{"id":1209,"date":"2020-12-15T09:30:46","date_gmt":"2020-12-15T14:30:46","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1209"},"modified":"2020-12-14T15:29:34","modified_gmt":"2020-12-14T20:29:34","slug":"security-fatigue-is-a-hackers-dream","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/","title":{"rendered":"Security Fatigue is a Hacker&#8217;s Dream"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-fatigue-is-a-very-real-problem-one-that-many-are-facing-amid-the-pandemic-security-fatigue-is-real-but-now-is-not-the-time-to-let-your-guard-down\">Fatigue is a very real problem, one that many are facing amid the pandemic. Security fatigue is real, but now is not the time to let your guard down.<\/h2>\n\n\n\n<p>Life on Earth has been turned upside down, inside out and reversed what seems like a million times over the last nine months. Technology has surged and we\u2019ve found new uses for old methodologies and found ways to update processes to streamline business. We\u2019ve adapted to remote work, work from home, contactless payments, contactless delivery, social distancing and wearing masks. We\u2019ve adjusted to using technology for just about everything in life, from telehealth appointments to online grocery shopping to creating startups. But with that came all of the security problems that have dominated the news of late, which is causing security fatigue everywhere.<\/p>\n\n\n\n<p>Because of the plethora of security issues that have plagued us recently, the entire business community is burning out on security, but now is not the time to waver. The more burnt out we get, the more hackers will push and try to get information from under our noses. When our eyes and brains get tired of looking at the same thing, reading about the same topic over and over, we start to miss things. It\u2019s why writers have editors, because you can only look at the same text so many times before your eyes skim over transposed letters and misspelled words that aren\u2019t caught by spell check because they are still words, just the wrong form.&nbsp;<\/p>\n\n\n\n<p>COVID fatigue is real, security fatigue is real, burnout is real, and the problems caused by both are equally as real. This is one of the reasons we always say to <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-hiring-an-expert-is-crucial-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">hire an expert<\/a> to help you. An expert can provide an outsider\u2019s view into your business operations, they can see things that you and your employees might not otherwise see due to fatigue. An expert isn\u2019t hired necessarily because you don\u2019t know how to do something. It\u2019s entirely possible that you DO know how to do things, but because your brain is used to seeing what\u2019s in front of you on a daily basis, you are bound to miss something.<\/p>\n\n\n\n<p>On top of the extra set of eyes, experts also know the best practices for getting things done. This doesn\u2019t mean that they have a cookie-cutter process for things, but that their processes are adapted for each unique situation and able to be adjusted on the fly when problems occur. They know how to handle the twists and turns of a project and how to overcome obstacles in a way that promotes security and efficiency.<\/p>\n\n\n\n<p>You could have the best Tech team, DevOps team, Security team, etc. in the world and you would still benefit from hiring an expert. No one is exempt from fatigue, no one is perfect and no one person is the be-all, end-all of anything. Even if what you\u2019re doing with your business doesn\u2019t involve technology at the moment, there\u2019s still an expert in that area you can call.<\/p>\n\n\n\n<p>Microsoft, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a>, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/aws-outage-lessons-to-learn\/\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon<\/a>, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/is-google-play-on-the-verge-of-implosion\/\" target=\"_blank\" rel=\"noreferrer noopener\">Android<\/a>, Apple, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cloudflare-vulnerability-reveals-need-for-depth\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloudflare<\/a>, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/fireeye-breach-forces-businesses-to-review-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">FireEye<\/a> and the dozens of other businesses which have headlined the news for various vulnerabilities, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\" target=\"_blank\" rel=\"noreferrer noopener\">configuration problems <\/a>and\/or breaches have some of the top security teams in the world. They procure the best talent they can, utilize layers of security and regularly apply updates and features to ensure stability, and yet they still have the same  problems all businesses do. Nothing makes your team exempt from making similar oversights.<\/p>\n\n\n\n<p>The truth is that no one is exempt. We are all human. The sooner business leaders realize that the complicated corners of tech are actually R&amp;D that require a level of expertise and oversight, the sooner those businesses will have the protection they need to survive. Securing your business is more than firewalls and geofences. It\u2019s secure coding, proper testing, educating employees about security and phishing schemes and ensuring that your front-line employees know the role they play. As a business leader, you have a lot on your plate as it is, so take a breath and understand that fatigue is normal. Let someone else help you. We\u2019re in the middle of a global pandemic that is affecting everyone. Any cost you incur hiring an expert is easily less expensive than the cost incurred from a breach.<\/p>\n\n\n\n<p>Business leaders are human, too, they don\u2019t like change and they don\u2019t trust outsiders. But now is not the time to hide behind pride, now is the time to put that away and make sure your business is taken care of. Now is the time to put the business needs and the needs of its employees ahead of everything else. Don\u2019t be stubborn. Do the right thing. Bring in some help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The more we hear about security, the more burned out we get. Security fatigue is real, and it&#8217;s a hacker&#8217;s dream come true.<\/p>\n","protected":false},"author":1,"featured_media":1213,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,4,14],"tags":[36,2012,1910,31,1959,2010,928,575,1940,688,17,2011,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Fatigue is a Hacker&#039;s Dream - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The more we hear about security, the more burned out we get. Security fatigue is real, and it&#039;s a hacker&#039;s dream come true.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Fatigue is a Hacker&#039;s Dream\" \/>\n<meta property=\"og:description\" content=\"The more we hear about security, the more burned out we get. Security fatigue is real, and it&#039;s a hacker&#039;s dream come true.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-15T14:30:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-14T20:29:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Security Fatigue is a Hacker&#8217;s Dream\",\"datePublished\":\"2020-12-15T14:30:46+00:00\",\"dateModified\":\"2020-12-14T20:29:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/\"},\"wordCount\":815,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg\",\"keywords\":[\"Business\",\"COVID fatigue\",\"CyberSec\",\"Cybersecurity\",\"expert\",\"fatigue\",\"hackers\",\"Information Security\",\"InfoSec\",\"pandemic\",\"Security\",\"security fatigue\",\"technology\"],\"articleSection\":[\"Business\",\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/\",\"name\":\"Security Fatigue is a Hacker's Dream - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg\",\"datePublished\":\"2020-12-15T14:30:46+00:00\",\"dateModified\":\"2020-12-14T20:29:34+00:00\",\"description\":\"The more we hear about security, the more burned out we get. Security fatigue is real, and it's a hacker's dream come true.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg\",\"width\":1920,\"height\":1440,\"caption\":\"Image by Anja\ud83e\udd17#helpinghands #solidarity#stays healthy\ud83d\ude4f from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Fatigue is a Hacker&#8217;s Dream\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Fatigue is a Hacker's Dream - PWV Consultants","description":"The more we hear about security, the more burned out we get. Security fatigue is real, and it's a hacker's dream come true.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/","og_locale":"en_US","og_type":"article","og_title":"Security Fatigue is a Hacker's Dream","og_description":"The more we hear about security, the more burned out we get. Security fatigue is real, and it's a hacker's dream come true.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-12-15T14:30:46+00:00","article_modified_time":"2020-12-14T20:29:34+00:00","og_image":[{"width":1920,"height":1440,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Security Fatigue is a Hacker&#8217;s Dream","datePublished":"2020-12-15T14:30:46+00:00","dateModified":"2020-12-14T20:29:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/"},"wordCount":815,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg","keywords":["Business","COVID fatigue","CyberSec","Cybersecurity","expert","fatigue","hackers","Information Security","InfoSec","pandemic","Security","security fatigue","technology"],"articleSection":["Business","Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/","url":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/","name":"Security Fatigue is a Hacker's Dream - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg","datePublished":"2020-12-15T14:30:46+00:00","dateModified":"2020-12-14T20:29:34+00:00","description":"The more we hear about security, the more burned out we get. Security fatigue is real, and it's a hacker's dream come true.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/12\/computer-2038627_1920.jpg","width":1920,"height":1440,"caption":"Image by Anja\ud83e\udd17#helpinghands #solidarity#stays healthy\ud83d\ude4f from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-fatigue-is-a-hackers-dream\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Fatigue is a Hacker&#8217;s Dream"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1209"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1209"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1209\/revisions"}],"predecessor-version":[{"id":1214,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1209\/revisions\/1214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1213"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}