{"id":6454,"date":"2019-09-20T13:02:30","date_gmt":"2019-09-20T10:02:30","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6454"},"modified":"2019-09-20T13:02:30","modified_gmt":"2019-09-20T10:02:30","slug":"small-office-supply-chain","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/small-office-supply-chain\/6454\/","title":{"rendered":"KOB\u0130&#8217;ler i\u00e7in bir tehdit olarak tedarik zinciri"},"content":{"rendered":"<p>K\u00fc\u00e7\u00fck i\u015fletme sahipleri, \u015firketlerinin siber su\u00e7lular i\u00e7in hedef olamayacak kadar k\u00fc\u00e7\u00fck oldu\u011funu d\u00fc\u015f\u00fcnebilir. Bu, belli \u00f6l\u00e7\u00fcde mant\u0131kl\u0131d\u0131r: Sald\u0131rganlar minimum efor harcayarak maksimum kar etme pe\u015findedir. Fakat g\u00f6z \u00f6n\u00fcnde bulundurulmas\u0131 gereken iki nokta daha vard\u0131r: Birincisi, b\u00fcy\u00fck \u015firketler savunmaya ciddi b\u00fct\u00e7eler ay\u0131r\u0131r, dolay\u0131s\u0131yla bunlara sald\u0131rmak daha zordur. \u0130kincisi, tedarik zinciri arac\u0131l\u0131\u011f\u0131yla sald\u0131r\u0131 ger\u00e7ekle\u015ftirme se\u00e7ene\u011fi daha cazip gelebilir. K\u00f6t\u00fc ama\u00e7l\u0131 ki\u015filer tek bir \u015firkete s\u0131zarak y\u00fczlerce k\u00fc\u00e7\u00fck firmaya eri\u015febilir.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6455\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/20124441\/small-office-supply-chain.jpg\" alt=\"\" width=\"1460\" height=\"960\"><\/p>\n<h2>Tedarik zinciri sald\u0131r\u0131lar\u0131<\/h2>\n<p>Tedarik zinciri arac\u0131l\u0131\u011f\u0131yla sald\u0131r\u0131ya u\u011framak, bir s\u00fcredir kullanmakta oldu\u011funuz bir hizmetin veya program\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 hale gelmesi demektir. Ge\u00e7ti\u011fimiz y\u0131llarda, farkl\u0131 karma\u015f\u0131kl\u0131k ve zarar verme kapasitesine sahip, benzer birka\u00e7 sald\u0131r\u0131 g\u00f6rd\u00fck. En \u00e7ok ses getirenler \u015funlard\u0131:<\/p>\n<h2>ExPetr fidye yaz\u0131l\u0131m\u0131 salg\u0131n\u0131<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/expetr-for-b2b\/3342\/\" target=\"_blank\" rel=\"noopener\">ExPetr<\/a> (bir di\u011fer ad\u0131yla NotPetya) sald\u0131r\u0131s\u0131n\u0131n y\u0131k\u0131c\u0131 sonu\u00e7lar\u0131na odaklan\u0131rken \u00e7ok az ki\u015fi sald\u0131r\u0131n\u0131n nas\u0131l ba\u015flad\u0131\u011f\u0131n\u0131 hat\u0131rlar. Halbuki, sald\u0131r\u0131y\u0131 da\u011f\u0131tan vekt\u00f6rlerden biri adeta \u201ctedarik zinciri sald\u0131r\u0131s\u0131n\u0131n\u201d s\u00f6zl\u00fck tan\u0131m\u0131yd\u0131. Sald\u0131rganlar, M.E.Doc adl\u0131 bir muhasebe yaz\u0131l\u0131m\u0131n\u0131n otomatik g\u00fcncelleme sistemini ele ge\u00e7irerek t\u00fcm m\u00fc\u015fterilere fidye yaz\u0131l\u0131m\u0131 g\u00f6ndermesini sa\u011flad\u0131. Bunun sonucunda ExPetr, hem b\u00fcy\u00fck \u015firketleri hem de k\u00fc\u00e7\u00fck i\u015fletmeleri etkileyerek milyonlarca dolar zarara sebep oldu.<\/p>\n<h2>CCleaner vakas\u0131<\/h2>\n<p>CCleaner, en \u00fcnl\u00fc sistem kayd\u0131 temizleme programlar\u0131ndan biri. Hem ev kullan\u0131c\u0131lar\u0131 hem de sistem y\u00f6neticileri taraf\u0131ndan yayg\u0131n bi\u00e7imde kullan\u0131l\u0131yor. Bir noktada s<a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ccleaner-supply-chain\/4819\/\" target=\"_blank\" rel=\"noopener\">ald\u0131rganlar, program geli\u015ftiricinin derleme ortam\u0131n\u0131 ele ge\u00e7irerek<\/a>, s\u00fcr\u00fcmlerden birka\u00e7\u0131na birer arka kap\u0131 ekledi. Bu vir\u00fcsl\u00fc s\u00fcr\u00fcmler bir ay boyunca \u015firketin resmi internet sitesinden da\u011f\u0131t\u0131ld\u0131. 2,27 milyon defa indirildi.<\/p>\n<h2>Kurban olmaktan korunman\u0131n yollar\u0131<\/h2>\n<p>G\u00f6rd\u00fc\u011f\u00fcn\u00fcz \u00fczere bir tedarik zinciri sald\u0131r\u0131s\u0131nda siber su\u00e7lular\u0131n sizi hedef olarak se\u00e7mesine gerek kalmaz. Belirli bir hizmeti veya program\u0131 kullanarak bir \u00f6l\u00e7\u00fcde kendinizi hedef haline getirmi\u015f olursunuz.<\/p>\n<p>Sonu\u00e7 \u00e7ok a\u00e7\u0131kt\u0131r (ve bilmedi\u011finiz bir \u015fey de\u011fildir): \u0130nternet eri\u015fimine sahip her i\u015fletme cihaz\u0131 tek tek korunmal\u0131d\u0131r. Buna bilgisayarlar, sunucular, cep telefonlar\u0131, vb. dahildir. Bir bilgisayara bilinmeyen herhangi bir program kurmad\u0131\u011f\u0131n\u0131zdan emin olsan\u0131z bile, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n tan\u0131d\u0131\u011f\u0131n\u0131z, eski bir yaz\u0131l\u0131m\u0131n g\u00fcncellemesi \u015feklinde gelmeyece\u011finin garantisi yoktur. Bilgisayarlar \u00f6zellikle k\u00f6t\u00fc ama\u00e7l\u0131 madencilik ve fidye yaz\u0131l\u0131mlar\u0131na kar\u015f\u0131l\u0131k verebilecek teknolojiler taraf\u0131ndan korunmal\u0131d\u0131r. Bu iki sald\u0131r\u0131 y\u00f6ntemi, paraya \u00e7evrilmesi en kolay y\u00f6ntemlerdir; dolay\u0131s\u0131yla sald\u0131rganlar taraf\u0131ndan devaml\u0131 olarak kullan\u0131l\u0131rlar.<\/p>\n<h2>K\u00fc\u00e7\u00fck i\u015fletmeleri koruman\u0131n yollar\u0131<\/h2>\n<p>G\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc se\u00e7mek, k\u00fc\u00e7\u00fck i\u015fletmeleri ezelden beri zorlayan bir konudur. Ev kullan\u0131c\u0131lar\u0131na y\u00f6nelik \u00fcr\u00fcnler gerekli \u00f6zelliklerden yoksundur; b\u00fcy\u00fck i\u015fletmelere y\u00f6nelik \u00e7\u00f6z\u00fcmler ise \u00e7ok pahal\u0131d\u0131r ve bir BT g\u00fcvenli\u011fi departman\u0131na sahip olmadan y\u00f6netmesi zordur. K\u00fc\u00e7\u00fck i\u015fletmelerin dijital varl\u0131klar\u0131n\u0131 modern siber tehditlere kar\u015f\u0131 koruyabilmesi i\u00e7in Kaspersky Small Office Security \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fc g\u00fcncelledik.<\/p>\n<p>\u00c7\u00f6z\u00fcm\u00fcm\u00fcz, 5 ila 25 \u00e7al\u0131\u015fana sahip \u015firketler i\u00e7in optimize edildi; y\u00f6netim i\u00e7in herhangi \u00f6zel bir beceri gerektirmiyor ve ki\u015fisel bilgisayarlar, Windows dosya sunucular\u0131 ve Android mobil cihazlar dahil neredeyse her t\u00fcrl\u00fc internete ba\u011fl\u0131 i\u015fletme cihaz\u0131n\u0131 koruyabiliyor.<\/p>\n<p>\u00c7\u00f6z\u00fcm\u00fcn ana bile\u015fenlerinden biri olan Kaspersky System Watcher, fidye ve madencilik yaz\u0131l\u0131mlar\u0131n\u0131 kullan\u0131c\u0131ya herhangi bir zarar vermeden \u00f6nce tespit edebilen davran\u0131\u015fsal analiz teknolojileriyle donat\u0131ld\u0131. <a href=\"https:\/\/kas.pr\/ksostr\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a> bunlara ek olarak taray\u0131c\u0131yla yap\u0131lan \u00e7evrimi\u00e7i \u00f6demeleri koruyor, hassas verileri \u015fifrelemenize izin veriyor ve \u00f6nemli bilgilerin yedek kopyalar\u0131n\u0131 olu\u015fturuyor. Kaspersky Small Office Security internet sitesinde daha detayl\u0131 bilgi bulabilir, bir \u00e7\u00f6z\u00fcm sat\u0131n alabilir ya da deneme s\u00fcr\u00fcm\u00fcn\u00fc indirebilirsiniz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos\">\n","protected":false},"excerpt":{"rendered":"<p>K\u00fc\u00e7\u00fck i\u015fletmeler siber su\u00e7lular\u0131n ana hedefi olmayabilir, fakat bu, KOB\u0130&#8217;lerin bir tedarik zinciri sald\u0131r\u0131s\u0131na kurban gitmeyece\u011fi anlam\u0131na gelmiyor. \u0130kincil hasar olmaktan ka\u00e7\u0131nman\u0131n yollar\u0131.<\/p>\n","protected":false},"author":40,"featured_media":6456,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[2015,1611],"class_list":{"0":"post-6454","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-kucuk-isletmeler","11":"tag-tedarik-zinciri"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/small-office-supply-chain\/6454\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/small-office-supply-chain\/16632\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/small-office-supply-chain\/14024\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/small-office-supply-chain\/18598\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/small-office-supply-chain\/16670\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/small-office-supply-chain\/19273\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/small-office-supply-chain\/17992\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/small-office-supply-chain\/23649\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/small-office-supply-chain\/28592\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/small-office-supply-chain\/12284\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/small-office-supply-chain\/12325\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/small-office-supply-chain\/11247\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/small-office-supply-chain\/20165\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/small-office-supply-chain\/24122\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/small-office-supply-chain\/24288\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/small-office-supply-chain\/19116\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/small-office-supply-chain\/23354\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/small-office-supply-chain\/23264\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kucuk-isletmeler\/","name":"K\u00fc\u00e7\u00fck i\u015fletmeler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6454"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6454\/revisions"}],"predecessor-version":[{"id":6457,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6454\/revisions\/6457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6456"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}