Demirci ve Demirci https://demircivedemirci.com/ "Sadece Yazılım" Sun, 17 May 2020 12:03:28 +0000 tr hourly 1 https://i0.wp.com/demircivedemirci.com/wp-content/uploads/2020/04/cropped-Demirci-ve-Demirci-Logo-512x512-1.png?fit=32%2C32&ssl=1 Demirci ve Demirci https://demircivedemirci.com/ 32 32 175355130 Uzaktan Erişim Güvenliğini Artırmak için 5 İpucu https://demircivedemirci.com/uzaktan-erisim-guvenligini-artirmak-icin-5-ipucu/?utm_source=rss&utm_medium=rss&utm_campaign=uzaktan-erisim-guvenligini-artirmak-icin-5-ipucu Mon, 06 Apr 2020 09:30:40 +0000 http://demircivedemirci.com/index.php/2019/10/05/how-to-choose-perfect-gadgets/ Millions of workers are now working from home. For anyone in IT or security, the move towards remote access creates a new set of challenges and security threats. The most common way to offer remote access is through VPN. But this can create speed issues. VPNs typically consume up to 20% of a company’s bandwidth. […]

The post Uzaktan Erişim Güvenliğini Artırmak için 5 İpucu appeared first on Demirci ve Demirci.

]]>

Millions of workers are now working from home. For anyone in IT or security, the move towards remote access creates a new set of challenges and security threats.

The most common way to offer remote access is through VPN. But this can create speed issues. VPNs typically consume up to 20% of a company’s bandwidth. With everyone connecting to VPN this will create bottlenecks. Most companies have likely added capacity to help address this, but remote workers should expect that systems will run slower over VPN.

Security is another big concern. While VPNs are a good option for office workers, they can still be insecure and unreliable. VPN opens access to the whole network instead of several resources. With so many people working off VPNs, this increases security risks by creating new entry points for malicious actors to execute malware, ransomware, phishing and brute force attacks. Employees and companies can expect an increase in attacks as bad actors dial-up their threats.

As companies (and their IT departments) work to ensure remote access for workers and maintain security, keep these 5 tips in mind:

1. Update VPNs and Install Patches – If you haven’t already, make sure you have installed all updates and patches to your VPN network. Hackers have increased their attacks on VPN vulnerabilities.

2. Strong Passwords – This goes without saying but remote workers should have strong passwords that are regularly rotated. If your password policies don’t require regular rotation, you may want to update them or ask employees to rotate them every few weeks – especially while working from insecure home WiFi networks.

3. Add Multifactor Authentication – many companies already use MFA and using it in conjunction with VPN adds another layer of security. If you are not using MFA, now is a good time to consider it. At its core, multifactor authentication provides an added access control that requires a user to present multiple pieces of evidence or identifiers (usually a one-time passcode) before granting access to company systems. With MFA, even if passwords are stolen, it’s unlikely that the hacker also has the phone and OTP generator.

4. Implement a Secure Gateway for IT Admins and Privileged Users – Not all remote users are the same. Most of your workers need access to email and a few other resources to perform their job. VPN with MFA works for these employees. But IT admins need access to your network and accounts, including Windows, Unix, AWS or Azure Instances, Mainframes, Cisco and Juniper Network Devices, Websites or Web Management Portals. VPNs are not designed for this level of privileged user. You need a Secure Gateway that brokers access using HTTPs to specific resources. This way you can use your existing identity provider such as Active Directory (AD), AzureAD, Office365, Google Authentication, etc, to access privileged accounts such as root or Administrator.  This also frees up speed by eliminating the need for VPNs for IT admins and privileged users.

5. Implement Principle of Least Privilege – Whether it’s general workers or IT admins, you want to implement the principle of least privilege. This ensures people only have access to the systems they need and no more.

XTAM Remote Employee Gateway

At Xton, we know these are challenging times and companies are continuously updating their business continuity plans. In an effort to help companies provide secure remote access to their privileged users, the XTAM Remote Employee Gateway is free for new installations through June 1.

XTAM Remote Employee Gateway uses a modern architecture and is cloud-ready which makes it easy to set up quickly.  The goal is to help companies securely lock their systems behind their firewall and use a secure gateway to provide access to IT admins. The added benefit is that XTAM also offers session monitoring, video recording, and notifications required for auditing and compliance. Something that VPN cannot provide.

With a 10-minute download, companies can set up a secure gateway quickly, implement least privilege and have audit capabilities. You will also have peace of mind knowing that IT admins can access critical infrastructure security minimizing the risk of a breach.

The post Uzaktan Erişim Güvenliğini Artırmak için 5 İpucu appeared first on Demirci ve Demirci.

]]>
94
YouTube Videosu Nasıl Yapılır? https://demircivedemirci.com/youtube-videosu-nasil-yapilir/?utm_source=rss&utm_medium=rss&utm_campaign=youtube-videosu-nasil-yapilir Wed, 01 Apr 2020 08:11:00 +0000 http://demircivedemirci.com/index.php/2019/10/05/how-to-choose-perfect-gadgets-2/ It’s no secret that YouTube is the ultimate place to post video content. YouTube has over 1.9 billion monthly active users and they watch a billion hours of video every day. To put that in perspective, that’s over 114,000 years of video consumed EVERY DAY. Top YouTube content creators can make hundreds — if not […]

The post YouTube Videosu Nasıl Yapılır? appeared first on Demirci ve Demirci.

]]>
It’s no secret that YouTube is the ultimate place to post video content.

YouTube has over 1.9 billion monthly active users and they watch a billion hours of video every day. To put that in perspective, that’s over 114,000 years of video consumed EVERY DAY.

Top YouTube content creators can make hundreds — if not thousands — of dollars a day, but ironically, being successful and making money on YouTube has little to do with actually making a video.

Today I’m going to share with you techniques from some of the top YouTubers that show exactly what you should (and shouldn’t) do for YouTube content creation.

If you want to know how to start making YouTube videos, you’ll love this guide.

With a few simple steps, you’ll be creating content in no time!

Let’s go! https://www.techsmith.com/blog/make-youtube-video/

The post YouTube Videosu Nasıl Yapılır? appeared first on Demirci ve Demirci.

]]>
95
ZOOM Phone 5 farklı yöntem ile nasıl mobilite ve iş sürekliliği sağlar? https://demircivedemirci.com/zoom-phone-5-farkli-yontem-ile-nasil-mobilite-ve-is-surekliligi-saglar/?utm_source=rss&utm_medium=rss&utm_campaign=zoom-phone-5-farkli-yontem-ile-nasil-mobilite-ve-is-surekliligi-saglar Thu, 05 Mar 2020 11:27:13 +0000 http://demircivedemirci.com/index.php/2019/10/05/how-to-choose-perfect-gadgets-3/ Businesses relying on a legacy on-premise PBX as their primary business phone system face unique challenges now that employees are working remotely. Odds are, these employees were not able to take their office phone home. But legacy, on-premise phone systems by nature make supporting remote users difficult. Oftentimes there are limited options available for remote […]

The post ZOOM Phone 5 farklı yöntem ile nasıl mobilite ve iş sürekliliği sağlar? appeared first on Demirci ve Demirci.

]]>

Businesses relying on a legacy on-premise PBX as their primary business phone system face unique challenges now that employees are working remotely. Odds are, these employees were not able to take their office phone home.

But legacy, on-premise phone systems by nature make supporting remote users difficult. Oftentimes there are limited options available for remote administration, and support for end-user desktop and mobile apps leave much to be desired. When they are available, mobile applications often do not have as many features as the desktop system, which forces admins and users to change behaviors, or worse, give up altogether. 

Keeping an organization in sync and ensuring continuity requires consistent and reliable business communications. They are a lifeline for employees who must depend on their teams, customers, and partners scattered around the world to get work done.  

Here are five ways Zoom Phone ensures mobility, flexibility, and business continuity when your teams need it most https://blog.zoom.us/wordpress/2020/04/01/5-ways-zoom-phone-enables-mobility-business-continuity/

The post ZOOM Phone 5 farklı yöntem ile nasıl mobilite ve iş sürekliliği sağlar? appeared first on Demirci ve Demirci.

]]>
97