{"id":523,"date":"2020-07-16T15:45:00","date_gmt":"2020-07-16T19:45:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=523"},"modified":"2020-07-16T15:38:15","modified_gmt":"2020-07-16T19:38:15","slug":"healthcare-and-cybersecurity-why-it-cannot-be-overlooked","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/","title":{"rendered":"Healthcare and Cybersecurity: Why It Cannot Be Overlooked"},"content":{"rendered":"\n<p>The healthcare industry has long been notorious for it\u2019s lack of cybersecurity protocols. It\u2019s a soft target industry because of the ease in which hackers can get in and obtain information. Hospitals and medical facilities tend to have a large number of employees, from cooks and janitors up to researchers and surgeons. Even smaller practices with only a few physicians on staff have schedulers, nurses, cleaning and maintenance staff. The surface area is large, but cybersecurity is often overlooked by the healthcare industry. This practice has to change, and it has to change now.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/healthitsecurity.com\/news\/the-10-biggest-healthcare-data-breaches-of-2020-so-far\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Health ITScience<\/a>, \u201cThe healthcare sector saw a whopping 41.4 million patient records breached in 2019, fueled by a 49 percent increase in hacking, according to the\u00a0<a href=\"https:\/\/healthitsecurity.com\/news\/over-41.4m-patient-records-breached-in-2019-as-hacking-jumped-49\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Protenus<\/strong><\/a>\u00a0Breach Barometer. And despite the COVID-19\u00a0crisis, the pace of healthcare data breaches in 2020 continue to highlight some of the sector\u2019s biggest vulnerabilities.\u201d<\/p>\n\n\n\n<p>The article goes on to list the top 10 breaches of 2020, which means it\u2019s not an all inclusive list of healthcare breaches. In the first half of 2020, the <a href=\"https:\/\/www.pwvconsultants.com\/blog\/data-breaches-are-a-major-cybersecurity-threat\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">top 10 breaches alone<\/a> caused the exposure of over 2.9 million patient records. These breaches were caused by stolen laptops, improper records destruction, ransomware implanted by socially engineered phishing schemes and more. What is truly important to note is that 41.4 million records weren&#8217;t stolen from a handful of sources, they are an accumulation of an astounding number of indiscriminate attacks.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Varonis<\/a>, a 15-year old cybersecurity company, put together a list of statistics around breaches. Three that should get any businesses attention are:<\/p>\n\n\n\n<ul><li>Hackers attack every 39 seconds, on average 2,244 times a day. (<a href=\"https:\/\/eng.umd.edu\/news\/story\/study-hackers-attack-every-39-seconds\" target=\"_blank\" rel=\"noreferrer noopener\">University of Maryland<\/a>)&nbsp;<\/li><li>The average time to identify a breach in 2019 was 206 days. (<a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">IBM<\/a>)<\/li><li>The average lifecycle of a breach was 314 days (from the breach to containment). (<a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">IBM<\/a>)<\/li><\/ul>\n\n\n\n<p>Those staggering statistics, on top of the sheer number of patient accounts exposed in the first half of 2020 alone, should be a massive wake-up call to the healthcare industry. It\u2019s not just about securing their internal systems at their facilities, it\u2019s about IAM controls for vendors and employees, it\u2019s about remote access protocols and insider threats. Information, data, is today\u2019s hot commodity. Hackers seek information to exploit businesses and people across the globe. The more information and data they can collect, the more they stand to gain.<\/p>\n\n\n\n<p>HIPAA regulations require healthcare facilities to <a href=\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">protect patient information<\/a>. The information isn\u2019t just limited to medical records, either, it also includes identifying information like social security numbers, driver\u2019s license numbers, birthdays, phone numbers, addresses and anything else that someone could use to potentially steal an identity. When breaches happen, it costs facilities exorbitant amounts of money, not just to fix whatever weakness was exploited, but in fines, fees and legal action taken by affected patients.<\/p>\n\n\n\n<p>The other aspect of security at healthcare facilities involves employees. Vendors, like legal and accounting firms, which are not in-house have the potential to cause a problem, too. Both the legal and accounting industries are soft targets as well, only in this instance, it\u2019s employee information that becomes exposed. On top of that, many healthcare facilities and institutions have in-house research teams and programs in place which have proprietary information.<\/p>\n\n\n\n<p>The healthcare industry employs a wide variety of people and uses third-party vendors for various services throughout their buildings which makes it even softer as a soft target. That fact that it\u2019s a soft target is extremely concerning for people all over the world because everyone sees a doctor at some point in their life. Yes, cybersecurity comes at a cost and most healthcare facilities operate on a limited budget and some are non-profit organizations. However, cybersecurity needs to be implemented on a large scale, so these facilities and organizations have to find a way to fit it into their budgets. It may not be easy, but this up-front cost will end up saving them millions in fees and lawsuits in the long run.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The healthcare industry is a soft target for hackers because cybersecurity is overlooked. This practice has to change to avoid exposing patient information.<\/p>\n","protected":false},"author":1,"featured_media":529,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[6,5,959,14],"tags":[30,31,1242,1240,1241,575,1244],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Healthcare and Cybersecurity: Why It Cannot Be Overlooked - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The healthcare industry is a soft target for hackers because cybersecurity is overlooked. This practice has to change to avoid exposing patient information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare and Cybersecurity: Why It Cannot Be Overlooked\" \/>\n<meta property=\"og:description\" content=\"The healthcare industry is a soft target for hackers because cybersecurity is overlooked. This practice has to change to avoid exposing patient information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-16T19:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-16T19:38:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1273\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Healthcare and Cybersecurity: Why It Cannot Be Overlooked\",\"datePublished\":\"2020-07-16T19:45:00+00:00\",\"dateModified\":\"2020-07-16T19:38:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/\"},\"wordCount\":664,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg\",\"keywords\":[\"Compliance\",\"Cybersecurity\",\"data breaches\",\"healthcare industry\",\"HIPAA\",\"Information Security\",\"soft target\"],\"articleSection\":[\"Compliance\",\"Cyber Security\",\"Data Breaches\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/\",\"name\":\"Healthcare and Cybersecurity: Why It Cannot Be Overlooked - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg\",\"datePublished\":\"2020-07-16T19:45:00+00:00\",\"dateModified\":\"2020-07-16T19:38:15+00:00\",\"description\":\"The healthcare industry is a soft target for hackers because cybersecurity is overlooked. This practice has to change to avoid exposing patient information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg\",\"width\":2560,\"height\":1273,\"caption\":\"Cropped shot of young female doctor explain symptoms to her patient with digital tablet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Healthcare and Cybersecurity: Why It Cannot Be Overlooked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Healthcare and Cybersecurity: Why It Cannot Be Overlooked - PWV Consultants","description":"The healthcare industry is a soft target for hackers because cybersecurity is overlooked. This practice has to change to avoid exposing patient information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/","og_locale":"en_US","og_type":"article","og_title":"Healthcare and Cybersecurity: Why It Cannot Be Overlooked","og_description":"The healthcare industry is a soft target for hackers because cybersecurity is overlooked. This practice has to change to avoid exposing patient information.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-07-16T19:45:00+00:00","article_modified_time":"2020-07-16T19:38:15+00:00","og_image":[{"width":2560,"height":1273,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Healthcare and Cybersecurity: Why It Cannot Be Overlooked","datePublished":"2020-07-16T19:45:00+00:00","dateModified":"2020-07-16T19:38:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/"},"wordCount":664,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg","keywords":["Compliance","Cybersecurity","data breaches","healthcare industry","HIPAA","Information Security","soft target"],"articleSection":["Compliance","Cyber Security","Data Breaches","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/","url":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/","name":"Healthcare and Cybersecurity: Why It Cannot Be Overlooked - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg","datePublished":"2020-07-16T19:45:00+00:00","dateModified":"2020-07-16T19:38:15+00:00","description":"The healthcare industry is a soft target for hackers because cybersecurity is overlooked. This practice has to change to avoid exposing patient information.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/Healthcare-and-Cybersecurity-Why-it-Can-No-Longer-Be-Overlooked-scaled.jpg","width":2560,"height":1273,"caption":"Cropped shot of young female doctor explain symptoms to her patient with digital tablet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/healthcare-and-cybersecurity-why-it-cannot-be-overlooked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Healthcare and Cybersecurity: Why It Cannot Be Overlooked"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/523"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=523"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/523\/revisions"}],"predecessor-version":[{"id":530,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/523\/revisions\/530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/529"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}