{"id":5920,"date":"2019-05-06T11:03:03","date_gmt":"2019-05-06T08:03:03","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5920"},"modified":"2019-11-15T14:29:24","modified_gmt":"2019-11-15T11:29:24","slug":"startup-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/startup-cybersecurity\/5920\/","title":{"rendered":"Startup&#8217;lar ve bilgi g\u00fcvenli\u011fi"},"content":{"rendered":"<p>Startup\u2019lar bir fikirle yan\u0131p tutu\u015fan ve bunu en k\u0131sa zamanda eyleme d\u00f6kmek isteyen ki\u015filerce kurulur. B\u00fct\u00e7e genellikle k\u0131s\u0131tl\u0131d\u0131r ve masraflar al\u0131p ba\u015f\u0131n\u0131 gider, \u00fcr\u00fcn\u00fc geli\u015ftirme, promosyon ve di\u011fer konular\u0131 saym\u0131yoruz bile. Yeni i\u015f insanlar\u0131 \u00f6ncelikleri y\u00f6netirken \u00e7o\u011fu zaman bilgi g\u00fcvenli\u011fi ile ilgili konular\u0131 ihmal eder. Bu yaz\u0131da bunun sak\u0131ncalar\u0131ndan s\u00f6z edece\u011fiz.<\/p>\n<h2>Bilgisayar korsanlar\u0131 startup\u2019lar\u0131 \u00f6ld\u00fcrerek beslenir<\/h2>\n<p>Startuplar\u0131n \u00e7o\u011fu k\u0131s\u0131tl\u0131 kaynaklara sahip k\u00fc\u00e7\u00fck bir i\u015fletmenin siber su\u00e7lular\u0131n ilgisini \u00e7ekmeyece\u011fine g\u00fcvenerek g\u00fcvenli\u011fe yat\u0131r\u0131m yapmaz. Ger\u00e7ekte ise, herkes siber su\u00e7lar\u0131n azizli\u011fine u\u011frayabilir. \u00d6ncelikle, siber tehditlerin \u00e7o\u011fu \u00e7ok b\u00fcy\u00fck \u00f6l\u00e7ekli oldu\u011fu i\u00e7in yarat\u0131c\u0131lar\u0131 da hedefi geni\u015f tutup en az\u0131ndan birka\u00e7\u0131ndan kazanabilmek i\u00e7in olabildi\u011fince \u00e7ok \u015firketi vurmaya \u00e7al\u0131\u015f\u0131r. \u0130kincisi, genellikle nispeten korunmas\u0131z olduklar\u0131ndan startuplar siber su\u00e7lular i\u00e7in cazip hedeftir.<\/p>\n<p>Kurulu\u015flar\u0131n bir siper sald\u0131r\u0131dan sonra toparlanmas\u0131 bazen aylar al\u0131rken, k\u00fc\u00e7\u00fck bir firma bir daha aya\u011fa kalkamayabilir. 2014\u2019te, siber su\u00e7lular\u0131n sald\u0131r\u0131lar\u0131 <a href=\"https:\/\/www.theregister.co.uk\/2014\/06\/18\/code_spaces_destroyed\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Code Spaces<\/a> ad\u0131nda, ortak proje y\u00f6netimi ara\u00e7lar\u0131yla bar\u0131nd\u0131rma hizmeti veren bir giri\u015fimin kapanmas\u0131yla sonu\u00e7land\u0131. Sald\u0131rganlar \u015firketin bulut kaynaklar\u0131na eri\u015ferek m\u00fc\u015fteri verilerinin \u00f6nemli bir b\u00f6l\u00fcm\u00fcn\u00fc imha etti. Hizmet sahipleri olabildi\u011fince \u00e7ok veriyi kurtarmay\u0131 ba\u015farsa da normal i\u015fleyi\u015fe geri d\u00f6nmeleri m\u00fcmk\u00fcn olmad\u0131.<\/p>\n<h3>\u0130\u015fletmenizin sonunu getirebilecek hatalar<\/h3>\n<p>Startup\u2019\u0131n\u0131z\u0131 k\u0131s\u0131tl\u0131 b\u00fct\u00e7eye ra\u011fmen hakk\u0131yla koruyabilmek i\u00e7in i\u015fe ba\u015flamadan \u00f6nce bir tehdit modeli olu\u015fturman\u0131z ve hangi risklerin i\u015fletmenizle ilgili oldu\u011funu tespit etmeniz gerekebilir. Burada, ilk i\u015fini kuran bir\u00e7ok giri\u015fimcinin yapt\u0131\u011f\u0131 tipik hatalar\u0131 ele alarak size yard\u0131mc\u0131 olaca\u011f\u0131z.<\/p>\n<h4>1. Ki\u015fisel veri depolama ve i\u015fleme yasalar\u0131 hakk\u0131nda bilgi sahibi olmamak<\/h4>\n<p>\u00c7o\u011fu devlet kendi vatanda\u015flar\u0131n\u0131n g\u00fcvenli\u011fini korumaya \u00e7al\u0131\u015f\u0131r. Avrupa\u2019da Genel Veri Koruma Y\u00f6netmeli\u011fi (GDPR) ve ABD\u2019de de farkl\u0131 end\u00fcstrilerde ve eyaletlerde ge\u00e7erli <a href=\"https:\/\/iclg.com\/practice-areas\/data-protection-laws-and-regulations\/usa\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u00e7ok say\u0131da kanun vard\u0131r<\/a>. T\u00fcrkiye\u2019de ise <a href=\"https:\/\/www.kvkk.gov.tr\/Icerik\/2043\/Veri-Sorumlulari-Sicili-Nedir\" target=\"_blank\" rel=\"noopener nofollow\">Ki\u015fisel Verileri Konuma Kanunu<\/a> (KVKK) bulunur. Bu kanunlar\u0131n t\u00fcm\u00fc, siz onlar\u0131 okumu\u015f olsan\u0131z da olmasan\u0131z da, ge\u00e7erlidir.<\/p>\n<p>\u0130lgili yasal gerekliliklerin ihlali halinde verilecek cezalar de\u011fi\u015febilir, ama ihmalkarl\u0131k b\u00fcy\u00fck olas\u0131l\u0131kla size pahal\u0131ya patlar: en iyi ihtimalle, hi\u00e7 az\u0131msanmayacak bir para cezas\u0131 \u00f6dersiniz. En k\u00f6t\u00fcs\u00fc de, ilgili yasalara ayk\u0131r\u0131l\u0131klar\u0131 giderene kadar i\u015flerinizi ask\u0131ya almak zorunda kalabilirsiniz.<\/p>\n<p>\u00d6nemli bir husus daha: Bazen yasalar\u0131n kapsam\u0131 tahmin etti\u011finizden daha geni\u015f olur. \u00d6rne\u011fin, GDPR ister Rusya\u2019da ya da ABD\u2019de olsun, Avrupa vatanda\u015flar\u0131n\u0131n verilerini i\u015fleyen t\u00fcm \u015firketler i\u00e7in ge\u00e7erlidir. Bu nedenle en iyisi, yerel y\u00f6netmeliklerinizin yan\u0131nda ortaklar\u0131n\u0131z\u0131n ve m\u00fc\u015fterilerinizin y\u00f6netmeliklerini de incelemektir.<\/p>\n<h4>2. B\u00fct\u00fcn kaynaklar\u0131n\u0131n yetersiz korunmas\u0131<\/h4>\n<p>Startup\u2019lar\u0131n \u00e7o\u011fu \u00f6rne\u011fin Amazon AWS ya da Google Cloud gibi halka a\u00e7\u0131k bulut hizmetlerine bel ba\u011flar, ama bunlarda bu t\u00fcr depolama alanlar\u0131na uygun g\u00fcvenlik ayarlar\u0131 bulunmayabilir. \u00c7o\u011fu zaman, m\u00fc\u015fteri verilerinin veya Web uygulamas\u0131 kodlar\u0131n\u0131n oldu\u011fu kapsay\u0131c\u0131lar\u0131n korunma yolu zay\u0131f parolalar\u0131n \u00f6tesine ge\u00e7mez ve dahili kurumsal belgeler do\u011frudan ba\u011flant\u0131larla eri\u015filebildi\u011fi gibi arama motorlar\u0131na da g\u00f6r\u00fcn\u00fcr. Sonu\u00e7ta da kritik veriler herkesin eline ge\u00e7ebilir. Startuplar bazen, i\u015fleri zorla\u015ft\u0131rmamak ad\u0131na, \u00f6nemli belgelere eri\u015fimi s\u0131n\u0131rland\u0131rmay\u0131 unutarak bunlar\u0131 Google Docs\u2019ta sonsuza kadar herkese a\u00e7\u0131k halde b\u0131rak\u0131r.<\/p>\n<h4>3. DDoS sald\u0131r\u0131lar\u0131na haz\u0131rl\u0131ks\u0131z yakalanma<\/h4>\n<p>DDoS \u0130nternetten kaynak indirmenin verimli bir yoludur. Bu t\u00fcr hizmetler karanl\u0131k a\u011fda genellikle daha ucuz oldu\u011fundan, bunlar\u0131 daha geli\u015fmi\u015f sald\u0131r\u0131lar\u0131 gizlemede kullanacak olan rakipler ve siber su\u00e7lular i\u00e7in olduk\u00e7a da uygun maliyetli olur.<\/p>\n<p>2016\u2019da, <a href=\"https:\/\/cointelegraph.com\/news\/coinkite-is-closing-down-its-web-wallet-citing-legal-and-ddos-issues\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Coinkite ad\u0131ndaki bir kripto para e-c\u00fczdan\u0131 bitmek bilmeyen DDoS sald\u0131r\u0131lar\u0131 y\u00fcz\u00fcnden kapanmak zorunda kalm\u0131\u015ft\u0131<\/a>. Bunu geli\u015ftirenler, hizmeti kullan\u0131ma sunduklar\u0131 g\u00fcnden bu yana huzurlar\u0131n\u0131n kalmad\u0131\u011f\u0131n\u0131 s\u00f6ylemi\u015fti. \u015eirket birka\u00e7 y\u0131l direndikten sonra vazge\u00e7ti ve odak noktas\u0131n\u0131 tekrar donan\u0131m c\u00fczdanlar\u0131na kayd\u0131rd\u0131.<\/p>\n<h4>4. \u00c7al\u0131\u015fanlar\u0131n yeterince bilin\u00e7li olmamas\u0131<\/h4>\n<p>B\u00fct\u00fcn i\u015fletmelerde insanlar genellikle zay\u0131f halkad\u0131r. Sald\u0131rganlar da bunu \u00e7ok iyi bilir ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/phishing-psychology\/5628\/\" target=\"_blank\" rel=\"noopener noreferrer\">toplum m\u00fchendisli\u011fi<\/a> hilelerini kullanarak kurumsal a\u011fa s\u0131zar ya da gizli bilgi avc\u0131l\u0131\u011f\u0131 yapar.<\/p>\n<p>Bilin\u00e7sizlik serbest \u00e7al\u0131\u015fanlarla i\u015f yapan firmalar i\u00e7in iki kat tehlikelidir: Bu ki\u015filerin \u00e7al\u0131\u015f\u0131rken hangi ayg\u0131tlar\u0131 ve hangi a\u011flar\u0131 kulland\u0131\u011f\u0131n\u0131 kontrol etmek olduk\u00e7a zor olabilir. Bu nedenle, t\u00fcm \u00e7al\u0131\u015fanlar\u0131 g\u00fcvenlik odakl\u0131 bir tav\u0131r almaya motive etmek ve y\u00f6nlendirmek \u00e7ok \u00f6nemlidir.<\/p>\n<h3>Startup\u2019\u0131n\u0131z nas\u0131l ayakta kalabilir?<\/h3>\n<p>Kendinizi siber su\u00e7lulara a\u00e7\u0131k etmekten ka\u00e7\u0131nmak ve i\u015finizi s\u00fcrd\u00fcrmek i\u00e7in, i\u015f plan\u0131n\u0131z\u0131 haz\u0131rlarken siber g\u00fcvenli\u011fe yeterince \u00f6zen g\u00f6sterin:<\/p>\n<ul>\n<li>Hangi kaynaklar\u0131n \u00f6ncelikli olarak koruma gerektirdi\u011fini ve ilk a\u015famalarda b\u00fct\u00e7enizin ne t\u00fcr g\u00fcvenlik ara\u00e7lar\u0131na yetece\u011fini tespit edin. Asl\u0131nda, tedbirlerin \u00e7o\u011fu o kadar da maliyetli de\u011fildir.<\/li>\n<li>Ayg\u0131tlar\u0131n\u0131z\u0131 ve hesaplar\u0131n\u0131z\u0131 korumak i\u00e7in g\u00fc\u00e7l\u00fc parolalar kullan\u0131n. <a href=\"https:\/\/kas.pr\/ksostr\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a> \u00e7\u00f6z\u00fcm\u00fcm\u00fcz g\u00fc\u00e7l\u00fc parolalar olu\u015fturmaya ve bunlar\u0131 \u015fifreli kapsay\u0131c\u0131lar\u0131n i\u00e7inde tutmaya yarayan Kaspersky Password Manager arac\u0131n\u0131 i\u00e7erir. \u0130ki a\u015famal\u0131 kimlik do\u011frulamay\u0131 ihmal etmeyin. Bu aralar neredeyse her yerde kullan\u0131l\u0131yor ve ger\u00e7ekten i\u015fe yar\u0131yor.<\/li>\n<li>\u00c7al\u0131\u015fmay\u0131 planlad\u0131\u011f\u0131n\u0131z \u00fclkelerdeki veri depolama yasalar\u0131n\u0131 dikkatle inceleyin ve firman\u0131z\u0131n ki\u015fisel bilgi depolama ve i\u015fleme i\u015f ak\u0131\u015f\u0131n\u0131n bu yasalara uygun oldu\u011fundan emin olun. M\u00fcmk\u00fcnse s\u00f6z konusu her piyasadaki tuzaklar ve gizli tehlikeler konusunda avukatlara dan\u0131\u015f\u0131n.<\/li>\n<li>\u00dc\u00e7\u00fcnc\u00fc \u015fah\u0131s hizmet ve yaz\u0131l\u0131mlar\u0131n\u0131n g\u00fcvenli\u011fini yak\u0131ndan takip edin. Kulland\u0131\u011f\u0131n\u0131z i\u015fbirlik\u00e7i geli\u015ftirme sistemi ne kadar iyi korunuyor? Konak\u00e7\u0131 hizmet sa\u011flay\u0131c\u0131n\u0131z g\u00fcvenli mi? Kulland\u0131\u011f\u0131n\u0131z a\u00e7\u0131k kaynak k\u00fct\u00fcphanelerinde bilinen zafiyetler var m\u0131? Bu sorular da sizi en az son \u00fcr\u00fcn\u00fcn t\u00fcketici \u00f6zellikleri kadar ilgilendirmelidir.<\/li>\n<li>\u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131n siber g\u00fcvenlik bilincini y\u00fckseltin ve onlar\u0131 bu konuda ara\u015ft\u0131rma yapmaya te\u015fvik edin. E\u011fer firman\u0131zda kadrolu siber g\u00fcvenlik uzman\u0131 yoksa (startuplarda genellikle olmaz) bu konuya en az\u0131ndan biraz ilgi duyan ve i\u015fe blogumuzu takip ederek ba\u015flayacak birini bulun.<\/li>\n<li>Bilgisayar\u0131n altyap\u0131s\u0131n\u0131 korumay\u0131 unutmay\u0131n. B\u00fct\u00e7esi k\u0131s\u0131tl\u0131 olan yeni firmalara y\u00f6nelik bir <a href=\"https:\/\/kas.pr\/ksostr\" target=\"_blank\" rel=\"noopener\">\u00e7\u00f6z\u00fcm\u00fcm\u00fcz<\/a> var. Bu \u00fcr\u00fcn sayesinde i\u015f istasyonlar\u0131n\u0131z\u0131n ve sunucular\u0131n\u0131z\u0131n g\u00fcvenli\u011fini otomatik kontrol edebilir ve \u00f6demelerinizi \u00e7evrimi\u00e7i olarak g\u00fcvenle yapabilirsiniz. Hi\u00e7bir idari beceri gerekmez.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos\">\n","protected":false},"excerpt":{"rendered":"<p>Startup&#8217;lar\u0131 ba\u015far\u0131 i\u00e7in veri korumaya ba\u011f\u0131ml\u0131 k\u0131lan \u015fey nedir?<\/p>\n","protected":false},"author":2484,"featured_media":5921,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[1748,1919],"class_list":{"0":"post-5920","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-kucuk-isletme","10":"tag-startup"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/startup-cybersecurity\/5920\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/startup-cybersecurity\/15619\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/startup-cybersecurity\/13161\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/startup-cybersecurity\/17538\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/startup-cybersecurity\/15686\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/startup-cybersecurity\/14412\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/startup-cybersecurity\/18286\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/startup-cybersecurity\/17201\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/startup-cybersecurity\/22629\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/startup-cybersecurity\/26456\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/startup-cybersecurity\/11640\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/startup-cybersecurity\/11680\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/startup-cybersecurity\/10608\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/startup-cybersecurity\/19042\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/startup-cybersecurity\/23078\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/startup-cybersecurity\/18279\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/startup-cybersecurity\/22468\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/startup-cybersecurity\/22405\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kucuk-isletme\/","name":"k\u00fc\u00e7\u00fck i\u015fletme"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5920"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5920\/revisions"}],"predecessor-version":[{"id":6794,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5920\/revisions\/6794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5921"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}