Cyber Security
Information technologies are used more intensely than ever in public communication data transfer, information processing infrastructures and electronic information systems while communication technologies (ICT) play a fundamental role in many critical areas of public services.
Device, information, document, personnel, and access backup studies are carried out within the framework of the relevant legislation and ISO Quality Methodologies to protect the data stored in electronic media against deletion/theft/corruption and to ensure that it is always accessible. The purpose of all these Methodologies is to ensure data access and communication security.
The Circular on Information and Communication Security Measures published by the Presidency on July 5, 2019, and the relevant guide published in July 2020 show comprehensive measures that institutions should take. Data, information, and communication security and privacy have now become a national issue.
As mentioned in the circular and guide; public clouds, foreign-based transfer applications that facilitate data leakage, instant messaging and communication applications in the consumer segment, applications for organising office documents, storing and processing in data centres abroad, and accessing non-corporate e-mails are restricted.
In this context, it is quite inconvenient for public officials to use their personal e-mail accounts, mobile phones, and other consumer electronics facilities in public matters.
Electronic corporate data, which is considered as a natural product of the use of information technologies, can be created, updated, moved or archived at the end of the life cycle and removed from use as a result of daily, weekly, monthly or special periodic studies in various corporate units and campuses.
Pre-determined corporate strategies against vulnerabilities that may render critical processes inoperable, prevent unauthorised access to important information and can minimise the loss of business and data, as well as time and also provide cost savings.
Organisations that evaluate the scope and possibilities of information security by performing risk analyses and business impact analyses in accordance with national standards, have an operational business continuity and an uninterrupted plan to work regardless of what happens. They are always prepared against information leaks, information loss, internal and external attack threats, and are more durable than those without skills.
Our sayTEC solutions are aimed at how we can contribute more in terms of compliance with the updated legislation; How to make a hybrid adaptation by taking local backup and secure remote access solutions together for organisations to collect, backup, multiplex, and protect their own data in their own central systems. Thus, we point out a few important points with the suggestions we make in achieving governance responsibilities and audit objectives by using high and up-to-date technologies.