{"id":531,"date":"2020-07-17T15:45:00","date_gmt":"2020-07-17T19:45:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=531"},"modified":"2020-07-17T18:47:01","modified_gmt":"2020-07-17T22:47:01","slug":"the-public-learned-from-twitter-what-industry-professionals-already-know","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/","title":{"rendered":"The Public Learned from Twitter What Industry Professionals Already Know"},"content":{"rendered":"\n<p>As noted in previous articles, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">hacker\u2019s tactics are changing rapidly.<\/a> They are becoming more sophisticated, using social engineering and gaining access to sensitive information with relative ease. Many businesses have some form of training on cybersecurity and phishing schemes as phishing is the number one vector chosen by hackers due to its effectiveness, but the levels of education and training provided to non-technical employees is not adequate. Yesterday, the public learned from Twitter what cybersecurity professionals already know: Employees are every company\u2019s weakest link.<\/p>\n\n\n\n<p>Employees are the weakest link because people are easier to hack than machines. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/data-breaches-are-a-major-cybersecurity-threat\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Sophisticated social engineering phishing schemes<\/a> are designed to get you to give up your credentials for a website. The hacker who obtains this information will then use those credentials everywhere someone might possibly have an account, looking to gain access. This is what happened with Twitter\u2019s Bitcoin scam. <\/p>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.nytimes.com\/2020\/07\/15\/technology\/twitter-hack-bill-gates-elon-musk.html\" target=\"_blank\" rel=\"noreferrer noopener\">The New York Times states<\/a>, \u201cTwitter\u2019s investigation into the breach revealed that several employees who had access to internal systems had their accounts compromised in a \u201ccoordinated social engineering attack,\u201d a spokesman said, referring to attacks that trick people into giving up their credentials. The attackers then used Twitter\u2019s internal systems to tweet from high-profile accounts like Vice President Biden\u2019s.<\/p>\n\n\n\n<p>\u201cWe\u2019re looking into what other malicious activity they may have conducted or information they may have accessed,\u201d Twitter\u2019s spokesman added. \u201cWe\u2019ve taken significant steps to limit access to internal systems and tools while our investigation is ongoing.\u201d\u201d<\/p>\n\n\n\n<p>The article also includes a screenshot of the tweet that went out on the high-profile accounts, which included Joe Biden, Barack Obama, Elon Musk, Kanye West, Bill Gates and more. Twitter did their best to <a href=\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">control and shut down the attack<\/a>, but it wasn\u2019t pretty. They are also extremely lucky that the hackers, who have not yet been identified, didn\u2019t cause more havoc. They simply asked for Bitcoin, when they could have caused much more detrimental damage with access to internal systems. The fact that more damage wasn\u2019t done points to a likely amateur hacker, not a nation state or other known organization, unless this is just the beginning.<\/p>\n\n\n\n<p>Still, this attack points to the exact reasons <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cloud-security-best-practices-for-all-business-types\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">why IAM controls, cleaning up accounts, strong passwords<\/a>, and cybersecurity education and training is crucial. To be frank, IAM controls are extremely important as is cleaning up accounts, but the most important piece of ensuring cybersecurity at your business is to fully educate your employees on phishing schemes and passwords. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/password-managers-keep-your-information-secure\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Provide them with a password manager<\/a> which can generate a lengthy, random password that they don\u2019t even know. Use <a href=\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">MFA and 2FA<\/a> for especially sensitive information or access, if not all the time. Continue education on at least a quarterly basis, updating training as new tactics by hackers come to light.<\/p>\n\n\n\n<p>There are ways to protect your business from hackers and would-be thieves. These bad actors are all after one thing: information and data that they can sell to the highest bidder or use to extract a ridiculous ransom to get the information back. Insider threats don\u2019t have to be intentional to have a detrimental impact. And if your business gets had by someone who\u2019s not an amateur, the damage done will be far worse than a few tweets requesting Bitcoin.<\/p>\n\n\n\n<p>People aren\u2019t going to stop using Twitter, it\u2019s too ingrained into their every day lives and routine. The will, however, find a different place to get a product similar to yours if their information is exposed on your watch. Once that trust is broken, your business reputation is tarnished. You lose money on restitution, legal fees, fixing the problem and losing a portion of your customer base. Recovering from that is no easy feat. Even Twitter is going to suffer for their breach, but a multi-billion dollar company is far more capable of bouncing back than a small business which doesn\u2019t have the assets to fall back on. Do your due diligence. Protect your assets, your customers, your employees and your proprietary information. Educate, train regularly, use password managers and employ proper IAM controls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Twitter&#8217;s Bitcoin scam could have been a lot worse than it was. The public learned something that industry professionals already know.<\/p>\n","protected":false},"author":1,"featured_media":537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,959],"tags":[1271,51,31,925,926,928,570,32,927,41,1270],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Public Learned from Twitter What Industry Professionals Already Know - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Twitter&#039;s Bitcoin scam could have been a lot worse than it was. The public learned something that industry professionals already know.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Public Learned from Twitter What Industry Professionals Already Know\" \/>\n<meta property=\"og:description\" content=\"Twitter&#039;s Bitcoin scam could have been a lot worse than it was. The public learned something that industry professionals already know.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-17T19:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-17T22:47:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1857\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"The Public Learned from Twitter What Industry Professionals Already Know\",\"datePublished\":\"2020-07-17T19:45:00+00:00\",\"dateModified\":\"2020-07-17T22:47:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/\"},\"wordCount\":702,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg\",\"keywords\":[\"Bitcoin\",\"Credentials\",\"Cybersecurity\",\"data\",\"data breach\",\"hackers\",\"Information\",\"Passwords\",\"phishing schemees\",\"Social Engineering\",\"Twitter\"],\"articleSection\":[\"Cyber Security\",\"Data Breaches\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/\",\"name\":\"The Public Learned from Twitter What Industry Professionals Already Know - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg\",\"datePublished\":\"2020-07-17T19:45:00+00:00\",\"dateModified\":\"2020-07-17T22:47:01+00:00\",\"description\":\"Twitter's Bitcoin scam could have been a lot worse than it was. The public learned something that industry professionals already know.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg\",\"width\":2560,\"height\":1857},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Public Learned from Twitter What Industry Professionals Already Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Public Learned from Twitter What Industry Professionals Already Know - PWV Consultants","description":"Twitter's Bitcoin scam could have been a lot worse than it was. The public learned something that industry professionals already know.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/","og_locale":"en_US","og_type":"article","og_title":"The Public Learned from Twitter What Industry Professionals Already Know","og_description":"Twitter's Bitcoin scam could have been a lot worse than it was. The public learned something that industry professionals already know.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-07-17T19:45:00+00:00","article_modified_time":"2020-07-17T22:47:01+00:00","og_image":[{"width":2560,"height":1857,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"The Public Learned from Twitter What Industry Professionals Already Know","datePublished":"2020-07-17T19:45:00+00:00","dateModified":"2020-07-17T22:47:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/"},"wordCount":702,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg","keywords":["Bitcoin","Credentials","Cybersecurity","data","data breach","hackers","Information","Passwords","phishing schemees","Social Engineering","Twitter"],"articleSection":["Cyber Security","Data Breaches"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/","url":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/","name":"The Public Learned from Twitter What Industry Professionals Already Know - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg","datePublished":"2020-07-17T19:45:00+00:00","dateModified":"2020-07-17T22:47:01+00:00","description":"Twitter's Bitcoin scam could have been a lot worse than it was. The public learned something that industry professionals already know.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/07\/The-Public-Learned-From-Twitter-What-Industry-Professionals-Already-Know-scaled.jpg","width":2560,"height":1857},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-public-learned-from-twitter-what-industry-professionals-already-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Public Learned from Twitter What Industry Professionals Already Know"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/531"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=531"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/531\/revisions"}],"predecessor-version":[{"id":615,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/531\/revisions\/615"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/537"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}