{"id":1701,"date":"2023-04-08T14:32:10","date_gmt":"2023-04-08T14:32:10","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1701"},"modified":"2023-04-08T14:32:10","modified_gmt":"2023-04-08T14:32:10","slug":"hall-dig-saker-vid-globala-handelser-bekampa-cyberhot","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/hall-dig-saker-vid-globala-handelser-bekampa-cyberhot\/","title":{"rendered":"H\u00e5ll dig s\u00e4ker vid globala evenemang: Bek\u00e4mpning av cyberhot och s\u00e4kerst\u00e4llande av v\u00e4lbefinnande"},"content":{"rendered":"<p>Inf\u00f6r en oroande situation med global p\u00e5verkan \u00e4r det viktigt att sprida sanningsenlig och exakt information f\u00f6r att definiera de kontroll- och skydds\u00e5tg\u00e4rder som m\u00e5ste genomf\u00f6ras f\u00f6r att begr\u00e4nsa skadan. I en s\u00e5dan situation hittar cyberbrottslingar nya nischer f\u00f6r bedr\u00e4gerier. Till exempel i det specifika fallet med COVID-19-pandemin, <a href=\"https:\/\/f3magazine.unicri.it\/?p=2085\" target=\"_blank\" rel=\"noreferrer noopener\">cyberbrottslingar presenterade ett nytt s\u00e4tt att arbeta<\/a>. Detta har best\u00e5tt i att utge sig f\u00f6r att vara internationella h\u00e4lsoorganisationer, som V\u00e4rldsh\u00e4lsoorganisationen, andra sjukv\u00e5rdsorganisationer och andra statliga enheter, genom skadliga e-postkampanjer. Dessa \u00e4r utformade f\u00f6r att framkalla r\u00e4dsla i hopp om att utl\u00f6sa \u00e5tg\u00e4rder som g\u00f6r det m\u00f6jligt f\u00f6r dem att f\u00e5 tillg\u00e5ng till k\u00e4nsliga informationssystem.<\/p>\n\n\n\n<p>Detta \u00e4r dock inte den enda aspekten relaterad till cybers\u00e4kerhet som organisationer b\u00f6r vara uppm\u00e4rksamma p\u00e5. F\u00f6r att aktivt bem\u00f6ta de h\u00e4lsorisker som \u00e4r f\u00f6rknippade med covid-19 har m\u00e5nga f\u00f6retag b\u00f6rjat \u00f6verg\u00e5 fr\u00e5n sitt vanliga arbetss\u00e4tt till ett alternativt arbetss\u00e4tt som bygger p\u00e5 distansarbete eller arbete p\u00e5 distans via virtuella kontor.<\/p>\n\n\n\n<p>Ett omfattande och v\u00e4lstrukturerat tillv\u00e4gag\u00e5ngss\u00e4tt under en extraordin\u00e4r h\u00e4ndelse, som den vi upplever just nu, g\u00f6r det m\u00f6jligt f\u00f6r organisationer att hantera cybers\u00e4kerhetsutmaningar proaktivt.<\/p>\n\n\n<h2 class=\"simpletoc-title\">Inneh\u00e5llsf\u00f6rteckning<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#recommendations-for-cybersecurity-amidst-extraordinary-events\">Rekommendationer f\u00f6r cybers\u00e4kerhet i samband med extraordin\u00e4ra h\u00e4ndelser<\/a>\n\n<\/li>\n<li><a href=\"#ransomware-and-covid19\">Utpressningsprogram och covid-19<\/a>\n\n<\/li>\n<li><a href=\"#phishing-and-covid19\">N\u00e4tfiske och covid-19<\/a>\n\n<\/li>\n<li><a href=\"#identity-theft-and-covid19\">Identitetsst\u00f6ld och covid-19<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"recommendations-for-cybersecurity-amidst-extraordinary-events\">Rekommendationer f\u00f6r cybers\u00e4kerhet i samband med extraordin\u00e4ra h\u00e4ndelser<\/h2>\n\n\n<p>Mot bakgrund av de skydds\u00e5tg\u00e4rder som vidtagits till f\u00f6ljd av covid-19-pandemin har f\u00f6retagen \u00e4ndrat sina aff\u00e4rsprocesser <a href=\"https:\/\/www.mckinsey.com\/capabilities\/strategy-and-corporate-finance\/our-insights\/how-covid-19-has-pushed-companies-over-the-technology-tipping-point-and-transformed-business-forever\" target=\"_blank\" rel=\"noreferrer noopener\">mot fj\u00e4rr\u00e5tkomst<\/a> och samarbetstj\u00e4nster under de senaste tre \u00e5ren. Denna f\u00f6r\u00e4ndring har medf\u00f6rt nya risker, vilket g\u00f6r det n\u00f6dv\u00e4ndigt att anpassa policyer, processer och kontroller f\u00f6r cybers\u00e4kerhet till det nya verksamhetsscenariot.<\/p>\n\n\n\n<p>Med tanke p\u00e5 att fyra \u00e5r har g\u00e5tt sedan pandemin br\u00f6t ut, och p\u00e5 grund av covid-19:s muterande natur, m\u00e5ste allt fler organisationer anpassa sina nuvarande processer f\u00f6r att utf\u00f6ra de flesta av sina operationer p\u00e5 distans. Som svar p\u00e5 detta m\u00e5ste de relaterade informationss\u00e4kerhetskontrollerna ocks\u00e5 justeras och motsvarande cybers\u00e4kerhetskonfigurationer m\u00e5ste uppdateras.<\/p>\n\n\n\n<p>Till exempel har medarbetare nu massiv fj\u00e4rr\u00e5tkomst, vilket kr\u00e4ver att organisationerna har st\u00f6rre bearbetningskapacitet och anslutningsm\u00f6jligheter. Dessutom m\u00e5ste de \u00f6ppna eller ut\u00f6ka fler gr\u00e4nssnitt f\u00f6r att f\u00e5 tillg\u00e5ng till interna tj\u00e4nster och m\u00f6jligg\u00f6ra datatillg\u00e5ngsr\u00e4ttigheter via ett offentligt n\u00e4tverk. F\u00f6retag b\u00f6r inte f\u00f6rsumma eller \u00f6verge \u00e5tg\u00e4rder f\u00f6r hantering av cyberrisker p\u00e5 grund av detta speciella sammanhang. Genom att tillf\u00e4lligt justera policyerna f\u00f6r cybers\u00e4kerhet och hantering av n\u00e4tverkskapacitet kan organisationerna p\u00e5 ett effektivt s\u00e4tt m\u00f6ta de cyberhot som det nya verksamhetsscenariot inneb\u00e4r.<\/p>\n\n\n\n<p>I takt med att f\u00f6retag rekommenderar distansarbete f\u00f6r sina anst\u00e4llda \u00f6kar anv\u00e4ndningen av mobila enheter och fj\u00e4rr\u00e5tkomst till centrala aff\u00e4rssystem. D\u00e4rf\u00f6r \u00e4r det viktigt att st\u00e4rka den organisatoriska hanteringen av identitets\u00e5tkomst och f\u00f6rb\u00e4ttra \u00f6vervakningen och korrelationen av h\u00e4ndelser.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-and-covid19\">Utpressningsprogram och covid-19<\/h2>\n\n\n<p>Cyberriskerna \u00f6kar n\u00e4r man arbetar p\u00e5 distans eller hemifr\u00e5n. Proaktiva \u00e5tg\u00e4rder kan f\u00f6rb\u00e4ttra anv\u00e4ndarupplevelsen och cybers\u00e4kerheten n\u00e4r man arbetar enligt detta system. Enheter som inte har det n\u00f6dv\u00e4ndiga skyddet kan leda till dataf\u00f6rlust, integritetskr\u00e4nkningar och system som faller offer f\u00f6r utpressningstrojaner.<\/p>\n\n\n\n<p>F\u00f6r att mildra den boost som COVID-19 gav ransomware rekommenderas det att:<\/p>\n\n\n\n<p>Implementera ett konsekvent lager av multifaktorautentisering eller progressiv autentisering baserat p\u00e5 hur kritisk \u00e5tkomstbeg\u00e4ran \u00e4r. <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Se till att identitetshanteringsprocesserna s\u00e4krar alla tredjepartsidentiteter med \u00e5tkomst till f\u00f6retagets n\u00e4tverk. <\/li>\n\n\n\n<li>Har en helt\u00e4ckande bild av privilegierade identiteter i sina IT-milj\u00f6er, inklusive en procedur f\u00f6r att uppt\u00e4cka, f\u00f6rhindra eller ta bort f\u00f6r\u00e4ldral\u00f6sa konton. <\/li>\n\n\n\n<li>F\u00f6rb\u00e4ttra granulariteten i s\u00e4kerhets\u00f6vervakningen och f\u00f6rb\u00e4ttra \u00f6vervakningen i fj\u00e4rrstyrningsscenarier. <\/li>\n\n\n\n<li>\u00d6vervaka driften av funktioner f\u00f6r hantering av cybers\u00e4kerhet; identifiera vilka som kan vara ur funktion och f\u00f6rseningar i s\u00e4kerhets\u00e5tg\u00e4rderna.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"phishing-and-covid19\">N\u00e4tfiske och covid-19<\/h2>\n\n\n<p>Kriser minskar slutanv\u00e4ndarnas vaksamhet och skydd och leder till att cyberbrottslingar utnyttjar situationen och anv\u00e4nder sig av skadliga metoder. D\u00e4rf\u00f6r rekommenderas en \u00f6kad medvetenhet om uppkomsten av nya cyberhot. Under pandemin f\u00e5r medarbetarna st\u00e4ndigt en stor m\u00e4ngd information om den fr\u00e5n interna och externa k\u00e4llor. Detta kan orsaka psykologisk press, vilket minskar deras vakenhet och p\u00e5verkar deras f\u00f6rm\u00e5ga att reagera p\u00e5 cyberhot, t.ex. cyberattacker som bygger p\u00e5 social ingenj\u00f6rskonst eller n\u00e4tfiske.<\/p>\n\n\n\n<p>COVID-19-relaterade phishing-kampanjer, d\u00e4r cyberbrottslingar utger sig f\u00f6r att vara t.ex. v\u00e4lrenommerade h\u00e4lsoorganisationer, har \u00f6kat. Av denna anledning m\u00e5ste organisationer vara vaksamma p\u00e5 bedr\u00e4gliga meddelanden relaterade till denna pandemi. Cyberbrottslingar kan skicka e-postmeddelanden med skadliga bilagor eller l\u00e4nkar till bedr\u00e4gliga webbplatser f\u00f6r att lura offren att l\u00e4mna ut k\u00e4nslig information eller donera till bedr\u00e4gliga organisationer eller \u00e4ndam\u00e5l. Attacker som dessa kan spridas snabbt och brett i ett helt aff\u00e4rsn\u00e4tverk, vilket leder till identitetsst\u00f6ld och inl\u00e4mning av falska betalningsanspr\u00e5k och f\u00f6rm\u00e5nsprogram. Men det \u00f6kade psykologiska trycket p\u00e5verkar inte bara i denna bem\u00e4rkelse. Fenomenet kan ocks\u00e5 leda till att medarbetare blir mer ben\u00e4gna att g\u00f6ra fel i hanteringsprocesser eller \u00e4gna sig \u00e5t os\u00e4kra beteenden, som att dela med sig av privat information eller inloggningsuppgifter. <\/p>\n\n\n\n<p>D\u00e4rf\u00f6r rekommenderas att man genomf\u00f6r medvetandeh\u00f6jande \u00e5tg\u00e4rder med hj\u00e4lp av meddelanden, enligt f\u00f6ljande riktlinjer:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/securitybriefing.net\/sv\/cyberattacker\/hur-skydda-ditt-foretag-fran-phishing-attacker-via-e-post\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Var f\u00f6rsiktig n\u00e4r du hanterar e-post<\/a> med en \u00e4mnesrad, bilaga eller hyperl\u00e4nk som r\u00f6r covid-19, och var f\u00f6rsiktig med uppmaningar, sms eller samtal fr\u00e5n sociala medier som r\u00f6r covid-19.<\/li>\n\n\n\n<li>Anv\u00e4nd p\u00e5litliga k\u00e4llor som t.ex. legitima myndigheters webbplatser f\u00f6r uppdaterad, faktabaserad information om COVID-19.<\/li>\n\n\n\n<li>L\u00e4mna inte ut personlig eller ekonomisk information i ett e-postmeddelande och svara inte p\u00e5 f\u00f6rfr\u00e5gningar om s\u00e5dan information.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"identity-theft-and-covid19\">Identitetsst\u00f6ld och covid-19<\/h2>\n\n\n<p>Det finns en st\u00f6rre risk f\u00f6r att konfidentiella eller privata uppgifter l\u00e4cker ut i os\u00e4kra milj\u00f6er, s\u00e5 det \u00e4r rekommenderat att hantera fj\u00e4rranslutningar. M\u00f6jligheterna till fj\u00e4rr\u00e5tkomst och samarbete via n\u00e4tverk och enheter som inte tillh\u00f6r f\u00f6retaget har \u00f6kat. I det r\u00e5dande klimatet kan anst\u00e4llda frestas att anv\u00e4nda dessa metoder i st\u00e4llet f\u00f6r f\u00f6retagets egna.<\/p>\n\n\n\n<p>Denna situation kan leda till att konfidentiella uppgifter exponeras p\u00e5 n\u00e4tverk utanf\u00f6r f\u00f6retaget, sociala n\u00e4tverk och\/eller tredjepartsplattformar som saknar l\u00e4mpliga skydds\u00e5tg\u00e4rder. Dessutom har m\u00e5nga smarta n\u00e4tverksenheter med svaga s\u00e4kerhetsfunktioner kommit in i hemmen under de senaste \u00e5ren. De m\u00e5nga s\u00e4kerhetsbristerna i dessa enheter utg\u00f6r risker som olika s\u00e4kerhetsorgan har varnat f\u00f6r, och som blir mer relevanta och k\u00e4nnbara i samband med \"massiva\" fj\u00e4rroperationer.<\/p>\n\n\n\n<p>Dessa enheter skapar ocks\u00e5 risker genom os\u00e4kra standardkonfigurationer, brist p\u00e5 underh\u00e5ll eller support fr\u00e5n leverant\u00f6ren, brist p\u00e5 s\u00e4kerhetsuppdateringar och ok\u00e4nda \u00e5tkomstm\u00f6jligheter f\u00f6r anv\u00e4ndare.<\/p>\n\n\n\n<p>F\u00f6retagen m\u00e5ste identifiera och klassificera kraven p\u00e5 fj\u00e4rranslutning, identifiera relaterade risker och snabbt bekr\u00e4fta den tr\u00f6skel f\u00f6r aff\u00e4rss\u00e4kerhet som till\u00e5ts i denna situation. Samtidigt m\u00e5ste de undvika att acceptera m\u00e5nga undantag som undergr\u00e4ver niv\u00e5n p\u00e5 hantering och kontroll av informationss\u00e4kerhet, s\u00e4rskilt n\u00e4r dessa undantag beror p\u00e5 sekund\u00e4ra aff\u00e4rsbehov.<\/p>\n\n\n\n<p><strong>Cybers\u00e4kerhet i molnet och Covid-19<\/strong><\/p>\n\n\n\n<p>Den digitala omvandlingen g\u00f6r det m\u00f6jligt f\u00f6r offentliga, privata och blandade f\u00f6retag att utveckla cybers\u00e4kerhetssystem och \u00e5tg\u00e4rder f\u00f6r att f\u00f6rhindra intr\u00e5ng i och tillg\u00e5ng till kritiska system. Det rekommenderas att ha en cyber\u00e5terst\u00e4llningsplan. P\u00e5 s\u00e5 s\u00e4tt k\u00e4nnetecknas den nuvarande dator\u00e5ldern av en st\u00f6rre teknisk omvandling och anv\u00e4ndningen av molnet eller st\u00f6rre n\u00e4tverkskapacitet visar att cyberhotpanoramat kommer att forts\u00e4tta att \u00f6ka.<\/p>\n\n\n\n<p>I det h\u00e4r sammanhanget f\u00f6rs\u00f6ker cyberbrottslingar attackera operativsystem och backup-kapacitet samtidigt under ett mycket sofistikerat driftschema, vilket kan orsaka betydande risker f\u00f6r alla f\u00f6retag.<\/p>\n\n\n\n<p>F\u00f6retag kan f\u00f6rb\u00e4ttra sin cyberf\u00f6rsvarsposition och <a href=\"https:\/\/securitybriefing.net\/sv\/cyberattacker\/de-mest-utbredda-typerna-av-cyberattacker-mot-foretag-och-hur-man-undviker-dem\/\">cyberattack<\/a> Cyberberedskap inneb\u00e4r god cyberhygien, en strategi f\u00f6r incidenthantering samt utformning och implementering av l\u00f6sningar f\u00f6r cyber\u00e5terst\u00e4llning, vilket kommer att mildra effekterna av cyberattacker. Ett livskraftigt cyberresiliensprogram utvidgar gr\u00e4nserna f\u00f6r traditionella riskdom\u00e4ner till att omfatta nya funktioner, till exempel supporttj\u00e4nster f\u00f6r anst\u00e4llda, verktyg f\u00f6r fj\u00e4rrkommunikation och samarbete samt ett \u00e5terst\u00e4llningsvalv.<\/p>","protected":false},"excerpt":{"rendered":"<p>Inf\u00f6r en oroande situation med global p\u00e5verkan \u00e4r det viktigt att sprida sanningsenlig och exakt information f\u00f6r att definiera de kontroll- och skydds\u00e5tg\u00e4rder som m\u00e5ste genomf\u00f6ras f\u00f6r att begr\u00e4nsa skadorna. I... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/hall-dig-saker-vid-globala-handelser-bekampa-cyberhot\/\">Continue reading <span class=\"screen-reader-text\">H\u00e5ll dig s\u00e4ker vid globala evenemang: Bek\u00e4mpning av cyberhot och s\u00e4kerst\u00e4llande av v\u00e4lbefinnande<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1707,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Staying Safe in Global Events: Combating Cyber Threats<\/title>\n<meta name=\"description\" content=\"In global crises, prioritize accurate info and cybersecurity to protect sensitive systems from cybercriminals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/hall-dig-saker-vid-globala-handelser-bekampa-cyberhot\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Staying Safe in Global Events: Combating Cyber Threats\" \/>\n<meta property=\"og:description\" content=\"In global crises, prioritize accurate info and cybersecurity to protect sensitive systems from cybercriminals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/hall-dig-saker-vid-globala-handelser-bekampa-cyberhot\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-08T14:32:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Staying Safe in Global Events: Combating Cyber Threats &amp; Ensuring Well-being\",\"datePublished\":\"2023-04-08T14:32:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\"},\"wordCount\":1205,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\",\"name\":\"Staying Safe in Global Events: Combating Cyber Threats\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\",\"datePublished\":\"2023-04-08T14:32:10+00:00\",\"description\":\"In global crises, prioritize accurate info and cybersecurity to protect sensitive systems from cybercriminals.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\",\"width\":696,\"height\":300,\"caption\":\"Staying Safe in Global Events Combating Cyber Threats & Ensuring Well-being\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Staying Safe in Global Events: Combating Cyber Threats &amp; Ensuring Well-being\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"H\u00e5ll dig s\u00e4ker vid globala evenemang: Bek\u00e4mpning av cyberhot","description":"Vid globala kriser b\u00f6r man prioritera korrekt information och cybers\u00e4kerhet f\u00f6r att skydda k\u00e4nsliga system fr\u00e5n cyberbrottslingar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/hall-dig-saker-vid-globala-handelser-bekampa-cyberhot\/","og_locale":"sv_SE","og_type":"article","og_title":"Staying Safe in Global Events: Combating Cyber Threats","og_description":"In global crises, prioritize accurate info and cybersecurity to protect sensitive systems from cybercriminals.","og_url":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/hall-dig-saker-vid-globala-handelser-bekampa-cyberhot\/","og_site_name":"Security Briefing","article_published_time":"2023-04-08T14:32:10+00:00","og_image":[{"width":696,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"C\u00e9sar Daniel Barreto","Ber\u00e4knad l\u00e4stid":"6 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Staying Safe in Global Events: Combating Cyber Threats &amp; Ensuring Well-being","datePublished":"2023-04-08T14:32:10+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/"},"wordCount":1205,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","articleSection":["cybersecurity"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/","name":"H\u00e5ll dig s\u00e4ker vid globala evenemang: Bek\u00e4mpning av cyberhot","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","datePublished":"2023-04-08T14:32:10+00:00","description":"Vid globala kriser b\u00f6r man prioritera korrekt information och cybers\u00e4kerhet f\u00f6r att skydda k\u00e4nsliga system fr\u00e5n cyberbrottslingar.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","width":696,"height":300,"caption":"Staying Safe in Global Events Combating Cyber Threats & Ensuring Well-being"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Staying Safe in Global Events: Combating Cyber Threats &amp; Ensuring Well-being"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar Daniel Barreto","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e4r en uppskattad cybers\u00e4kerhetsskribent och expert, k\u00e4nd f\u00f6r sin djupg\u00e5ende kunskap och f\u00f6rm\u00e5ga att f\u00f6renkla komplexa cybers\u00e4kerhets\u00e4mnen. Han har l\u00e5ng erfarenhet av n\u00e4tverkss\u00e4kerhet och dataskydd och bidrar regelbundet med insiktsfulla artiklar och analyser om de senaste trenderna inom cybers\u00e4kerhet, som utbildar b\u00e5de yrkesverksamma och allm\u00e4nheten.","url":"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=1701"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1701\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/1707"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=1701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=1701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=1701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}