{"id":6297,"date":"2019-08-06T11:15:50","date_gmt":"2019-08-06T08:15:50","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6297"},"modified":"2019-11-15T14:25:59","modified_gmt":"2019-11-15T11:25:59","slug":"personal-devices-at-work","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/personal-devices-at-work\/6297\/","title":{"rendered":"\u0130\u015f yerindeki ki\u015fisel cihazlar"},"content":{"rendered":"<p>Ki\u015fisel telefonlardan yap\u0131lan i\u015f g\u00f6r\u00fc\u015fmelerinden evdeki diz\u00fcst\u00fc bilgisayarlardan kurulan kurumsal a\u011f ba\u011flant\u0131lar\u0131na, pek \u00e7ok \u015firket ki\u015fisel cihazlar\u0131n i\u015f i\u00e7in kullan\u0131lmas\u0131na izin verir. Bu durum, \u00f6zellikle k\u00fc\u00e7\u00fck \u015firketlerde genellikle faydal\u0131 olabilir: \u00c7al\u0131\u015fan, cihaz\u0131 zaten tan\u0131maktad\u0131r; \u015firket de paradan tasarruf eder. \u0130\u015fin olumsuz yan\u0131 ise bu prati\u011fin i\u015fletme i\u00e7in fazladan siber risk yaratmas\u0131d\u0131r.<\/p>\n<h2>\u0130\u015f yerinde ki\u015fisel cihazlar: Yeni norm<\/h2>\n<p>Kendi Cihaz\u0131n\u0131 Getir (KCG) politikas\u0131 uygulayan kurulu\u015flar\u0131n say\u0131s\u0131 son birka\u00e7 y\u0131ld\u0131r gitgide art\u0131yor. Samsung i\u00e7in Oxford Economics taraf\u0131ndan <a href=\"https:\/\/insights.samsung.com\/2018\/06\/06\/the-state-of-enterprise-mobility-in-2018-five-key-trends\/\" target=\"_blank\" rel=\"noopener nofollow\">ge\u00e7en y\u0131l yap\u0131lan bir \u00e7al\u0131\u015fmaya g\u00f6re<\/a> mobil cihazlar, \u015firketlerin %75\u2019inin i\u015f s\u00fcre\u00e7lerinin ayr\u0131lmaz bir par\u00e7as\u0131n\u0131 olu\u015fturuyor. Dahas\u0131, i\u015fverenlerin yaln\u0131zca %17\u2019si t\u00fcm personele kurumsal telefon sa\u011fl\u0131yor. \u0130\u015fverenlerin geri kalan\u0131, i\u015f yerinde ki\u015fisel cihazlar\u0131n kullan\u0131m\u0131na belli \u00f6l\u00e7\u00fcde izin veriyor.<\/p>\n<h2>Ki\u015fisel cihazlar\u0131n korunmas\u0131 sahiplerine mi b\u0131rak\u0131lmal\u0131?<\/h2>\n<p>Kurumsal sunucular ve i\u015f istasyonlar\u0131 b\u00fct\u00fcn olarak korunsa da, y\u00f6neticilerin ve \u00e7al\u0131\u015fanlar\u0131n ki\u015fisel diz\u00fcst\u00fc bilgisayarlar\u0131, ak\u0131ll\u0131 telefonlar\u0131 ve tabletleri her zaman BT g\u00fcvenli\u011fi departman\u0131n\u0131n sorumluluk alan\u0131na girmez. Bunun yerine herkesin kendi ki\u015fisel cihaz\u0131n\u0131n g\u00fcvenli\u011finden sorumlu oldu\u011fu kabul edilir.<\/p>\n<p>Fakat bu yakla\u015f\u0131m, do\u011frudan siber su\u00e7lular\u0131n eline oynamaktan farks\u0131zd\u0131r. Bu g\u00f6r\u00fc\u015f yaln\u0131zca s\u00f6ylentilerden veya spek\u00fclasyondan ibaret de\u011fil: Ki\u015fisel cihazlar\u0131n \u00e7al\u0131nmas\u0131n\u0131n veya hacklenmesinin sebep oldu\u011fu olaylar s\u00fcrekli meydana geliyor. A\u015fa\u011f\u0131dakiler, dikkat \u00e7eken \u00f6rneklerden yaln\u0131zca birka\u00e7\u0131.<\/p>\n<h3>Cihaz h\u0131rs\u0131zl\u0131\u011f\u0131<\/h3>\n<p>Ge\u00e7ti\u011fimiz y\u0131l\u0131n Haziran ay\u0131nda Michigan Medicine, \u00e7al\u0131\u015fanlar\u0131ndan birinin ki\u015fisel diz\u00fcst\u00fc bilgisayar\u0131 <a href=\"https:\/\/www.uofmhealth.org\/news\/archive\/201806\/michigan-medicine-notifies-patients-health-information-data\" target=\"_blank\" rel=\"noopener nofollow\">\u00e7al\u0131nd\u0131ktan sonra 870 hastaya ait verilerin s\u0131zm\u0131\u015f olabilece\u011fini bildirdi<\/a>. Diz\u00fcst\u00fc bilgisayarda saklanan veriler ara\u015ft\u0131rma ama\u00e7l\u0131yd\u0131 ve projeye g\u00f6re de\u011fi\u015fiklik g\u00f6steriyordu, fakat kay\u0131tlar\u0131n isim, do\u011fum tarihi, cinsiyet, tan\u0131 ve tedaviyle ilgili ba\u015fka gizli bilgileri i\u00e7erme olas\u0131l\u0131\u011f\u0131 y\u00fcksekti.<\/p>\n<h3>Ev bilgisayarlar\u0131n\u0131 hackleme<\/h3>\n<p>H\u0131rs\u0131z\u0131n \u00e7ald\u0131\u011f\u0131 diz\u00fcst\u00fc bilgisayardaki verileri kullan\u0131p kullanmad\u0131\u011f\u0131 bilinmiyor, fakat bir ba\u015fka olay\u0131n kurbanlar\u0131 olan kripto para al\u0131m sat\u0131m platformu Bithumb\u2019\u0131n m\u00fc\u015fterilerinin \u015f\u00fcphe etmesine bile gerek kalmad\u0131. Siber su\u00e7lular, bir \u00e7al\u0131\u015fan\u0131n ev bilgisayar\u0131na <a href=\"https:\/\/www.theregister.co.uk\/2017\/07\/06\/bithumb_hack\/\" target=\"_blank\" rel=\"noopener nofollow\">s\u0131zarak<\/a> hizmetin 32.000 kullan\u0131c\u0131s\u0131n\u0131n c\u00fczdanlar\u0131 hakk\u0131nda bilgiyi ele ge\u00e7irdi. Sonu\u00e7 olarak su\u00e7lular Bithumb m\u00fc\u015fteri hesaplar\u0131ndan y\u00fcz binlerce dolar \u00e7ekti.<\/p>\n<p>Al\u0131m sat\u0131m platformu, kurbanlar\u0131n zarar\u0131n\u0131 kendi cebinden kar\u015f\u0131layaca\u011f\u0131na s\u00f6z verdi ama m\u00fc\u015fteriler yine de ki\u015fisel bilgilerin if\u015fa edilmesi ve bununla ilgili mali kay\u0131plar i\u00e7in Bithumb\u2019a <a href=\"https:\/\/www.financemagnates.com\/cryptocurrency\/exchange\/korean-traders-file-class-action-lawsuit-bithumb-server-outage\/\" target=\"_blank\" rel=\"noopener nofollow\">kar\u015f\u0131 toplu dava a\u00e7t\u0131<\/a>.<\/p>\n<h3>KCG ve g\u00fcvenlik politikas\u0131<\/h3>\n<p>Sadece \u00e7al\u0131\u015fanlar\u0131n kendi cihazlar\u0131n\u0131 kullanmalar\u0131na izin vermekle yetinip art\u0131k \u015firketinizin bir KCG politikas\u0131 oldu\u011funu d\u00fc\u015f\u00fcnemezsiniz. \u0130\u015fle ilgili bilgileri depolamak ve kullanmak \u00fczere ki\u015fisel telefonlar\u0131n ya da diz\u00fcst\u00fc bilgisayarlar\u0131n kullan\u0131lmas\u0131na izin verdi\u011finizde baz\u0131 riskler alm\u0131\u015f olursunuz. Mali ve itibar\u0131n\u0131za y\u00f6nelik zarara u\u011frama olas\u0131l\u0131\u011f\u0131n\u0131z\u0131 d\u00fc\u015f\u00fcrmek i\u00e7in vercee\u011fimiz birka\u00e7 ipucunu dikkate alman\u0131z\u0131 \u00f6neriyoruz:<\/p>\n<ul>\n<li>G\u00fcncel siber tehditler hakk\u0131nda d\u00fczenli olarak <a href=\"https:\/\/www.kaspersky.com\/blog\/k-asap\/25411\/\" target=\"_blank\" rel=\"noopener nofollow\">g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 dersleri<\/a> d\u00fczenleyin. \u00c7al\u0131\u015fanlar, i\u015f yerinde ve i\u015f i\u00e7in ki\u015fisel cihaz kullanman\u0131n risklerinin fark\u0131nda olmal\u0131d\u0131r.<\/li>\n<li>Kurumsal a\u011flara ve verilere eri\u015fimi olan t\u00fcm cihazlarda bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc kurulu oldu\u011fundan emin olun. Bu g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcn\u00fcn kurumsal bir y\u00f6netici taraf\u0131ndan y\u00f6netilmesi en iyisidir. Bu m\u00fcmk\u00fcn de\u011filse en az\u0131ndan \u00e7al\u0131\u015fanlara bir ev g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc kurmalar\u0131n\u0131 tavsiye edin. Korunmayan cihazlara eri\u015fim vermeyin.<\/li>\n<li>Bu ak\u0131ll\u0131 telefonlarda, tabletlerde ve diz\u00fcst\u00fc bilgisayarlarda bulunan t\u00fcm gizli bilgilerin \u015fifrelenmi\u015f bi\u00e7imde sakland\u0131\u011f\u0131ndan emin olun. Modern mobil i\u015fletim sistemleri, kullan\u0131c\u0131lar\u0131n t\u00fcm telefonu veya tableti \u015fifreleyebilmesine izin veriyor. G\u00fcvenilir veri \u015fifreleme i\u00e7in <a href=\"https:\/\/kas.pr\/ksostr\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a> kullan\u0131n. B\u00f6ylece cihaz \u00e7al\u0131nsa ya da kaybolsa bile d\u0131\u015far\u0131dan ki\u015filerin \u00f6nemli verilere eri\u015fim sa\u011flamas\u0131 \u00f6nlenir.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/kas.pr\/ksostr\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a>, k\u00fc\u00e7\u00fck \u015firketlerini ihtiya\u00e7lar\u0131n\u0131 kar\u015f\u0131lamak i\u00e7in \u00f6zel olarak geli\u015ftirildi. En \u00f6nemlisi bu \u00e7\u00f6z\u00fcm, y\u00f6neticilerin herhangi bir e\u011fitimden ge\u00e7mesini veya \u00f6zel becerilere sahip olmas\u0131n\u0131 gerektirmez. Web tabanl\u0131 kontrol panelini herkes y\u00f6netebilir. Ayn\u0131 zamanda bu g\u00fcvenlik paketi, hem bilgisayarlar hem de mobil cihazlar i\u00e7in g\u00fc\u00e7l\u00fc koruma sa\u011flar.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos\">\n","protected":false},"excerpt":{"rendered":"<p>\u0130\u015f i\u00e7in kullan\u0131lan ki\u015fisel cihazlar\u0131n neden g\u00fcvenli olmas\u0131 gerekir?<\/p>\n","protected":false},"author":2484,"featured_media":6298,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1976,1974,665,1975],"class_list":{"0":"post-6297","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-kcg","11":"tag-kendi-cihazini-getir","12":"tag-mobil-cihazlar","13":"tag-veri-sizintilari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/personal-devices-at-work\/6297\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/personal-devices-at-work\/16279\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/personal-devices-at-work\/13784\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/personal-devices-at-work\/18286\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/personal-devices-at-work\/16362\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/personal-devices-at-work\/15067\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/personal-devices-at-work\/18998\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/personal-devices-at-work\/17713\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/personal-devices-at-work\/23215\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/personal-devices-at-work\/27769\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/personal-devices-at-work\/12065\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/personal-devices-at-work\/12181\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/personal-devices-at-work\/11016\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/personal-devices-at-work\/19846\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/personal-devices-at-work\/23823\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/personal-devices-at-work\/18735\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/personal-devices-at-work\/23091\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/personal-devices-at-work\/23031\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kcg\/","name":"KCG"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6297"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6297\/revisions"}],"predecessor-version":[{"id":6749,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6297\/revisions\/6749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6298"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}