{"id":318,"date":"2020-06-08T11:45:00","date_gmt":"2020-06-08T11:45:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=318"},"modified":"2020-06-04T02:10:28","modified_gmt":"2020-06-04T02:10:28","slug":"tips-for-cybersecurity-disaster-preparation","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/","title":{"rendered":"Tips for Cybersecurity Disaster Preparation"},"content":{"rendered":"\n<p>In the wake of the COVID-19 pandemic, businesses across the globe are experiencing hardships. Employees are largely <a rel=\"noreferrer noopener\" href=\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-working-from-home-effectively\/\" target=\"_blank\">working from home<\/a>, straining VPN\u2019s and creating larger surface area for risk exposure. These problems are no one\u2019s fault, this virus is not something we would expect in 2020, but here we are. Cybersecurity should be at the forefront of everyone&#8217;s mind while working from home, but the reality is it probably isn&#8217;t. Cybersecurity disaster preparation will combat employees who are more concerned with the health of the people in their homes (as they should be) than they are with <a rel=\"noreferrer noopener\" href=\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\" target=\"_blank\">cyber attacks<\/a>.<\/p>\n\n\n\n<p>This leaves business leaders to do the thinking for them. There are things companies have to think about now that they didn\u2019t have to think about before, so here are a few tips and best practices for cybersecurity disaster preparation:<\/p>\n\n\n\n<ol><li>Use your VPN, make sure VPNs are updated and VPN traffic is monitored. Ensure correct usage by employees. Know what the typical headcount should be, locations of various employees, how many connections are open. Blocking traffic from places where you do not have employees is a good idea as well. For example, if your employees are all living inside the US, put up a geofence around your VPN that blocks access from everywhere else.<\/li><li>Use a dedicated company email address to update employees. These updates can be regarding security and VPN changes\/updates, updates to policies and procedures, etc but don&#8217;t send them from multiple addresses so phishing attacks aren&#8217;t camoflouged.<\/li><li>Keep updated information on your intranet site or slack. Use this as a method of communication with your employees. Make clear on the homepage that any updates will come from the dedicated email that has been set up in tip 2.&nbsp;<\/li><li>Re-educate people on not clicking links from unknown sources. If there\u2019s a question, refer to intranet. If it\u2019s not there, don\u2019t click the link.<\/li><li>Set up email filter protections around key words. (Currently COVID-19, working from home, coronavirus, hashtags like #AloneTogether #StayHome, etc.)<\/li><li>Think about securing your brick and mortar building. You may just want to lock the building down if there\u2019s going to be an extended lockdown or closure. Especially if it\u2019s a shared building and you cannot control who goes in and out. A hacker physically getting into one of your machines is the absolute worst-case scenario. If you can\u2019t keep a security guard on staff, consider shutting your space down. No one in or out.<\/li><li>Watch your perimeter or if your Beyond Trust your segmentation. Know what\u2019s normal behavior, and what the new normal is so you can monitor for anything abnormal. Especially if your office isn\u2019t securely locked down and someone gains physical access to your machines.<br>&nbsp;<\/li><li>Keep your eyes open for bad actors. Now is the prime time an insider threat can pop up. Someone who has access to the building and can make up a reason to get past security. They can get in, drop an appliance to start skimming the information from the systems and get back out without anyone being the wiser.<\/li><li>Ensure proper access controls. With everyone transitioning to working from home and setting up VPNs and the like, it is imperative that people only have access to what they need. No one wants to think their employees will do bad things with extra access, but it\u2019s better to trust no one and ensure security, than to live by the adage, \u201cBetter to have it and not need it than to need it and not have it.\u201d Security doesn\u2019t work that way.<\/li><li>Encourage the use of antivirus software. Even if it\u2019s the free version from their ISP, encourage your employees to utilize the service. For those who don\u2019t have that option or who you want to make sure have an extra layer of security, provide it for them. Any cost incurred from this process will be far less than the thousands of dollars it could cost if your business suffers a data breach or falls out of compliance.<\/li><\/ol>\n\n\n\n<p>Disaster situations always have businesses and people moving fast. Most disasters don\u2019t give notice, so it\u2019s all reaction. Having some of these programs and processes in place in the event a disaster or another pandemic should happen is a great way to be proactive. Businesses suffer during disasters as it is, the last thing any business needs is for a breach to happen because they weren\u2019t secure enough.&nbsp;<\/p>\n\n\n\n<p>No one wants to believe that people will take advantage of other people during disasters or pandemics. Human nature is to be altruistic, but not all humans work that way. If you can\u2019t be the person who is skeptical, hire someone who can do that for you. Be helpful where you can, but be aware that people will take advantage if they can. Be proactive, have a cybersecurity disaster preparation plan put in place to protect your business. Doing so will ensure your company\u2019s survival.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When a disaster strikes, cybersecurity isn&#8217;t a priority. Having a cybersecurity disaster preparation plan is key to your company&#8217;s survival.<\/p>\n","protected":false},"author":1,"featured_media":319,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,555,14],"tags":[564,686,31,687,688,557,689],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tips for Cybersecurity Disaster Preparation - PWV Consultants<\/title>\n<meta name=\"description\" content=\"When a disaster strikes, cybersecurity isn&#039;t a priority. Having a cybersecurity disaster preparation plan is key to your company&#039;s survival.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tips for Cybersecurity Disaster Preparation\" \/>\n<meta property=\"og:description\" content=\"When a disaster strikes, cybersecurity isn&#039;t a priority. Having a cybersecurity disaster preparation plan is key to your company&#039;s survival.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-08T11:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-04T02:10:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2525\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Tips for Cybersecurity Disaster Preparation\",\"datePublished\":\"2020-06-08T11:45:00+00:00\",\"dateModified\":\"2020-06-04T02:10:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/\"},\"wordCount\":847,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg\",\"keywords\":[\"COVID19\",\"cyber sec\",\"Cybersecurity\",\"disaster\",\"pandemic\",\"remote work\",\"VPN\"],\"articleSection\":[\"Cyber Security\",\"Remote Work\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/\",\"name\":\"Tips for Cybersecurity Disaster Preparation - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg\",\"datePublished\":\"2020-06-08T11:45:00+00:00\",\"dateModified\":\"2020-06-04T02:10:28+00:00\",\"description\":\"When a disaster strikes, cybersecurity isn't a priority. Having a cybersecurity disaster preparation plan is key to your company's survival.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg\",\"width\":2525,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips for Cybersecurity Disaster Preparation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tips for Cybersecurity Disaster Preparation - PWV Consultants","description":"When a disaster strikes, cybersecurity isn't a priority. Having a cybersecurity disaster preparation plan is key to your company's survival.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/","og_locale":"en_US","og_type":"article","og_title":"Tips for Cybersecurity Disaster Preparation","og_description":"When a disaster strikes, cybersecurity isn't a priority. Having a cybersecurity disaster preparation plan is key to your company's survival.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-06-08T11:45:00+00:00","article_modified_time":"2020-06-04T02:10:28+00:00","og_image":[{"width":2525,"height":2560,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Tips for Cybersecurity Disaster Preparation","datePublished":"2020-06-08T11:45:00+00:00","dateModified":"2020-06-04T02:10:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/"},"wordCount":847,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg","keywords":["COVID19","cyber sec","Cybersecurity","disaster","pandemic","remote work","VPN"],"articleSection":["Cyber Security","Remote Work","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/","url":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/","name":"Tips for Cybersecurity Disaster Preparation - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg","datePublished":"2020-06-08T11:45:00+00:00","dateModified":"2020-06-04T02:10:28+00:00","description":"When a disaster strikes, cybersecurity isn't a priority. Having a cybersecurity disaster preparation plan is key to your company's survival.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/Tips-for-Cybersecurity-Disaster-Preparation-scaled.jpg","width":2525,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/tips-for-cybersecurity-disaster-preparation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tips for Cybersecurity Disaster Preparation"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/318"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/318\/revisions"}],"predecessor-version":[{"id":372,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/318\/revisions\/372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/319"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}