Skip to content Skip to footer

Who we are

Our website address is: https://shipip.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

What data breach procedures we have in place

What third parties we receive data from

What automated decision making and/or profiling we do with user data

Industry regulatory disclosure requirements

In Cybersecurity, Turkey Leads the Way

yberspace has a gradually expanding structure that connects new devices, systems, and users every new second. This causes threats from cyberspace to change constantly, making it impossible to combat them without cooperation.

With the Covid-19 pandemic, government and private sector operations dramatically changed at a never-before-seen pace. Meanwhile, a significant increase was registered in threats targeting the digital security of critical public services, healthcare organizations, and the finance and banking sectors in 2020 and 2021. Globally, cybercrime rose by over 200%.

From this point of view, collaboration has become more and more vital in order to fight cybercrime and create cyber resilience.

 

A comprehensive platform

In recent years, Turkey has put considerable effort in establishing a clustering platform in the cybersecurity domain. In October 2017, public sector institutions, academia, and major private sector cybersecurity companies gathered to discuss potential avenues for cooperation among each other, ultimately coming up with the Turkish Cyber Security Cluster. Today, the Cluster operates under the coordination of the Digital Transformation Office and the Presidency of Defence Industries with over 200 members.

The Turkish Cyber Security Cluster pursues several goals, including:

  • Increasing the number of cybersecurity companies;
  • Supporting the development of member companies’ technical, administrative, and financial capabilities;
  • Improving the branding of products and services;
  • Improving the standards of the cybersecurity ecosystem;
  • Increasing the competitiveness of member companies in national and global markets;
  • Improving the human capital in the field of cybersecurity; and
  • Increasing awareness about cybersecurity across society.

Public-private partnerships

Though there is no legal obligation for the private sector to take part in such cooperation, emphasis ought to be kept on the mutual trust and cooperation between public and private institutions. The key motivation behind these efforts is to strengthen buyer-supplier relationships, common distribution channels, common networking opportunities, and R&D activities conducted by universities with companies that can create better opportunities and benefits for both parties. Because of common economic interests, companies in the cluster can become more productive and innovative and therefore more competitive than companies operating alone.

It is almost impossible to achieve success in the field of cybersecurity without the support of the highest-level public authority.

The Digital Transformation Office (DTO) of the Presidency of the Republic of Turkey was established in 2018 to unify the fragmented activities around digital transformation, cybersecurity, research and development of national technologies, big data, and artificial intelligence under a single roof.

Some of the DTO’s responsibilities include preparing the roadmap for the digital transformation of the public sector; developing projects to improve cyber security; and fostering cooperation among public and private sector organizations, universities, and non-governmental organizations in order to create a digital transformation ecosystem and encourage their participation in the design and delivery of digital public services.

The DTO’s main duties in the cybersecurity domain include:

  • Establishing unique leadership in national cyber security;
  • Developing projects to enhance cybersecurity awareness;
  • Establishing a strong cyberthreat intelligence sharing platform;
  • Providing international cooperation against cyber threats;
  • Improving the understanding of cybersecurity as an enabler of the digital future.

A methodology and clear strategy

In order to achieve these goals, the DTO wrote a guide defining a methodology for managing cyber domain related risks, minimum cybersecurity baselines and compliance mechanisms. After almost one year of comprehensive work to prepare under the coordination of the Digital Transformation Office, Turkey’s “Information and Communication Security Guide” was licenced under the Creative Commons public licence and published in July 2020.

Moreover, Turkey published the first national level Cybersecurity strategy and action plan back in 2013. The third strategy and action plan covering the 2020-2023 period was then published in 2020.

The basic goals of the current strategy and action plan include:

  • 24/7 protection of critical Turkish infrastructure against cyber-attacks,
  • National technology development to meet cybersecurity needs,
  • Improving readiness vis-à-vis cyber-incidents,
  • Improving cyber security awareness,
  • Establishing an information security culture,
  • Investing in human capital and improving professionals’ skills,
  • Developing mechanisms for information sharing and cooperation with national and international stakeholders.

As mentioned, Turkey’s current efforts focus on improving the understanding of cybersecurity as an enabler of the digital future.

In the military context, cyberspace is mostly defined as cyber warfare: the importance of cybersecurity is highlighted in correlation with cybercrime, advanced persistent threats, cyber-attacks, and cyber-terrorism, too.

However, from another point of view, the cyber domain also represents an opportunity for capacity-building, innovation, and development. This approach can be named as a “positive cybersecurity approach”.

With a positive cybersecurity approach, international collaboration, improving business-to-business relations as well as cyber-threats information sharing will be the key element to achieving cyber-resilience worldwide.