{"id":11137,"date":"2022-10-25T13:01:17","date_gmt":"2022-10-25T10:01:17","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11137"},"modified":"2022-10-25T13:01:17","modified_gmt":"2022-10-25T10:01:17","slug":"what-cybercriminals-are-hunting-for","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/what-cybercriminals-are-hunting-for\/11137\/","title":{"rendered":"Siber doland\u0131r\u0131c\u0131lar neyin pe\u015finde?"},"content":{"rendered":"<p>D\u0131\u015fardan birileri bir \u015fekilde a\u011f\u0131n\u0131za girerse, ne olursa olsun sonu\u00e7lar\u0131ndan pek ho\u015flanmayacaks\u0131n\u0131z. Ancak, bir sald\u0131rgan\u0131n en \u00e7ok hangi varl\u0131klarla ilgilenece\u011fini \u00f6nceden saptayarak ve g\u00fcvenlik \u00f6nlemleri alarak bu tarz bir ihlalin yol a\u00e7abilece\u011fi potansiyel zarar\u0131 en aza indirebilirsiniz. Odaklanman\u0131z gereken noktalar:<\/p>\n<h2>1. Ki\u015fisel veriler<\/h2>\n<p>Ki\u015fisel veriler, siber su\u00e7lular\u0131n en \u00e7ok pe\u015fine d\u00fc\u015ft\u00fc\u011f\u00fc bilgi t\u00fcrlerinden biri. \u00d6ncelikle, ki\u015fisel verilerin kime ait oldu\u011fu hi\u00e7 fark etmez, m\u00fc\u015fteriler veya \u00e7al\u0131\u015fanlar olabilir. Bu verilere eri\u015fim, para s\u0131zd\u0131rmak i\u00e7in b\u00fcy\u00fck avantaj sa\u011flar. Bu tarz bilgilerin yay\u0131nlanmas\u0131, sadece itibar kayb\u0131na ve ma\u011fdurlar\u0131n dava a\u00e7mas\u0131na sebep olmaz, ayn\u0131 zamanda denetmenlerle (<a href=\"https:\/\/tr.wikipedia.org\/wiki\/Ki%C5%9Fisel_veri\" target=\"_blank\" rel=\"noopener nofollow\">PII <\/a>i\u015fleme ve depolama konusunda kat\u0131 yasalara sahip b\u00f6lgelerde a\u011f\u0131r para cezalar\u0131 uygulayabilen) sorunlara da yol a\u00e7abilir. \u0130kincisi, dark web pazar\u0131nda ki\u015fisel verilere talep olduk\u00e7a fazla. Hackerlar, dark web sayesinde para kazanabiliyor.<\/p>\n<p>Ki\u015fisel verilerin yanl\u0131\u015f ellere d\u00fc\u015fme ihtimalini en aza indirmek i\u00e7in, bu verilerin \u015fifrelenmi\u015f bi\u00e7imde saklanmas\u0131n\u0131, sadece ger\u00e7ekten ihtiyac\u0131 olan \u00e7al\u0131\u015fanlar\u0131n eri\u015fimine izin verilmesini ve m\u00fcmk\u00fcn oldu\u011funca az bilgi toplanmas\u0131n\u0131 tavsiye ediyoruz.<\/p>\n<h2>2. Finans uygulamalar\u0131<\/h2>\n<p>Elektronik \u00f6deme sistemlerinin ve di\u011fer finansal uygulamalar\u0131n y\u00fckl\u00fc oldu\u011fu cihazlar\u0131 tuza\u011fa d\u00fc\u015f\u00fcrmek i\u00e7in k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m s\u0131n\u0131f\u0131n\u0131n tamam\u0131 kullan\u0131l\u0131yor. Bu sistemler, \u015firket fonlar\u0131na do\u011frudan eri\u015fim sa\u011fl\u0131yor. Bu y\u00fczden, i\u015flem lehdar\u0131n\u0131n yerine ba\u015fka bir \u015fey ge\u00e7erse, bu durum felaketle sonu\u00e7lanabilir. Son zamanlarda \u00f6zellikle k\u00fc\u00e7\u00fck \u015firketlerde, bu t\u00fcr yaz\u0131l\u0131mlar mobil cihazlarda giderek daha fazla kullan\u0131l\u0131yor.<\/p>\n<p>Finansal kay\u0131plar\u0131 \u00f6nlemek i\u00e7in, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/cloud?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir g\u00fcvenlik \u00e7\u00f6z\u00fcmleriyle<\/a> donat\u0131lmam\u0131\u015f cihazlarda finansal uygulamalar\u0131n kullan\u0131m\u0131 yasaklanmal\u0131d\u0131r.<\/p>\n<h2>3. Hesap bilgileri<\/h2>\n<p>Tek bir kurumsal cihaz, bir sald\u0131rgan\u0131n pek de ilgisini \u00e7eken bir hedef de\u011fil. Bu nedenle, herhangi birinin g\u00fcvenli\u011fi ihlal edildi\u011finde, a\u011f kaynaklar\u0131, kurumsal hizmetler veya uzaktan eri\u015fim ara\u00e7lar\u0131nda bulunan \u00e7e\u015fitli kimlik bilgilerinin pe\u015fine d\u00fc\u015ferler. \u00c7\u00fcnk\u00fc ilk giri\u015fim tespit edilir ve engellenirse, bu sayede, sald\u0131r\u0131y\u0131 geni\u015fletebilir ve eri\u015fimi yeniden kazanabilirler. Ayr\u0131ca rotalar\u0131n\u0131, hedef \u015firketin i\u015f e-postas\u0131 ve sosyal medya hesaplar\u0131na veya kurumsal web sitesinin kontrol paneline \u00e7evirebilirler. Bunlar\u0131n her birini, ilk kurban\u0131n meslekta\u015flar\u0131na, m\u00fc\u015fterilere ve i\u015f ortaklar\u0131na sald\u0131rmak i\u00e7in kullanabilirler.<\/p>\n<p>\u0130lk etapta, \u00e7al\u0131\u015fanlar\u0131n kurumsal hizmetleri veya kaynaklar\u0131 kulland\u0131\u011f\u0131 t\u00fcm cihazlarda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 koruma olmal\u0131d\u0131r. \u0130kinci olarak, \u00e7al\u0131\u015fanlara parolalar\u0131n\u0131 nas\u0131l d\u00fczg\u00fcn bir \u015fekilde saklayacaklar\u0131n\u0131 (ve m\u00fcmk\u00fcnse <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">gerekli uygulamay\u0131 sa\u011flayarak<\/a> y\u00fcklemeyi) d\u00fczenli olarak hat\u0131rlatmakta fayda var.<\/p>\n<h2>4. Veri yedekleme<\/h2>\n<p>Sald\u0131rgan \u015firketin a\u011f\u0131na eri\u015fim sa\u011flad\u0131\u011f\u0131nda, \u00e7\u0131kar\u0131na uygun bir \u015fey bulmas\u0131 biraz zaman alabilir. Ancak sald\u0131rgan ne kadar uzun s\u00fcre ara\u015ft\u0131r\u0131rsa, tespit edilip durdurulma olas\u0131l\u0131\u011f\u0131 da bir o kadar artar. Bu y\u00fczden \u201cYedek\u201d olarak adland\u0131rd\u0131\u011f\u0131n\u0131z bir klas\u00f6r\u00fc belirgin bir yerde olu\u015fturarak i\u015flerini kolayla\u015ft\u0131rmay\u0131n. Sonu\u00e7ta, yedek klas\u00f6rler genellikle \u015firketin kaybetmekten en \u00e7ok korktu\u011fu ve dolay\u0131s\u0131yla siber su\u00e7lular\u0131n en \u00e7ok ilgisini \u00e7eken bilgileri bar\u0131nd\u0131r\u0131yor.<\/p>\n<p>Yedek klas\u00f6rler, \u015firketin ana a\u011f\u0131na ba\u011fl\u0131 olmayan ortamlarda veya \u00f6zel bulut hizmetlerinde saklanmal\u0131d\u0131r. B\u00f6ylece, fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131 durumunda verilere ek koruma da sa\u011flam\u0131\u015f olursunuz.<\/p>\n<h2>5. Yaz\u0131l\u0131m geli\u015ftirme ortam\u0131<\/h2>\n<p>Her \u015firket yaz\u0131l\u0131m geli\u015ftirmedi\u011fi i\u00e7in, bu tavsiye herkesin durumuna uygun de\u011fil. \u00d6te yandan, uygulama geli\u015ftiren k\u00fc\u00e7\u00fck i\u015fletme ve giri\u015fimlerin say\u0131s\u0131 da az de\u011fil. \u015eirketiniz bunlardan biriyse uygulamalar\u0131 geli\u015ftirdi\u011finiz ortam\u0131n korunmas\u0131na \u00f6zellikle dikkat etmenizi tavsiye ederiz. G\u00fcn\u00fcm\u00fczde, hedefli bir sald\u0131r\u0131n kurban\u0131 olmak i\u00e7in b\u00fcy\u00fck bir \u015firket olmak zorunda de\u011filsiniz. B\u00fcy\u00fck \u015firketlerin kulland\u0131\u011f\u0131 bir uygulama ya da sadece pop\u00fcler uygulamalar\u0131 geli\u015ftirmeniz yeterli. Siber su\u00e7lular, geli\u015ftirme ortam\u0131n\u0131za s\u0131zmaya \u00e7al\u0131\u015fabilir ve tedarik zinciri yoluyla, sizi bir sald\u0131r\u0131da ba\u011flant\u0131 olarak kullanabilir. Bu t\u00fcr sald\u0131r\u0131larda ba\u015fvurduklar\u0131 y\u00f6ntemler de olduk\u00e7a dahice olabilir.<\/p>\n<p>Geli\u015ftirme ortam\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/devops-security-hybrid\/8536\/\" target=\"_blank\" rel=\"noopener\">koruma stratejinizi<\/a> \u00f6nceden belirlemeli ve performans\u0131 etkilemeyecek \u00f6zel g\u00fcvenlik ara\u00e7lar\u0131n\u0131 geli\u015ftirme s\u00fcrecinize dahil etmelisiniz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kes-cloud\">\n","protected":false},"excerpt":{"rendered":"<p>Siber sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flamak i\u00e7in hangi \u015firket varl\u0131klar\u0131na \u00f6ncelik verilmeli? <\/p>\n","protected":false},"author":2581,"featured_media":11138,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727,1351],"tags":[715,1525,1109,2475,2460],"class_list":{"0":"post-11137","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"category-threats","11":"tag-kisisel-veriler","12":"tag-parolalar","13":"tag-saldirilar","14":"tag-strateji","15":"tag-yedekler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-cybercriminals-are-hunting-for\/11137\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-cybercriminals-are-hunting-for\/24786\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-cybercriminals-are-hunting-for\/20264\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-cybercriminals-are-hunting-for\/27301\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-cybercriminals-are-hunting-for\/25124\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-cybercriminals-are-hunting-for\/25467\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-cybercriminals-are-hunting-for\/28020\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-cybercriminals-are-hunting-for\/27331\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-cybercriminals-are-hunting-for\/45935\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-cybercriminals-are-hunting-for\/19673\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-cybercriminals-are-hunting-for\/20234\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-cybercriminals-are-hunting-for\/29439\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-cybercriminals-are-hunting-for\/32719\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/what-cybercriminals-are-hunting-for\/28598\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-cybercriminals-are-hunting-for\/31171\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-cybercriminals-are-hunting-for\/30879\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/strateji\/","name":"strateji"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11137"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11137\/revisions"}],"predecessor-version":[{"id":11139,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11137\/revisions\/11139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11138"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}