{"id":2239,"date":"2021-10-05T14:23:31","date_gmt":"2021-10-05T18:23:31","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=2239"},"modified":"2021-10-05T14:23:33","modified_gmt":"2021-10-05T18:23:33","slug":"hackers-entice-employees-in-ransomware-scheme","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/","title":{"rendered":"Hackers Entice Employees in Ransomware Scheme"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-october-is-cybersecurity-awareness-month-and-we-re-kicking-it-off-with-a-reminder-that-not-all-threats-are-external-threat-actors-are-now-soliciting-employees-to-aid-in-ransomware-schemes-for-a-cut-of-the-ransom\">October is Cybersecurity Awareness Month, and we&#8217;re kicking it off with a reminder that not all threats are external. Threat actors are now soliciting employees to aid in ransomware schemes for a cut of the ransom.<\/h2>\n\n\n\n<p>Cyberattacks of all kinds continue to rise, even as governments around the world begin to set regulations and litigate legislation. There has long been a need for governments to get involved, but until there are laws, and repercussions for breaking those laws, cybercriminals will continue to evolve. Threat actors have to change their tactics on a regular basis to stay ahead of whatever law enforcement is focusing on, and they\u2019ve been able to do so with the lack of punishment handed out. Now, though, businesses are taking steps to strengthen their own security, understanding that this is a legitimate threat. Because those defenses are holding their own, hackers are trying something new: soliciting employees of profitable enterprises to deploy ransomware as part of an insider threat scheme.<\/p>\n\n\n\n<p>That\u2019s right, as if business leaders and security professionals don\u2019t have enough on their plates with outside threats, now they have to keep their eyes open for insider threats. Not that insider threats are new, and this tactic isn\u2019t necessarily new either. But this tactic has never been employed so widely, and it\u2019s never been used indiscriminately like it is today. This tactic was previously reserved for major blackmail scandals at large corporations. Now, though, with data being a major driver on the dark web and other black markets used by cyber criminals, information from anywhere and everywhere is welcome.<\/p>\n\n\n\n<p>The revelation of the uptick in this tactic was revealed in August. From <a href=\"https:\/\/krebsonsecurity.com\/2021\/08\/wanted-disgruntled-employees-to-deploy-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">KrebsOnSecurity<\/a>:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/6CCOyvu3v-Io7jQqGAho3kvGH-WmbQmDfeM1h6wR3eAg5qg5PTwmc7jQui9Vf1b9fKOuY1IWs2-xCqWvR1X03fyfGuZtIPGoGsTTX9QQc8fVsos5vLfi8FszayqTs0CCJTPouVrN=s0\" alt=\"\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><strong>\u201cCrane Hassold<\/strong>, director of threat intelligence at <strong>Abnormal Security<\/strong>, <a href=\"https:\/\/abnormalsecurity.com\/blog\/nigerian-ransomware-soliciting-employees-demonware\/\" target=\"_blank\" rel=\"noreferrer noopener\">described<\/a> what happened after he adopted a fake persona and responded to the proposal in the screenshot above. It offered to pay him 40 percent of a million-dollar ransom demand if he agreed to launch their malware inside his employer\u2019s network.<\/p><p>This particular scammer was fairly chatty, and over the course of five days it emerged that Hassold\u2019s correspondent was forced to change up his initial approach in planning to deploy the <a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/03\/ransomware-operators-are-piling-on-already-hacked-exchange-servers\/\" target=\"_blank\" rel=\"noreferrer noopener\">DemonWare ransomware strain<\/a>, which is freely available on <strong>GitHub<\/strong>.<\/p><p>\u201cAccording to this actor, he had originally intended to send his targets\u2014all senior-level executives\u2014phishing emails to compromise their accounts, but after that was unsuccessful, he pivoted to this ransomware pretext,\u201d Hassold wrote.\u201d\u00a0<\/p><\/blockquote>\n\n\n\n<p>The article goes on to describe how they tied the email to a Nigerian man and that dismissing a threat from West African nations is a mistake. That region is known for perfecting social engineering in cyber crime. That a Nigerian threat actor used a similar technique to solicit employees into helping him deploy ransomware really isn\u2019t so surprising.\u00a0<\/p>\n\n\n\n<p>This scheme raises red flags and should be setting off alarm bells all throughout the business world. We\u2019ve often recommended third-party security reviews, and this only reinforces the need for an outside party to come in and review your security protocols. What if your employees receive an email like this and it isn\u2019t caught? The company in this case was lucky, the emails were largely blocked and no one took the bait. But not every company is going to be so lucky. In fact, most companies probably won\u2019t be that lucky. We\u2019re in the middle of a global pandemic, there are shortages of everything and people are hurting. All one of these emails has to do is reach one desperate person, and suddenly your entire business is locked down.<\/p>\n\n\n\n<p>Security reviews matter. IAM controls matter. Credentialling matters. Having all of these things functioning in top form is vital to the success and viability of your business. On top of that, this type of attack shows exactly why employee retention matters. The longer someone works for a company, the more loyal they become to that company, especially when they are treated with respect and understanding. High rates of turnover are an indication of a problem and should be analyzed for improvement. Keeping employees happy isn\u2019t the only consideration here, either, it\u2019s also important for managers and co-workers to check in on each other and make sure mental health is monitored. If an employee is struggling for whatever reason, how can you help as a company? Those are the intangibles that matter, when employees feel that they are cared for, trusted and that they can discuss problems with others, it serves as a reason for an employee to stick around. And if they want to stick around, it\u2019s unlikely they will do anything to compromise that.<\/p>\n\n\n\n<p>Hackers are always trying new tactics and revamping old ones. Ransomware continues to be a top cybersecurity threat in a variety of industries. Don\u2019t get caught unaware, make sure your security is reviewed by an expert, that IAM controls are set so that people only have access to functions that are essential for their position, and that the credential requirements for personnel are adequate for preventing credential stuffing. Securing your business should be a top priority in the 4th quarter and looking ahead to 2022.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors are targeting employees to help them plant ransomware in exchange for a payout. It&#8217;s time for a third-party security analysis.<\/p>\n","protected":false},"author":1,"featured_media":2243,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,27,26],"tags":[2420,36,1910,31,928,33,21,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Entice Employees in Ransomware Scheme - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Threat actors are targeting employees to help them plant ransomware in exchange for a payout. It&#039;s time for a third-party security analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Entice Employees in Ransomware Scheme\" \/>\n<meta property=\"og:description\" content=\"Threat actors are targeting employees to help them plant ransomware in exchange for a payout. It&#039;s time for a third-party security analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-05T18:23:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-05T18:23:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Hackers Entice Employees in Ransomware Scheme\",\"datePublished\":\"2021-10-05T18:23:31+00:00\",\"dateModified\":\"2021-10-05T18:23:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/\"},\"wordCount\":869,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg\",\"keywords\":[\"BeCyberSmart\",\"Business\",\"CyberSec\",\"Cybersecurity\",\"hackers\",\"Insider Threats\",\"Ransomware\",\"technology\"],\"articleSection\":[\"Cyber Security\",\"Malware\",\"Ransomware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/\",\"name\":\"Hackers Entice Employees in Ransomware Scheme - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg\",\"datePublished\":\"2021-10-05T18:23:31+00:00\",\"dateModified\":\"2021-10-05T18:23:33+00:00\",\"description\":\"Threat actors are targeting employees to help them plant ransomware in exchange for a payout. It's time for a third-party security analysis.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Business man in a suit offering bribery money for making a deal. Selective focus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Entice Employees in Ransomware Scheme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers Entice Employees in Ransomware Scheme - PWV Consultants","description":"Threat actors are targeting employees to help them plant ransomware in exchange for a payout. It's time for a third-party security analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Entice Employees in Ransomware Scheme","og_description":"Threat actors are targeting employees to help them plant ransomware in exchange for a payout. It's time for a third-party security analysis.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-10-05T18:23:31+00:00","article_modified_time":"2021-10-05T18:23:33+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Hackers Entice Employees in Ransomware Scheme","datePublished":"2021-10-05T18:23:31+00:00","dateModified":"2021-10-05T18:23:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/"},"wordCount":869,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg","keywords":["BeCyberSmart","Business","CyberSec","Cybersecurity","hackers","Insider Threats","Ransomware","technology"],"articleSection":["Cyber Security","Malware","Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/","url":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/","name":"Hackers Entice Employees in Ransomware Scheme - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg","datePublished":"2021-10-05T18:23:31+00:00","dateModified":"2021-10-05T18:23:33+00:00","description":"Threat actors are targeting employees to help them plant ransomware in exchange for a payout. It's time for a third-party security analysis.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/10\/Hackers-Entice-Employees-in-Ransomware-Scheme-scaled.jpeg","width":2560,"height":1707,"caption":"Business man in a suit offering bribery money for making a deal. Selective focus"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/hackers-entice-employees-in-ransomware-scheme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Entice Employees in Ransomware Scheme"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2239"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=2239"}],"version-history":[{"count":2,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2239\/revisions"}],"predecessor-version":[{"id":2247,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2239\/revisions\/2247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2243"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=2239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=2239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=2239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}