{"id":117,"date":"2020-05-15T13:30:00","date_gmt":"2020-05-15T13:30:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=117"},"modified":"2020-10-15T21:46:12","modified_gmt":"2020-10-16T01:46:12","slug":"information-security-preparation-is-protection","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/","title":{"rendered":"Information Security: Preparation is Protection"},"content":{"rendered":"\n<p>As technology advances at a rapid rate, information has become a hot commodity. Information is how businesses determine how to get you to buy their products, how to market their products, how to get you to subscribe to their way of thinking. Information is traded for other information, which is how apps on your phone work together even when they aren\u2019t made by the same company. And while information is now being used for commerce, it is not protected or secured like money or intelligence. Information is just there, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\" target=\"_blank\" rel=\"noreferrer noopener\">ripe for the taking<\/a>, if someone knows how to get it.<\/p>\n\n\n\n<p>Enter Information Security, a sector of the tech world that is <a href=\"https:\/\/www.pwvconsultants.com\/blog\/info-sec-burnout\/\" target=\"_blank\" rel=\"noreferrer noopener\">underutilized and misunderstood<\/a>. Info sec isn\u2019t a dark art, it isn\u2019t voodoo and it isn\u2019t magic. Info sec is how information is protected, or at least supposed to be. The problem is the culture around it is lagging so far behind that it is an afterthought for most businesses. It\u2019s not viewed as a priority until a problem arises. <\/p>\n\n\n\n<p>There\u2019s a lack of education around what info sec is, why it\u2019s important and how to do business while protecting the information that\u2019s being used. Businesses tend to focus more on numbers, making sure key growth metrics are met and accounting is done properly. Numbers are viewed as more important than protecting the information that is used to run the business. The reality is that information should be treated as if it is money, because the ramifications of not protecting it are just as dire as what could happen if your company fails a tax audit or misses a sales target.<\/p>\n\n\n\n<p>Info sec isn\u2019t just about protecting your customer\u2019s information, it\u2019s about protecting your company\u2019s proprietary information and reputation. You don\u2019t want a hacker attacking your firewalls and gaining access to your patent-protected formulas or designs, just like you don\u2019t want someone breaching your firewalls and gaining access to your customers credit card information to sell on the dark web. If someone can gain access to one part of your system, they can get to the rest from there.&nbsp;Any internal emails lying around that you wouldn&#8217;t want made public?<\/p>\n\n\n\n<p>It\u2019s not just about pen testing or creating and completing tickets. It\u2019s about making sure there\u2019s a lock on the front door. And when you fix a vulnerability that was found, ensuring that you\u2019re not opening a window when you lock the door. For example, an issue is raised with users remaining logged in when they should be logged out. That problem is solved with a quick code patch, but the next time users log in, they are logged in as an admin. Whoops!  Now you have fixed one problem but created another. You locked the door but opened a window.<\/p>\n\n\n\n<p>Information security isn\u2019t an ambiguous, magical thing. It\u2019s a very real necessity that should be implemented from the birth of a business. Businesses which have been around longer than the internet have to make adjustments. Securing a business&#8217; information has its cost, but the up-front cost will be far less than the cost of a breach. Consider it risk management. Being prepared is being protected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security is protecting vital information about your business and customers. Proactive preparation provides the best protection.<\/p>\n","protected":false},"author":1,"featured_media":251,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[4,14],"tags":[40,570,17,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security: Preparation is Protection - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Information Security is protecting vital information about your business and customers. Proactive preparation provides the best protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security: Preparation is Protection\" \/>\n<meta property=\"og:description\" content=\"Information Security is protecting vital information about your business and customers. Proactive preparation provides the best protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-15T13:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-16T01:46:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Information Security: Preparation is Protection\",\"datePublished\":\"2020-05-15T13:30:00+00:00\",\"dateModified\":\"2020-10-16T01:46:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\"},\"wordCount\":552,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg\",\"keywords\":[\"Info Sec\",\"Information\",\"Security\",\"technology\"],\"articleSection\":[\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\",\"name\":\"Information Security: Preparation is Protection - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg\",\"datePublished\":\"2020-05-15T13:30:00+00:00\",\"dateModified\":\"2020-10-16T01:46:12+00:00\",\"description\":\"Information Security is protecting vital information about your business and customers. Proactive preparation provides the best protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg\",\"width\":2560,\"height\":1696,\"caption\":\"Photo by Lukas from Pexels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security: Preparation is Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security: Preparation is Protection - PWV Consultants","description":"Information Security is protecting vital information about your business and customers. Proactive preparation provides the best protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/","og_locale":"en_US","og_type":"article","og_title":"Information Security: Preparation is Protection","og_description":"Information Security is protecting vital information about your business and customers. Proactive preparation provides the best protection.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-05-15T13:30:00+00:00","article_modified_time":"2020-10-16T01:46:12+00:00","og_image":[{"width":2560,"height":1696,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Information Security: Preparation is Protection","datePublished":"2020-05-15T13:30:00+00:00","dateModified":"2020-10-16T01:46:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/"},"wordCount":552,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg","keywords":["Info Sec","Information","Security","technology"],"articleSection":["Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/","url":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/","name":"Information Security: Preparation is Protection - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg","datePublished":"2020-05-15T13:30:00+00:00","dateModified":"2020-10-16T01:46:12+00:00","description":"Information Security is protecting vital information about your business and customers. Proactive preparation provides the best protection.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/person-writing-on-notebook-669615-scaled.jpg","width":2560,"height":1696,"caption":"Photo by Lukas from Pexels"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Information Security: Preparation is Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/117"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=117"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/117\/revisions"}],"predecessor-version":[{"id":961,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/117\/revisions\/961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/251"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}