{"id":7466,"date":"2021-09-14T08:20:59","date_gmt":"2021-09-14T08:20:59","guid":{"rendered":"https:\/\/knowhow.distrelec.com\/?p=7466"},"modified":"2021-10-17T17:17:17","modified_gmt":"2021-10-17T17:17:17","slug":"den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk","status":"publish","type":"post","link":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/","title":{"rendered":"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk"},"content":{"rendered":"\n<p>Cybersikkerhetsproblemer blir en daglig kamp for industribedrifter. Nyere trender og cybersecurity-statistikk har avdekket en enorm \u00f8kning i hacket og brutt data fra kilder som er stadig vanligere p\u00e5 arbeidsplassen, som mobile og IoT-enheter.<br><br>Hovedm\u00e5let til ethvert industriselskap er \u00e5 \u00f8ke og maksimere fortjenesten. N\u00f8kkelen til \u00e5 oppn\u00e5 dette er \u00e5 redusere driftskostnadene og \u00f8ke produksjonseffektiviteten. Dette krever at det tas informerte beslutninger, som igjen er avhengige av et vell av data som overf\u00f8res fra og mellom smarte enheter og maskiner som kommuniserer effektivt i et nettverk.<br><br>I tillegg antyder nylig sikkerhetsforskning at de fleste selskaper har ubeskyttet data og d\u00e5rlig cybersikkerhetspraksis, noe som gj\u00f8r dem s\u00e5rbare for tap av data. For \u00e5 lykkes med \u00e5 bekjempe ondsinnede hensikter, er det viktig at selskaper gj\u00f8r cybersikkerhetsbevissthet, forebygging og sikkerhet best practices til en del av deres kultur. I denne artikkelen ser vi n\u00e6rmere p\u00e5 hva som trengs for \u00e5 sikre ditt industrielle nettverk og enhetene som kobles til det.<\/p>\n\n\n\n<h2 id=\"okt-sarbarhet-for-nettangrep\" class=\"wp-block-heading\">\u00d8kt s\u00e5rbarhet for nettangrep<\/h2>\n\n\n\n<p>Tilkobling av enheter i et automatisert nettverk styrt av programmerbare logikkontrollere (PLC), et distribuert kontrollsystem (DCS) eller et SCADA-system (Supervisory Control and Data Acquisition) er ikke noe nytt innen industriens verden.<br><br>Imidlertid har disse operasjonelle teknologisystemene tradisjonelt blitt isolert fra de mer s\u00e5rbare bedriftsnettverkene. P\u00e5 grunn av denne isolasjonen har industrielle nettverk hatt en lav risiko for nettangrep, og cybersikkerhet har ikke v\u00e6rt et hovedanliggende for systemoperat\u00f8rer.<br><br>Tidene er i endring, men med IoT-praksis for \u00e5 koble industri- og bedriftsnettverk for \u00e5 sikre en s\u00f8ml\u00f8s og kontinuerlig dataflyt mellom alle enheter, er det n\u00e5 viktig \u00e5 implementere cybersikkerhetstiltak for \u00e5 sikre hele nettverket ditt.<br><br>Hver tilkoblet enhet \u00f8ker nettverkets s\u00e5rbarhet for nettangrep og et enkelt hull i gjerdet, for eksempel en utdatert eldre enhet eller en ubeskyttet bryter, er alt en hacker med skadelige hensiktsbehov for \u00e5 trenge gjennom nettverket ditt og begynne \u00e5 sifonere verdifulle data &#8211; eller til og med ta kontroll over hele prosessen.<\/p>\n\n\n\n<h2 id=\"tre-viktige-cybersikkerhetsfaktorer\" class=\"wp-block-heading\">Tre viktige cybersikkerhetsfaktorer<\/h2>\n\n\n\n<p>Vi forst\u00e5r at utforming, implementering og \u00f8kt sikkerhet i nettverkene dine kan v\u00e6re en utfordrende oppgave, ettersom det er flere aspekter \u00e5 vurdere.<br><br>Fra et grunnleggende punkt er det tre viktige faktorer som m\u00e5 tas opp n\u00e5r du bygger din cybersikkerhetsinfrastruktur:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Nettverksikkerhet<\/li><li>Enhetssikkerhet<\/li><li>Sikker overv\u00e5king og styring<\/li><\/ul>\n\n\n\n<h2 id=\"beste-praksis-for-nettverkssikkerhet\" class=\"wp-block-heading\">Beste praksis for nettverkssikkerhet<\/h2>\n\n\n\n<p>Til tross for forskjellene i prioriteringer og teknikker som brukes til \u00e5 beskytte industrielle kontrollsystemer kontra IT-systemer for bedrifter, har flere industriforeninger utviklet standarder og sikkerhetsretningslinjer for \u00e5 koble eller konvertere ICS med IT-systemer.<br><br>Tre pilarer for \u00e5 sikre industrielle nettverk inkluderer:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Implementere Defense in Depth (DiD) beskyttelse for industrielle nettverk<\/li><li>Aktiver sikkerhetsinnstillinger p\u00e5 dine industrielle nettverk<\/li><li>Administrer sikkerhet gjennom kursing, interne rutiner og overv\u00e5king<\/li><\/ul>\n\n\n\n<p>Basert p\u00e5 disse tre s\u00f8ylene anbefales f\u00f8lgende fremgangsm\u00e5ter som det f\u00f8rste trinnet for \u00e5 st\u00f8tte et cybersikkerhetssystem for industrielle kontrollsystemer.<\/p>\n\n\n\n<h2 id=\"cybersecurity-statistics\" class=\"wp-block-heading\">Cybersecurity Statistics<\/h2>\n\n\n\n<p>Skaden relatert til nettkriminalitet ansl\u00e5s \u00e5 sl\u00e5 $ 6 billioner \u00e5rlig innen 2021, if\u00f8lge&nbsp;<a href=\"http:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Ventures<\/a>. For \u00e5 gi deg et lite innblikk i den n\u00e5v\u00e6rende tilstanden av generell sikkerhet, har vi samlet 5 viktige statistikker om datainnbrudd, hacking, bransjespesifikk statistikk, samt utgifter og kostnader.<br><br>De fem store<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Verdensomspennende utgifter til cybersikkerhet vil n\u00e5 $ 133,7 milliarder dollar i 2022. (<a href=\"http:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a>)<\/li><li>68% av bedriftens ledere f\u00f8ler at cybersikkerhetsrisikoen \u00f8ker. (<a href=\"http:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon<\/a>)<\/li><li>41% av kundene ville slutte \u00e5 kj\u00f8pe fra et virksomhetsoffer for et ransomware-angrep. (<a href=\"http:\/\/www.fintechnews.org\/the-2020-cybersecurity-stats-you-need-to-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fintechnews<\/a>)<\/li><li>86% av bruddene var \u00f8konomisk motivert og 25% var motivert av spionasje. (<a href=\"http:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon<\/a>)<\/li><li>52% av bruddene inneholdt hacking, 28% involverte skadelig programvare og 32\u201333% inkluderte henholdsvis phishing eller sosialteknikk. (<a href=\"http:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon<\/a>)<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"Cybersikkerhetsproblemer blir en daglig kamp for industribedrifter. Nyere trender og cybersecurity-statistikk har avdekket en enorm \u00f8kning i hacket&hellip;\n","protected":false},"author":13,"featured_media":8909,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[214],"tags":[],"coauthors":[],"class_list":{"0":"post-7466","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-it-digital","8":"cs-entry","9":"cs-video-wrap"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk - KnowHow<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/\" \/>\n<meta property=\"og:locale\" content=\"nb_NO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk - KnowHow\" \/>\n<meta property=\"og:description\" content=\"Cybersikkerhetsproblemer blir en daglig kamp for industribedrifter. Nyere trender og cybersecurity-statistikk har avdekket en enorm \u00f8kning i hacket&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/\" \/>\n<meta property=\"og:site_name\" content=\"KnowHow\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-14T08:20:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-17T17:17:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ken Berkley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ken Berkley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ansl. lesetid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutter\" \/>\n\t<meta name=\"twitter:label3\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data3\" content=\"Ken Berkley\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/\"},\"author\":{\"name\":\"Ken Berkley\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/person\/03054fa7e45994b39e63e34a8d07e7f4\"},\"headline\":\"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk\",\"datePublished\":\"2021-09-14T08:20:59+00:00\",\"dateModified\":\"2021-10-17T17:17:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/\"},\"wordCount\":580,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#organization\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\",\"articleSection\":[\"IT &amp; digital\"],\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/\",\"url\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/\",\"name\":\"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk - KnowHow\",\"isPartOf\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\",\"datePublished\":\"2021-09-14T08:20:59+00:00\",\"dateModified\":\"2021-10-17T17:17:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#breadcrumb\"},\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#primaryimage\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg\",\"width\":2000,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hjem\",\"item\":\"https:\/\/knowhow.distrelec.com\/no\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#website\",\"url\":\"https:\/\/knowhow.distrelec.com\/no\/\",\"name\":\"KnowHow\",\"description\":\"KnowHow Hub\",\"publisher\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/knowhow.distrelec.com\/no\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nb-NO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#organization\",\"name\":\"Distrelec\",\"url\":\"https:\/\/knowhow.distrelec.com\/no\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png\",\"width\":530,\"height\":98,\"caption\":\"Distrelec\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/person\/03054fa7e45994b39e63e34a8d07e7f4\",\"name\":\"Ken Berkley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/person\/image\/c74d33c40ed3adfd1fb8b6b8d6c5a0bd\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/10\/cropped-Ken-Berkley-1-96x96.jpg\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/10\/cropped-Ken-Berkley-1-96x96.jpg\",\"caption\":\"Ken Berkley\"},\"description\":\"Ken Berkley is a Results-driven SEO &amp; Content Manager here at Disterelec. With over 10 years\u2019 experience within the search industry Ken prides himself on implementing best practise and SEO techniques to improve organic ranking and visibility.\",\"sameAs\":[\"http:\/\/www.distrelec.com\",\"https:\/\/uk.linkedin.com\/in\/ken-berkley\"],\"url\":\"https:\/\/knowhow.distrelec.com\/no\/author\/ken-berkley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk - KnowHow","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/","og_locale":"nb_NO","og_type":"article","og_title":"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk - KnowHow","og_description":"Cybersikkerhetsproblemer blir en daglig kamp for industribedrifter. Nyere trender og cybersecurity-statistikk har avdekket en enorm \u00f8kning i hacket&hellip;","og_url":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/","og_site_name":"KnowHow","article_published_time":"2021-09-14T08:20:59+00:00","article_modified_time":"2021-10-17T17:17:17+00:00","og_image":[{"width":2000,"height":800,"url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","type":"image\/jpeg"}],"author":"Ken Berkley","twitter_card":"summary_large_image","twitter_misc":{"Skrevet av":"Ken Berkley","Ansl. lesetid":"3 minutter","Written by":"Ken Berkley"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#article","isPartOf":{"@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/"},"author":{"name":"Ken Berkley","@id":"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/person\/03054fa7e45994b39e63e34a8d07e7f4"},"headline":"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk","datePublished":"2021-09-14T08:20:59+00:00","dateModified":"2021-10-17T17:17:17+00:00","mainEntityOfPage":{"@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/"},"wordCount":580,"commentCount":0,"publisher":{"@id":"https:\/\/knowhow.distrelec.com\/no\/#organization"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#primaryimage"},"thumbnailUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","articleSection":["IT &amp; digital"],"inLanguage":"nb-NO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/","url":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/","name":"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk - KnowHow","isPartOf":{"@id":"https:\/\/knowhow.distrelec.com\/no\/#website"},"primaryImageOfPage":{"@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#primaryimage"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#primaryimage"},"thumbnailUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","datePublished":"2021-09-14T08:20:59+00:00","dateModified":"2021-10-17T17:17:17+00:00","breadcrumb":{"@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#breadcrumb"},"inLanguage":"nb-NO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/"]}]},{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#primaryimage","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","width":2000,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/knowhow.distrelec.com\/no\/it-digital\/den-ultimate-guiden-for-a-sikre-ditt-industrielle-nettverk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hjem","item":"https:\/\/knowhow.distrelec.com\/no\/"},{"@type":"ListItem","position":2,"name":"Den ultimate guiden for \u00e5 sikre ditt industrielle nettverk"}]},{"@type":"WebSite","@id":"https:\/\/knowhow.distrelec.com\/no\/#website","url":"https:\/\/knowhow.distrelec.com\/no\/","name":"KnowHow","description":"KnowHow Hub","publisher":{"@id":"https:\/\/knowhow.distrelec.com\/no\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/knowhow.distrelec.com\/no\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nb-NO"},{"@type":"Organization","@id":"https:\/\/knowhow.distrelec.com\/no\/#organization","name":"Distrelec","url":"https:\/\/knowhow.distrelec.com\/no\/","logo":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/logo\/image\/","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png","width":530,"height":98,"caption":"Distrelec"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/person\/03054fa7e45994b39e63e34a8d07e7f4","name":"Ken Berkley","image":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/knowhow.distrelec.com\/no\/#\/schema\/person\/image\/c74d33c40ed3adfd1fb8b6b8d6c5a0bd","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/10\/cropped-Ken-Berkley-1-96x96.jpg","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/10\/cropped-Ken-Berkley-1-96x96.jpg","caption":"Ken Berkley"},"description":"Ken Berkley is a Results-driven SEO &amp; Content Manager here at Disterelec. With over 10 years\u2019 experience within the search industry Ken prides himself on implementing best practise and SEO techniques to improve organic ranking and visibility.","sameAs":["http:\/\/www.distrelec.com","https:\/\/uk.linkedin.com\/in\/ken-berkley"],"url":"https:\/\/knowhow.distrelec.com\/no\/author\/ken-berkley\/"}]}},"jetpack_featured_media_url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/06\/iStock-1061227424-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/posts\/7466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/comments?post=7466"}],"version-history":[{"count":0,"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/posts\/7466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/media\/8909"}],"wp:attachment":[{"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/media?parent=7466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/categories?post=7466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/tags?post=7466"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/no\/wp-json\/wp\/v2\/coauthors?post=7466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}