{"id":778,"date":"2020-09-16T12:19:00","date_gmt":"2020-09-16T16:19:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=778"},"modified":"2020-09-15T19:05:34","modified_gmt":"2020-09-15T23:05:34","slug":"the-negative-impact-of-malware","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/","title":{"rendered":"The Negative Impact of Malware"},"content":{"rendered":"\n<p>Previously, we discussed how <a href=\"https:\/\/www.pwvconsultants.com\/blog\/malware-is-more-than-just-a-virus\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">malware is more that &#8220;just&#8221; a virus<\/a>, it can really wreak havoc on your systems. There are many forms of malware as well, making spotting it that much more difficult. Another part of the problem lies in the mobile devices we carry around because they don&#8217;t have anti-viral or anti-malware programs attached to them. Without those protections and without our vigilance around what we download, malware can have a seriously negative impact on our devices.<\/p>\n\n\n\n<p>Society has become too busy to look any deeper than the surface when it comes to apps on phones and tablets. The systems put in place by app stores (Google Play, Android Marketplace, App Store, etc.) could never scan every line of code and determine what each line of code is for in an automated system. Instead, they weed out bad programs over time. Which means you may be an unlucky guinea pig, yet people have lost vigilance in this arena. We update apps and agree to terms and permissions without reading them, assuming it\u2019s all legitimate.<\/p>\n\n\n\n<p>It doesn\u2019t have to be as extreme as a nation state or an app with privacy fears around it like TikTok, it could be something seemingly innocuous like a fancier calculator or a program that edits photos in a specific way. You use it once and then it just sits on your phone for years. You don\u2019t use it, but it stays updated and malware could be included in those update packages. But we\u2019re so busy, we don\u2019t have time to look at it, so we just accept the permissions and end up giving access blindly.<\/p>\n\n\n\n<p>Malware is an incredibly effective attack vector. The goal of an attacker is to gain access to someone\u2019s system. If you can gain access to someone by gaining access to their physical computer or device and then access what they are doing on their device, you can then gain all the information you need to do the things they do in their life.<\/p>\n\n\n\n<p>All an attacker needs is a back door. If they can get in a back door they can install key loggers and all sorts of other loggers that even record what the victim is doing in their home &#8211; manipulate their webcams, smart devices, baby monitors (nothing is out of reach). Once they&#8217;re in, they\u2019re in. And as long as they can keep getting back in, they can stay there for years. The easiest way to do that is by having a packaged payload via malware that allows you to do that. Which is why malware is so effective. Why hack when all you need is someone to click a link.<\/p>\n\n\n\n<p>Even so, using off the shelf malware is not as effective because it has a signature and is blocked by most anti-virus and anti-malware programs. However, people don\u2019t always have those programs either. It\u2019s also possible to alter the code and signatures of malware packages enough so that they are unique, not to mention that unique packages can always be written. As if back door malware wasn\u2019t hard enough to protect against, there\u2019s always front door malware too. This happens when people download an app because they want to play some variant of a game like Candy Crush with some special, different icon, and the download includes a back door to all of their data.<\/p>\n\n\n\n<p>Preventing malware can be difficult today, especially since nefarious packages can be hidden inside the code of everyday apps we use, or they can be socially engineered to look like legitimate brands. The best thing to do is stop downloading things you don\u2019t know for sure (100%) are safe, especially if you don\u2019t understand who the source is and don\u2019t trust the app store to have done diligence for you. Make sure what you are downloading has been well-reviewed. You should always employ anti-virus and anti-malware software programs on your personal systems, including phones and tablets, especially if you are file sharing between devices. Practice good cyber-hygiene, meaning don\u2019t click on links or share files, don\u2019t accept files from other people, verify everything you do to the best of your ability.<\/p>\n\n\n\n<p>Even if you do all of the right things, it\u2019s still possible to get infected with malware. So what should you do if that happens? If you or your company are attacked because someone has malware, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-proper-incident-response-matters\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">good incident response is imperative<\/a>. The number one thing to do when being attacked, whether it\u2019s malware or something else, is to isolate the breach without shutting down. You want to leave the machine on and connected to the broad internet so you can track and trace and find the source and radius of attack. But you want to ensure that it\u2019s isolated down to its own system so the malware isn\u2019t infecting every device on your network.<\/p>\n\n\n\n<p>You can remove critical functions or secure any sensitive data from that machine, but, for all intents and purposes, that box is now your sandbox. This is where you\u2019re going to fight off the attackers. You may have multiple sandboxes to try and figure out what is going on, but isolation is the number one response to an attack with any form of malware. It is ultimately the way you will figure out how to inoculate a system against the malware, and how to eradicate whatever damage has been done.<\/p>\n\n\n\n<p>Malware is a term that encompasses a number of nasty things that can do anything from spam your system to rendering it unusable. The best way to prevent malware is with anti-virus and anti-malware software, in conjunction with proper cyber-hygiene. Be wary of what\u2019s out there, be skeptical of anything that looks even the slightest bit off. Do your due diligence. And if you do get infected, make sure to isolate that device without killing it so you have a chance to track down the perpetrator. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Cybercrime is real<\/a>! Don\u2019t be a victim.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware is more than &#8220;just&#8221; a virus. Prevention can be difficult, which is why the proper response to an attack is imperative.<\/p>\n","protected":false},"author":1,"featured_media":795,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,5,27,14],"tags":[54,28,1169,25,686,31,1745,1750,1756,21,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Negative Impact of Malware - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Malware is more than &quot;just&quot; a virus. Prevention can be difficult, which is why the proper response to an attack is imperative.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Negative Impact of Malware\" \/>\n<meta property=\"og:description\" content=\"Malware is more than &quot;just&quot; a virus. Prevention can be difficult, which is why the proper response to an attack is imperative.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-16T16:19:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-15T23:05:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"The Negative Impact of Malware\",\"datePublished\":\"2020-09-16T16:19:00+00:00\",\"dateModified\":\"2020-09-15T23:05:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\"},\"wordCount\":1016,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg\",\"keywords\":[\"Access\",\"App Sec\",\"Application Security\",\"cyber attack\",\"cyber sec\",\"Cybersecurity\",\"malware\",\"mobile devices\",\"mobile security\",\"Ransomware\",\"Security\"],\"articleSection\":[\"Application Security\",\"Cyber Security\",\"Malware\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\",\"name\":\"The Negative Impact of Malware - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg\",\"datePublished\":\"2020-09-16T16:19:00+00:00\",\"dateModified\":\"2020-09-15T23:05:34+00:00\",\"description\":\"Malware is more than \\\"just\\\" a virus. Prevention can be difficult, which is why the proper response to an attack is imperative.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Image by Gerd Altmann from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Negative Impact of Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Negative Impact of Malware - PWV Consultants","description":"Malware is more than \"just\" a virus. Prevention can be difficult, which is why the proper response to an attack is imperative.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/","og_locale":"en_US","og_type":"article","og_title":"The Negative Impact of Malware","og_description":"Malware is more than \"just\" a virus. Prevention can be difficult, which is why the proper response to an attack is imperative.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-09-16T16:19:00+00:00","article_modified_time":"2020-09-15T23:05:34+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"The Negative Impact of Malware","datePublished":"2020-09-16T16:19:00+00:00","dateModified":"2020-09-15T23:05:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/"},"wordCount":1016,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg","keywords":["Access","App Sec","Application Security","cyber attack","cyber sec","Cybersecurity","malware","mobile devices","mobile security","Ransomware","Security"],"articleSection":["Application Security","Cyber Security","Malware","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/","url":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/","name":"The Negative Impact of Malware - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg","datePublished":"2020-09-16T16:19:00+00:00","dateModified":"2020-09-15T23:05:34+00:00","description":"Malware is more than \"just\" a virus. Prevention can be difficult, which is why the proper response to an attack is imperative.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/The-Negative-Impact-of-Malware.jpg","width":1920,"height":1280,"caption":"Image by Gerd Altmann from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Negative Impact of Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/778"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=778"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/778\/revisions"}],"predecessor-version":[{"id":808,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/778\/revisions\/808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/795"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}