandan ay\u0131rt edebilir ve parolalar\u0131 g\u00fcvende tutabilirse, bilgi g\u00fcvenli\u011fi birimlerinin y\u00fck\u00fc b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azalacakt\u0131r;<\/li>\n<li>Zay\u0131f ve tekrarlanan parolalar\u0131 yasaklayan ve bir parola y\u00f6neticisi kullan\u0131lmas\u0131n\u0131 gerektiren kat\u0131 bir parola politikas\u0131na sahip olmak;<\/li>\n<li>Uzaktaki masa\u00fcst\u00fc servislerini (RDP gibi) gerekli olmad\u0131k\u00e7a kesinlikle genel a\u011flarda kullanmamak. \u0130htiya\u00e7 halinde sadece g\u00fcvenli bir VPN kanal\u0131 \u00fczerinden uzaktan eri\u015fim kurmak;<\/li>\n<li>T\u00fcm ba\u011fl\u0131 cihazlara g\u00fcncellemelerin y\u00fcklenmesine \u00f6ncelik verilmesi \u2013 en \u00f6nemlisi, kritik yaz\u0131l\u0131mlar i\u00e7in yamalar (i\u015fletim sistemleri, taray\u0131c\u0131lar, ofis paketleri, VPN istemcileri, sunucu uygulamalar\u0131) ve uzaktan kod y\u00fcr\u00fct\u00fclmesine (RCE) ve ayr\u0131cal\u0131k y\u00fckseltmeye izin veren g\u00fcvenlik a\u00e7\u0131klar\u0131 i\u00e7in d\u00fczeltmeler.<\/li>\n<\/ul>\n<h2>Infosec ekibinizi en yeni siber tehditlere kar\u015f\u0131 haz\u0131rlay\u0131n<\/h2>\n<p>Infosec ekibinizin koruma ara\u00e7lar\u0131 ve teknolojileri, g\u00fcn\u00fcm\u00fcz tehditlerine haz\u0131rl\u0131kl\u0131 olmal\u0131. Ve uzmanlar, de\u011fi\u015fen tehdit ortam\u0131 ile ilgili g\u00fcncel bilgilere eri\u015febilmeli. Bu y\u00fczden, a\u015fa\u011f\u0131dakileri tavsiye ediyoruz:<\/p>\n<ul>\n<li>Uzmanlar\u0131n\u0131z\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-intelligence?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">en yeni siber su\u00e7 taktikleri, teknikleri ve prosed\u00fcrleri hakk\u0131nda bilgilendirmek i\u00e7in g\u00fcncel tehdit istihbarat\u0131n\u0131<\/a> kullanmak;<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">G\u00fcvenlik \u00e7\u00f6z\u00fcmlerinin<\/a> zaman\u0131nda g\u00fcncellenmesi. B\u00f6ylece, fidye yaz\u0131l\u0131m\u0131 ile ili\u015fkili en yayg\u0131n tehditlere (Uzaktan Eri\u015fim Sa\u011flayan Truva Atlar\u0131 (RAT\u2019ler), g\u00fcvenlik ihlalleri, botnet etkinli\u011fi) kar\u015f\u0131 kapsaml\u0131 koruma sa\u011flanmas\u0131;<\/li>\n<li>Yaln\u0131zca k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 tespit etmekle kalmayan, ayn\u0131 zamanda \u015firketin altyap\u0131s\u0131ndaki \u015f\u00fcpheli etkinlikleri izleyen ara\u00e7lar kullanmak (<a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/endpoint-detection-response-edr?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Geni\u015fletilmi\u015f Tespit ve Yan\u0131t (EDR)<\/a> \u00e7\u00f6z\u00fcmleri);<\/li>\n<li>\u015eirket i\u00e7i kaynaklar s\u0131n\u0131rl\u0131ysa, \u00fc\u00e7\u00fcnc\u00fc taraf uzmanlar\u0131 i\u015fe almay\u0131 (veya <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Y\u00f6netilen Tespit ve Yan\u0131t (MDR)<\/a> \u00e7\u00f6z\u00fcmlerini kullanmay\u0131) g\u00f6z \u00f6n\u00fcnde bulundurmak;<\/li>\n<li>Kurumsal altyap\u0131 d\u0131\u015f\u0131ndan yetkisiz ba\u011flant\u0131lar\u0131 tespit etmek i\u00e7in giden trafi\u011fi izlemek;<\/li>\n<li>\u015eirket a\u011f\u0131ndaki yanal hareketin komut dosyas\u0131 dil ve ara\u00e7 kullan\u0131m\u0131n\u0131n yak\u0131ndan izlenmesi;<\/li>\n<li>Fidye yaz\u0131l\u0131m haberleri i\u00e7in bizi takip etmeye devam etmek ve koruma teknolojilerinizin yeni zorluklarla ba\u015fa \u00e7\u0131kabilece\u011finden emin olmak.<\/li>\n<\/ul>\n<h2>Fidye yaz\u0131l\u0131m sald\u0131r\u0131s\u0131n\u0131n ba\u015far\u0131l\u0131 oldu\u011fu bir senaryo i\u00e7in strateji geli\u015ftirin<\/h2>\n<p>Fidye yaz\u0131l\u0131mlar\u0131n\u0131 tespit etmek ve bunlara kar\u015f\u0131l\u0131k vermek i\u00e7in teknolojilere g\u00fcvenebilirsiniz. Ancak, ba\u015far\u0131s\u0131zl\u0131k ihtimalini g\u00f6z \u00f6n\u00fcnde bulundurarak, bir plana sahip olmak her zaman en iyisi. Farkl\u0131 senaryolar mevcut. Mesela, k\u00f6t\u00fc ama\u00e7l\u0131 bir \u00e7al\u0131\u015fan \u2013 \u00f6zellikle de y\u00f6netici haklar\u0131na sahip biri \u2013 g\u00fcvenlik sisteminizi devre d\u0131\u015f\u0131 b\u0131rakabilir. Bu tarz olaylara haz\u0131rl\u0131ks\u0131z yakalanmamak olduk\u00e7a \u00f6nemli. Siber olaylardan kaynaklanan kesintileri \u00f6nlemek i\u00e7in:<\/p>\n<ul>\n<li>\u00d6zellikle i\u015f a\u00e7\u0131s\u0131ndan kritik \u00f6neme sahipse verileri d\u00fczenli olarak yedekleyin;<\/li>\n<li>Acil bir durumda verilere h\u0131zl\u0131 eri\u015fim sa\u011flayabilirsiniz.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n","protected":false},"excerpt":{"rendered":"<p>\u015eirketleri fidye yaz\u0131l\u0131mlardan korumaya y\u00f6nelik pratik ipu\u00e7lar\u0131.<\/p>\n","protected":false},"author":2581,"featured_media":10616,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[591,2545,2475],"class_list":{"0":"post-10615","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-fidye-yazilimi","10":"tag-kripto-kotu-amacli-yazilim","11":"tag-strateji"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/anti-ransomware-strategy\/10615\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/anti-ransomware-strategy\/24028\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/anti-ransomware-strategy\/19515\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/anti-ransomware-strategy\/9868\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/anti-ransomware-strategy\/26352\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/anti-ransomware-strategy\/24296\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/anti-ransomware-strategy\/24663\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/anti-ransomware-strategy\/27069\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/anti-ransomware-strategy\/33057\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/anti-ransomware-strategy\/44082\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/anti-ransomware-strategy\/18740\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/anti-ransomware-strategy\/19289\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/anti-ransomware-strategy\/15919\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/anti-ransomware-strategy\/24933\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/anti-ransomware-strategy\/30377\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/anti-ransomware-strategy\/30145\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10615"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10615\/revisions"}],"predecessor-version":[{"id":10617,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10615\/revisions\/10617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10616"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}