{"id":1584,"date":"2021-03-08T15:22:07","date_gmt":"2021-03-08T20:22:07","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1584"},"modified":"2021-03-08T15:22:10","modified_gmt":"2021-03-08T20:22:10","slug":"cybersecurity-training-today-is-ineffective","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/","title":{"rendered":"Cybersecurity Training Today is Ineffective"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-many-businesses-are-looking-at-cybersecurity-practices-amid-the-rise-in-cyber-attacks-they-should-also-be-looking-at-their-cybersecurity-training-programs-and-making-changes\">Many businesses are looking at cybersecurity practices amid the rise in cyber-attacks. They should also be looking at their cybersecurity training programs and making changes.<\/h2>\n\n\n\n<p>Businesses around the world are paying more attention to cybersecurity. They are learning that the practices and procedures they have been following are not working and that something needs to change. There are several areas of opportunity for every business out there, but one thing that every business can agree on is that cybersecurity training is ineffective, at best, in its current form.<\/p>\n\n\n\n<p>Let\u2019s look at some numbers. According to <em>CSO<\/em>\u2019s <a href=\"https:\/\/www.idg.com\/tools-for-marketers\/2020-security-priorities-study\/\"><em>2020 Security Priorities<\/em><\/a>, 36% of security incidents stem from non-malicious user-error, and 27% of respondents said security training was inadequate for users. However, 29% of survey respondents said that security training interferes with more strategic tasks. These numbers are a good indication that many businesses do not prioritize cybersecurity training and do not see it as part of their defense system.&nbsp;<\/p>\n\n\n\n<p>The reality these businesses are now faced with, is that their customer-facing employees are their first line of defense. Yes, there are many automated systems and security protocols happening underneath the business at all times. But those systems are not perfect, remember, they were created by imperfect humans. Which is why human eyes must also be on the lookout for potential threats. Your security team certainly cannot hover over the shoulders of your employees to ensure they aren\u2019t violating any policies (knowingly or not), or that they aren\u2019t clicking links inside of emails. It\u2019s really not an economical solution.<\/p>\n\n\n\n<p>\u201cThe main reason that cybersecurity training and awareness programs are not effective enough is that these events are one-off and irregular. Information security practices turn out to be disconnected from the real work duties of an employee and are not integrated into the workflow,\u201d <a href=\"https:\/\/www.csoonline.com\/article\/3606377\/undervalued-and-ineffective-why-security-training-programs-still-fall-short.html?upd=1614884324264\" target=\"_blank\" rel=\"noreferrer noopener\">says Ekaterina Kilyusheva<\/a>, head of the Information Security Analytics Research Group at Positive Technologies.<\/p>\n\n\n\n<p>What businesses should be doing is training all employees on cybersecurity, and more than once a year. When the Federal Computer Security Act of 1987 was adopted, it established the annual training practice we still use today. Many businesses only do it for compliance purposes and do not focus on anything other than checking a box. But in 2021, technology is an entirely different realm than it was in 1987. Annual security training is not good enough. Threat actors continually change their tactics and find new ways to breach systems. It\u2019s why we so often say that businesses must stay on top of known vulnerabilities and constantly make improvements to their cybersecurity defenses.<\/p>\n\n\n\n<p>There is a huge disconnect here. The perceived value of the need for training is disproportionate across the board, and it\u2019s time for businesses to understand that cybersecurity is fast becoming the only barrier between them and the bad guys. And when the bad guys get through, which they eventually will, whomever is targeted must know how to defend against them. Whether it\u2019s recognizing a phishing scheme, violating an internal security policy (even unknowingly), having credentials stolen because guidelines aren\u2019t followed or something else, your customer-facing employees must know how to respond.<\/p>\n\n\n\n<p>This isn\u2019t just incident response, however. Incident response is a reactive process. Cybersecurity awareness training is preventative. Secure lines of code, firewalls and geofences, data storage methods and IAM controls are also preventative. But when combined together, what your security team does and what your other departmental staff provide through training becomes a pretty big deterrent for threat actors. Especially those looking for a quick in-and-out type of scheme, where  they don\u2019t want to jump through hoops. They want an easy way into your systems. Don\u2019t give them one.<\/p>\n\n\n\n<p>The bottom line is that cybersecurity training is imperative for all employees. It really needs to be done at least on a quarterly basis so that employees can stay abreast of the known active threats. Without this training, how can employees know they are potentially putting your business at risk?<\/p>\n\n\n\n<p>If your current training methods aren\u2019t working, or you want to revamp your training program but don\u2019t know where to start, consult an expert. There are people who specialize in creating programs that are industry and job-specific. Using real-world case studies to train employees is vital to the success of your training program. Make it fun, make it mandatory for all employees regardless of seniority level, and make it relevant.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity training programs have not kept pace with threats. Businesses must revamp these programs to reflect today&#8217;s thread landscape.<\/p>\n","protected":false},"author":1,"featured_media":1599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,5],"tags":[36,25,1910,31,2174,2175,17,2173],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Training Today is Ineffective - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Cybersecurity training programs have not kept pace with threats. Businesses must revamp these programs to reflect today&#039;s thread landscape.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Training Today is Ineffective\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity training programs have not kept pace with threats. Businesses must revamp these programs to reflect today&#039;s thread landscape.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-08T20:22:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-08T20:22:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Cybersecurity Training Today is Ineffective\",\"datePublished\":\"2021-03-08T20:22:07+00:00\",\"dateModified\":\"2021-03-08T20:22:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/\"},\"wordCount\":741,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg\",\"keywords\":[\"Business\",\"cyber attack\",\"CyberSec\",\"Cybersecurity\",\"cybersecurity education\",\"Federal Computer Security Act of 1987\",\"Security\",\"Training\"],\"articleSection\":[\"Business\",\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/\",\"name\":\"Cybersecurity Training Today is Ineffective - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg\",\"datePublished\":\"2021-03-08T20:22:07+00:00\",\"dateModified\":\"2021-03-08T20:22:10+00:00\",\"description\":\"Cybersecurity training programs have not kept pace with threats. Businesses must revamp these programs to reflect today's thread landscape.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg\",\"width\":2560,\"height\":1920,\"caption\":\"Cybersecurity Education Security Seminar Teaching 2d Illustration Shows Online Training Of Cyber Skills For System Protection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Training Today is Ineffective\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Training Today is Ineffective - PWV Consultants","description":"Cybersecurity training programs have not kept pace with threats. Businesses must revamp these programs to reflect today's thread landscape.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Training Today is Ineffective","og_description":"Cybersecurity training programs have not kept pace with threats. Businesses must revamp these programs to reflect today's thread landscape.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-03-08T20:22:07+00:00","article_modified_time":"2021-03-08T20:22:10+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Cybersecurity Training Today is Ineffective","datePublished":"2021-03-08T20:22:07+00:00","dateModified":"2021-03-08T20:22:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/"},"wordCount":741,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg","keywords":["Business","cyber attack","CyberSec","Cybersecurity","cybersecurity education","Federal Computer Security Act of 1987","Security","Training"],"articleSection":["Business","Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/","url":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/","name":"Cybersecurity Training Today is Ineffective - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg","datePublished":"2021-03-08T20:22:07+00:00","dateModified":"2021-03-08T20:22:10+00:00","description":"Cybersecurity training programs have not kept pace with threats. Businesses must revamp these programs to reflect today's thread landscape.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Cybersecurity-Training-is-Inefficient-scaled.jpeg","width":2560,"height":1920,"caption":"Cybersecurity Education Security Seminar Teaching 2d Illustration Shows Online Training Of Cyber Skills For System Protection"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-training-today-is-ineffective\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Training Today is Ineffective"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1584"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1584"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1584\/revisions"}],"predecessor-version":[{"id":1602,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1584\/revisions\/1602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1599"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}