{"id":8061,"date":"2022-02-18T13:47:24","date_gmt":"2022-02-18T10:47:24","guid":{"rendered":"https:\/\/www.inforte.com\/?p=8061"},"modified":"2022-02-18T13:47:51","modified_gmt":"2022-02-18T10:47:51","slug":"siber-hijyene-dikkat","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/siber-hijyene-dikkat\/","title":{"rendered":"Siber Hijyene Dikkat!"},"content":{"rendered":"<p>Siber hijyen, bilgisayar ve di\u011fer cihaz kullan\u0131c\u0131lar\u0131n\u0131n sistem sa\u011fl\u0131\u011f\u0131n\u0131 korumak ve \u00e7evrimi\u00e7i g\u00fcvenli\u011fi art\u0131rmak ad\u0131na uygulad\u0131klar\u0131 baz\u0131 pratiklere ve ad\u0131mlara bir referanst\u0131r. Bu uygulamalar genellikle kimli\u011fin ve \u00e7al\u0131nabilecek veya bozulabilecek di\u011fer ayr\u0131nt\u0131lar\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in rutinin bir par\u00e7as\u0131d\u0131r. Fiziksel hijyen gibi, siber hijyen de do\u011fal bozulmalar\u0131 ve yayg\u0131n tehditleri \u00f6nlemek i\u00e7in d\u00fczenli olarak ger\u00e7ekle\u015ftirilir.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u201cSiber Hijyenin Faydalar\u0131\u201d<\/strong><\/p>\n<p>Siber hijyen, bireylere ve i\u015fletmelere bir\u00e7ok y\u00f6nden yard\u0131mc\u0131 olur. \u00d6rne\u011fin, iyi bir siber hijyen, Equifax&#8217;taki k\u00f6t\u00fc \u015f\u00f6hretli veri ihlalini \u00f6nlemi\u015f ve \u015firketin ba\u015f\u0131na gelebilecek milyonlarca dolarl\u0131k kayb\u0131 \u00f6nlemi\u015f ve itibar\u0131n\u0131 kurtarm\u0131\u015f olabilir. Ayr\u0131ca, COVID-19 salg\u0131n\u0131 gibi bir halk sa\u011fl\u0131\u011f\u0131 krizi s\u0131ras\u0131nda uzaktan \u00e7al\u0131\u015fan insanlara daha fazla g\u00f6n\u00fcl rahatl\u0131\u011f\u0131 sa\u011flayabilir. Siber hijyen, bilgisayar korsanlar\u0131n\u0131n g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanma riskini azaltarak a\u015fa\u011f\u0131daki konularda ki\u015fi ve kurumlara yard\u0131mc\u0131 olur:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Bir i\u015fletmenin verilerini ve m\u00fc\u015fteri bilgilerini koruma,<\/li>\n<li>Cihazlar\u0131n ve bilgisayarlar\u0131n sorunsuz \u00e7al\u0131\u015fmas\u0131n\u0131 sa\u011flama,<\/li>\n<li>Fidye yaz\u0131l\u0131mlar\u0131na ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 koruma,<\/li>\n<li>Kimlik av\u0131 giri\u015fimlerinden ve di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 giri\u015fimlerden ka\u00e7\u0131nma,<\/li>\n<li>Eski \u00e7al\u0131\u015fanlar\u0131n vb. eski y\u00f6netici ayr\u0131cal\u0131klar\u0131n\u0131 belirleme ve kontrol etme,<\/li>\n<li>Y\u00f6netilmeyen varl\u0131klar\u0131 bularak tan\u0131mlama,<\/li>\n<li>Bir sistemde yetkisiz yaz\u0131l\u0131mlar\u0131 bulma,<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>\u0130\u015fletmeler veya bireyler siber hijyeni ihmal ettiklerinde her t\u00fcrl\u00fc sorunla kar\u015f\u0131la\u015fabilirler. Bak\u0131m, yaz\u0131l\u0131mlar\u0131n ve bilgisayarlar\u0131n etkin bir \u015fekilde \u00e7al\u0131\u015fmas\u0131na ve bozulma veya bilgisayar korsanl\u0131\u011f\u0131 nedeniyle veri kayb\u0131 ya\u015fama ve yanl\u0131\u015f yerle\u015ftirilmi\u015f veriler gibi daha ciddi sorunlar\u0131 \u00f6nlemesine olanak tan\u0131r.<\/p>\n<p>Siber hijyen, kullan\u0131c\u0131lara, onlar\u0131n \u00e7evrimi\u00e7i g\u00fcvenliklerini s\u00fcrd\u00fcrmeye ve geli\u015ftirmeye y\u00f6nelik ki\u015fisel uygulamalar\u0131na odaklan\u0131r. Bu uygulamalar genellikle; kimli\u011fin ve \u00e7al\u0131nabilecek \/ bozulabilecek di\u011fer ayr\u0131nt\u0131lar\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in bir rutinin par\u00e7as\u0131d\u0131r. Ancak do\u011fal olarak, belirli bir kurulu\u015fun t\u00fcm bireyleri sorumlu siber hijyen davran\u0131\u015f\u0131 uygularsa, t\u00fcm kurulu\u015fun siber sa\u011fl\u0131\u011f\u0131 da iyile\u015fir. B\u00f6ylece bireysel ve kurumsal siber g\u00fcvenlik birbiriyle ba\u011flant\u0131l\u0131d\u0131r.<\/p>\n<p>Kurulu\u015flar, siber hijyen konusunda en iyi uygulamalar\u0131 benimseyerek sistemlerinin siber g\u00fcvenli\u011fini daha iyi sahiplenebilir ve a\u011flar\u0131n\u0131 bilgisayar korsanlar\u0131ndan korumak i\u00e7in her bireye bir rol verebilir. Siber g\u00fcvenlikle ilgili daha bilin\u00e7li olmak ve sa\u011fl\u0131kl\u0131 siber hijyen uygulamak, ihtiya\u00e7 duydu\u011funuzda i\u015finizi veya idari s\u00fcreklili\u011finizi koruman\u0131za yard\u0131mc\u0131 olacakt\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u201cNeler Yapmal\u0131y\u0131z?\u201d<\/strong><\/p>\n<p>\u00d6ncelikle, bir kurumda birden fazla kullan\u0131c\u0131 varsa; bu uygulamalar, a\u011fa eri\u015fimi olan herkes taraf\u0131ndan izlenecek bir dizi politikada belgelenmelidir.<\/p>\n<p><em>Bir siber hijyen politikas\u0131na dahil edilmesi gereken tipik \u00f6\u011feler \u015funlard\u0131r:<\/em><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Parola De\u011fi\u015fiklikleri: D\u00fczenli olarak de\u011fi\u015ftirilen karma\u015f\u0131k parolalar, bir\u00e7ok k\u00f6t\u00fc ama\u00e7l\u0131 giri\u015fimi \u00f6nleyebilir ve siber g\u00fcvenli\u011fi koruyabilir.<\/li>\n<li>Yaz\u0131l\u0131m G\u00fcncellemeleri: Kulland\u0131\u011f\u0131n\u0131z yaz\u0131l\u0131m\u0131 g\u00fcncellemek veya belki de daha iyi s\u00fcr\u00fcmler almak, d\u00fczenli hijyen incelemenizin bir par\u00e7as\u0131 olmal\u0131d\u0131r.<\/li>\n<li>Donan\u0131m G\u00fcncellemeleri: Performans\u0131 korumak ve sorunlar\u0131 \u00f6nlemek i\u00e7in daha eski bilgisayarlar\u0131n ve ak\u0131ll\u0131 telefonlar\u0131n g\u00fcncellenmesi gerekebilir.<\/li>\n<li>Yeni Y\u00fcklemeleri Y\u00f6netme: T\u00fcm donan\u0131m ve yaz\u0131l\u0131mlar\u0131n g\u00fcncel bir envanterini tutmak i\u00e7in her yeni y\u00fckleme d\u00fczg\u00fcn bir \u015fekilde yap\u0131lmal\u0131 ve belgelenmelidir.<\/li>\n<li>Kullan\u0131c\u0131lar\u0131 S\u0131n\u0131rlama: Yaln\u0131zca programlara y\u00f6netici d\u00fczeyinde eri\u015fime ihtiya\u00e7 duyanlar\u0131n eri\u015fimi olmal\u0131d\u0131r. Di\u011fer kullan\u0131c\u0131lar\u0131n s\u0131n\u0131rl\u0131 yetenekleri olmal\u0131d\u0131r.<\/li>\n<li>Verileri Yedekleme: T\u00fcm veriler ikincil bir kayna\u011fa (yani sabit s\u00fcr\u00fcc\u00fc, bulut depolama) yedeklenmelidir. Bu, bir ihlal veya ar\u0131za durumunda t\u00fcm verilerin genel g\u00fcvenli\u011fini sa\u011flayacakt\u0131r.<\/li>\n<li>Siber G\u00fcvenlik \u00c7er\u00e7evesi Kullanma: \u0130\u015fletmeler, g\u00fcvenli\u011fi sa\u011flamak i\u00e7in daha geli\u015fmi\u015f bir sistemi (\u00f6rn. NIST \u00e7er\u00e7evesi) g\u00f6zden ge\u00e7irmek ve uygulamak isteyebilir.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Politika olu\u015fturulduktan sonra, her \u00f6\u011fe i\u00e7in rutin uygun zaman dilimlerine ayarlanmal\u0131d\u0131r. \u00d6rne\u011fin, parolalar\u0131n her 30 g\u00fcnde bir de\u011fi\u015ftirilmesi veya haftada en az bir kez g\u00fcncellemelerin kontrol edilmesi yerinde ayarlanabilir. Bunu yapmak, t\u00fcm donan\u0131m ve yaz\u0131l\u0131m a\u011f\u0131n\u0131z\u0131n s\u00fcrekli siber hijyenini sa\u011flayacakt\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<p>Kapsaml\u0131 siber hijyen prosed\u00fcrleri geli\u015ftirmek, g\u00fcn\u00fcm\u00fcz i\u015fletmeleri i\u00e7in bir zorunluluktur. Sa\u011flam, kurumsal \u00e7apta g\u00fcvenlik uygulamalar\u0131yla birlikte ger\u00e7ekle\u015ftirildi\u011finde, sa\u011flam siber hijyen uygulamalar\u0131, modern kurulu\u015flar i\u00e7in sa\u011flam bir g\u00fcvenlik duru\u015funun korunmas\u0131na yard\u0131mc\u0131 olur. Detayl\u0131 bilgi: www.inforte.com.tr<\/p>\n<p><u>\u00a0<\/u><\/p>","protected":false},"excerpt":{"rendered":"<p>Siber hijyen, bilgisayar ve di\u011fer cihaz kullan\u0131c\u0131lar\u0131n\u0131n sistem sa\u011fl\u0131\u011f\u0131n\u0131 korumak ve \u00e7evrimi\u00e7i g\u00fcvenli\u011fi art\u0131rmak ad\u0131na uygulad\u0131klar\u0131 baz\u0131 pratiklere ve ad\u0131mlara bir referanst\u0131r. Bu uygulamalar genellikle kimli\u011fin ve \u00e7al\u0131nabilecek veya bozulabilecek di\u011fer ayr\u0131nt\u0131lar\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in rutinin bir par\u00e7as\u0131d\u0131r. Fiziksel hijyen gibi, siber hijyen de do\u011fal&#8230;<\/p>","protected":false},"author":2,"featured_media":8062,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[],"class_list":["post-8061","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Siber Hijyene Dikkat! - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/siber-hijyene-dikkat\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber Hijyene Dikkat! - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"Siber hijyen, bilgisayar ve di\u011fer cihaz kullan\u0131c\u0131lar\u0131n\u0131n sistem sa\u011fl\u0131\u011f\u0131n\u0131 korumak ve \u00e7evrimi\u00e7i g\u00fcvenli\u011fi art\u0131rmak ad\u0131na uygulad\u0131klar\u0131 baz\u0131 pratiklere ve ad\u0131mlara bir referanst\u0131r. Bu uygulamalar genellikle kimli\u011fin ve \u00e7al\u0131nabilecek veya bozulabilecek di\u011fer ayr\u0131nt\u0131lar\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in rutinin bir par\u00e7as\u0131d\u0131r. Fiziksel hijyen gibi, siber hijyen de do\u011fal...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/siber-hijyene-dikkat\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-18T10:47:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-18T10:47:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"979\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"Siber Hijyene Dikkat!\",\"datePublished\":\"2022-02-18T10:47:24+00:00\",\"dateModified\":\"2022-02-18T10:47:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/\"},\"wordCount\":853,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg\",\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/\",\"url\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/\",\"name\":\"Siber Hijyene Dikkat! - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg\",\"datePublished\":\"2022-02-18T10:47:24+00:00\",\"dateModified\":\"2022-02-18T10:47:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg\",\"width\":2560,\"height\":979},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Siber Hijyene Dikkat!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber Hijyene Dikkat! - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/siber-hijyene-dikkat\/","og_locale":"en_GB","og_type":"article","og_title":"Siber Hijyene Dikkat! - Inforte Bili\u015fim A.\u015e.","og_description":"Siber hijyen, bilgisayar ve di\u011fer cihaz kullan\u0131c\u0131lar\u0131n\u0131n sistem sa\u011fl\u0131\u011f\u0131n\u0131 korumak ve \u00e7evrimi\u00e7i g\u00fcvenli\u011fi art\u0131rmak ad\u0131na uygulad\u0131klar\u0131 baz\u0131 pratiklere ve ad\u0131mlara bir referanst\u0131r. Bu uygulamalar genellikle kimli\u011fin ve \u00e7al\u0131nabilecek veya bozulabilecek di\u011fer ayr\u0131nt\u0131lar\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in rutinin bir par\u00e7as\u0131d\u0131r. Fiziksel hijyen gibi, siber hijyen de do\u011fal...","og_url":"https:\/\/www.inforte.com\/en\/siber-hijyene-dikkat\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2022-02-18T10:47:24+00:00","article_modified_time":"2022-02-18T10:47:51+00:00","og_image":[{"width":2560,"height":979,"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg","type":"image\/jpeg"}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"Siber Hijyene Dikkat!","datePublished":"2022-02-18T10:47:24+00:00","dateModified":"2022-02-18T10:47:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/"},"wordCount":853,"commentCount":0,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg","articleSection":["Inforte Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/","url":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/","name":"Siber Hijyene Dikkat! - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg","datePublished":"2022-02-18T10:47:24+00:00","dateModified":"2022-02-18T10:47:51+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/siber-hijyene-dikkat\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/02\/Cyber-security.jpg","width":2560,"height":979},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/siber-hijyene-dikkat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"Siber Hijyene Dikkat!"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8061"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=8061"}],"version-history":[{"count":2,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8061\/revisions"}],"predecessor-version":[{"id":8064,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8061\/revisions\/8064"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media\/8062"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=8061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=8061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=8061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}