When the concept of digital security was mentioned in the early 90s, there were not many people who would consider this as an important issue and discuss it, except the IT experts and those who worked on information security . When the web page was mentioned at that time, nothing came to mind except for the corporate identity being represented on the Internet in proportion to the company's prestige. However, over time, the use of the Internet has become very widespread, the number of computers that can connect to the Internet has increased and the limits of the programs that can run on these computers have expanded.
So much so that today, we see that almost every company performs one or more activities such as selling using the Internet infrastructure, updating customer information, managing e-mail traffic, providing employees with access to the company network outside of normal business hours. Beyond providing static information that will represent the corporate identity of the company, which will provide customers with information about the company, the fact that very important data related to the business is now accessible and changed through a very unsafe environment such as the Internet has caused different security gaps and different solutions for closing these gaps.
Of course, the rapid development of information technologies and the increasing use and density of computers in daily life are not limited to the fact that institutions face problems. From time to time, we come across news that we learned from various news sources that "an ex employee of company X leaks customer e-mail information before leaving work" or "a famous company's website was hacked by a hacker". However, the major threat of digital threats is end users who continue to use their computers without paying much attention to security at home or in their small medium-sized workplaces. Network and security experts, system engineers, database administrators, IT supervisors working within a large company. There are system integrator consultancy companies that offer contracted services, and protecting the workplace network is among their duties. This is why malicious digital attackers are targeted by end-user computers with less protection. So who are these end users and why are they more at risk? Anyone who needs to use their computers in their daily work, access the Internet frequently, send and receive e-mail messages, chat with their friends electronically, and connect to the private virtual network of the company, if any, can be called end users. If we take a look at the reasons why end user computers are at higher risk: malicious digital attackers are targeted to end-user computers with less protection. So who are these end users and why are they more at risk? Anyone who needs to use their computers in their daily work, access the Internet frequently, send and receive e-mail messages, chat with friends electronically and connect to the private virtual network of the company they work with, can be called an end user. If we take a look at the reasons why end user computers are at higher risk: malicious digital attackers are targeted to end-user computers with less protection. So who are these end users and why are they more at risk? Anyone who needs to use their computers in their daily work, access the Internet frequently, send and receive e-mail messages, chat with their friends electronically, and connect to the private virtual network of the company, if any, can be called end users. If we take a look at the reasons why end user computers are at higher risk: Anyone who talks electronically with his friends and connects to the private virtual network of the company he works for, can be called an end user. If we take a look at the reasons why end user computers are at higher risk: Anyone who talks electronically with his friends and connects to the private virtual network of the company he works for, can be called an end user. If we take a look at the reasons why end user computers are at higher risk:
