{"id":12094,"date":"2026-04-22T08:31:53","date_gmt":"2026-04-22T08:31:53","guid":{"rendered":"https:\/\/busondakika.com.tr\/?p=12094"},"modified":"2026-04-22T08:31:54","modified_gmt":"2026-04-22T08:31:54","slug":"kaspersky-arastirmasi-siber-guvenlik-politikalari-ile-calisan-davranislari-arasindaki-ucurum-derinlesiyor","status":"publish","type":"post","link":"https:\/\/busondakika.com.tr\/?p=12094","title":{"rendered":"Kaspersky Ara\u015ft\u0131rmas\u0131: Siber G\u00fcvenlik Politikalar\u0131 ile \u00c7al\u0131\u015fan Davran\u0131\u015flar\u0131 Aras\u0131ndaki U\u00e7urum Derinle\u015fiyor"},"content":{"rendered":"<p> Kaspersky taraf\u0131ndan ger\u00e7ekle\u015ftirilen \u201c<em>\u0130\u015f Yerinde Siber G\u00fcvenlik: \u00c7al\u0131\u015fan Bilgi ve Davran\u0131\u015flar\u0131<\/em>\u201d ba\u015fl\u0131kl\u0131 g\u00fcncel ara\u015ft\u0131rma, T\u00fcrkiye\u2019deki profesyonellerin %52\u2019sinin \u015firketlerindeki siber g\u00fcvenlik kurallar\u0131n\u0131 ya a\u015f\u0131r\u0131 k\u0131s\u0131tlay\u0131c\u0131 ya da tam olarak uygun olmayan kurallar olarak g\u00f6rd\u00fc\u011f\u00fcn\u00fc ortaya koydu. Kat\u0131l\u0131mc\u0131lar\u0131n %6\u2019s\u0131 ise kurumlar\u0131nda herhangi bir siber g\u00fcvenlik kural\u0131 bulunmad\u0131\u011f\u0131n\u0131 veya mevcut kurallardan haberdar olmad\u0131klar\u0131n\u0131 belirtti. Bu sonu\u00e7lar, kurumsal siber g\u00fcvenlik politikalar\u0131 ile \u00e7al\u0131\u015fanlar\u0131n bu kurallara olan ba\u011fl\u0131l\u0131\u011f\u0131 aras\u0131ndaki kopuklu\u011fu g\u00f6zler \u00f6n\u00fcne seriyor. Ay\u0131n\u0131 zamanda Shadow IT ve y\u00f6netilmeyen cihaz kullan\u0131m\u0131ndan kaynaklanan risklerin alt\u0131n\u0131 \u00e7iziyor.<\/p>\n<p>BT departman\u0131n\u0131n denetimi d\u0131\u015f\u0131nda kullan\u0131lan yetkisiz yaz\u0131l\u0131m, cihaz veya hizmetler olarak tan\u0131mlanan Shadow IT, g\u00fcn\u00fcm\u00fczde kritik bir i\u015f riski haline gelmi\u015f durumda. \u00c7o\u011fu zaman \u00e7al\u0131\u015fanlar\u0131n verimlilik aray\u0131\u015f\u0131yla ortaya \u00e7\u0131kan bu durum, BT birimleri i\u00e7in ciddi k\u00f6r noktalar yarat\u0131yor. Hibrit \u00e7al\u0131\u015fma modellerinin y\u00fckseli\u015fi, bulut tabanl\u0131 ara\u00e7lara olan ba\u011f\u0131ml\u0131l\u0131\u011f\u0131n artmas\u0131 ve yapay zeka ara\u00e7lar\u0131n\u0131n yayg\u0131nla\u015fmas\u0131 bu e\u011filimi daha da h\u0131zland\u0131rd\u0131. G\u00fc\u00e7l\u00fc bir siber g\u00fcvenlik y\u00f6netimi ve denetimi olmaks\u0131z\u0131n kurumlar; fidye yaz\u0131l\u0131m\u0131 (ransomware) sald\u0131r\u0131lar\u0131, veri s\u0131z\u0131nt\u0131lar\u0131 ve yasal yapt\u0131r\u0131mlar gibi tehditlerle kar\u015f\u0131 kar\u015f\u0131ya kal\u0131yor.<\/p>\n<p>T\u00fcrkiye\u2019de ara\u015ft\u0131rmaya kat\u0131lanlar\u0131n %17\u2019si, \u015firketlerinde kurumsal olmayan cihazlar\u0131n kullan\u0131m\u0131na y\u00f6nelik herhangi bir politika bulunmad\u0131\u011f\u0131n\u0131 ifade etti. \u00c7al\u0131\u015fanlar\u0131n %35,5\u2019i, bireysel d\u00fczeyde (t\u00fcketici tipi yaz\u0131l\u0131mlar dahil) bir siber g\u00fcvenlik korumas\u0131na sahip olmak kayd\u0131yla i\u015fle ilgili verilere eri\u015fmek i\u00e7in kendi cihazlar\u0131n\u0131 kullanabildiklerini belirtti. Olumlu bir tablo \u00e7izen %16\u2019l\u0131k kesim, kendi cihazlar\u0131n\u0131 ancak s\u0131k\u0131 kurumsal BT g\u00fcvenlik denetimlerinden ge\u00e7tikten sonra kullanabildiklerini s\u00f6ylerken; kat\u0131l\u0131mc\u0131lar\u0131n %31,5\u2019i i\u015f ama\u00e7l\u0131 olarak yaln\u0131zca BT birimi taraf\u0131ndan tahsis edilen cihazlar\u0131n kullan\u0131m\u0131na izin verildi\u011fini bildirdi.<\/p>\n<p>Kurumsal cihazlara BT onay\u0131 olmaks\u0131z\u0131n yaz\u0131l\u0131m y\u00fckleme yetkileri konusunda ise durumun daha kontroll\u00fc oldu\u011fu g\u00f6r\u00fcl\u00fcyor. Kat\u0131l\u0131mc\u0131lar\u0131n %48\u2019i yaz\u0131l\u0131m y\u00fckleme yetkisinin yaln\u0131zca BT uzmanlar\u0131nda oldu\u011funu, %37\u2019si ise bu yetkinin sadece \u00fcst y\u00f6netim veya yetkilendirilmi\u015f kullan\u0131c\u0131larda bulundu\u011funu bildirdi. \u00c7al\u0131\u015fanlar\u0131n %11\u2019i yaln\u0131zca BT ekibi taraf\u0131ndan onaylanm\u0131\u015f yaz\u0131l\u0131mlar\u0131 y\u00fckleyebilirken, %4\u2019l\u00fck bir kesim herhangi bir onay almadan herhangi bir yaz\u0131l\u0131m\u0131 y\u00fckleyebildiklerini ifade etti.\u00a0<\/p>\n<p>\u00d6te yandan, profesyonellerin %13\u2019\u00fc ge\u00e7ti\u011fimiz y\u0131l i\u00e7inde i\u015f cihazlar\u0131na BT denetimi olmaks\u0131z\u0131n yaz\u0131l\u0131m y\u00fcklediklerini belirtti. Bu durum, kurumlar\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131na, uyumluluk risklerine ve veri ihlallerine maruz b\u0131rakan Shadow IT sorununun devam etti\u011fini g\u00f6steriyor.<\/p>\n<p><strong>Kaspersky META B\u00f6lgesi Genel M\u00fcd\u00fcr\u00fc Toufic Derbass<\/strong>\u00a0konuyla ilgili \u015fu de\u011ferlendirmede bulundu: \u201c<em>Shadow IT art\u0131k operasyonel risklerin ana unsurlar\u0131ndan biri haline geldi. Her be\u015f \u00e7al\u0131\u015fanlar\u0131n \u00f6nemli bir k\u0131sm\u0131n\u0131n BT denetimi olmadan yaz\u0131l\u0131m y\u00fcklemesi, politika taraf\u0131nda \u00f6nemli bir bo\u015fluk oldu\u011funa i\u015faret ediyor. Pek \u00e7ok kurulu\u015fun zaten g\u00fcvenlik politikalar\u0131 mevcut; ancak \u00e7al\u0131\u015fanlar\u0131n bu politikalar\u0131 nas\u0131l alg\u0131lad\u0131\u011f\u0131 da en az uygulama kadar \u00f6nemli. Kurumlar\u0131n yaln\u0131zca k\u0131s\u0131tlay\u0131c\u0131 kontrollerle ilerlemek yerine, teknoloji ile \u00e7al\u0131\u015fan fark\u0131ndal\u0131\u011f\u0131n\u0131 ve sorumlu kullan\u0131m al\u0131\u015fkanl\u0131klar\u0131n\u0131 bir araya getiren, kullan\u0131c\u0131 odakl\u0131 ve ak\u0131ll\u0131 siber g\u00fcvenlik stratejilerine y\u00f6nelmesi gerekiyor<\/em>.\u201d<\/p>\n<p>Kaspersky, kurumlar\u0131n savunmalar\u0131n\u0131 g\u00fc\u00e7lendirmeleri i\u00e7in \u015funlar\u0131 \u00f6neriyor:<\/p>\n<ul type=\"disc\">\n<li>Kurumsal verilere eri\u015fen t\u00fcm yetkisiz yaz\u0131l\u0131mlar\u0131, bulut hizmetlerini ve ki\u015fisel cihazlar\u0131 belirlemek i\u00e7in bir Shadow IT denetimi ger\u00e7ekle\u015ftirin.<\/li>\n<li>Onaylanmam\u0131\u015f uygulama kullan\u0131m\u0131n\u0131 ve cihaz davran\u0131\u015flar\u0131n\u0131 izleyebilmek i\u00e7in Kaspersky Next \u00fcr\u00fcn ailesinin EDR ve XDR katmanlar\u0131 gibi g\u00fc\u00e7l\u00fc izleme ve siber g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini devreye al\u0131n.<\/li>\n<li>Ki\u015fisel cihaz kullan\u0131m\u0131na (BYOD) izin veriliyorsa, minimum g\u00fcvenlik gereksinimlerini net bir \u015fekilde tan\u0131mlay\u0131n ve bunlar\u0131 Mobil Cihaz Y\u00f6netimi (MDM) veya u\u00e7 nokta y\u00f6netim ara\u00e7lar\u0131yla denetleyin.<\/li>\n<li>Kullan\u0131c\u0131 dostu siber g\u00fcvenlik politikalar\u0131n\u0131z\u0131, ger\u00e7ek hayattaki riskleri ve bunlardan ka\u00e7\u0131nma yollar\u0131n\u0131 g\u00f6steren e\u011fitimlerle destekleyin. Bu noktada Kaspersky Automated Security Awareness Platform gibi \u00e7\u00f6z\u00fcmlerden faydalanabilirsiniz.<\/li>\n<\/ul>\n<p>Kaspersky uzmanlar\u0131 \u00e7al\u0131\u015fanlar i\u00e7in \u015fu tavsiyelerde bulunuyor:<\/p>\n<ul type=\"disc\">\n<li>\u015eirketinizin siber g\u00fcvenlik politikalar\u0131n\u0131 tam olarak anlad\u0131\u011f\u0131n\u0131zdan emin olun; net olmayan noktalar\u0131 BT biriminize dan\u0131\u015f\u0131n.<\/li>\n<li>Yaln\u0131zca BT departman\u0131 taraf\u0131ndan onaylanm\u0131\u015f uygulamalar\u0131 kullan\u0131n ve \u00f6zel bir kayna\u011fa ihtiya\u00e7 duydu\u011funuzda resmi talepte bulunun.<\/li>\n<li>\u0130\u015f i\u00e7in sadece yetkilendirilmi\u015f cihazlar\u0131 kullan\u0131n. Ki\u015fisel cihaz kullan\u0131m\u0131na izin veriliyorsa, cihaz\u0131n t\u00fcm g\u00fcvenlik standartlar\u0131n\u0131 kar\u015f\u0131lad\u0131\u011f\u0131ndan ve gerekli koruma yaz\u0131l\u0131mlar\u0131na sahip oldu\u011fundan emin olun.<\/li>\n<li>\u0130\u015f dosyalar\u0131n\u0131 yaln\u0131zca kurum taraf\u0131ndan onaylanm\u0131\u015f platformlar \u00fczerinden payla\u015f\u0131n ve depolay\u0131n.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Kaynak: (BYZHA) Beyaz Haber Ajans\u0131<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky taraf\u0131ndan ger\u00e7ekle\u015ftirilen \u201c\u0130\u015f Yerinde Siber G\u00fcvenlik: \u00c7al\u0131\u015fan Bilgi ve Davran\u0131\u015flar\u0131\u201d ba\u015fl\u0131kl\u0131 g\u00fcncel ara\u015ft\u0131rma, T\u00fcrkiye\u2019deki profesyonellerin %52\u2019sinin \u015firketlerindeki siber g\u00fcvenlik kurallar\u0131n\u0131 ya a\u015f\u0131r\u0131 k\u0131s\u0131tlay\u0131c\u0131 ya da tam olarak uygun olmayan kurallar olarak g\u00f6rd\u00fc\u011f\u00fcn\u00fc ortaya koydu.<\/p>\n","protected":false},"author":1,"featured_media":12095,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-12094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji"],"_links":{"self":[{"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/12094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12094"}],"version-history":[{"count":1,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/12094\/revisions"}],"predecessor-version":[{"id":12096,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/12094\/revisions\/12096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/media\/12095"}],"wp:attachment":[{"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}