{"id":80559,"date":"2022-01-25T03:01:53","date_gmt":"2022-01-25T02:01:53","guid":{"rendered":"https:\/\/blog.bluebeam.com\/se\/?p=80559"},"modified":"2022-01-21T13:19:47","modified_gmt":"2022-01-21T12:19:47","slug":"cybersecurity-construction","status":"publish","type":"post","link":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/","title":{"rendered":"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet"},"content":{"rendered":"\n<p><em>Illustration av Dalbert Vilarino<\/em><\/p>\n\n\n\n<p class=\"has-drop-cap\">Cybers\u00e4kerhet blir en allt mer central fr\u00e5ga f\u00f6r byggbranschen.<\/p>\n\n\n\n<p>I takt med att v\u00e4rlden blir mer sammankopplad genom mobil teknik och n\u00e4tverksbaserade molntj\u00e4nster tvingas f\u00f6retag i alla branscher sk\u00e4rpa sina s\u00e4kerhets\u00e5tg\u00e4rder f\u00f6r att skydda s\u00e5v\u00e4l sina kunders data som alla andra former av k\u00e4nslig f\u00f6retagsinformation.<\/p>\n\n\n\n<p>Byggbranschen \u00e4r inget undantag. Medan branschen forts\u00e4tter att anamma ny teknik \u2013 fr\u00e5n <a href=\"https:\/\/blog.bluebeam.com\/se\/tech-adoption\/\" target=\"_blank\" rel=\"noreferrer noopener\">dataanalys till artificiell intelligens<\/a> och verktyg som hj\u00e4lper den att g\u00e5 vidare med sin \u00f6vergripande digitala transformation \u2013 g\u00f6r den sig sj\u00e4lv alltmer s\u00e5rbar f\u00f6r de risker och hot som f\u00f6ljer med att arbeta i ett mer digitalt ekosystem.<\/p>\n\n\n\n<p>F\u00f6r att bek\u00e4mpa det v\u00e4xande hotet om cyberattacker m\u00e5ste byggf\u00f6retagen vara vaksamma och h\u00e5lla sina s\u00e4kerhets\u00e5tg\u00e4rder uppdaterade. H\u00e4r \u00e4r n\u00e5gra strategier och taktiker som branschexperter rekommenderar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>G\u00f6r SSO obligatoriskt f\u00f6r medarbetarna<\/strong><\/h3>\n\n\n\n<p>Inget f\u00f6retag beh\u00f6ver klara sig p\u00e5 egen hand n\u00e4r det g\u00e4ller cybers\u00e4kerhet. Cybers\u00e4kerhetsbranschen har vuxit, och med den \u00e4ven de f\u00f6retag som specialiserar sig p\u00e5 \u00e5tg\u00e4rder som hj\u00e4lper organisationer att s\u00e4kra sin verksamhet.<\/p>\n\n\n\n<p>D\u00e4rmed beh\u00f6ver byggf\u00f6retagen inte vara r\u00e4dda f\u00f6r att samarbeta om cybers\u00e4kerhet med en tredje part, ut\u00f6ver att anst\u00e4lla interna ledare och team som \u00f6vervakar arbetet.<\/p>\n\n\n\n<p>Cybers\u00e4kerheten \u00e4r kanske extra k\u00e4nslig inom byggbranschen eftersom s\u00e5 m\u00e5nga underleverant\u00f6rer arbetar tillsammans med huvudentrepren\u00f6ren i varje projekt. F\u00f6r ett st\u00f6rre byggprojekt kan det finnas hundratals underleverant\u00f6rer som interagerar med projektets teknik och data. Det g\u00f6r projektet mer s\u00e5rbart f\u00f6r potentiella cybers\u00e4kerhetsattacker.<\/p>\n\n\n\n<p>L. Russell Dalton, Associate Vice President, Digital Practice and Technology Building Information Modeling (BIM) f\u00f6r entrepren\u00f6ren <a href=\"http:\/\/www.aecom.com\" target=\"_blank\" rel=\"noreferrer noopener\">AECOM<\/a>, \u00f6vervakar byggf\u00f6retagets interna projekt. Han s\u00e4ger att f\u00f6retaget \u201dsamarbetar med en m\u00e4ngd underentrepren\u00f6rer \u00f6ver hela USA med v\u00e5ra projekt, och s\u00e4kerheten \u00e4r ytterst viktig\u201d.<\/p>\n\n\n\n<p>AECOM anv\u00e4nder ocks\u00e5 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Single_sign-on\" target=\"_blank\" rel=\"noreferrer noopener\">enkel inloggning<\/a> (SSO) genom ett <a href=\"https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\" target=\"_blank\" rel=\"noreferrer noopener\">virtuellt privat n\u00e4tverk<\/a> (VPN) f\u00f6r att skydda sig mot cyberhot, och kr\u00e4ver att samtliga medarbetare har SSO aktiverat f\u00f6r all teknik som de anv\u00e4nder.&nbsp;<\/p>\n\n\n\n<p>\u201dVi har gjort SSO obligatoriskt internt, och till\u00e5ter inte att man har separata inloggningar f\u00f6r allt\u201d, s\u00e4ger Russell. \u201dVi anv\u00e4nder VPN f\u00f6r enkel inloggning och d\u00e4r kombineras v\u00e5ra auktoriseringar f\u00f6r det vi f\u00e5r komma in p\u00e5. F\u00f6r att f\u00f6lja kraven i Defense Federal Acquisition Regulation Supplement (DFARS) f\u00f6r v\u00e5ra avtal med den federala regeringen anv\u00e4nder vi en s\u00e4ker tj\u00e4nstedom\u00e4n med VDI (Virtual Desktop Environment).\u201d<\/p>\n\n\n\n<p>Russell f\u00f6rklarar att DFARS-kraven blev mer relevanta i november 2020 f\u00f6r de av f\u00f6retagets statliga avtal d\u00e4r de har tillg\u00e5ng till hemligst\u00e4mplad information. \u201dVi k\u00f6r en s\u00e4ker tj\u00e4nstedom\u00e4n i en VDI-milj\u00f6 som h\u00e5ller allt bakom en brandv\u00e4gg \u2013 krypterade datorer. Man kan s\u00e4ga att det \u00e4r en styrd SCIF (k\u00e4nslig uppdelad informationsanl\u00e4ggning) i en virtuell v\u00e4rld.\u201d<\/p>\n\n\n\n<p>F\u00f6rutom SSO och VPN rekommenderar Russell starkt att byggf\u00f6retagen h\u00e5ller alla data bakom en brandv\u00e4gg eller anv\u00e4nder en s\u00e4ker molnl\u00f6sning.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Anv\u00e4nd leverant\u00f6rer med SOC&nbsp;2-kompatibel kryptering<\/strong><\/h3>\n\n\n\n<p>Russell s\u00e4ger att byggf\u00f6retag som arbetar med mycket s\u00e4kra projekt b\u00f6r arbeta i en v\u00e4rld med SOC&nbsp;2-kompatibel kryptering. Det g\u00e4ller allts\u00e5 att v\u00e4lja teknik p\u00e5 ett klokt s\u00e4tt. \u201dF\u00f6r att bli SOC&nbsp;2-kompatibel m\u00e5ste man ha ett \u00e5r bakom sig som leverant\u00f6r av ett molnbaserat system eller ett FTP-ber\u00f6ringssystem\u201d, s\u00e4ger han.&nbsp;<\/p>\n\n\n\n<p>\u00d6verallt d\u00e4r datalager finns m\u00e5ste teknikleverant\u00f6ren ha m\u00e5ng\u00e5rig bakgrund och bevisade meriter innan de kan ans\u00f6ka om SOC 2-kompatibilitet.<\/p>\n\n\n\n<p>Russell rekommenderar byggf\u00f6retag som arbetar under DFARS-krav p\u00e5 statliga projekt att bes\u00f6ka det federala riskregistret \u2013 <a href=\"https:\/\/marketplace.fedramp.gov\" target=\"_blank\" rel=\"noreferrer noopener\">FedRAMP Marketplace<\/a>, som \u00e4r en officiell webbplats som tillh\u00f6r USA:s regering \u2013 f\u00f6r att kontrollera att leverant\u00f6ren uppfyller den standarden. P\u00e5 webbplatsen hittar f\u00f6retagen en fullst\u00e4ndig lista \u00f6ver alla vanliga program f\u00f6r och leverant\u00f6rer av datamilj\u00f6er som \u00e4r FedRAMP-auktoriserade, samt en lista \u00f6ver leverant\u00f6rer som \u00e4r p\u00e5 v\u00e4g att bli auktoriserade.<\/p>\n\n\n\n<p>Molntj\u00e4nstleverant\u00f6ren Amazon Web Services \u00e4r till exempel FedRAMP-auktoriserad p\u00e5 420 punkter. \u201dN\u00e4r vi f\u00e5r ett projekt d\u00e4r kunden s\u00e4ger att de vill anv\u00e4nda produkt X och att FedRAMP-kraven g\u00e4ller, m\u00e5ste vi \u00e5ka ut till platsen och se till att de uppfylls\u201d, s\u00e4ger Russell.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Utbilda personalen<\/strong><\/h3>\n\n\n\n<p>Michael Bonelli, projektarkitekt p\u00e5 <a href=\"https:\/\/www.pagnotta.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Michael Pagnotta <\/a>Architecture &amp; Construction, s\u00e4ger att den viktigaste uppgiften n\u00e4r det g\u00e4ller cybers\u00e4kerhet i byggbranschen \u00e4r att utbilda de anst\u00e4llda i att vara medvetna om hotens natur och de taktiker som hackare ofta anv\u00e4nder.&nbsp;<\/p>\n\n\n\n<p>Medarbetarna b\u00f6r:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>vara p\u00e5 sin vakt n\u00e4r de f\u00e5r udda e-postmeddelanden fr\u00e5n ok\u00e4nda avs\u00e4ndare med ovanliga bilagor<\/li><li>alltid skanna e-postbilagor med ett virusverktyg innan de \u00f6ppnar dem<\/li><li>regelbundet uppdatera datorer och annan teknik med det senaste operativsystemet.<\/li><\/ul>\n\n\n\n<p>Precis som L. Russell Dalton r\u00e5der Michael Bonelli byggf\u00f6retagen att \u201dinstallera en brandv\u00e4gg i n\u00e4tverket och sp\u00e5ra ovanlig aktivitet som f\u00f6rs\u00f6ker tr\u00e4nga igenom det installerade skyddet. Skanna listan med IP-adresser som \u00e4r anslutna till n\u00e4tverket och leta efter s\u00e5dant som \u00e4r avvikande\u201d, s\u00e4ger han.<\/p>\n\n\n\n<p>Michael s\u00e4ger ocks\u00e5 att byggf\u00f6retagen b\u00f6r ha flera s\u00e4kerhetskopieringsk\u00e4llor f\u00f6r att s\u00e4kerst\u00e4lla att de kan \u00e5terst\u00e4lla f\u00f6rlorade filer effektivt f\u00f6r att h\u00e5lla verksamheten ig\u00e5ng. Detta omfattar s\u00e4kerhetskopior i s\u00e5v\u00e4l molnet som p\u00e5 fysiska h\u00e5rddiskar lokalt.<\/p>\n\n\n\n<p>Medan tekniken blir allt mer integrerad i branschen \u2013 och allt fler medarbetare anammar det nya normala efter pandemin med distans- och hybridarbete \u2013 \u00e4r det avg\u00f6rande att byggf\u00f6retagen h\u00e5ller ett kritiskt \u00f6ga p\u00e5 cybers\u00e4kerheten och s\u00e4krar sina data och sin verksamhet. De h\u00e4r tipsen \u00e4r en bra utg\u00e5ngspunkt, men kom ih\u00e5g att n\u00e4r branschen utvecklas i takt med teknologin s\u00e5 utvecklas \u00e4ven de som f\u00f6rs\u00f6ker tr\u00e4nga in och stj\u00e4la k\u00e4nsliga f\u00f6retagsdata.<\/p>\n\n\n\n<p>Att uppr\u00e4tth\u00e5lla r\u00e4tt cybers\u00e4kerhets\u00e5tg\u00e4rder \u00e4r ingenting man bara g\u00f6r en g\u00e5ng och sedan g\u00e5r vidare. Det \u00e4r n\u00e5got som beh\u00f6ver \u00f6vervakas och uppdateras hela tiden.&nbsp;&nbsp;<\/p>\n\n\n\n<div style=\"background-color:#111;text-align:center\" class=\"wp-block-atomic-blocks-ab-cta ab-block-cta\"><div class=\"ab-cta-image-wrap\"><img decoding=\"async\" class=\"ab-cta-image has-background-dim-60 has-background-dim\" src=\"https:\/\/blog.bluebeam.com\/au\/wp-content\/uploads\/sites\/3\/2021\/11\/HybridWorkPolicy_FEATURE.jpeg\" \/><\/div><div class=\"ab-cta-content\"><h2 class=\"ab-cta-title ab-font-size-32\" style=\"color:#FFF\"><strong>L\u00e4mpar sig den hybrida arbetsplatsen \u00e4ven f\u00f6r byggbranschen?<\/strong><\/h2><div class=\"ab-cta-text ab-font-size-32\" style=\"color:#FFF\"><\/div><\/div><div class=\"ab-cta-button\"><a href=\"https:\/\/blog.bluebeam.com\/se\/hybrid-work-construction\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"ab-button ab-button-shape-rounded ab-button-size-medium\" style=\"color:#ffffff;background-color:#3373dc\">L\u00e4s mer<\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Att h\u00e5lla projektdata skyddade mot cybers\u00e4kerhetshot \u00e4r ett r\u00f6rligt m\u00e5l nu f\u00f6r tiden, men de h\u00e4r tre grundl\u00e4ggande stegen leder byggf\u00f6retagen p\u00e5 r\u00e4tt v\u00e4g<\/p>\n","protected":false},"author":666,"featured_media":80560,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[145],"tags":[16843],"class_list":["post-80559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","tag-cybersakerhet","category-145","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet - Built | SE<\/title>\n<meta name=\"description\" content=\"Att h\u00e5lla projektdata skyddade mot cybers\u00e4kerhetshot \u00e4r ett r\u00f6rligt m\u00e5l nu f\u00f6r tiden, men de h\u00e4r tre grundl\u00e4ggande stegen leder byggf\u00f6retagen p\u00e5 r\u00e4tt v\u00e4g\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet - Built | SE\" \/>\n<meta property=\"og:description\" content=\"Att h\u00e5lla projektdata skyddade mot cybers\u00e4kerhetshot \u00e4r ett r\u00f6rligt m\u00e5l nu f\u00f6r tiden, men de h\u00e4r tre grundl\u00e4ggande stegen leder byggf\u00f6retagen p\u00e5 r\u00e4tt v\u00e4g\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/\" \/>\n<meta property=\"og:site_name\" content=\"Built | SE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bluebeamSE\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-25T02:01:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/01\/Cybersecurity-Feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erin Flynn Jay\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bluebeam\" \/>\n<meta name=\"twitter:site\" content=\"@bluebeam\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erin Flynn Jay\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/\"},\"author\":{\"name\":\"Erin Flynn Jay\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/person\\\/8f83e665492f9b03ecaa9f2905a6106d\"},\"headline\":\"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet\",\"datePublished\":\"2022-01-25T02:01:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/\"},\"wordCount\":1142,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/01\\\/Cybersecurity-Feature.jpg\",\"keywords\":[\"Cybers\u00e4kerhet\"],\"articleSection\":[\"Innovation\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/\",\"name\":\"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet - Built | SE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/01\\\/Cybersecurity-Feature.jpg\",\"datePublished\":\"2022-01-25T02:01:53+00:00\",\"description\":\"Att h\u00e5lla projektdata skyddade mot cybers\u00e4kerhetshot \u00e4r ett r\u00f6rligt m\u00e5l nu f\u00f6r tiden, men de h\u00e4r tre grundl\u00e4ggande stegen leder byggf\u00f6retagen p\u00e5 r\u00e4tt v\u00e4g\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/01\\\/Cybersecurity-Feature.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/01\\\/Cybersecurity-Feature.jpg\",\"width\":900,\"height\":600,\"caption\":\"Cybers\u00e4kerhet i byggbranschen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-construction\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#website\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\",\"name\":\"Built | SE\",\"description\":\"The Bluebeam Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\",\"name\":\"Bluebeam Inc.\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2020\\\/05\\\/bluebeam.png\",\"contentUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2020\\\/05\\\/bluebeam.png\",\"width\":840,\"height\":630,\"caption\":\"Bluebeam Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/bluebeamSE\",\"https:\\\/\\\/x.com\\\/bluebeam\",\"https:\\\/\\\/www.instagram.com\\\/bluebeam_nordics\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/bluebeam-sweden\",\"https:\\\/\\\/youtube.com\\\/bluebeampdfrevu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/person\\\/8f83e665492f9b03ecaa9f2905a6106d\",\"name\":\"Erin Flynn Jay\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12b9a759d8254732212173aab977d0850a42aa166d1fc8947dd723195caa2535?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12b9a759d8254732212173aab977d0850a42aa166d1fc8947dd723195caa2535?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12b9a759d8254732212173aab977d0850a42aa166d1fc8947dd723195caa2535?s=96&d=mm&r=g\",\"caption\":\"Erin Flynn Jay\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet - Built | SE","description":"Att h\u00e5lla projektdata skyddade mot cybers\u00e4kerhetshot \u00e4r ett r\u00f6rligt m\u00e5l nu f\u00f6r tiden, men de h\u00e4r tre grundl\u00e4ggande stegen leder byggf\u00f6retagen p\u00e5 r\u00e4tt v\u00e4g","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/","og_locale":"sv_SE","og_type":"article","og_title":"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet - Built | SE","og_description":"Att h\u00e5lla projektdata skyddade mot cybers\u00e4kerhetshot \u00e4r ett r\u00f6rligt m\u00e5l nu f\u00f6r tiden, men de h\u00e4r tre grundl\u00e4ggande stegen leder byggf\u00f6retagen p\u00e5 r\u00e4tt v\u00e4g","og_url":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/","og_site_name":"Built | SE","article_publisher":"https:\/\/www.facebook.com\/bluebeamSE","article_published_time":"2022-01-25T02:01:53+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/01\/Cybersecurity-Feature.jpg","type":"image\/jpeg"}],"author":"Erin Flynn Jay","twitter_card":"summary_large_image","twitter_creator":"@bluebeam","twitter_site":"@bluebeam","twitter_misc":{"Skriven av":"Erin Flynn Jay","Ber\u00e4knad l\u00e4stid":"5 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/#article","isPartOf":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/"},"author":{"name":"Erin Flynn Jay","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/person\/8f83e665492f9b03ecaa9f2905a6106d"},"headline":"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet","datePublished":"2022-01-25T02:01:53+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/"},"wordCount":1142,"publisher":{"@id":"https:\/\/blog.bluebeam.com\/se\/#organization"},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/01\/Cybersecurity-Feature.jpg","keywords":["Cybers\u00e4kerhet"],"articleSection":["Innovation"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/","url":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/","name":"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet - Built | SE","isPartOf":{"@id":"https:\/\/blog.bluebeam.com\/se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/#primaryimage"},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/01\/Cybersecurity-Feature.jpg","datePublished":"2022-01-25T02:01:53+00:00","description":"Att h\u00e5lla projektdata skyddade mot cybers\u00e4kerhetshot \u00e4r ett r\u00f6rligt m\u00e5l nu f\u00f6r tiden, men de h\u00e4r tre grundl\u00e4ggande stegen leder byggf\u00f6retagen p\u00e5 r\u00e4tt v\u00e4g","breadcrumb":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/#primaryimage","url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/01\/Cybersecurity-Feature.jpg","contentUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/01\/Cybersecurity-Feature.jpg","width":900,"height":600,"caption":"Cybers\u00e4kerhet i byggbranschen"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-construction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.bluebeam.com\/se\/"},{"@type":"ListItem","position":2,"name":"Tre \u00e5tg\u00e4rder som byggf\u00f6retagen m\u00e5ste vidta kring cybers\u00e4kerhet"}]},{"@type":"WebSite","@id":"https:\/\/blog.bluebeam.com\/se\/#website","url":"https:\/\/blog.bluebeam.com\/se\/","name":"Built | SE","description":"The Bluebeam Blog","publisher":{"@id":"https:\/\/blog.bluebeam.com\/se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.bluebeam.com\/se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/blog.bluebeam.com\/se\/#organization","name":"Bluebeam Inc.","url":"https:\/\/blog.bluebeam.com\/se\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/logo\/image\/","url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2020\/05\/bluebeam.png","contentUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2020\/05\/bluebeam.png","width":840,"height":630,"caption":"Bluebeam Inc."},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bluebeamSE","https:\/\/x.com\/bluebeam","https:\/\/www.instagram.com\/bluebeam_nordics\/","https:\/\/www.linkedin.com\/showcase\/bluebeam-sweden","https:\/\/youtube.com\/bluebeampdfrevu"]},{"@type":"Person","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/person\/8f83e665492f9b03ecaa9f2905a6106d","name":"Erin Flynn Jay","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/secure.gravatar.com\/avatar\/12b9a759d8254732212173aab977d0850a42aa166d1fc8947dd723195caa2535?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/12b9a759d8254732212173aab977d0850a42aa166d1fc8947dd723195caa2535?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12b9a759d8254732212173aab977d0850a42aa166d1fc8947dd723195caa2535?s=96&d=mm&r=g","caption":"Erin Flynn Jay"}}]}},"featured_image_src":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/01\/Cybersecurity-Feature-600x400.jpg","featured_image_src_square":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/01\/Cybersecurity-Feature-600x600.jpg","author_info":{"display_name":"Erin Flynn Jay","author_link":"https:\/\/blog.bluebeam.com\/se\/author\/erinfljay\/"},"_links":{"self":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts\/80559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/users\/666"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/comments?post=80559"}],"version-history":[{"count":0,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts\/80559\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/media\/80560"}],"wp:attachment":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/media?parent=80559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/categories?post=80559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/tags?post=80559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}