4. SERVİSNETCYBERSECURITY
4
This is perhaps one of the greatest obstacles we face today, with
so much technology and so many distractions. We’re listening to a video on
YouTube while writing an e-mail, when suddenly a chat prompt pops up and we
answer it.Then our smartphone vibrates in our pocket; just as soon as we
respond to that message, we’re back at our computer, logging on to Facebook.
Pretty soon thirty minutes have passed, and we’ve forgotten what the e-mail we
were writing was supposed to be about. (quoted by Ikigai)
INSIDETHREATS1: Harmless
4
6. SERVİSNETCYBERSECURITY
6
Çok fazla teknoloji ve dikkat dağıtıcı şeylere sahibiz. Bir e-posta
yazarkenYouTube’daki bir videoyu izliyoruz, aniden bir sohbet istemi belirdiğinde
cevap veriyoruz. Sonra akıllı telefonumuz cebimizde titreşiyor; ve bu sefer bir
WhatsApp mesaja cevap veriyoruz, sonrasında bilgisayarımıza dönüp Facebook’a
giriş yapıyoruz neler var diye ,yazdığımız e-posta yı unuttuk bile ?
İÇ TEHDİTLER,
ENZARARSIZ TEHDİTLERİÇERİDE!
6
IBM reports say 95% of successful security attacks are the result of human
error! Sometimes accidentally attacks come from inside by accidentally ;
such as unhappy employees, business partners, casual employees, and
consultants .
INSIDETHREATS2:TheMostHarmful!
8. SERVİSNETCYBERSECURITY
8
Reveals the difference
between productive
worker and non-
productive ones..
Solution :
D ATA L O S S P R E V E N T I O N
U S E R A C T I V I T Y A N A L I T I C S
• InsiderThreat Detection
• Employee Monitoring
• Audit and Compliance
• Privileged User Monitoring
• ITVendor Risk Management
• Anomaly Detection
• PCI (Payment Card Industry) Data Protection
• PHI (Protected Health Info) Data Protection