×
TR EN
OUR RECOMMENDATIONS TO USERS

Basic Precautions for Our Computer and Internet Users:

  1. Every user should set passwords on their computers and these passwords should not be simple(1, 1234 , etc.). It should be noted that passwords consist of numbers, characters and letters.
  2. Computers' firewalls and network shares should be turned off, even if sharing is done, you should be aware of the shares and use a secure password.
  3. Computers should not be logged on all the time and should be logged off each time they leave the computer. After a certain period of time, the screen will turn black and the screen saver will make it easier for you to enter the password again.
  4. Computer owners should take the necessary physical precautions to prevent unauthorized use of their computers. (locking the room, screen saver, camera recording as a deterrent for critical environments, etc.)
  5. Your passwords for both computer user and other;
            Do not save to your computer or browser.
            Do not store your important passwords in your e-mail account, do not forget that your e-mail account can also be hacked.
            Do not write your passwords on paper and paste them on your desk.
            Do not share with other people.
  6. You must control all kinds of computers in your embezzlement in the light of the items we have specified.
  7. Do not set your wireless internet access device to be used without a password, either at home or at work. Please note that you will be responsible for any improper use of such access points.
  8. Do not enter suspicious sites in your internet use, take advantage of your personal firewall.
  9. Use software that counts virus check on your computer.
  10. Virtual computer etc. defined on your behalf in your institution or on the internet. Take the necessary safety precautions for the elements.


Basic Precautions For Our E-Mail Users:


br> - You should not respond to emails asking you for your passwords, personal information or to run a plugin.
- Never use your corporate e-mail password when subscribing to sites that require membership for your private use.
- Be careful about mails with the following features

  1. Mail with mismatched URL (web address) One of the first things to check in a suspicious email message is the integrity of the embedded URLs (the web address to be clicked). Often times in a phishing message the URL will appear perfectly valid. Hover the mouse over the URL in Outlook and wait 1-2 seconds and you should see its real address. If the URL displayed differs from the URL displayed in the yellow box, we can identify the message as possibly fake or malicious.
  2. Mails with misleading URL (web address) / domain mean scam starters often take advantage of their victims not knowing the DNS naming structure . The last piece in a domain name is the most obvious. For example, the domain name info.banvit.com is a subdomain of the main domain banvit.com. We recognize this by the fact that banvit.com is at the end of the whole domain name (on the right). On the other hand, the address banvit.com.maliciousdomain.com goes to maliciousdomain.com, not banvit.com, but to a different site because banvit.com is on the left side of the URL. This trick has been used by countless scammers to deceive their victims by showing that the message from big brands like Microsoft, Apple is gone. These scammers can try to use this technique from an address such as Microsoft.maliciousdomain.com by creating subdomains that include Microsoft or Apple.
  3. Mails containing many misspelled words or bad grammar. The message regarding grammatical errors and legality is reviewed and when it is in perfect shape, the message is sent. If there are sentence errors, typos, etc. in the message. If it is full of errors, most likely this message is fake.
  4. Personal information from you