According to Google Trends data, searches on ‘cybersecurity’ keywords have increased more than 7 times in the last 5 years.
*** This release is originally published in Turkish.
Google Translate Application translates the content you see on this page.***
ISTANBUL (TR) - After the land, sea, air and space by NATO was considered the 5th war area cybersecurity is now included in every point of everyday life. Berqnet Firewall Google Trends and field, according to data obtained from studies conducted in Turkey "cybersecurity" on internet search showed an increase of 737% since 2014. Worldwide, this rate of increase was determined as 337%. Geographically, Turkey is in "cybersecurity" on the top 3 most searched Elazig province, which is listed as Ankara and Istanbul. Elazığ has doubled Istanbul to 2 and İzmir to 4 in search volume. One of the main reasons only in the Forensic Computing Engineering Department, Firat University in Turkey.
Cybersecurity, which has become one of the most important focal points of individual users or businesses as a result of rapid digitization, also affects user behavior. Cybercriminals, who develop new methods every year, continue to pose a danger in every aspect of life. Eighty percent of cyber attacks against small, medium or large enterprises are successfully completed due to unconscious employees. The so-called social engineering, pirates, who use their mistakes and weaknesses in human behavior, put companies in a difficult position. Cyber pirates exploit their mistakes by identifying the weak link between company employees. Thus, cyber hackers who have access to company systems without permission can access many confidential documents.
Stating that cyber hackers first chose a victim in social engineering attacks, Berqnet Firewall General Manager said. A. Murat Apohan, When selecting victims, generally the weakest link is identified as uninformed, careless users and all information about these users is collected from social media. Various methods of persuasion are used in social engineering attacks by taking advantage of employees' weaknesses. Thus, pirates can easily access the information they want to access. In these processes, many interesting arguments such as money, giveaways, and gifts are presented in exchange for information received from the victim. In order to reach the company information, all employees should be careful against the pirates who use the weaknesses of the people from the highest level to the bottom.
Murat Apohan stated that cyber attackers are carrying out activities to trigger excitement such as gifts and sweepstakes, as well as scary disaster scenarios. Cyber pirates effectively manage fear and exciting emotions against the people they target. Victims related to the events and developments in the agenda are created by the impression of an expert and studies are being carried out for social engineering. The feelings of people, especially the employees of the corporation with low level of awareness and awareness in cyber security, are triggered and triggered by mistake. Then the cyber attacker exploits this error and provides access to the systems. ”