{"id":81092,"date":"2022-12-22T03:01:36","date_gmt":"2022-12-22T02:01:36","guid":{"rendered":"https:\/\/blog.bluebeam.com\/se\/?p=81092"},"modified":"2022-12-20T10:27:01","modified_gmt":"2022-12-20T09:27:01","slug":"how-construction-can-bolster-cybersecurity","status":"publish","type":"post","link":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/","title":{"rendered":"S\u00e5 kan byggf\u00f6retagen h\u00f6ja sin cybers\u00e4kerhet"},"content":{"rendered":"\n<p class=\"has-drop-cap\">Det \u00e4r inte enkelt att skapa stark <a href=\"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/\">cybers\u00e4kerhet<\/a>. Det kr\u00e4ver en oerh\u00f6rt disciplinerad och komplex s\u00e4kerhetsh\u00e5llning, d\u00e4r ansvar och ansvarsskyldighet inte bara delas upp\u00e5t och ned\u00e5t i organisationens egen hierarki utan \u00e4ven med de teknologileverant\u00f6rer som f\u00f6retaget v\u00e4ljer att samarbeta med.<\/p>\n\n\n\n<p>P\u00e5 Bluebeam f\u00f6respr\u00e5kar vi en modell med delat ansvar n\u00e4r det g\u00e4ller cybers\u00e4kerhet i byggbranschen. Det inneb\u00e4r att flera intressenter m\u00e5ste involveras f\u00f6r att g\u00f6ra cyberf\u00f6rsvaret s\u00e5 skyddande och effektivt som m\u00f6jligt. Tillsammans erbjuder deras kollektiva skydds\u00e5tg\u00e4rder det starkaste f\u00f6rsvaret mot ett v\u00e4xande hot fr\u00e5n cyberbrottslingar. <\/p>\n\n\n\n<p>F\u00f6ljande intressenter inom byggbranschen har viktiga roller n\u00e4r det g\u00e4ller att ta kollektivt ansvar f\u00f6r cybers\u00e4kerheten:<\/p>\n\n\n\n<p><strong>Entrepren\u00f6rer<\/strong>: F\u00f6rst och fr\u00e4mst m\u00e5ste byggorganisationerna sj\u00e4lva ta cybers\u00e4kerheten p\u00e5 allvar. Det finns flera s\u00e4tt att g\u00f6ra det, men det viktigaste \u00e4r att vidta \u00e5tg\u00e4rder f\u00f6r att s\u00e4kerst\u00e4lla att f\u00f6retagets identitetsinformation och lagrade datasystem \u00e4r skyddade och s\u00e4kra. Det \u00e4r ocks\u00e5 viktigt att byggf\u00f6retagen intar en ledande roll n\u00e4r det g\u00e4ller att kontrollera i vilken utstr\u00e4ckning som alla deras externa aff\u00e4rspartners och leverant\u00f6rer \u00e4r skyddade mot cyberhot.<\/p>\n\n\n\n<p>Slutligen har byggf\u00f6retagen ett ansvar f\u00f6r att se till att samtliga anst\u00e4llda \u00e4r utbildade i de enskilda \u00e5tg\u00e4rder som de m\u00e5ste vidta f\u00f6r att h\u00e5lla sina egna \u2013 och organisationens \u2013 data s\u00e4kra. Det \u00e4r absolut n\u00f6dv\u00e4ndigt att ett f\u00f6retags anst\u00e4llda vet hur man skriver effektiva och s\u00e4kra l\u00f6senord, anv\u00e4nder virtuella privata n\u00e4tverk (VPN) och s\u00e4kra wifi-n\u00e4tverk f\u00f6r k\u00e4nsliga projekt samt hur man anv\u00e4nder sig av protokoll f\u00f6r multifaktorautentisering.<\/p>\n\n\n\n<p><strong>Tredjepartsleverant\u00f6rer av cybers\u00e4kerhet<\/strong>: Varje f\u00f6retag som str\u00e4var efter att h\u00f6ja sin datas\u00e4kerhet kommer sannolikt att samarbeta med en extern leverant\u00f6r av cybers\u00e4kerhet f\u00f6r att f\u00e5 hj\u00e4lp med tj\u00e4nster som l\u00f6senordslagring, autentisering eller inloggningss\u00e4kerhet. Det \u00e4r d\u00e4rf\u00f6r av st\u00f6rsta vikt att de externa cybers\u00e4kerhetsleverant\u00f6rerna har egna f\u00f6rsvar p\u00e5 plats.<\/p>\n\n\n\n<p><strong>Leverant\u00f6rer\/samarbetspartners inom teknologi<\/strong>: Varje g\u00e5ng ett byggf\u00f6retag k\u00f6per in eller skaffar en licens eller prenumeration p\u00e5 n\u00e5gon ny teknologi \u00e4r det helt avg\u00f6rande att teknologileverant\u00f6rerna ocks\u00e5 har vidtagit l\u00e4mpliga \u00e5tg\u00e4rder f\u00f6r att s\u00e4kerst\u00e4lla att deras produkter \u00e4r ordentligt utrustade f\u00f6r att skydda kundernas data. Varje teknologileverant\u00f6r m\u00e5ste ha sin egen programs\u00e4kerhet, n\u00e4tverks- och servers\u00e4kerhet samt intern f\u00f6retagss\u00e4kerhet.<\/p>\n\n\n\n<p><strong>Leverant\u00f6rer\/samarbetspartners inom molntj\u00e4nster<\/strong>: Tack vare den \u00f6kade bearbetningen och lagringen av data i molnet anv\u00e4nder sig i stort sett alla f\u00f6retag idag av en tredjepartsleverant\u00f6r av molntj\u00e4nster, som Amazon Web Services (AWS), Microsoft Azure, IBM Cloud eller Google f\u00f6r att n\u00e4mna n\u00e5gra. De h\u00e4r f\u00f6retagen bygger stora fysiska datacenter \u00f6ver hela v\u00e4rlden, vilket ger deras kunder tillg\u00e5ng till p\u00e5litliga och billiga datalagrings- och utbytestj\u00e4nster utan att beh\u00f6va hysa dyra egna lokala servrar.<\/p>\n\n\n\n<p>Det \u00e4r inte bara de enskilda byggf\u00f6retagen som samarbetar med de h\u00e4r molnleverant\u00f6rerna \u2013 det g\u00f6r \u00e4ven deras partners inom teknologitill\u00e4mpning och cybers\u00e4kerhet. Det r\u00e4cker allts\u00e5 inte med att sj\u00e4lva f\u00f6retaget och dess leverant\u00f6rer av teknologi och datas\u00e4kerhet har sitt cyberf\u00f6rsvar under kontroll \u2013 deras leverant\u00f6rer av molntj\u00e4nster m\u00e5ste ocks\u00e5 ha det.<\/p>\n\n\n\n<p>Det uppn\u00e5r de fr\u00e4mst genom att fokusera p\u00e5 den fysiska s\u00e4kerheten f\u00f6r sina miljontals kvadratmeter datacenteranl\u00e4ggningar, samt att se till att underliggande servrar och n\u00e4tverk f\u00f6ljer med i utvecklingen av myndighetsregler med fokus p\u00e5 datas\u00e4kerhet.<\/p>\n\n\n\n<p>Med de h\u00e4r \u00e5tg\u00e4rderna p\u00e5 plats har byggf\u00f6retagen lagt grunden till att f\u00f6rsvara sig mot det v\u00e4xande hotet fr\u00e5n cyberbrottslingar som pl\u00e5gar branschen.<\/p>\n\n\n\n<div style=\"text-align:center\" class=\"wp-block-atomic-blocks-ab-cta ab-block-cta\"><div class=\"ab-cta-content\"><h2 class=\"ab-cta-title ab-font-size-32\" style=\"color:#32373c\"><strong>L\u00e4s hela v\u00e5rt whitepaper om datas\u00e4kerhet.<\/strong><\/h2><div class=\"ab-cta-text ab-font-size-32\" style=\"color:#32373c\"><\/div><\/div><div class=\"ab-cta-button\"><a href=\"https:\/\/www.bluebeam.com\/se\/resources\/whitepapers\/data-security\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"ab-button ab-button-shape-rounded ab-button-size-medium\" style=\"color:#ffffff;background-color:#3373dc\">LADDA NER NU<\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Byggbranschen \u00e4r ett lockande m\u00e5l f\u00f6r hackare \u2013 s\u00e5 h\u00e4r kan byggf\u00f6retag b\u00f6rja bygga upp ett starkt cyberf\u00f6rsvar<\/p>\n","protected":false},"author":605,"featured_media":81093,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[145],"tags":[16843,16927,16716],"class_list":["post-81092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","tag-cybersakerhet","tag-infora-teknologi","tag-technology","category-145","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e5 kan byggbranschen h\u00f6ja cybers\u00e4kerheten | Built<\/title>\n<meta name=\"description\" content=\"Byggbranschen \u00e4r ett lockande m\u00e5l f\u00f6r hackare \u2013 s\u00e5 h\u00e4r kan byggf\u00f6retagen b\u00f6rja bygga upp ett starkt cyberf\u00f6rsvar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e5 kan byggbranschen h\u00f6ja cybers\u00e4kerheten | Built\" \/>\n<meta property=\"og:description\" content=\"Byggbranschen \u00e4r ett lockande m\u00e5l f\u00f6r hackare \u2013 s\u00e5 h\u00e4r kan byggf\u00f6retagen b\u00f6rja bygga upp ett starkt cyberf\u00f6rsvar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Built | SE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bluebeamSE\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T02:01:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/ConstructionSecurityData-3-Feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Frank Kalman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bluebeam\" \/>\n<meta name=\"twitter:site\" content=\"@bluebeam\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Frank Kalman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/\"},\"author\":{\"name\":\"Frank Kalman\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/person\\\/9d4c3906dc90c112428cfaa63db9d1f5\"},\"headline\":\"S\u00e5 kan byggf\u00f6retagen h\u00f6ja sin cybers\u00e4kerhet\",\"datePublished\":\"2022-12-22T02:01:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/\"},\"wordCount\":704,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/12\\\/ConstructionSecurityData-3-Feature.jpg\",\"keywords\":[\"Cybers\u00e4kerhet\",\"Inf\u00f6ra teknologi\",\"Teknologi\"],\"articleSection\":[\"Innovation\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/\",\"name\":\"S\u00e5 kan byggbranschen h\u00f6ja cybers\u00e4kerheten | Built\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/12\\\/ConstructionSecurityData-3-Feature.jpg\",\"datePublished\":\"2022-12-22T02:01:36+00:00\",\"description\":\"Byggbranschen \u00e4r ett lockande m\u00e5l f\u00f6r hackare \u2013 s\u00e5 h\u00e4r kan byggf\u00f6retagen b\u00f6rja bygga upp ett starkt cyberf\u00f6rsvar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/12\\\/ConstructionSecurityData-3-Feature.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/12\\\/ConstructionSecurityData-3-Feature.jpg\",\"width\":900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/how-construction-can-bolster-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e5 kan byggf\u00f6retagen h\u00f6ja sin cybers\u00e4kerhet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#website\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\",\"name\":\"Built | SE\",\"description\":\"The Bluebeam Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\",\"name\":\"Bluebeam Inc.\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2020\\\/05\\\/bluebeam.png\",\"contentUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2020\\\/05\\\/bluebeam.png\",\"width\":840,\"height\":630,\"caption\":\"Bluebeam Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/bluebeamSE\",\"https:\\\/\\\/x.com\\\/bluebeam\",\"https:\\\/\\\/www.instagram.com\\\/bluebeam_nordics\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/bluebeam-sweden\",\"https:\\\/\\\/youtube.com\\\/bluebeampdfrevu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/person\\\/9d4c3906dc90c112428cfaa63db9d1f5\",\"name\":\"Frank Kalman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g\",\"caption\":\"Frank Kalman\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e5 kan byggbranschen h\u00f6ja cybers\u00e4kerheten | Built","description":"Byggbranschen \u00e4r ett lockande m\u00e5l f\u00f6r hackare \u2013 s\u00e5 h\u00e4r kan byggf\u00f6retagen b\u00f6rja bygga upp ett starkt cyberf\u00f6rsvar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/","og_locale":"sv_SE","og_type":"article","og_title":"S\u00e5 kan byggbranschen h\u00f6ja cybers\u00e4kerheten | Built","og_description":"Byggbranschen \u00e4r ett lockande m\u00e5l f\u00f6r hackare \u2013 s\u00e5 h\u00e4r kan byggf\u00f6retagen b\u00f6rja bygga upp ett starkt cyberf\u00f6rsvar.","og_url":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/","og_site_name":"Built | SE","article_publisher":"https:\/\/www.facebook.com\/bluebeamSE","article_published_time":"2022-12-22T02:01:36+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/ConstructionSecurityData-3-Feature.jpg","type":"image\/jpeg"}],"author":"Frank Kalman","twitter_card":"summary_large_image","twitter_creator":"@bluebeam","twitter_site":"@bluebeam","twitter_misc":{"Skriven av":"Frank Kalman","Ber\u00e4knad l\u00e4stid":"3 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/"},"author":{"name":"Frank Kalman","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/person\/9d4c3906dc90c112428cfaa63db9d1f5"},"headline":"S\u00e5 kan byggf\u00f6retagen h\u00f6ja sin cybers\u00e4kerhet","datePublished":"2022-12-22T02:01:36+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/"},"wordCount":704,"publisher":{"@id":"https:\/\/blog.bluebeam.com\/se\/#organization"},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/ConstructionSecurityData-3-Feature.jpg","keywords":["Cybers\u00e4kerhet","Inf\u00f6ra teknologi","Teknologi"],"articleSection":["Innovation"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/","url":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/","name":"S\u00e5 kan byggbranschen h\u00f6ja cybers\u00e4kerheten | Built","isPartOf":{"@id":"https:\/\/blog.bluebeam.com\/se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/ConstructionSecurityData-3-Feature.jpg","datePublished":"2022-12-22T02:01:36+00:00","description":"Byggbranschen \u00e4r ett lockande m\u00e5l f\u00f6r hackare \u2013 s\u00e5 h\u00e4r kan byggf\u00f6retagen b\u00f6rja bygga upp ett starkt cyberf\u00f6rsvar.","breadcrumb":{"@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/#primaryimage","url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/ConstructionSecurityData-3-Feature.jpg","contentUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/ConstructionSecurityData-3-Feature.jpg","width":900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/blog.bluebeam.com\/se\/how-construction-can-bolster-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.bluebeam.com\/se\/"},{"@type":"ListItem","position":2,"name":"S\u00e5 kan byggf\u00f6retagen h\u00f6ja sin cybers\u00e4kerhet"}]},{"@type":"WebSite","@id":"https:\/\/blog.bluebeam.com\/se\/#website","url":"https:\/\/blog.bluebeam.com\/se\/","name":"Built | SE","description":"The Bluebeam Blog","publisher":{"@id":"https:\/\/blog.bluebeam.com\/se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.bluebeam.com\/se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/blog.bluebeam.com\/se\/#organization","name":"Bluebeam Inc.","url":"https:\/\/blog.bluebeam.com\/se\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/logo\/image\/","url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2020\/05\/bluebeam.png","contentUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2020\/05\/bluebeam.png","width":840,"height":630,"caption":"Bluebeam Inc."},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bluebeamSE","https:\/\/x.com\/bluebeam","https:\/\/www.instagram.com\/bluebeam_nordics\/","https:\/\/www.linkedin.com\/showcase\/bluebeam-sweden","https:\/\/youtube.com\/bluebeampdfrevu"]},{"@type":"Person","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/person\/9d4c3906dc90c112428cfaa63db9d1f5","name":"Frank Kalman","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/secure.gravatar.com\/avatar\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ec71058f1e8dd24edfc7c319b928579669acb40f375fffb3fba6bfb49a3d328?s=96&d=mm&r=g","caption":"Frank Kalman"}}]}},"featured_image_src":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/ConstructionSecurityData-3-Feature-600x400.jpg","featured_image_src_square":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/ConstructionSecurityData-3-Feature-600x600.jpg","author_info":{"display_name":"Frank Kalman","author_link":"https:\/\/blog.bluebeam.com\/se\/author\/kalman\/"},"_links":{"self":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts\/81092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/users\/605"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/comments?post=81092"}],"version-history":[{"count":0,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts\/81092\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/media\/81093"}],"wp:attachment":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/media?parent=81092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/categories?post=81092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/tags?post=81092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}