{"id":8399,"date":"2020-06-08T13:21:36","date_gmt":"2020-06-08T10:21:36","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8399"},"modified":"2020-06-08T13:21:36","modified_gmt":"2020-06-08T10:21:36","slug":"collaboration-solutions","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/collaboration-solutions\/8399\/","title":{"rendered":"\u0130\u015fbirli\u011fi ara\u00e7lar\u0131 g\u00fcvenli mi?"},"content":{"rendered":"<p>K\u00fc\u00e7\u00fck i\u015fletmeler nadiren y\u00fcksek maliyetli i\u015fbirli\u011fi ara\u00e7lar\u0131na yat\u0131r\u0131m yaparlar. Bu ara\u00e7lar yerine daha ucuz ve \u00fccretsiz programlar\u0131 tercih ederler. \u0130yisiyle k\u00f6t\u00fcs\u00fcyle bu ara\u00e7lar\u0131n sundu\u011fu bir\u00e7ok se\u00e7enek vard\u0131r. Bununla birlikte, bu t\u00fcr ara\u00e7lar\u0131n kullan\u0131lmas\u0131n\u0131n g\u00fcvenlikle ilgili sonu\u00e7lar\u0131n\u0131n dikkate al\u0131nmamas\u0131 KOB\u0130\u2019lere daha pahal\u0131ya mal olabilir.<\/p>\n<h2>Belge i\u015f birlik ara\u00e7lar\u0131<\/h2>\n<p>Bir\u00e7ok hizmet, k\u00fc\u00e7\u00fck ekiplerin belgeleri ayn\u0131 anda d\u00fczenlemesine izin verir. Bunlar sadece metin ara\u00e7lar\u0131 de\u011fildir. Ekip \u00fcyeleri bu ara\u00e7lar\u0131 kullanarak birlikte grafik aray\u00fczler, diyagramlar, kaynak kodu ve \u00e7ok daha fazlas\u0131n\u0131 geli\u015ftirebilirler. Ne de olsa bu ara\u00e7lar olduk\u00e7a kullan\u0131\u015fl\u0131d\u0131r. \u00d6te yandan, b\u00f6yle bir hizmeti kullanmadan \u00f6nce tam olarak nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131, bilgilerinizi nas\u0131l saklad\u0131\u011f\u0131n\u0131, kimlere eri\u015fimi sundu\u011funu ve hangi g\u00fcvenlik ayarlar\u0131n\u0131n kullan\u0131labilece\u011fini anlamak \u00f6nemlidir. \u00c7al\u0131\u015fma dosyalar\u0131n\u0131 herkesin eri\u015fimine a\u00e7\u0131k b\u0131rakmak hi\u00e7bir zaman iyi bir fikir de\u011fildir. Bilgi s\u0131z\u0131nt\u0131s\u0131 konusunda endi\u015feleriniz olmasa bile davetsiz bir misafir dosyaya eri\u015fim sa\u011flayarak proje belgelerinizde de\u011fi\u015fiklikler yapabilir.<\/p>\n<p>Bu konuda en belirgin \u00f6rnek Google Docs\u2019tur. Kullan\u0131c\u0131lar genellikle herhangi bir k\u0131s\u0131tlama olmaks\u0131z\u0131n do\u011frudan bir ba\u011flant\u0131 kullanarak dok\u00fcmanlar\u0131 Google \u00fczerinden payla\u015f\u0131rlar. Bu durum, arama motorlar\u0131n\u0131n bunlar\u0131 dizine ekleyebilece\u011fi, bu nedenle hemen hemen herkesin bu belgeleri g\u00f6rebilece\u011fi anlam\u0131na gelir. \u00c7al\u0131\u015fanlar\u0131n <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/clutter-as-cyberrisk\/5902\/\" target=\"_blank\" rel=\"noopener\">ki\u015fisel verileri<\/a>, ileti\u015fim bilgilerini i\u00e7eren m\u00fc\u015fteri listeleri ve hatta bordro kay\u0131tlar\u0131na kadar her t\u00fcrl\u00fc gizli bilgi, tamamen yabanc\u0131 birtak\u0131m ki\u015filer taraf\u0131ndan bulunmu\u015ftur.<\/p>\n<p><strong>Ne yapmal\u0131<\/strong>: Yaln\u0131zca belgeleri merakl\u0131 g\u00f6zlerden gizleyebilece\u011finiz veya en az\u0131ndan belgelerin nas\u0131l sakland\u0131\u011f\u0131na dair net bir a\u00e7\u0131klama sunan hizmetleri kullan\u0131n. Eri\u015fim haklar\u0131n\u0131 yap\u0131land\u0131rmay\u0131 unutmay\u0131n. Bunu yapmak hayati \u00f6nem ta\u015f\u0131r. Dolay\u0131s\u0131yla, Google Docs\u2019u i\u015f amac\u0131yla kullan\u0131yorsan\u0131z eri\u015fimi yaln\u0131zca dosyay\u0131 payla\u015ft\u0131\u011f\u0131n\u0131z ki\u015filere vererek eri\u015fimi k\u0131s\u0131tlay\u0131n ve eri\u015filmesine gerek kalmad\u0131\u011f\u0131nda eri\u015fim hakk\u0131n\u0131 iptal etmeyi unutmay\u0131n.<\/p>\n<h2>Bulutta dosya depolama<\/h2>\n<p>Dikkatli davranman\u0131z gereken ba\u015fka bir hizmet t\u00fcr\u00fc de bulutta dosya depolamad\u0131r. B\u00fcy\u00fck miktarda bilgi mi aktarman\u0131z gerekiyor? Hi\u00e7 sorun de\u011fil, buluta y\u00fckleyip al\u0131c\u0131ya bir ba\u011flant\u0131 g\u00f6ndermeniz yeterli. Bu, her t\u00fcrl\u00fc bir e-posta boyutu s\u0131n\u0131r\u0131n\u0131n \u00fcstesinden gelir. Ancak bir\u00e7ok dosya payla\u015f\u0131m hizmeti, hi\u00e7bir korumaya sahip de\u011fildir ve dosyalar yine rastgele yabanc\u0131lar\u0131n arama sonu\u00e7lar\u0131nda \u00e7\u0131kabilir.<\/p>\n<p>Hizmet korumaya sahip olsa bile g\u00fcvenlik ayarlar\u0131n\u0131 en \u00fcst d\u00fczeye \u00e7\u0131karman\u0131z gerekir. \u0130nsanlar genellikle kaydolur, buluta veri y\u00fckler ve unuturlar. Ancak \u015fifreler s\u0131zabilir. Daha k\u00fc\u00e7\u00fck hizmetlerin yan\u0131 s\u0131ra, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/dropbox-hack\/2386\/\" target=\"_blank\" rel=\"noopener\">Dropbox<\/a>\u2018\u0131n \u015fifreleri bile bir hacker taraf\u0131ndan \u00e7al\u0131nd\u0131.<\/p>\n<p><strong>Ne yapmal\u0131: <\/strong>\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 destekleyen g\u00fcvenilir bir dosya payla\u015f\u0131m hizmeti se\u00e7in. Veriyi buluta koyduktan sonra unutmay\u0131n, art\u0131k i\u015f i\u00e7in kullanm\u0131yorsan\u0131z silin. Dosyalar\u0131 payla\u015fmak i\u00e7in tek bir hizmette karar k\u0131l\u0131n. Birden fazla hizmet kullanmak kar\u0131\u015f\u0131kl\u0131\u011fa davetiye \u00e7\u0131kar\u0131r.<\/p>\n<h2>Proje y\u00f6netimi ortamlar\u0131<\/h2>\n<p>Bu platformlar genel olarak i\u015f ak\u0131\u015f\u0131nda yer alan ki\u015filerin projeler \u00fczerinde ileti\u015fim kurmalar\u0131na, dosya payla\u015fmalar\u0131na ve projeyi sistemle\u015ftirmelerine olanak tan\u0131r. \u0130\u015f stratejilerini tart\u0131\u015fmak veya dosya aktarmak i\u00e7in bu hizmetlerden birini kullan\u0131rsan\u0131z i\u00e7erikleri yaln\u0131zca \u015fu anda kimlerin g\u00f6rebilece\u011fini de\u011fil, daha sonra da kimlerin g\u00f6rebilece\u011fini bilmek \u00f6nemlidir. Baz\u0131 bulut platformlar\u0131 varsay\u0131lan olarak her \u015feyi herkese a\u00e7\u0131k k\u0131lar. Kullan\u0131c\u0131lar \u00f6\u011feleri gizleyebilir, ancak b\u00fcy\u00fck olas\u0131l\u0131kla her seferinde bunu yapmay\u0131 hat\u0131rlayamayacaklar\u0131 i\u00e7in varsay\u0131lan ayarlar ge\u00e7erli olur. Dahas\u0131, bir ki\u015fi bir projeye eri\u015fti\u011finde daima t\u00fcm proje ge\u00e7mi\u015fine arzu edilmeyen \u015fekilde de eri\u015febilir.<\/p>\n<p>\u015eirketler genellikle bu ortamlarda bug\u00fcn kendileri i\u00e7in \u00e7al\u0131\u015fan, yar\u0131nsa rakipleri olabilecek \u00fcstlenicilere veya serbest \u00e7al\u0131\u015fanlara eri\u015fim izni verirler. \u0130\u015ften \u00e7\u0131kar\u0131lan ve eri\u015fim izinleri iptal edilmeden \u00f6nce t\u00fcm ar\u015fivi indirmeye vakti olabilecek \u00e7al\u0131\u015fanlardan bahsetmiyoruz bile.<\/p>\n<p><strong>Ne yapmal\u0131:<\/strong> T\u00fcm taraflar i\u00e7in proje eri\u015fim haklar\u0131n\u0131 d\u00fczenleyerek bu haklar\u0131 yaln\u0131zca i\u015fle ilgili dosyalarla s\u0131n\u0131rland\u0131r\u0131n. \u00c7al\u0131\u015fanlar ve d\u0131\u015far\u0131dan ki\u015filer (y\u00fckleniciler, m\u00fc\u015fteriler) i\u00e7in ayr\u0131 ileti\u015fim ortamlar\u0131 kullan\u0131n. Eski \u00e7al\u0131\u015fanlar ve serbest \u00e7al\u0131\u015fanlar i\u00e7in eri\u015fimi derhal iptal etmeyi de unutmay\u0131n.<\/p>\n<h2>Ek ipu\u00e7lar\u0131<\/h2>\n<p>T\u00fcm hizmetlerin kullanmaya ba\u015flad\u0131\u011f\u0131n\u0131zda hen\u00fcz ke\u015ffedilmemi\u015f g\u00fcvenlik a\u00e7\u0131klar\u0131 olabilece\u011fini unutmay\u0131n. Ayr\u0131ca bir\u00e7ok hizmet, kendi sorunlar\u0131 olan istemci uygulamalar\u0131 kullan\u0131r. Bu nedenle, a\u015fa\u011f\u0131daki ilkelere ba\u011fl\u0131 kalman\u0131z\u0131 \u00f6neririz:<\/p>\n<ul>\n<li>Bir hizmetle \u00e7al\u0131\u015fmaya ba\u015flamadan \u00f6nce, ayarlar\u0131n\u0131 ve veri i\u015fleme kurallar\u0131n\u0131 dikkatlice inceleyin ve insanlar\u0131n g\u00fcvenlik ba\u011flam\u0131nda nas\u0131l de\u011ferlendirmelerde bulundu\u011funu okuyun.<\/li>\n<li>\u00d6zel bir BT uzman\u0131n\u0131z veya ekibiniz varsa bu uzman veya ekip, hangi hizmetleri kulland\u0131\u011f\u0131n\u0131z\u0131, nas\u0131l yap\u0131land\u0131r\u0131ld\u0131klar\u0131n\u0131 ve kimler taraf\u0131ndan y\u00f6netildiklerini a\u00e7\u0131k\u00e7a anlamal\u0131d\u0131r.<\/li>\n<li>\u00d6zel bir uzman\u0131n\u0131z yoksa bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulundu\u011funda istemci uygulamas\u0131n\u0131n hemen g\u00fcncellenmesini, s\u0131z\u0131nt\u0131 durumunda \u015fifrelerin de\u011fi\u015ftirilmesini ve gerekti\u011finde eri\u015fim haklar\u0131n\u0131n verilip iptal edilmesini sa\u011flamak \u00fczere her hizmet i\u00e7in sorumlu bir ki\u015fi atay\u0131n.<\/li>\n<li>Bir ba\u011flant\u0131y\u0131 veya dosyay\u0131 payla\u015fmak i\u00e7in kullan\u0131lan herhangi bir hizmet, potansiyel olarak k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m da\u011f\u0131t\u0131m kanal\u0131 olabilir. Bu nedenle, bu ara\u00e7lar\u0131n kullan\u0131ld\u0131\u011f\u0131 her cihaz\u0131n g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcne ihtiyac\u0131 vard\u0131r.<\/li>\n<\/ul>\n<p>KOB\u0130\u2019lere y\u00f6nelik \u00e7\u00f6z\u00fcm\u00fcm\u00fcz Kaspersky Small Office Security, kur ve unut prensibi ile \u00e7al\u0131\u015f\u0131r. En yeni fidye yaz\u0131l\u0131mlar\u0131na kar\u015f\u0131 korur ve t\u00fcm \u00e7evrimi\u00e7i \u00f6demeleri, de\u011ferli dosyalar\u0131 \u015fifreleme ve yedekleme yoluyla korur. Uygulamalar\u0131 ise g\u00fcvenlik a\u00e7\u0131\u011f\u0131 izleme ve zaman\u0131nda yaz\u0131l\u0131m g\u00fcncellemeleri yoluyla korur. \u00c7\u00f6z\u00fcm, Windows ve macOS bilgisayarlarda, Android mobil cihazlarda ve dosya sunucular\u0131nda kullan\u0131labilir. <a href=\"https:\/\/www.kaspersky.com.tr\/small-business-security\/small-office-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_banner____ksos___\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a> sayfas\u0131ndan daha fazla bilgi edinebilir ve \u00e7\u00f6z\u00fcm\u00fc sat\u0131n alabilirsiniz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos\">\n","protected":false},"excerpt":{"rendered":"<p>Dosya depolama ve belge veya proje y\u00f6netimi i\u00e7in bulut \u00e7\u00f6z\u00fcmleri kullanmak, avantajlar\u0131n\u0131n yan\u0131 s\u0131ra bir\u00e7ok soruna da neden olabilir.<\/p>\n","protected":false},"author":700,"featured_media":8400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[2209,642,2210,2007],"class_list":{"0":"post-8399","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-birlikte-calisma","11":"tag-isbirligi","12":"tag-paylasimli-erisim","13":"tag-sizintilar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/collaboration-solutions\/8399\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/collaboration-solutions\/21382\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/collaboration-solutions\/16846\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/collaboration-solutions\/8343\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/collaboration-solutions\/22475\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/collaboration-solutions\/20611\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/collaboration-solutions\/19064\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/collaboration-solutions\/22851\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/collaboration-solutions\/21863\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/collaboration-solutions\/28514\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/collaboration-solutions\/35740\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/collaboration-solutions\/15665\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/collaboration-solutions\/13514\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/collaboration-solutions\/24186\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/collaboration-solutions\/11553\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/collaboration-solutions\/28641\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/collaboration-solutions\/25504\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/collaboration-solutions\/22407\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/collaboration-solutions\/27664\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/collaboration-solutions\/27505\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/isbirligi\/","name":"\u0130\u015fbirli\u011fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8399"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8399\/revisions"}],"predecessor-version":[{"id":8401,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8399\/revisions\/8401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8400"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}