{"id":8135,"date":"2020-04-21T14:21:25","date_gmt":"2020-04-21T11:21:25","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8135"},"modified":"2020-04-21T14:21:25","modified_gmt":"2020-04-21T11:21:25","slug":"awareness-telecommuting","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/awareness-telecommuting\/8135\/","title":{"rendered":"\u00c7al\u0131\u015fanlar\u0131n\u0131z uzaktan \u00e7al\u0131\u015fmaya haz\u0131r m\u0131?"},"content":{"rendered":"<p>B\u00fct\u00fcn kurumsal g\u00fcvenlik sistemlerinin en zay\u0131f halkas\u0131 \u00e7al\u0131\u015fanlard\u0131r. \u0130\u015fi bilgi sistemlerini korumak olan herkes, bir g\u00fcvenlik teknolojisi ne kadar geli\u015fmi\u015f olursa olsun dikkatsiz veya bilgisiz bir \u00e7al\u0131\u015fan\u0131n her zaman altyap\u0131y\u0131 riske atman\u0131n bir yolunu bulabilece\u011fi konusunda hem fikirdir. Yak\u0131n zamanda \u00e7al\u0131\u015fanlar\u0131n\u0131z evden \u00e7al\u0131\u015fmaya ba\u015flad\u0131ysa (insanlar\u0131n neredeyse yar\u0131s\u0131n\u0131n \u015fu anda yapt\u0131\u011f\u0131 gibi), \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n yapabilece\u011fi hatalar\u0131n kapsam\u0131 da art\u0131k daha geni\u015ftir.<\/p>\n<p>\u0130nsanlar ofiste \u00e7al\u0131\u015f\u0131rken koruma sistemleri ve BT personelleri bu y\u00fck\u00fc \u00fcstlenmek i\u00e7in oradad\u0131r. Elbette ki bu, g\u00fcvenli\u011fi m\u00fckemmel bir \u015fekilde sa\u011flaman\u0131n garantisini vermez ancak en az\u0131ndan \u015firketin kulland\u0131\u011f\u0131 anti-vir\u00fcs \u00e7\u00f6z\u00fcm\u00fc kimlik av\u0131 sitelerini engeller, bilgi g\u00fcvenlik ekibi ise vir\u00fcsl\u00fc bir makineden gelen trafikteki anomalileri tespit edebilir. BT ekibi ise <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/windows-adobe-type-manager-vulnerability\/8005\/\" target=\"_blank\" rel=\"noopener noreferrer\">en son g\u00fcvenlik a\u00e7\u0131klar\u0131na<\/a> yama yapmak i\u00e7in g\u00fcncellemeleri derhal y\u00fckler.<\/p>\n<p>Evden \u00e7al\u0131\u015fmaya ba\u015flayan \u00e7al\u0131\u015fanlar art\u0131k t\u00fcm bunlar ve daha fazlas\u0131 ile kendileri ilgilenmek zorundalar. \u0130\u015fte g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131n\u0131n \u00e7ok daha \u00f6nemli bir rol oynamaya ba\u015flad\u0131\u011f\u0131 yer de tam olarak buras\u0131.<\/p>\n<h2>Kendinizin BT y\u00f6neticisi olmak<\/h2>\n<p>\u00c7al\u0131\u015fanlar\u0131n\u0131z evden \u00e7al\u0131\u015fmak i\u00e7in hangi cihazlar\u0131 kullan\u0131yor? Kurumsal politikalara uygun bir i\u015f bilgisayar\u0131 m\u0131? Harika, ancak yine de yeterli de\u011fil. \u00c7\u00fcnk\u00fc bu i\u015f bilgisayar\u0131 art\u0131k yabanc\u0131 bir ev a\u011f\u0131na ba\u011fl\u0131. Peki y\u00f6nlendiriciye ba\u015fka hangi cihazlar ba\u011fl\u0131? Bu ne t\u00fcr bir y\u00f6nlendirici? Y\u00f6nlendiricinin \u015fifresi ne kadar g\u00fc\u00e7l\u00fc, nas\u0131l ve kim taraf\u0131ndan yap\u0131land\u0131r\u0131ld\u0131? \u00c7al\u0131\u015fan, kurumsal bir i\u015f bilgisayar\u0131 yerine ki\u015fisel, ev bilgisayar\u0131n\u0131 kullan\u0131yorsa, bu bilgisayara ba\u015fka kimlerin eri\u015fiminin oldu\u011funu, hangi g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcn\u00fcn y\u00fckl\u00fc oldu\u011funu veya kullan\u0131c\u0131n\u0131n i\u015fletim sistemini g\u00fcncelle\u015ftirmi\u015f oldu\u011funu veya olmad\u0131\u011f\u0131n\u0131 bilmiyorsunuz.<\/p>\n<p>Herkesin bir gecede profesyonel bir sistem y\u00f6neticisi olmas\u0131 gerekti\u011fini \u00f6nermiyoruz, ancak tehditleri ve zay\u0131f noktalar\u0131 belirleme yetene\u011fini edinmek herkes i\u00e7in b\u00fcy\u00fck bir art\u0131 olacakt\u0131r. B\u00f6ylece \u00e7al\u0131\u015fanlar, \u015firket taraf\u0131ndan kullanmalar\u0131 i\u00e7in kendilerine sunulan bir VPN kullan\u0131yorlarsa, sahte \u201cflash player g\u00fcncellemeleri\u201d kurup \u015firket d\u0131\u015f\u0131 \u201cuzmanlar\u0131n\u201d ayarlarla oynamas\u0131na izin veren ki\u015filerin do\u011frudan kurumsal veritabanlar\u0131na eri\u015fmesine engel olurlar.<\/p>\n<h2>Kendinizin veri koruma g\u00f6revlisi olmak<\/h2>\n<p>\u00c7al\u0131\u015fanlar\u0131n\u0131z g\u00fcnl\u00fck i\u015flerinde hangi verileri kullan\u0131yor? Gizli bilgilerin ger\u00e7ekte ne anlama geldi\u011fini ve hangi verilerin kurumsal s\u0131r oldu\u011funu biliyorlar m\u0131? Her \u015feyin olmas\u0131 gerekti\u011fi gibi oldu\u011fu bir d\u00fcnyada \u00e7al\u0131\u015fanlar bunu ilk g\u00fcnde, ofiste \u00f6\u011frenirlerdi. Ancak, bir \u00e7al\u0131\u015fan\u0131n tamamen izole edilmi\u015f bir ofis alt a\u011f\u0131nda \u015firketin AB m\u00fc\u015fterilerinin listesi \u00fczerinde \u00e7al\u0131\u015fmas\u0131 ile bu t\u00fcr dosyalara evden eri\u015fmesi tamamen farkl\u0131 durumlard\u0131r.<\/p>\n<p>Sonu\u00e7ta, uzaktan \u00e7al\u0131\u015f\u0131rken izlenmeyen, resmi olmayan bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/shadow-it-as-a-threat\/8121\/\" target=\"_blank\" rel=\"noopener\">birlikte \u00e7al\u0131\u015fma arac\u0131 kullanabiliyor<\/a> olmalar\u0131 \u00e7al\u0131\u015fanlara olduk\u00e7a cazip gelebilir. Bu nedenle herkesin, hangi verilerin gayri resmi kanallar \u00fczerinden g\u00f6nderilebilece\u011fi ve hi\u00e7bir ko\u015fulda a\u011fdan asla ayr\u0131lmamas\u0131 gerekti\u011fi konusunda olduk\u00e7a a\u00e7\u0131k olmas\u0131 gerekir.<\/p>\n<h2>Kendinizin siber g\u00fcvenlik uzman\u0131 olmak<\/h2>\n<p>Hem uzaktan \u00e7al\u0131\u015fan ki\u015filer hem de BT uzmanlar\u0131, mevcut salg\u0131n\u0131n siber su\u00e7lular i\u00e7in bir nimet oldu\u011funu anlamal\u0131lar. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/coronavirus-phishing\/7649\/\" target=\"_blank\" rel=\"noopener\">Kitlesel kapsamda<\/a> ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/coronavirus-corporate-phishing-2\/8019\/\" target=\"_blank\" rel=\"noopener\">belirli end\u00fcstrileri hedefleyen<\/a> COVID-19 kimlik av\u0131 dalgalar\u0131 g\u00f6rd\u00fck. \u00d6yle ki baz\u0131 doland\u0131r\u0131c\u0131lar, telekom\u00fcnikasyon yaz\u0131\u015fma ak\u0131\u015flar\u0131 \u00fczerinden mesajlar\u0131n\u0131n iletilmesini sa\u011flayarak i\u015f e-postas\u0131 uzla\u015fma sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirmeye <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/what-is-bec-attack\/7936\/\" target=\"_blank\" rel=\"noopener\">\u00e7al\u0131\u015f\u0131yor<\/a>. G\u00fcvenlik teknolojilerimiz, a\u00e7\u0131k Uzak Masa\u00fcst\u00fc ba\u011flant\u0131 noktalar\u0131n\u0131 (RDP) arayan, d\u0131\u015far\u0131dan s\u00fcrekli taramalara tabi kurumsal altyap\u0131lar\u0131 tespit etti. Bunlar tetikte olmak i\u00e7in yeterli sebepler.<\/p>\n<h2>Mevcut ortamda \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 nas\u0131l e\u011fitebilirsiniz<\/h2>\n<p>\u0130\u015fe \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 bilgi g\u00fcvenli\u011finden her zamankinden daha fazla sorumlu olduklar\u0131 fikrini ileterek ba\u015flay\u0131n. Bu size zaten her \u00e7al\u0131\u015fan\u0131n bilmesi gerekti\u011fi bir \u015fey gibi gelse de bir\u00e7ok ki\u015finin sizin gibi d\u00fc\u015f\u00fcnmedi\u011fini unutmay\u0131n. Sonraki ad\u0131m olarak \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n g\u00fcvenlik fark\u0131ndal\u0131klar\u0131n\u0131 artt\u0131r\u0131n. Elbette, \u015fu anda y\u00fcz y\u00fcze siber g\u00fcvenlik e\u011fitimleri vermeniz m\u00fcmk\u00fcn de\u011fil ancak uzaktan \u00f6\u011frenim programlar\u0131m\u0131z bu eksikli\u011fi telafi etmekten daha fazlas\u0131n\u0131 yap\u0131yor. S\u00fcrekli olarak uzaktan \u00f6\u011frenim programlar\u0131m\u0131z\u0131 g\u00fcncelliyor ve geli\u015ftiriyoruz.<\/p>\n<p>Uzaktan siber g\u00fcvenlik e\u011fitimini kurman\u0131n en kolay yolu\u00a0 platformumuzdur. <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/security-awareness?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksa___\" target=\"_blank\" rel=\"noopener\">Kaspersky Security Awareness<\/a> yaln\u0131zca \u00e7al\u0131\u015fanlar\u0131 en son tehditlerden haberdar etmekle kalmaz, ayn\u0131 zamanda onlara bu tehditlere nas\u0131l kar\u015f\u0131 koyacaklar\u0131n\u0131 da \u00f6\u011fretir. Dahas\u0131, y\u00f6netici s\u00fcre\u00e7 \u00fczerinde kontrole sahiptir ve e\u011fitim program\u0131n\u0131 uzaktan kurabilir. Dersler, e\u011fitim ve psikoloji alan\u0131ndaki uzmanlar taraf\u0131ndan hem ilgi \u00e7ekici hem de ak\u0131lda kal\u0131c\u0131 olacak \u015fekilde olu\u015fturulmu\u015ftur.<\/p>\n<p>K\u0131sa bir s\u00fcre \u00f6nce uzmanlar\u0131m\u0131z, platforma gizli veriler ve KVKK konular\u0131 ile ilgili iki e\u011fitim mod\u00fcl\u00fc ekledi. Bu mod\u00fcllerin birincisi, ki\u015fisel veriler, ticari s\u0131rlar veya \u015firket i\u00e7i belgelerle \u00e7al\u0131\u015fan \u00e7al\u0131\u015fanlar, ikincisi ise m\u00fc\u015fterileri veya \u00e7al\u0131\u015fanlar\u0131 AB vatanda\u015flar\u0131n\u0131 i\u00e7eren \u015firketler i\u00e7indir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n<p>Ayr\u0131ca e\u011fitim uzmanlar\u0131m\u0131z <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/what-is-bec-attack\/7936\/\" target=\"_blank\" rel=\"noopener\">Area9 Lyceum<\/a> ile birlikte iki ana b\u00f6l\u00fcmden olu\u015fan \u00fccretsiz bir mod\u00fcl de olu\u015fturdu. Birinci mod\u00fcl, kat\u0131l\u0131mc\u0131lara evde g\u00fcvenli bir \u00e7al\u0131\u015fma ortam\u0131n\u0131 nas\u0131l sa\u011flayabileceklerini \u00f6\u011fretirken ikinci mod\u00fcl tam olarak bilgi g\u00fcvenli\u011fi ile ilgili olmasa da COVID-19\u2019a yakalanma riskini nas\u0131l en aza indirilebilece\u011fini anlat\u0131yor. Mod\u00fcle buradan <a href=\"https:\/\/go.kaspersky.com\/stay_secure_course.html?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_KB_nv0092&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_9wzv92bc6olmduz\" target=\"_blank\" rel=\"noopener nofollow\">eri\u015febilirsiniz<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c7al\u0131\u015fanlar\u0131n\u0131z evden \u00e7al\u0131\u015fmaya ba\u015flamadan \u00f6nce onlar\u0131 bilgi g\u00fcvenli\u011finin temelleri konusunda e\u011fitme \u015fans\u0131n\u0131z oldu mu?<\/p>\n","protected":false},"author":700,"featured_media":8136,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1270,1376,2112,1809,2154,551,2145],"class_list":{"0":"post-8135","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-egitim","10":"tag-farkindalik","11":"tag-koronavirus","12":"tag-kvkk","13":"tag-telekomunikasyon","14":"tag-urunler-2","15":"tag-uzaktan-calisma"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/awareness-telecommuting\/8135\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/awareness-telecommuting\/20664\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/awareness-telecommuting\/16481\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/awareness-telecommuting\/8124\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/awareness-telecommuting\/21538\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/awareness-telecommuting\/19789\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/awareness-telecommuting\/18486\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/awareness-telecommuting\/22491\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/awareness-telecommuting\/21412\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/awareness-telecommuting\/28180\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/awareness-telecommuting\/34972\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/awareness-telecommuting\/14685\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/awareness-telecommuting\/15047\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/awareness-telecommuting\/13518\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/awareness-telecommuting\/23751\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/awareness-telecommuting\/25324\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/awareness-telecommuting\/22103\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/awareness-telecommuting\/27374\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/awareness-telecommuting\/27212\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/uzaktan-calisma\/","name":"uzaktan \u00e7al\u0131\u015fma"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8135"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8135\/revisions"}],"predecessor-version":[{"id":8137,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8135\/revisions\/8137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8136"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}