{"id":2256,"date":"2022-01-03T10:27:00","date_gmt":"2022-01-03T15:27:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=2256"},"modified":"2021-12-17T14:50:23","modified_gmt":"2021-12-17T19:50:23","slug":"cybersecurity-isnt-just-for-big-tech","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/","title":{"rendered":"Cybersecurity Isn&#8217;t Just for Big Tech"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-is-all-the-talk-today-but-it-s-important-to-remember-that-it-s-not-just-for-big-tech-cybersecurity-is-vital-to-the-survival-of-all-businesses\">Cybersecurity is all the talk today, but it&#8217;s important to remember that it&#8217;s not just for Big Tech. Cybersecurity is vital to the survival of all businesses.<\/h2>\n\n\n\n<p>October was Cybersecurity Awareness Month and the tech world was bursting with news. Not because of the month, but because new vulnerabilities and new exploits combined with both new and old tactics keep it there. Both consumers and business leaders are taking notice, with everyone taking steps to ensure their information is safe. Still, there are businesses out there without a cybersecurity plan and without cybersecurity defenses protecting the information they house. According to a new article from Law.com, <a href=\"https:\/\/www.law.com\/legaltechnews\/2021\/07\/22\/neglecting-cybersecurity-isnt-just-risky-its-reckless\/\">neglecting cybersecurity isn\u2019t just risky, it\u2019s reckless<\/a>.<\/p>\n\n\n\n<p>We\u2019ve often discussed that threat actors do not care about business size or location. Information, data, is their form of currency and they don\u2019t care where it comes from. The sheer amount of data available for threat actors to hone in on increases daily, and they want every piece they can get. As such, hackers have honed their skills, upskilled and increased their knowledge of business cybersecurity practices to bolster their efforts.<\/p>\n\n\n\n<p>This was a thing before the pandemic, it just wasn\u2019t in the news on a regular basis like it is today. When the pandemic hit, we saw a huge surge in cybersecurity activity, some of it resulting in lockdowns by ransomware or theft of data by cyber criminals. Why did we see that surge? There are a few reasons, but the two big ones are that prior to the pandemic, cybersecurity simply wasn\u2019t a focus for businesses, so any security actually implemented often looked like swiss cheese; and when we shifted to remote work, business cyber infrastructure expanded exponentially. Since cybersecurity wasn\u2019t a big focus, the holes that were there only grew.<\/p>\n\n\n\n<p>From Law.com, \u201cBrian Hengesbaugh, chair of the global data privacy and security business unit at Baker McKenzie, <a href=\"https:\/\/link.law.com\/click\/24523696.19273\/aHR0cHM6Ly93d3cubGF3LmNvbS9sZWdhbHRlY2huZXdzLzIwMjEvMDQvMzAvZGF0YS12ZW5kb3JzLXVzZWQtdG8taGF2ZS11bmxpbWl0ZWQtbGlhYmlsaXR5LWZvci1icmVhY2hlcy1idXQtbm90LWFueW1vcmUvP3V0bV9zb3VyY2U9ZW1haWwmdXRtX21lZGl1bT1lbmwmdXRtX2NvbnRlbnQ9MjAyMTA3MjImdXRtX2NhbXBhaWduPWxhd2Jhcm9tZXRlciZ1dG1fdGVybT1sYXc\/5695bdc1e9a8a273768b4dc8B47f032e4\">called all of this<\/a> a \u201cperfect storm\u201d rising on the corporate cybersecurity landscape. Between businesses, such as law firms, and their vendors, \u201cIt\u2019s going to get more into litigation and dispute over who is responsible for what.\u201d\u201d<br><br>As this is from a publication dealing with law, they spark an excellent legal point: When it comes to cybersecurity, who is ultimately responsible for the data that becomes exposed? The article cites the Accellion FTP breach as a flag that businesses have more to worry about than their own security, including the cybersecurity practices of their vendors and business partners. Which is why, in the past, we have <a href=\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/\" target=\"_blank\" rel=\"noreferrer noopener\">advocated for vetting the cybersecurity practices of potential vendors and business partners<\/a> before signing any contracts.<\/p>\n\n\n\n<p>There are many tactics used by cyber criminals today. Spoofing, phishing and ransomware are just a few that we hear about the most, but there are a multitude of ways a threat actor can gain access to a business\u2019 systems. Known vulnerabilities are consistently a problem, which is why regular patching and upgrades and consistent modernization cycles are so important. These are ways businesses can ensure that known vulnerabilities are patched appropriately and in a timely fashion.<\/p>\n\n\n\n<p>Cyber activity is on the minds of business leaders and owners across the globe. Sure, you can go out and buy all the best technology on the market. But it won\u2019t be long before it\u2019s not the best anymore and you have to do it again. Which is why the role of a CISO is important, whether it\u2019s a dedicated team or person who works on-site, or an MSP you outsource to handle, having a dedicated expert overseeing your cybersecurity is vital. Even so, it\u2019s just as important to have a third-party review to ensure that nothing is missed.<\/p>\n\n\n\n<p>\u201cJust because a company doesn\u2019t have a CISO doesn\u2019t mean they are not Fort Knox with security\u2014however, it\u2019s more likely they are not,\u201d Christopher Ballod, an associate managing director in the cyber risk practice at Kroll, <a href=\"https:\/\/link.law.com\/click\/24523696.19273\/aHR0cHM6Ly93d3cubGF3LmNvbS9sZWdhbHRlY2huZXdzLzIwMjEvMDUvMTcvaW4taG91c2UtbGlrZXMtYS1jaXNvLWJ1dC1ub3QtbW9yZS10aGFuLWdvb2QtbGF3LWZpcm0tY3liZXJzZWN1cml0eS8_dXRtX3NvdXJjZT1lbWFpbCZ1dG1fbWVkaXVtPWVubCZ1dG1fY29udGVudD0yMDIxMDcyMiZ1dG1fY2FtcGFpZ249bGF3YmFyb21ldGVyJnV0bV90ZXJtPWxhdw\/5695bdc1e9a8a273768b4dc8B63df5888\">told Law.com<\/a>.<\/p>\n\n\n\n<p>Not having solid cybersecurity in place is definitely risky, and, from your attorney\u2019s perspective, it\u2019s even reckless. Yes, there is cyber insurance, which is rapidly evolving with the onslaught of threats, but that will never be enough to save your business in the event of a breach. And, with shoddy cybersecurity in place, you will suffer a breach sooner than later. Now is the time to have a security review by a third party. Cyber attacks aren\u2019t going anywhere for a long time, don\u2019t be the next victim.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Small businesses don&#8217;t need a big tech budget to have cybersecurity. Security is vital to the survival of businesses, no matter the size.<\/p>\n","protected":false},"author":1,"featured_media":2286,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,5,14,2231],"tags":[2247,36,1910,31,925,1822,570,575,2426,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Isn&#039;t Just for Big Tech - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Small businesses don&#039;t need a big tech budget to have cybersecurity. Security is vital to the survival of businesses, no matter the size.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Isn&#039;t Just for Big Tech\" \/>\n<meta property=\"og:description\" content=\"Small businesses don&#039;t need a big tech budget to have cybersecurity. Security is vital to the survival of businesses, no matter the size.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-03T15:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-17T19:50:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Cybersecurity Isn&#8217;t Just for Big Tech\",\"datePublished\":\"2022-01-03T15:27:00+00:00\",\"dateModified\":\"2021-12-17T19:50:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/\"},\"wordCount\":767,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg\",\"keywords\":[\"big tech\",\"Business\",\"CyberSec\",\"Cybersecurity\",\"data\",\"data privacy\",\"Information\",\"Information Security\",\"small business\",\"technology\"],\"articleSection\":[\"Business\",\"Cyber Security\",\"Security\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/\",\"name\":\"Cybersecurity Isn't Just for Big Tech - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg\",\"datePublished\":\"2022-01-03T15:27:00+00:00\",\"dateModified\":\"2021-12-17T19:50:23+00:00\",\"description\":\"Small businesses don't need a big tech budget to have cybersecurity. Security is vital to the survival of businesses, no matter the size.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg\",\"width\":2560,\"height\":1700,\"caption\":\"Woman paying by credit card and entering pin code on reader holded by smiling barista in cafeteria. Customer using credit card for payment. Mature cashier wearing apron accepting payment over nfc technology.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Isn&#8217;t Just for Big Tech\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Isn't Just for Big Tech - PWV Consultants","description":"Small businesses don't need a big tech budget to have cybersecurity. Security is vital to the survival of businesses, no matter the size.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Isn't Just for Big Tech","og_description":"Small businesses don't need a big tech budget to have cybersecurity. Security is vital to the survival of businesses, no matter the size.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2022-01-03T15:27:00+00:00","article_modified_time":"2021-12-17T19:50:23+00:00","og_image":[{"width":2560,"height":1700,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Cybersecurity Isn&#8217;t Just for Big Tech","datePublished":"2022-01-03T15:27:00+00:00","dateModified":"2021-12-17T19:50:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/"},"wordCount":767,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg","keywords":["big tech","Business","CyberSec","Cybersecurity","data","data privacy","Information","Information Security","small business","technology"],"articleSection":["Business","Cyber Security","Security","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/","url":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/","name":"Cybersecurity Isn't Just for Big Tech - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg","datePublished":"2022-01-03T15:27:00+00:00","dateModified":"2021-12-17T19:50:23+00:00","description":"Small businesses don't need a big tech budget to have cybersecurity. Security is vital to the survival of businesses, no matter the size.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/11\/Cybersecurity-Isnt-Just-for-Big-Tech-scaled.jpeg","width":2560,"height":1700,"caption":"Woman paying by credit card and entering pin code on reader holded by smiling barista in cafeteria. Customer using credit card for payment. Mature cashier wearing apron accepting payment over nfc technology."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybersecurity-isnt-just-for-big-tech\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Isn&#8217;t Just for Big Tech"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2256"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=2256"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2256\/revisions"}],"predecessor-version":[{"id":2290,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2256\/revisions\/2290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2286"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=2256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=2256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=2256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}