{"id":8326,"date":"2020-05-14T20:33:17","date_gmt":"2020-05-14T17:33:17","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8326"},"modified":"2020-05-14T20:33:17","modified_gmt":"2020-05-14T17:33:17","slug":"ransomware-telecommuting","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-telecommuting\/8326\/","title":{"rendered":"Uzaktan \u00c7al\u0131\u015fma ve Fidye Yaz\u0131l\u0131m"},"content":{"rendered":"<p>Her ne kadar bu blogun okurlar\u0131 i\u00e7in yeni bir haber olmasa da ge\u00e7en birka\u00e7 ay d\u00fcnyay\u0131 t\u00fcm\u00fcyle de\u011fi\u015ftirdi. Daha \u00f6nce de defalarca s\u00f6yledi\u011fimiz \u00fczere, evrensel \u00f6l\u00e7ekte uzaktan \u00e7al\u0131\u015fmaya ge\u00e7i\u015f tehdit ortam\u0131n\u0131 tamamen de\u011fi\u015ftirdi. Kurumsal siber korumadan sorumlu ki\u015filerin, di\u011fer t\u00fcm noktalara ek olarak art\u0131k iki yeni fakt\u00f6r\u00fc daha g\u00f6z \u00f6n\u00fcnde bulundurmas\u0131 gerekli: ofis a\u011f\u0131n\u0131n co\u011frafi da\u011f\u0131l\u0131m\u0131 ve i\u015f bilgisayarlar\u0131n\u0131n ev ortamlar\u0131nda kullan\u0131lmas\u0131.<\/p>\n<h2>Ofis a\u011f\u0131nda bulunan tehditler<\/h2>\n<p>Bulundu\u011fumuz noktada, \u00e7al\u0131\u015fanlar\u0131n\u0131z kurumsal a\u011fa uzaktan ba\u011flanarak evden \u00e7al\u0131\u015f\u0131yorlar. Bu durum temelde ofis a\u011f\u0131n\u0131n bir \u015fehire, belki de birden fazla \u015fehire da\u011f\u0131lmas\u0131 anlam\u0131na geliyor. Buna ba\u011fl\u0131 olarak, k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131m a\u011fa s\u0131zarsa, birbirinden kilometrelerce uzakta olan bilgisayarlar \u015fifrelenecektir.<\/p>\n<p>T\u00fcm i\u015f bilgisayarlar\u0131n\u0131n yedeklerine sahip olsan\u0131z bile, etkilenen her \u00e7al\u0131\u015fan\u0131n evine teknik destek g\u00f6ndermeniz veya bilgisayarlar\u0131 ofise g\u00f6t\u00fcrmeniz gerekir. \u0130ki se\u00e7enek de karantina ko\u015fullar\u0131ndayken tercih edilmez.<\/p>\n<h2>Tehdit alt\u0131ndaki ev a\u011flar\u0131<\/h2>\n<p>Bir\u00e7ok ki\u015fi, i\u00e7erisinde \u015firket bilgileri bulunan ev bilgisayarlar\u0131nda \u00e7al\u0131\u015f\u0131yor. Bu cihazlar\u0131n ne kadar iyi korundu\u011funu, ba\u015fka kimler taraf\u0131ndan kullan\u0131ld\u0131\u011f\u0131n\u0131 ve kullan\u0131c\u0131lar\u0131n modern siber tehditleri ne kadar iyi anlad\u0131\u011f\u0131n\u0131 kesin olarak bilemezsiniz. Ba\u015fka bir deyi\u015fle, \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n t\u00fcm\u00fc k\u00f6t\u00fc ama\u00e7l\u0131 bir eki tespit edebilmek i\u00e7in e\u011fitim alm\u0131\u015f olsa dahi, evlerindeki bir ba\u015fka ki\u015finin hatas\u0131 sonucu kurumsal verilerinizin \u015fifrelenmeyece\u011finin garantisi yoktur.<\/p>\n<p>Kom\u015fular da ba\u015fka bir tehdit arz ediyor. \u00c7al\u0131\u015fanlar\u0131n y\u00f6nlendiricilerine ba\u015fka hangi cihazlar\u0131n ba\u011fl\u0131 oldu\u011funu ve \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n payla\u015f\u0131lan klas\u00f6rlere eri\u015fim i\u015flemini nas\u0131l yap\u0131land\u0131rd\u0131\u011f\u0131n\u0131 kim bilebilir?<\/p>\n<p>Modern siber su\u00e7lular\u0131n, verileri \u015fifrelemeden \u00f6nce \u00e7almaya \u00e7al\u0131\u015ft\u0131klar\u0131n\u0131 da akl\u0131n\u0131zda bulundurun. Daha \u00f6nceden birinin ev bilgisayar\u0131 \u015fifrelenirse, bu durum t\u00fcm\u00fcyle onlar\u0131n sorunu olurdu. G\u00fcn\u00fcm\u00fczde ise, evlerdeki fidye yaz\u0131l\u0131m gizli i\u015f bilgilerinin siber su\u00e7lular\u0131n eline ge\u00e7mesine sebep olabilir. Bu nedenle, bir \u00e7al\u0131\u015fana kar\u015f\u0131 yap\u0131lan ev sald\u0131r\u0131s\u0131 kurumsal bir sorun, yani sizin sorununuz haline gelir.<\/p>\n<h2>G\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/h2>\n<p>\u00c7al\u0131\u015fanlar\u0131n\u0131 \u00e7ok k\u0131sa bir s\u00fcre i\u00e7erisinde uzaktan \u00e7al\u0131\u015fma modeline ge\u00e7irmek durumunda kalan bir\u00e7ok \u015firketin, en az\u0131ndan her bir \u00e7al\u0131\u015fan\u0131n ev bilgisayarlar\u0131 i\u00e7in ek g\u00fcvenlik \u00e7\u00f6z\u00fcmlerine ay\u0131racak bir b\u00fct\u00e7esi olmad\u0131\u011f\u0131n\u0131 anl\u0131yoruz. Ancak bu durum onlar\u0131 korumas\u0131z b\u0131rakmak i\u00e7in ge\u00e7erli bir sebep de\u011fil. Kaspersky Anti-Ransomware Tool for Business \u00e7\u00f6z\u00fcm\u00fcm\u00fcz, fidye yaz\u0131l\u0131mlar\u0131 \u00fcstesinden gelmek \u00fczere \u00f6zel olarak tasarlanm\u0131\u015ft\u0131r.<\/p>\n<p>\u0130lk olarak, di\u011fer \u015firketlerin \u00e7\u00f6z\u00fcmleri de dahil olmak \u00fczere farkl\u0131 \u00e7\u00f6z\u00fcmlerle bir arada \u00e7al\u0131\u015farak ek bir koruma katman\u0131 olu\u015fturur. \u0130kincisi, yak\u0131n zamanda \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fc k\u00f6t\u00fc ama\u00e7l\u0131 kullan\u0131ma kar\u015f\u0131 koruma sa\u011flayan bir \u00f6zellikle g\u00fcncelledik. \u00c7o\u011fu fidye yaz\u0131l\u0131m\u0131, yama uygulanmam\u0131\u015f g\u00fcvenlik a\u00e7\u0131klar\u0131 arac\u0131l\u0131\u011f\u0131yla sisteme s\u0131zar. Ve \u00fc\u00e7\u00fcnc\u00fcs\u00fc, Kaspersky Anti-Ransomware Tool for Business, bu mod\u00fcl sayesinde, y\u0131l\u0131n ba\u015flar\u0131nda deste\u011fin kesildi\u011fi Windows 7 gibi eski sistemler i\u00e7in daha iyi bir koruma sunabiliyor.<\/p>\n<p>Kaspersky Anti-Ransomware Tool for Business hakk\u0131nda daha fazla bilgi edinmek ve \u00e7\u00f6z\u00fcm\u00fc indirmek i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-anti-ransomware-tool-for-business\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_KB_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_cdw92oxvuhcab46\" target=\"_blank\" rel=\"noopener\">buraya t\u0131klay\u0131n<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kartb2b\">\n","protected":false},"excerpt":{"rendered":"<p>Kitlesel olarak evden \u00e7al\u0131\u015fma modeline ge\u00e7ilmi\u015f olmas\u0131 fidye yaz\u0131l\u0131m\u0131 daha da b\u00fcy\u00fck bir tehdit haline getirdi. <\/p>\n","protected":false},"author":2581,"featured_media":8329,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2161,591,935],"class_list":{"0":"post-8326","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-cozumler","10":"tag-fidye-yazilimi","11":"tag-sifreleyiciler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-telecommuting\/8326\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-telecommuting\/21271\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-telecommuting\/16741\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-telecommuting\/22273\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-telecommuting\/20469\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-telecommuting\/18987\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-telecommuting\/22812\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-telecommuting\/21848\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-telecommuting\/28437\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-telecommuting\/35354\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-telecommuting\/15524\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-telecommuting\/13453\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-telecommuting\/28295\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ransomware-telecommuting\/25487\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-telecommuting\/22339\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-telecommuting\/27575\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-telecommuting\/27410\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8326"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8326\/revisions"}],"predecessor-version":[{"id":8328,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8326\/revisions\/8328"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8329"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}