{"id":16412,"date":"2023-10-31T12:35:46","date_gmt":"2023-10-31T09:35:46","guid":{"rendered":"https:\/\/authtake.com\/?p=16412"},"modified":"2023-10-31T12:43:17","modified_gmt":"2023-10-31T09:43:17","slug":"there-is-always-more-in-identity-security-settling-for-less-increases-risks","status":"publish","type":"post","link":"https:\/\/authtake.com\/tr\/there-is-always-more-in-identity-security-settling-for-less-increases-risks\/","title":{"rendered":"Kimlik G\u00fcvenli\u011fi'nde Her Zaman \"Daha Fazlas\u0131\" Vard\u0131r, Daha Az\u0131na Raz\u0131 Olmak ise Riskleri Art\u0131r\u0131r."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"16412\" class=\"elementor elementor-16412\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a409bb elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-sticky-section-no\" data-id=\"2a409bb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-315c82a1\" data-id=\"315c82a1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61147d1c elementor-widget elementor-widget-text-editor\" data-id=\"61147d1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p>G\u00fcn\u00fcm\u00fczde, insanlar ger\u00e7ekten ihtiya\u00e7 duymad\u0131klar\u0131 bir\u00e7ok \u00fcr\u00fcn\u00fc talep edebiliyor. Pazarlaman\u0131n bunun \u00fczerindeki etkisi ne kadar b\u00fcy\u00fckse, \"daha fazla\" isteme iste\u011fi o kadar \u00f6nemli hale geldi. Yeni bir \u00fcr\u00fcn \u00e7\u0131kt\u0131\u011f\u0131nda, yaln\u0131zca bir y\u0131l ge\u00e7ti\u011fi halde daha yeni bir \u00fcr\u00fcn talep etmeye ba\u015flar\u0131z. T\u00fcm d\u00fcnyan\u0131n bildi\u011fi iPhone \u00f6rne\u011fini d\u00fc\u015f\u00fcnelim. Yeni iPhone modeli sat\u0131\u015fa \u00e7\u0131kt\u0131\u011f\u0131nda ma\u011fazalar\u0131n \u00f6n\u00fcnde olu\u015fan kuyruklar\u0131 hayal edelim. Ger\u00e7ekten bu insanlar\u0131n yeni bir iPhone'a ihtiyac\u0131 var m\u0131? Yoksa daha iyi bir kamera, daha iyi bir i\u015fletim sistemi, daha y\u00fcksek \u00e7\u00f6z\u00fcn\u00fcrl\u00fckler pe\u015finde ko\u015fmak, her zaman sahip oldu\u011fumuz bir al\u0131\u015fkanl\u0131\u011f\u0131n bir yans\u0131mas\u0131 m\u0131d\u0131r? Evet, tam olarak \u00f6yle. Bu \"doyumsuz\" gibi g\u00f6r\u00fcnen durum asl\u0131nda teknolojinin sunulan t\u00fcm faydalar\u0131n\u0131 en \u00fcst d\u00fczeyde elde etme iste\u011fimizi ortaya koyuyor.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Nowadays, people can demand many products that they don\u2019t actually need. The greater the impact of marketing on this, the more important the desire to have &#8220;more&#8221;. We are all familiar with people who start demanding a new product when it comes out, even though it&#8217;s only been a year since they bought it. Let\u2019s think about the example of the iPhone that the whole world knows. Let&#8217;s imagine the queues that formed in front of the stores on the day the new iPhone model goes on sale. Do all these people really need a new iPhone? Or is the pursuit of a better camera, a better operating system, higher resolutions a reflection of a habit we have always had? Yes, that&#8217;s exactly how it is. This situation, which seems to be &#8220;insatiable&#8221;, actually reveals our desire to take maximum level of all the benefits provided by technology.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p><b>Veri Payla\u015f\u0131m\u0131 ve Kimlik G\u00fcvenli\u011fi<\/b><\/p>\n<p>Teknolojik geli\u015fmeler, her ge\u00e7en g\u00fcn daha fazla veri payla\u015f\u0131m\u0131na neden oluyor. Ki\u015fisel veya kurumsal bilgilerimizi payla\u015ft\u0131\u011f\u0131m\u0131z her ortam, siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan b\u00fcy\u00fck riskler ta\u015f\u0131r.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>\"\u00dc\u00e7\u00fcnc\u00fc taraflarla veri payla\u015f\u0131m\u0131\" i\u00e7in genellikle a\u00e7\u0131k onay gerekse de, bu bilgi okunmadan kabul edildi\u011finde ki\u015fisel veri g\u00fcvenli\u011fi sa\u011flanamaz. Bu nedenle ki\u015fisel veya kurumsal veri g\u00fcvenli\u011fini sa\u011flamak, kimlik g\u00fcvenli\u011fini sa\u011flamak anlam\u0131na gelir. Bu ba\u011flamda, son y\u0131llarda kar\u015f\u0131la\u015ft\u0131\u011f\u0131m\u0131z parolas\u0131z kimlik do\u011frulama dijital d\u00f6n\u00fc\u015f\u00fcm\u00fcn bir par\u00e7as\u0131 haline gelmi\u015ftir. Kullan\u0131c\u0131lar taraf\u0131ndan kolayca unutulan veya payla\u015f\u0131lan parolalar, siber sald\u0131r\u0131lara neden olabilir.<\/p>\n<p><b>Kimlik G\u00fcvenli\u011fi Konusunda \"Daha Fazlas\u0131\"<\/b><\/p>\n<p>Yukar\u0131da bahsetti\u011fimiz siber sald\u0131r\u0131lar\u0131 \u00f6nlemek i\u00e7in al\u0131\u015f\u0131lagelmi\u015f \u015fifrelerinizi bir kenara b\u0131rakman\u0131z gerekiyor. Bu size garip gelebilir... Ancak maalesef, \u015fifrelerinizi olu\u015ftururken sizden istenen zorlu kriterler, \u015fifrelerinizin \u00e7al\u0131nmamas\u0131 anlam\u0131na gelmez. Sizin i\u00e7in geli\u015ftirilen AuthTake kimlik ve eri\u015fim y\u00f6netimi y\u00f6ntemleri, bireysel ve kurumsal uygulamalar\u0131n\u0131za g\u00fcvenli eri\u015fiminizi sa\u011flar.<\/p>\n<p><b>Parolas\u0131z Kimlik Do\u011frulama ve FIDO2 WebAuthn<\/b><\/p>\n<p>AuthTake taraf\u0131ndan sunulan paroals\u0131z kullan\u0131c\u0131 do\u011frulama y\u00f6ntemi, FIDO2 WebAuthn standard\u0131n\u0131 kullan\u0131r. \u015eimdi i\u015fleyi\u015fin nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131na bir g\u00f6z atal\u0131m. <a style=\"color:#0A5289; text-decoration:underline;\" href=\"https:\/\/authtake.com\/tr\/solutions-fido2-support\/\">FIDO2 WebAuthn,<\/a> Kullan\u0131c\u0131lar cihazlar\u0131ndan giri\u015f talep etti\u011finde, cihaz giri\u015f talebini AuthTake sunucusuna iletilir. Sunucu, bir Challenge mesaj\u0131 olu\u015fturur ve bunu cihaza g\u00f6nderir, cihaz da Challenge mesaj\u0131n\u0131 gizli anahtarla imzalar ve sunucuya geri g\u00f6nderir. AuthTake sunucular\u0131, imzal\u0131 mesaj\u0131n ge\u00e7erlili\u011fini kendi anahtar\u0131yla kar\u015f\u0131la\u015ft\u0131rarak giri\u015fi do\u011frular. Bu do\u011frulama s\u00fcreci s\u0131ras\u0131nda FIDO, kullan\u0131c\u0131dan biyometrik do\u011frulama iste\u011fi de talep eder. Bu \u015fekilde size g\u00fcvenli ve h\u0131zl\u0131 bir giri\u015f deneyimi sunar. Ayr\u0131ca do\u011frulamalar \u00e7evrimd\u0131\u015f\u0131 modda da devam edebilir ve kimlik g\u00fcvenli\u011finiz hi\u00e7bir zaman tehlikede olmaz.<\/p>\n<p>Parola ve kullan\u0131c\u0131 ad\u0131 ile giri\u015f yapmak do\u011frulama i\u00e7in bir ad\u0131m olarak kabul edilse de, parolas\u0131z kimlik do\u011frulama teknoloji taraf\u0131ndan size sunulan \"Daha Fazlas\u0131\"ndan biridir. Al\u0131\u015ft\u0131\u011f\u0131n\u0131z y\u00f6ntemlerle yetinmek, veri ve kimlik g\u00fcvenli\u011finizi tehlikeye atar, AuthTake'ten daha fazlas\u0131n\u0131 istemek ise siber g\u00fcvenli\u011finizi maksimize eder.<\/p>\n<p><!-- \/wp:paragraph -->\n\n<!-- wp:paragraph --><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f996ee1 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"f996ee1\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/authtake.com\/tr\/company-contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Bize Ula\u015f\u0131n<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>People are seen as beings who are insatiable and have endless desires. Is it a bad thing to always desire better working conditions, a better house, better relationships and more money? Having high goals has been a driving force that has led human beings to discover in the process. So, what happens if we tend to settle for what we have, even though we know we have better than what we have? Let&#8217;s consider this issue from an identity security perspective.\u00a0 Nowadays, people can demand many products that they don\u2019t actually need. The greater the impact of marketing on this, the more important the desire to have &#8220;more&#8221;. We are all familiar with people who start demanding a new product when it comes out, even though it&#8217;s only been a year since they bought it. Let\u2019s think about the example of the iPhone that the whole world knows. Let&#8217;s imagine the queues that formed in front of the stores on the day the new iPhone model goes on sale. Do all these people really need a new iPhone? Or is the pursuit of a better camera, a better operating system, higher resolutions a reflection of a habit we have always had? Yes, that&#8217;s exactly how it is. This situation, which seems to be &#8220;insatiable&#8221;, actually reveals our desire to take maximum level of all the benefits provided by technology.\u00a0 Data Sharing and Identity Security Technological developments cause more data sharing day by day. Every environment in which we share our personal or corporate information poses risks in terms of cyber security.\u00a0 Even though explicit consent is often required for &#8220;sharing data with third parties&#8221;, personal data security cannot be ensured in cases where this information is accepted without reading. Therefore, ensuring personal or corporate data security is about ensuring identity security. In this regard, passwordless authentication, which we have encountered in recent years, has already become a part of digital transformation. Passwords that can be easily forgotten or confused by users also lead up to cyberattacks. More in Identity Security To prevent the cyberattacks that we mentioned above, you need to leave aside your habitual passwords. We know this may seem strange to you&#8230; But unfortunately, the difficult criteria required from you when creating your passwords does not mean that your passwords cannot be stolen. AuthTake&#8217;s identity and access management methods developed for you make your access to your individual and corporate applications the most secure. Passwordless Authentication and FIDO2 WebAuthn The passwordless user authentication method offered by AuthTake is based on FIDO2 WebAuthn, which is an important standard for passwordless authentication. Now let&#8217;s look at how the process works&#8230; When users request login from their devices, the device transmits the login request to the AuthTake server. The server creates a Challenge message and sends it to the device and the device signs the Challenge message with the secret key and sends it back to the server. AuthTake servers verify the login by comparing the validity of the signed message with its own key. During this verification process, FIDO requests biometric verification from the user. In this way, it provides you with a safe and fast login experience. Additionally, authentications can continue in offline mode and your identity security is never at risk. While logging in with the password is considered a step for authentication, passwordless authentication is one of the &#8220;Mores&#8221; that technology offers you. While settling for the methods that you are accustomed to puts both your data and your identity security at risk, asking for more from AuthTake maximizes your cyber security. Contact Us<\/p>","protected":false},"author":4,"featured_media":16415,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[45],"tags":[],"_links":{"self":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts\/16412"}],"collection":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/comments?post=16412"}],"version-history":[{"count":8,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts\/16412\/revisions"}],"predecessor-version":[{"id":16422,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts\/16412\/revisions\/16422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/media\/16415"}],"wp:attachment":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/media?parent=16412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/categories?post=16412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/tags?post=16412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}