{"id":2074,"date":"2021-06-30T16:28:53","date_gmt":"2021-06-30T20:28:53","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=2074"},"modified":"2021-06-30T16:28:55","modified_gmt":"2021-06-30T20:28:55","slug":"escalating-ransomware-attacks-are-preventable","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/","title":{"rendered":"Escalating Ransomware Attacks Are Preventable"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-ransomware-attacks-are-on-the-rise-their-increased-success-rate-due-to-lax-security-teams-most-successful-attacks-can-be-thwarted-with-basic-cybersecurity-practices\">Ransomware attacks are on the rise, their increased success rate due to lax security teams. Most successful attacks can be thwarted with basic cybersecurity practices.<\/h2>\n\n\n\n<p>Cyber attacks have dominated the headlines for months, specifically ransomware attacks. To refresh, a ransomware attack happens when a threat actor gains access to business systems and encrypts them until a ransom is paid. Once the ransom is paid, the bad actor sends a decryption key. Well, they\u2019re supposed to, but criminals tend to not care about rules or keeping their word, so there\u2019s never a guarantee that paying a ransom will work. Still, it\u2019s an effective method in many cases. While threat actors are certainly to blame for <a href=\"https:\/\/www.pwvconsultants.com\/blog\/ransomware-isnt-just-a-healthcare-problem\/\" target=\"_blank\" rel=\"noreferrer noopener\">the rise in attacks<\/a>, the reason the success rate is rising falls on the shoulders of security teams.<\/p>\n\n\n\n<p>Don\u2019t misunderstand, security teams around the world are vastly overworked. We\u2019ve discussed a <a href=\"https:\/\/www.pwvconsultants.com\/blog\/hiring-a-young-coder\/\" target=\"_blank\" rel=\"noreferrer noopener\">shortage of developers<\/a> in the past, and security is not exempt. Hackers know this, though, which is why ransomware attacks are often successful. However, it is really not an excuse to not apply updates as they are handed out. In many cases, updating systems and software requires a handful of mouse clicks or a few commands and letting the machine do the rest. Updating really doesn\u2019t take much time for the person behind the machine, although the machine may take some time to update depending on how critical and complicated the problem is.<\/p>\n\n\n\n<p>So then what\u2019s the problem? Why are so many businesses behind on patching and updating? There are two reasons: 1. Security teams have become lax about updating, and 2. Updates are not prioritized as part of the security strategy.&nbsp;<\/p>\n\n\n\n<p>Recently, Tech Radar <a href=\"https:\/\/www.techradar.com\/news\/ransomware-is-not-out-of-control-security-teams-are\" target=\"_blank\" rel=\"noreferrer noopener\">interviewed James Turgal<\/a>, current VP of Cyber Risk, Strategy and Transformation at Optiv Security and former executive assistant director for the FBI Information and Technology Branch (CIO). During this interview, Turgal suggests that the reason companies end up in a \u201cpay up or perish\u201d position is due to cybersecurity malpractices that make them prone to such attacks. Turgal says the most common mistakes he sees are not having a patching strategy, not understanding what normal traffic looks like on their networks and\/or relying on software tools, and relying too much on backups.<\/p>\n\n\n\n<p>Every business should have a patching strategy. When there are critical updates for systems and software, it is imperative that those updates are applied as soon as possible. Many of those older businesses which have not had to keep up with security in the past and rely on legacy tech, or those which have simply built new technology atop old technology without proper modernization\/configuration are now dealing with the repercussions of those actions. Any business that has on-site tech or infrastructure, regardless of age, should be looking to modernize and move to the cloud. Or, at the very least, should be updating that tech with the most recent updates.<\/p>\n\n\n\n<p>We have often said that you have to know what normal is within your business. When is peak traffic time? What areas of the globe should never light up as active in your business? Who has access to what systems? Are you suddenly using more compute or is that expected? You have to know what is normal before you can diagnose what is abnormal. When you know what normal is, it becomes much easier to triage a situation and determine where the problem is. This also means that you get human eyes on it and a human knows what is normal because relying solely on software tools can be ineffective. Tools can be misconfigured or overlap in ways that aren\u2019t effective. A threat actor could figure out how to mimic or not cause a huge disturbance in traffic activity, but a human has the advantage of knowledge and can alert the appropriate parties when something is amiss.<\/p>\n\n\n\n<p>Relying on backups isn\u2019t a security strategy. Especially when those backups are misconfigured or not segmented from the network, which means they aren\u2019t truly protected from threats. A backup will restore systems to a certain point in time, when configured and segmented properly. A backup is not going to protect your business from threats, it will simply make restoring everything a little bit easier.<\/p>\n\n\n\n<p>Besides some of these technical things, businesses should also be investing in their employees with regular cybersecurity training. They should know how to recognize a well-designed socially-engineered phishing scheme and where to report it. They should know not to click links in emails, to thoroughly verify customers and clients over the phone before disclosing any information, and they should know how to protect their personal devices to help prevent credential stealing.<\/p>\n\n\n\n<p>Yes, security teams are lax on updating, but it\u2019s not entirely their fault. There\u2019s been a long-standing culture of putting security and updating on the backburner, and culture is hard to change.  Security teams are often in the position of telling another team they need to update, but having no means to enforce that it happens. But as cyber attacks rise and more ransomware attacks become successful, businesses are learning that this is a problem and are putting a bigger focus on security. The one key thing for business leaders to remember is that security involves every single employee, not just their IT team. These attacks can be prevented, for the most part, with basic cybersecurity practices. Implementing those practices will go a long way toward keeping our businesses safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks in particular are on the rise worldwide.. Most successful attacks can be prevented with basic cybersecurity practices.<\/p>\n","protected":false},"author":1,"featured_media":2081,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[958,27,26,14],"tags":[25,1910,31,1202,1745,1992,2366,927,2364,21,2365],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Escalating Ransomware Attacks Are Preventable - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Ransomware attacks in particular are on the rise worldwide.. Most successful attacks can be prevented with basic cybersecurity practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Escalating Ransomware Attacks Are Preventable\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks in particular are on the rise worldwide.. Most successful attacks can be prevented with basic cybersecurity practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-30T20:28:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-30T20:28:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Escalating Ransomware Attacks Are Preventable\",\"datePublished\":\"2021-06-30T20:28:53+00:00\",\"dateModified\":\"2021-06-30T20:28:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/\"},\"wordCount\":921,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg\",\"keywords\":[\"cyber attack\",\"CyberSec\",\"Cybersecurity\",\"encryption\",\"malware\",\"patching\",\"patching strategy\",\"phishing schemees\",\"prevention\",\"Ransomware\",\"updating\"],\"articleSection\":[\"Information Technology\",\"Malware\",\"Ransomware\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/\",\"name\":\"Escalating Ransomware Attacks Are Preventable - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg\",\"datePublished\":\"2021-06-30T20:28:53+00:00\",\"dateModified\":\"2021-06-30T20:28:55+00:00\",\"description\":\"Ransomware attacks in particular are on the rise worldwide.. Most successful attacks can be prevented with basic cybersecurity practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Ransomware alert message on a laptop screen - man at work\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Escalating Ransomware Attacks Are Preventable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Escalating Ransomware Attacks Are Preventable - PWV Consultants","description":"Ransomware attacks in particular are on the rise worldwide.. Most successful attacks can be prevented with basic cybersecurity practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/","og_locale":"en_US","og_type":"article","og_title":"Escalating Ransomware Attacks Are Preventable","og_description":"Ransomware attacks in particular are on the rise worldwide.. Most successful attacks can be prevented with basic cybersecurity practices.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-06-30T20:28:53+00:00","article_modified_time":"2021-06-30T20:28:55+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Escalating Ransomware Attacks Are Preventable","datePublished":"2021-06-30T20:28:53+00:00","dateModified":"2021-06-30T20:28:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/"},"wordCount":921,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg","keywords":["cyber attack","CyberSec","Cybersecurity","encryption","malware","patching","patching strategy","phishing schemees","prevention","Ransomware","updating"],"articleSection":["Information Technology","Malware","Ransomware","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/","url":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/","name":"Escalating Ransomware Attacks Are Preventable - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg","datePublished":"2021-06-30T20:28:53+00:00","dateModified":"2021-06-30T20:28:55+00:00","description":"Ransomware attacks in particular are on the rise worldwide.. Most successful attacks can be prevented with basic cybersecurity practices.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/Escalating-Ransomware-Attacks-Are-Preventable-scaled.jpeg","width":2560,"height":1707,"caption":"Ransomware alert message on a laptop screen - man at work"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/escalating-ransomware-attacks-are-preventable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Escalating Ransomware Attacks Are Preventable"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2074"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=2074"}],"version-history":[{"count":7,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2074\/revisions"}],"predecessor-version":[{"id":2086,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2074\/revisions\/2086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2081"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=2074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=2074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=2074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}