{"id":9285,"date":"2021-02-04T12:52:52","date_gmt":"2021-02-04T09:52:52","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9285"},"modified":"2021-02-04T12:52:52","modified_gmt":"2021-02-04T09:52:52","slug":"hr-related-threats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/hr-related-threats\/9285\/","title":{"rendered":"\u0130K&#8217;y\u0131 hedef alan siber tehditler"},"content":{"rendered":"<p>\u0130\u015f alan\u0131na bak\u0131lmaks\u0131z\u0131n baz\u0131 meslekler, di\u011ferleriyle kar\u015f\u0131la\u015ft\u0131r\u0131ld\u0131\u011f\u0131nda siber sald\u0131r\u0131lara kar\u015f\u0131 daha savunmas\u0131zd\u0131r. Bug\u00fcn, insan kaynaklar\u0131 alan\u0131nda \u00e7al\u0131\u015fan profesyonellere y\u00f6nelik siber tehditlere odaklan\u0131yoruz. En basit ancak elbette tek neden de\u011fil: \u0130K \u00e7al\u0131\u015fanlar\u0131n\u0131n e-posta adreslerinin i\u015fe al\u0131m amac\u0131yla kurumsal sitelerde yay\u0131nlan\u0131yor olmas\u0131. Bulunmalar\u0131 olduk\u00e7a kolay.<\/p>\n<h2>\u0130K\u2019y\u0131 hedefli siber tehditler<\/h2>\n<p>\u0130nsan kaynaklar\u0131 \u00e7al\u0131\u015fanlar\u0131 olduk\u00e7a farkl\u0131 bir konuma sahiptir: \u015eirket d\u0131\u015f\u0131ndan \u00e7ok say\u0131da e-posta al\u0131rlar. Ancak ayn\u0131 zamanda, \u015firketin s\u0131zd\u0131rmay\u0131 g\u00f6ze alamayaca\u011f\u0131 ki\u015fisel verilere de eri\u015fimleri vard\u0131r.<\/p>\n<h3>Gelen e-posta<\/h3>\n<p>Genellikle, siber su\u00e7lular, bir \u00e7al\u0131\u015fana k\u00f6t\u00fc ama\u00e7l\u0131 bir ek veya ba\u011flant\u0131 i\u00e7eren bir e-posta g\u00f6ndererek kurumsal g\u00fcvenlik parametrelerine s\u0131zarlar. Bu nedenle okuyuculara her zaman ek i\u00e7eren \u015f\u00fcpheli e-postalar\u0131 a\u00e7mamalar\u0131n\u0131 veya bilinmeyen ki\u015filer taraf\u0131ndan g\u00f6nderilen ba\u011flant\u0131lara t\u0131klamamalar\u0131n\u0131 tavsiye ediyoruz. Fakat, bir \u0130K uzman\u0131 i\u00e7in bu tavsiye sa\u00e7ma olur. \u015eirket d\u0131\u015f\u0131ndan gelen e-postalar\u0131n \u00e7o\u011fu muhtemelen yabanc\u0131lardan geliyor. Bir\u00e7o\u011funda da \u00f6z ge\u00e7mi\u015f i\u00e7eren bir ek (ve bazen \u00f6rnek \u00e7al\u0131\u015fmalara giden bir ba\u011flant\u0131) bulunuyor. En az yar\u0131s\u0131n\u0131n \u015f\u00fcpheli g\u00f6r\u00fcnd\u00fc\u011f\u00fcn\u00fc s\u00f6yleyebiliriz.<\/p>\n<p>Dahas\u0131, ge\u00e7mi\u015f \u00e7al\u0131\u015fmalar\u0131n portf\u00f6yleri veya \u00f6rnekleri bazen olduk\u00e7a \u00f6zelle\u015fmi\u015f CAD program dosyalar\u0131 gibi istisnai formatlarda geliyor. \u0130\u015flerinin do\u011fas\u0131 gere\u011fi, \u0130K \u00e7al\u0131\u015fanlar\u0131n\u0131n bu t\u00fcr dosyalar\u0131 a\u00e7mas\u0131 ve i\u00e7eri\u011fini g\u00f6zden ge\u00e7irmesi gerekiyor. Siber su\u00e7lular\u0131n bazen dosya uzant\u0131s\u0131n\u0131 (bir CAD dosyas\u0131, RAW foto\u011fraflar\u0131, DOC, EXE?) de\u011fi\u015ftirerek bir dosyan\u0131n ger\u00e7ek amac\u0131n\u0131 gizlediklerini bir s\u00fcreli\u011fine unutsak bile, bu t\u00fcr programlar\u0131n t\u00fcm\u00fc g\u00fcncel de\u011fildir. Ayr\u0131ca, t\u00fcm\u00fc g\u00fcvenlik a\u00e7\u0131klar\u0131 i\u00e7in kapsaml\u0131 bir \u015fekilde test edilmemi\u015ftir. Uzmanlar genellikle Microsoft Office gibi yayg\u0131n, d\u00fczenli olarak analiz edilen yaz\u0131l\u0131mlarda bile rastgele kod y\u00fcr\u00fct\u00fclmesine yol a\u00e7an g\u00fcvenlik a\u00e7\u0131klar\u0131 bulurlar.<\/p>\n<h3>Ki\u015fisel verilere eri\u015fim<\/h3>\n<p>B\u00fcy\u00fck \u015firketlerin, i\u015f arayanlarla ileti\u015fimden ve mevcut \u00e7al\u0131\u015fanlar\u0131n \u00e7al\u0131\u015fmalar\u0131ndan sorumlu \u00e7e\u015fitli uzmanlar\u0131 olabilir. Ancak k\u00fc\u00e7\u00fck i\u015fletmelerde t\u00fcm durumlar i\u00e7in, yaln\u0131zca bir \u0130K temsilcisinin olma olas\u0131l\u0131\u011f\u0131 daha y\u00fcksektir. Bu bir ki\u015finin, \u015firketten bulunan t\u00fcm personel verilerine y\u00fcksek ihtimalle eri\u015fimi vard\u0131r.<\/p>\n<p>Ancak, sorun yaratmak istiyorsan\u0131z, yaln\u0131zca \u0130K uzman\u0131n\u0131n e-posta kutusunu ele ge\u00e7irmek genellikle i\u015fe yarar. \u00d6zge\u00e7mi\u015f g\u00f6nderen ba\u015fvuru sahipleri, bir \u015firkete ki\u015fisel verilerini i\u015flemesi ve saklamas\u0131 i\u00e7in a\u00e7\u0131k\u00e7a veya \u00fcst\u00fc kapal\u0131 olarak izin verebilir. Ancak, bunlar\u0131 kimli\u011fi belirsiz yabanc\u0131larla payla\u015fmay\u0131 kesinlikle kabul etmiyorlar. Siber su\u00e7lular, bu t\u00fcr bilgilere eri\u015fip \u015fantaj ama\u00e7l\u0131 kullanabilir.<\/p>\n<p>Ve para s\u0131zd\u0131rma s\u00f6z konusu oldu\u011funda, fidye yaz\u0131l\u0131m\u0131n\u0131 da dikkate almal\u0131y\u0131z. Hesap sahibinin verilere eri\u015fimini engellemeden \u00f6nce bu vir\u00fcsler genellikle verileri <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-data-disclosure\/7655\/\" target=\"_blank\" rel=\"noopener\">\u00e7alar<\/a>. Bu t\u00fcr bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bir \u0130K bilgisayar\u0131na kurulursa, h\u0131rs\u0131zlar b\u00fcy\u00fck bir ki\u015fisel veri piyangosunu da kazanm\u0131\u015f olur.<\/p>\n<h3>Daha ikna edici BEC sald\u0131r\u0131lar\u0131 i\u00e7in bir dayanak noktas\u0131<\/h3>\n<p>Hata yapmalar\u0131 i\u00e7in her \u015feye inanan veya e\u011fitimsiz \u00e7al\u0131\u015fanlara g\u00fcvenmek risklidir. Daha zor ama daha etkili olan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/what-is-bec-attack\/7936\/\" target=\"_blank\" rel=\"noopener\">kurumsal e-posta gizlili\u011fi ihlali (BE\u0421)<\/a> sald\u0131r\u0131s\u0131 art\u0131k \u00f6nemli bir oyuncu. Bu t\u00fcr sald\u0131r\u0131lar, genellikle bir \u00e7al\u0131\u015fan\u0131n posta kutusunun kontrol\u00fcn\u00fc ele ge\u00e7irip meslekta\u015flar\u0131n\u0131 para transferi yapmaya veya gizli bilgileri iletmeye ikna etmeyi ama\u00e7lar. Siber su\u00e7lular\u0131n ba\u015far\u0131lar\u0131n\u0131 sa\u011flama almak i\u00e7in, talimatlar\u0131 dikkate al\u0131nacak birinin, genellikle bir y\u00f6neticinin, e-posta hesab\u0131n\u0131 ele ge\u00e7irmesi gerekir. Operasyonun aktif a\u015famas\u0131ndan \u00f6nce, istenilen niteliklere sahip y\u00fcksek r\u00fctbeli bir \u00e7al\u0131\u015fan\u0131n bulunmas\u0131 gibi uzun ve emek isteyen bir g\u00f6rev vard\u0131r. Ve bu noktada, bir \u0130K e-posta kutusu ger\u00e7ekten \u00e7ok i\u015fe yarayabilir.<\/p>\n<p>Bir yandan, yukar\u0131da belirtildi\u011fi gibi, bir kimlik av\u0131 e-postas\u0131 veya ba\u011flant\u0131s\u0131n\u0131 a\u00e7mas\u0131 i\u00e7in \u0130K\u2019y\u0131 tuza\u011fa d\u00fc\u015f\u00fcrmek daha kolayd\u0131r. \u00d6te yandan, \u015firket \u00e7al\u0131\u015fanlar\u0131n\u0131n insan kaynaklar\u0131ndan gelen bir e-postaya g\u00fcvenmesi muhtemeldir. \u0130K, ba\u015fvuru sahiplerinin \u00f6z ge\u00e7mi\u015flerini d\u00fczenli olarak birim ba\u015fkanlar\u0131na g\u00f6nderir. Elbette \u0130K, \u015firkete genel olarak \u015firket i\u00e7i belgeler de g\u00f6nderir. Bu durum da, ele ge\u00e7irilmi\u015f bir \u0130K e-posta hesab\u0131n\u0131, bir BE\u0421 sald\u0131r\u0131s\u0131 ba\u015flang\u0131c\u0131 <em>ve<\/em> kurumsal a\u011f \u00fczerinden yanal hareket i\u00e7in etkili bir platform haline getirir.<\/p>\n<h2>\u0130K bilgisayarlar\u0131 nas\u0131l korunur?<\/h2>\n<p>Davetsiz misafirlerin, \u0130K biriminin bilgisayarlar\u0131na s\u0131zma ihtimalini en aza indirmek i\u00e7in a\u015fa\u011f\u0131daki ipu\u00e7lar\u0131na dikkat edilmesini \u00f6neriyoruz:<\/p>\n<ul>\n<li>M\u00fcmk\u00fcnse \u0130K bilgisayarlar\u0131n\u0131 ayr\u0131 bir alt a\u011fda di\u011ferlerinden ayr\u0131 tutun. Bir bilgisayar tehlikeye girdi\u011finde bile tehditlerin kurumsal a\u011fa yay\u0131lma olas\u0131l\u0131\u011f\u0131n\u0131 en aza indirin;<\/li>\n<li>Ki\u015fisel olarak tan\u0131mlanabilir bilgileri, i\u015f istasyonlar\u0131nda saklamay\u0131n. Bunun yerine, onu ayr\u0131 bir sunucuda veya daha da iyisi \u2013 bu t\u00fcr bilgiler i\u00e7in geli\u015ftirilmi\u015f ve \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulay\u0131c\u0131 ile korunan bir sistemde saklay\u0131n;<\/li>\n<li>\u0130K uzmanlar\u0131n\u0131n \u015firket i\u00e7in <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">siber g\u00fcvenlik fark\u0131ndal\u0131k e\u011fitimi<\/a> ile ilgili tavsiyelerine uyun ve onlar\u0131 bu e\u011fitimde ilk s\u0131raya koyun;<\/li>\n<li>\u0130K temsilcilerini, ba\u015fvuru sahipleri taraf\u0131ndan g\u00f6nderilen dosyalar\u0131n formatlar\u0131na dikkat etmeleri konusunda uyar\u0131n. \u0130\u015fe al\u0131m uzmanlar\u0131, y\u00fcr\u00fct\u00fclebilir bir dosyay\u0131 tespit edebilmeli ve onu a\u00e7mamas\u0131 gerekti\u011finin bilincinde olmal\u0131. Tercihen, \u00f6z ge\u00e7mi\u015fler ve \u00e7al\u0131\u015fma \u00f6rnekleri i\u00e7in kabul edilebilir dosya formatlar\u0131n\u0131n bir listesini birlikte haz\u0131rlay\u0131n. Bu bilgileri de ger\u00e7ek ba\u015fvuru sahipleri i\u00e7in listelerinize ekleyin.<\/li>\n<\/ul>\n<p>Son olarak, temel g\u00fcvenlik uygulamalar\u0131na uyun: \u0130K bilgisayarlar\u0131ndaki yaz\u0131l\u0131m\u0131 zaman\u0131nda g\u00fcncelleyin. Kat\u0131 ve takibi kolay bir parola politikas\u0131 uygulay\u0131n (\u015firket i\u00e7i kaynaklar i\u00e7in zay\u0131f veya yinelenen parolalar kullanmay\u0131n; t\u00fcm parolalar\u0131 d\u00fczenli olarak de\u011fi\u015ftirin). Her makineye, yeni tehditlere an\u0131nda yan\u0131t veren ve yaz\u0131l\u0131mdaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanma giri\u015fimlerini belirleyen <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a> kurun.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>\u0130nsan kaynaklar\u0131ndaki bilgisayarlar neden \u00f6zellikle savunmas\u0131zd\u0131r ve nas\u0131l korunur? <\/p>\n","protected":false},"author":700,"featured_media":9286,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2019,1921,2358,1074,686],"class_list":{"0":"post-9285","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-bec","10":"tag-e-posta","11":"tag-ik","12":"tag-kimlik-avi","13":"tag-kisisel-veri"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hr-related-threats\/9285\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hr-related-threats\/22468\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hr-related-threats\/17958\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hr-related-threats\/24173\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hr-related-threats\/22250\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hr-related-threats\/20944\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hr-related-threats\/24612\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hr-related-threats\/23820\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hr-related-threats\/29990\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hr-related-threats\/38614\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hr-related-threats\/16327\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hr-related-threats\/16915\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hr-related-threats\/14437\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hr-related-threats\/26153\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hr-related-threats\/29955\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/hr-related-threats\/26645\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hr-related-threats\/23473\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hr-related-threats\/28848\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hr-related-threats\/28654\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/e-posta\/","name":"e-posta"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9285"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9285\/revisions"}],"predecessor-version":[{"id":9287,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9285\/revisions\/9287"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9286"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}