{"id":69,"date":"2020-04-27T20:34:00","date_gmt":"2020-04-27T20:34:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=69"},"modified":"2020-06-04T01:46:27","modified_gmt":"2020-06-04T01:46:27","slug":"cybercrime-cybersecurity-get-organized","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/","title":{"rendered":"Cybercrime and Cybersecurity Get Organized"},"content":{"rendered":"\n<p>As technology and the internet become more advanced and information is more readily available to those who search for it, there is an increased need for security in the workplace. We are currently in the \u201cWild West\u201d age of the internet, where hackers and nation states attack servers, exploit information or expose weaknesses in systems with little to no repercussions. But that is about to change. Until recently, there have been few enforcable laws or regulations put in place. However, government bodies, compliance groups and security professionals are catching up to hackers. The scales are starting to slowly tilt in favor those who protect us from cyber criminals.<\/p>\n\n\n\n<p>Over the next decade, hacking and cybersecurity are going to change rapidly. In fact, both of those are already changing as new laws and regulations are put in place in an effort to stop cyber criminals from doing damage to unwitting folks. However, despite these efforts, the days of the lone wolf hacker in a hoodie, if they ever existed, have come and gone. We\u2019re now looking at organized crime where people consider hacking their day job. Just look to ransomware, it is literally the digital version of paying the mob protection money so they don&#8217;t trash your store. And it&#8217;s generally run by organized crime, either traditional mafia rings or cyber rings.<\/p>\n\n\n\n<p>Laws and regulations are catching up, though. Much like the FBI caught up to organized crime families under the direction of J. Edgar Hoover, so the legal system is catching up to the untamed internet. Some of that is due to people who, much like in the organized crime family era, are turning away from crime and beginning to educating law enforcement on how things work. The dark web is no longer dark, the TOR browser is no longer unknown. Governments are creating laws and regulations that international businesses will have to follow and adhere to in order to do business globally. They are removing the ability for hackers to hide and business to hand wave when they get hacked and their users get pawned.<\/p>\n\n\n\n<p>In fact, many countries, like the US, have already started creating <a rel=\"noreferrer noopener\" href=\"https:\/\/www.pwvconsultants.com\/blog\/best-practices-for-staying-compliant\/\" target=\"_blank\">laws and regulations<\/a> that impact cyber activity. Many countries have or are in the process of mandating that in order to do business over the internet within their borders or with their citizens, a business will have to house data of its citizens within their borders so they can regulate how the information is handled. It will be the responsibility of the business to know the laws and regulations of the country in which they want to operate. And this means that if you can&#8217;t catch the criminals, you can at least hold the companies accountable for failing to maintain best practices that could help protect their users from becoming victims.<\/p>\n\n\n\n<p>A word of caution here: Many companies never actually think about the laws of some far off place and how having users from that far off land puts them squarely under that country&#8217;s jurisdiction. It is no longer the free open prairie online that we grown accustomed to over the past decades. It would be wise, especially for a startups, to start seeking out experts who can help geofence their online operations and ensure that business can\u2019t be unintentionally&nbsp;conducted in a country where the business doesn\u2019t want to operate or understand the ramifications of operating. Should the business&#8217; needs change, that geofence can come down or be adjusted.&nbsp; The cost of modifying the fence is significantly less than the fines they could face. And as the US seems to be allowing states to take the first steps, business may also need to make choices about which of the 50 states they allow customers to originate online from.<\/p>\n\n\n\n<p>Up until recently we have existed in a digital&nbsp;world where businesses are still transforming business to be online and rushing to modernize to the digital age and evolving technology. This has helped enable hackers to run rampant over the internet. But as his phase starts end, companies are treating cybersecurity as essential and are organizing around it, as laws, compliance groups and regulations are catching up. In the next decade, criminal cyber activity is no longer going to be hidden but pulled out in the open, putting the need for laws and regulations smack in the faces of governments worldwide. The next decade will see more and more laws put into place, more cybersecurity organization and by the beginning of the 2030\u2019s, we predict we&#8217;ll start to see a major crackdown on cyber crime that will tip the scales to the side of cybersecurity globally.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime and cybersecurity are getting organized. The landscape is different in 2020 than it was even in 2015, here&#8217;s what to watch for.<\/p>\n","protected":false},"author":1,"featured_media":70,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,6,5,26,14],"tags":[36,30,37,31,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercrime and Cybersecurity Get Organized - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Cybercrime and cybersecurity are getting organized. The landscape is different in 2020 than it was even in 2015, here&#039;s what to watch for.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime and Cybersecurity Get Organized\" \/>\n<meta property=\"og:description\" content=\"Cybercrime and cybersecurity are getting organized. The landscape is different in 2020 than it was even in 2015, here&#039;s what to watch for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-27T20:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-04T01:46:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Cybercrime and Cybersecurity Get Organized\",\"datePublished\":\"2020-04-27T20:34:00+00:00\",\"dateModified\":\"2020-06-04T01:46:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\"},\"wordCount\":782,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg\",\"keywords\":[\"Business\",\"Compliance\",\"Corporation\",\"Cybersecurity\",\"Security\"],\"articleSection\":[\"Application Security\",\"Compliance\",\"Cyber Security\",\"Ransomware\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\",\"name\":\"Cybercrime and Cybersecurity Get Organized - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg\",\"datePublished\":\"2020-04-27T20:34:00+00:00\",\"dateModified\":\"2020-06-04T01:46:27+00:00\",\"description\":\"Cybercrime and cybersecurity are getting organized. The landscape is different in 2020 than it was even in 2015, here's what to watch for.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime and Cybersecurity Get Organized\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybercrime and Cybersecurity Get Organized - PWV Consultants","description":"Cybercrime and cybersecurity are getting organized. The landscape is different in 2020 than it was even in 2015, here's what to watch for.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime and Cybersecurity Get Organized","og_description":"Cybercrime and cybersecurity are getting organized. The landscape is different in 2020 than it was even in 2015, here's what to watch for.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-04-27T20:34:00+00:00","article_modified_time":"2020-06-04T01:46:27+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Cybercrime and Cybersecurity Get Organized","datePublished":"2020-04-27T20:34:00+00:00","dateModified":"2020-06-04T01:46:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/"},"wordCount":782,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg","keywords":["Business","Compliance","Corporation","Cybersecurity","Security"],"articleSection":["Application Security","Compliance","Cyber Security","Ransomware","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/","url":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/","name":"Cybercrime and Cybersecurity Get Organized - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg","datePublished":"2020-04-27T20:34:00+00:00","dateModified":"2020-06-04T01:46:27+00:00","description":"Cybercrime and cybersecurity are getting organized. The landscape is different in 2020 than it was even in 2015, here's what to watch for.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/internet-screen-security-protection-60504-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybercrime and Cybersecurity Get Organized"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/69"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":9,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/69\/revisions"}],"predecessor-version":[{"id":363,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/69\/revisions\/363"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/70"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}