{"id":81025,"date":"2022-11-03T03:01:41","date_gmt":"2022-11-03T02:01:41","guid":{"rendered":"https:\/\/blog.bluebeam.com\/se\/?p=81025"},"modified":"2022-11-02T10:24:45","modified_gmt":"2022-11-02T09:24:45","slug":"cybersecurity-101","status":"publish","type":"post","link":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/","title":{"rendered":"Cybers\u00e4kerhetens grunder: vad byggf\u00f6retagen beh\u00f6ver veta"},"content":{"rendered":"\n<p><em>Illustration av Wenting Li<\/em><\/p>\n\n\n\n<p class=\"has-drop-cap\">V\u00e4rlden blir allt mer digital. Vi f\u00f6rlitar oss mer och mer p\u00e5 internetbaserad teknologi i det dagliga livet, vilket medf\u00f6r s\u00e5v\u00e4l enorma f\u00f6rdelar som stora risker.<\/p>\n\n\n\n<p>I byggbranschen har man sett en lika snabb \u00f6kning av anv\u00e4ndningen av digital, internetansluten teknologi. Programvara i synnerhet blir ett allt viktigare verktyg i byggprocessen. Den globala marknaden f\u00f6r byggprogramvara uppg\u00e5r till omkring 9,6 miljarder dollar (cirka 110 miljarder kronor) enligt <a href=\"https:\/\/www.grandviewresearch.com\/industry-analysis\/construction-design-software-market-report\" target=\"_blank\" rel=\"noreferrer noopener\">Grand View Research<\/a> och f\u00f6rv\u00e4ntas \u00f6ka med en \u00e5rlig takt p\u00e5 8,5&nbsp;% mellan 2022 och 2030.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Den \u00f6kade anv\u00e4ndningen av teknologi i byggbranschen f\u00f6r med sig m\u00e5nga nya risker, den st\u00f6rsta \u00e4r cybers\u00e4kerheten. Ju st\u00f6rre m\u00e4ngder data som byggf\u00f6retag samlar in medan de bygger sina projekt, desto mer s\u00e5rbara blir dessa data som m\u00e5l f\u00f6r cyberbrottslingar. Hackare med avsikt att g\u00f6ra intr\u00e5ng i f\u00f6retags datasystem och utpressa dem p\u00e5 rej\u00e4la summor blir allt mer intresserade av att <a href=\"https:\/\/nordlocker.com\/recent-ransomware-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">rikta in sig p\u00e5 byggbranschen<\/a>.<\/p>\n\n\n\n<p>Flera nyligen uppm\u00e4rksammade cyberattacker i branschen belyser f\u00f6retagens akuta behov att st\u00e4rka sitt cyberf\u00f6rsvar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Nyligen genomf\u00f6rda attacker<\/strong><\/h3>\n\n\n\n<p>I januari 2020 blev den franska entrepren\u00f6ren <a href=\"https:\/\/www.enr.com\/articles\/48637-bouygues-construction-unit-gradually-recovering-after-ransomware-attack\" target=\"_blank\" rel=\"noreferrer noopener\">Bouygues<\/a> utsatt f\u00f6r en ransomware-attack som tillf\u00e4lligt st\u00e4ngde av och kopplade bort n\u00e5gra av f\u00f6retagets viktigaste datorsystem. Ransomware-g\u00e4nget Maze tog p\u00e5 sig ansvaret f\u00f6r attacken genom att offentligg\u00f6ra en fil p\u00e5 1,2&nbsp;GB p\u00e5 n\u00e4tet som inneh\u00f6ll viktiga Bouygues-data. Attacken kom bara dagar efter att Maze hade utf\u00f6rt ett liknande angrepp mot den kanadensiska entrepren\u00f6ren Bird.<\/p>\n\n\n\n<p>I maj m\u00e5nad intr\u00e4ffade <a href=\"https:\/\/cyware.com\/news\/construction-companies-fearful-after-cyberattacks-on-bam-construct-and-interserve-826d5ebd\" target=\"_blank\" rel=\"noreferrer noopener\">tv\u00e5 separata incidenter<\/a> d\u00e4r tv\u00e5 brittiska f\u00f6retag inom sjukhusbyggnad, Bam Construct och Interserve, utsattes f\u00f6r cyberattacker som ledde till att f\u00f6retagens datorsystem st\u00e4ngdes av. Efter att Ryssland hade invaderat Ukraina i februari 2022, <a href=\"https:\/\/www.constructiondive.com\/news\/russian-invasion-ukraine-construction-cyberattack-threats\/619631\/#:~:text=Small%20and%20medium%2Dsized%20businesses,most%20vulnerable%2C%20according%20to%20experts.\" target=\"_blank\" rel=\"noreferrer noopener\">rapporterade Construction Dive<\/a> ett \u00f6kat antal varningar om att ryskledda cyberattacker var redo att rikta in sig specifikt p\u00e5 byggf\u00f6retag.<\/p>\n\n\n\n<p>\u00d6kningen av cyberbrott i byggbranschen \u00e4r n\u00e5got som borde g\u00f6ra alla branschledare vaksamma. Men innan de kan st\u00e4rka sina f\u00f6retags cyberf\u00f6rsvar \u00e4r det viktigt att de f\u00f6rst\u00e5r hur v\u00e4lfungerande cybers\u00e4kerhet ser ut.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Allt du beh\u00f6ver veta om cybers\u00e4kerhet<\/strong><\/h3>\n\n\n\n<p>Cybers\u00e4kerhet \u00e4r konsten att skydda n\u00e4tverk, enheter och data mot obeh\u00f6rig \u00e5tkomst eller brottslig anv\u00e4ndning, s\u00e4ger <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-001\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity &amp; Infrastructure Security Agency<\/a>. Det handlar ocks\u00e5 om att s\u00e4kerst\u00e4lla informationens konfidentialitet, integritet och tillg\u00e4nglighet.<\/p>\n\n\n\n<p>Det finns flera olika s\u00e4tt f\u00f6r organisationer att f\u00f6rst\u00e5 sin cybers\u00e4kerhet. F\u00f6r att se till att byggf\u00f6retag \u00e4r s\u00e5 skyddade mot cyberhot som m\u00f6jligt \u00e4r det viktigt att deras f\u00f6rsvar omfattar alla delar av cybers\u00e4kerheten.<\/p>\n\n\n\n<p><strong>N\u00e4tverkss\u00e4kerhet:<\/strong> Det h\u00e4r handlar om att skydda data fr\u00e5n obeh\u00f6riga anv\u00e4ndare via en organisations datorn\u00e4tverk. Det omfattar organisationens brandv\u00e4gg, e-posts\u00e4kerhet, antivirus\u00e5tg\u00e4rder, skydd mot skadlig kod och <a href=\"https:\/\/www.googleadservices.com\/pagead\/aclk?sa=L&amp;ai=DChcSEwicnuSDtbT4AhXjgVsKHQqLCrYYABABGgJ5bQ&amp;ae=2&amp;ohost=www.google.com&amp;cid=CAESbOD2LPVjrf24D5UzlbH_7atwCx_TEhJ5YCM87IORIR5vQ_2jIEYTatBBKel3ruWakNnNWMGJBmHIq8fdIEzpacLgJOwfQ5Bm3iGCtxqWEUxRpYYEoW9R2JnivijlJvXscvIXsLWTrg4zChyjHw&amp;sig=AOD64_2OIrWlwK0Wwl-9rChEzrLFvyEFfA&amp;q&amp;adurl&amp;ved=2ahUKEwiGt9iDtbT4AhWlkIkEHZBHDPYQ0Qx6BAgFEAM\" target=\"_blank\" rel=\"noreferrer noopener\">f\u00f6rebyggande av dataf\u00f6rlust<\/a>.<\/p>\n\n\n\n<p><strong>Informationss\u00e4kerhet:<\/strong> Den h\u00e4r delen skyddar en <a href=\"https:\/\/uniserveit.com\/blog\/different-types-of-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">organisations kritiska aff\u00e4rsinformation<\/a> mot f\u00f6rst\u00f6relse, st\u00f6rningar och \u00e4ndringar. Den omfattar organisationens molns\u00e4kerhet, kryptografi, s\u00e5rbarhetshantering och incidenthantering.<\/p>\n\n\n\n<p><strong>Slutanv\u00e4ndarens beteende: <\/strong>Den h\u00e4r komponenten s\u00e4kerst\u00e4ller att en organisations slutanv\u00e4ndare (anst\u00e4llda, entrepren\u00f6rer m.fl.) \u00e4r r\u00e4tt utbildade om de individuella beteenden som kr\u00e4vs f\u00f6r b\u00e4sta praxis f\u00f6r s\u00e4kerhet. Det omfattar kunskaper om flera typer av cyberhot, d\u00e4ribland n\u00e4tfiskebedr\u00e4gerier, samt vilka \u00e5tg\u00e4rder som kr\u00e4vs f\u00f6r att skydda sig mot s\u00e5dana hot, till exempel enhetss\u00e4kerhet, l\u00f6senordsskapande och fysisk enhetss\u00e4kerhet<a>.&nbsp;<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>Infrastrukturs\u00e4kerhet: <\/strong>Den h\u00e4r faktorn avser att skydda kritisk information fr\u00e5n korruption, sabotage eller terrorism. Infrastrukturs\u00e4kerhet omfattar aspekter som n\u00e4tverksinfrastruktur, skydd och s\u00e4kerhet f\u00f6r datacentraler samt hantering av energi, kylsystem och vattenf\u00f6rs\u00f6rjning f\u00f6r de h\u00e4r fysiska tillg\u00e5ngarna.<\/p>\n\n\n\n<p>Att f\u00f6rst\u00e5 de h\u00e4r grunderna i cybers\u00e4kerhet \u00e4r ett avg\u00f6rande f\u00f6rsta steg som ledare inom byggbranschen m\u00e5ste ta f\u00f6r att b\u00f6rja st\u00e4rka sina f\u00f6retags cyberf\u00f6rsvar.<\/p>\n\n\n\n<div style=\"background-color:#111;text-align:center\" class=\"wp-block-atomic-blocks-ab-cta ab-block-cta\"><div class=\"ab-cta-image-wrap\"><img decoding=\"async\" class=\"ab-cta-image has-background-dim-60 has-background-dim\" src=\"https:\/\/blog.bluebeam.com\/wp-content\/uploads\/2022\/10\/ConstructionDataSecurity-1-Feature.jpg\" alt=\"Datas\u00e4kerhet i byggbranschen\" \/><\/div><div class=\"ab-cta-content\"><h2 class=\"ab-cta-title ab-font-size-32\" style=\"color:#FFF\">L\u00e4s hela v\u00e5rt whitepaper om datas\u00e4kerhet i byggbranschen.<\/h2><div class=\"ab-cta-text ab-font-size-32\" style=\"color:#FFF\"><\/div><\/div><div class=\"ab-cta-button\"><a href=\"https:\/\/www.bluebeam.com\/se\/resources\/whitepapers\/data-security\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"ab-button ab-button-shape-rounded ab-button-size-medium\" style=\"color:#ffffff;background-color:#3373dc\">L\u00c4S NU<\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyberbrottslingar \u00e4r i allt st\u00f6rre utstr\u00e4ckning p\u00e5 jakt efter s\u00e5rbara f\u00f6retagsm\u00e5l \u2014 vi f\u00f6rklarar varf\u00f6r ledare i byggbranschen beh\u00f6ver f\u00f6rst\u00e5 det v\u00e4xande behovet av cybers\u00e4kerhet.<\/p>\n","protected":false},"author":605,"featured_media":81026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[145],"tags":[],"class_list":["post-81025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-145","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e4kerhet och dataintr\u00e5ng i byggbranschen | Built<\/title>\n<meta name=\"description\" content=\"Cyberbrottslingar \u00e4r i allt st\u00f6rre utstr\u00e4ckning p\u00e5 jakt efter s\u00e5rbara f\u00f6retagsm\u00e5l \u2013 det h\u00e4r beh\u00f6ver byggf\u00f6retagen veta f\u00f6r att b\u00f6rja f\u00f6rsvara sig.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e4kerhet och dataintr\u00e5ng i byggbranschen | Built\" \/>\n<meta property=\"og:description\" content=\"Cyberbrottslingar \u00e4r i allt st\u00f6rre utstr\u00e4ckning p\u00e5 jakt efter s\u00e5rbara f\u00f6retagsm\u00e5l \u2013 det h\u00e4r beh\u00f6ver byggf\u00f6retagen veta f\u00f6r att b\u00f6rja f\u00f6rsvara sig.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/\" \/>\n<meta property=\"og:site_name\" content=\"Built | SE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bluebeamSE\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-03T02:01:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/10\/ConstructionDataSecurity-1-Feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Frank Kalman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bluebeam\" \/>\n<meta name=\"twitter:site\" content=\"@bluebeam\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Frank Kalman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/\"},\"author\":{\"name\":\"Frank Kalman\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/person\\\/9d4c3906dc90c112428cfaa63db9d1f5\"},\"headline\":\"Cybers\u00e4kerhetens grunder: vad byggf\u00f6retagen beh\u00f6ver veta\",\"datePublished\":\"2022-11-03T02:01:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/\"},\"wordCount\":732,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/10\\\/ConstructionDataSecurity-1-Feature.jpg\",\"articleSection\":[\"Innovation\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/\",\"name\":\"Cybers\u00e4kerhet och dataintr\u00e5ng i byggbranschen | Built\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/10\\\/ConstructionDataSecurity-1-Feature.jpg\",\"datePublished\":\"2022-11-03T02:01:41+00:00\",\"description\":\"Cyberbrottslingar \u00e4r i allt st\u00f6rre utstr\u00e4ckning p\u00e5 jakt efter s\u00e5rbara f\u00f6retagsm\u00e5l \u2013 det h\u00e4r beh\u00f6ver byggf\u00f6retagen veta f\u00f6r att b\u00f6rja f\u00f6rsvara sig.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/10\\\/ConstructionDataSecurity-1-Feature.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/10\\\/ConstructionDataSecurity-1-Feature.jpg\",\"width\":900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/cybersecurity-101\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e4kerhetens grunder: vad byggf\u00f6retagen beh\u00f6ver veta\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#website\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\",\"name\":\"Built | SE\",\"description\":\"The Bluebeam Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\",\"name\":\"Bluebeam Inc.\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2020\\\/05\\\/bluebeam.png\",\"contentUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2020\\\/05\\\/bluebeam.png\",\"width\":840,\"height\":630,\"caption\":\"Bluebeam Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/bluebeamSE\",\"https:\\\/\\\/x.com\\\/bluebeam\",\"https:\\\/\\\/www.instagram.com\\\/bluebeam_nordics\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/bluebeam-sweden\",\"https:\\\/\\\/youtube.com\\\/bluebeampdfrevu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/person\\\/9d4c3906dc90c112428cfaa63db9d1f5\",\"name\":\"Frank Kalman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g\",\"caption\":\"Frank Kalman\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e4kerhet och dataintr\u00e5ng i byggbranschen | Built","description":"Cyberbrottslingar \u00e4r i allt st\u00f6rre utstr\u00e4ckning p\u00e5 jakt efter s\u00e5rbara f\u00f6retagsm\u00e5l \u2013 det h\u00e4r beh\u00f6ver byggf\u00f6retagen veta f\u00f6r att b\u00f6rja f\u00f6rsvara sig.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/","og_locale":"sv_SE","og_type":"article","og_title":"Cybers\u00e4kerhet och dataintr\u00e5ng i byggbranschen | Built","og_description":"Cyberbrottslingar \u00e4r i allt st\u00f6rre utstr\u00e4ckning p\u00e5 jakt efter s\u00e5rbara f\u00f6retagsm\u00e5l \u2013 det h\u00e4r beh\u00f6ver byggf\u00f6retagen veta f\u00f6r att b\u00f6rja f\u00f6rsvara sig.","og_url":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/","og_site_name":"Built | SE","article_publisher":"https:\/\/www.facebook.com\/bluebeamSE","article_published_time":"2022-11-03T02:01:41+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/10\/ConstructionDataSecurity-1-Feature.jpg","type":"image\/jpeg"}],"author":"Frank Kalman","twitter_card":"summary_large_image","twitter_creator":"@bluebeam","twitter_site":"@bluebeam","twitter_misc":{"Skriven av":"Frank Kalman","Ber\u00e4knad l\u00e4stid":"3 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/#article","isPartOf":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/"},"author":{"name":"Frank Kalman","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/person\/9d4c3906dc90c112428cfaa63db9d1f5"},"headline":"Cybers\u00e4kerhetens grunder: vad byggf\u00f6retagen beh\u00f6ver veta","datePublished":"2022-11-03T02:01:41+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/"},"wordCount":732,"publisher":{"@id":"https:\/\/blog.bluebeam.com\/se\/#organization"},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/10\/ConstructionDataSecurity-1-Feature.jpg","articleSection":["Innovation"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/","url":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/","name":"Cybers\u00e4kerhet och dataintr\u00e5ng i byggbranschen | Built","isPartOf":{"@id":"https:\/\/blog.bluebeam.com\/se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/#primaryimage"},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/10\/ConstructionDataSecurity-1-Feature.jpg","datePublished":"2022-11-03T02:01:41+00:00","description":"Cyberbrottslingar \u00e4r i allt st\u00f6rre utstr\u00e4ckning p\u00e5 jakt efter s\u00e5rbara f\u00f6retagsm\u00e5l \u2013 det h\u00e4r beh\u00f6ver byggf\u00f6retagen veta f\u00f6r att b\u00f6rja f\u00f6rsvara sig.","breadcrumb":{"@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/#primaryimage","url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/10\/ConstructionDataSecurity-1-Feature.jpg","contentUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/10\/ConstructionDataSecurity-1-Feature.jpg","width":900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.bluebeam.com\/se\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e4kerhetens grunder: vad byggf\u00f6retagen beh\u00f6ver veta"}]},{"@type":"WebSite","@id":"https:\/\/blog.bluebeam.com\/se\/#website","url":"https:\/\/blog.bluebeam.com\/se\/","name":"Built | SE","description":"The Bluebeam Blog","publisher":{"@id":"https:\/\/blog.bluebeam.com\/se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.bluebeam.com\/se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/blog.bluebeam.com\/se\/#organization","name":"Bluebeam Inc.","url":"https:\/\/blog.bluebeam.com\/se\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/logo\/image\/","url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2020\/05\/bluebeam.png","contentUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2020\/05\/bluebeam.png","width":840,"height":630,"caption":"Bluebeam Inc."},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bluebeamSE","https:\/\/x.com\/bluebeam","https:\/\/www.instagram.com\/bluebeam_nordics\/","https:\/\/www.linkedin.com\/showcase\/bluebeam-sweden","https:\/\/youtube.com\/bluebeampdfrevu"]},{"@type":"Person","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/person\/9d4c3906dc90c112428cfaa63db9d1f5","name":"Frank Kalman","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/secure.gravatar.com\/avatar\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g","caption":"Frank Kalman"}}]}},"featured_image_src":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/10\/ConstructionDataSecurity-1-Feature-600x400.jpg","featured_image_src_square":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/10\/ConstructionDataSecurity-1-Feature-600x600.jpg","author_info":{"display_name":"Frank Kalman","author_link":"https:\/\/blog.bluebeam.com\/se\/author\/kalman\/"},"_links":{"self":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts\/81025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/users\/605"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/comments?post=81025"}],"version-history":[{"count":0,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts\/81025\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/media\/81026"}],"wp:attachment":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/media?parent=81025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/categories?post=81025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/tags?post=81025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}