{"id":788,"date":"2020-09-18T12:00:00","date_gmt":"2020-09-18T16:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=788"},"modified":"2020-09-17T18:51:27","modified_gmt":"2020-09-17T22:51:27","slug":"protecting-your-data-storage-solution","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/","title":{"rendered":"Protecting Your Data Storage Solution"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Having a data storage solution is only the first step in the process. The second step is protecting that data from would-be thieves and nefarious evil-doers who will attempt to breach your walls.<\/h2>\n\n\n\n<p>To discuss data security you have to start with CIA &#8211; confidentiality, integrity and availability. One of the biggest considerations in data storage solutions is how to best protect storage resources against cyber-attacks. Cyber-attacks and data breaches are continually <a href=\"https:\/\/www.pwvconsultants.com\/blog\/social-media-hacking-is-on-the-rise\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">on the rise<\/a>, so setting proper protections around your sensitive data is incredibly important.<\/p>\n\n\n\n<p>The number one factor in securing any data storage solution is its configuration. Proper configuration is extremely important. Next is durability. You need to ensure that your company will have that data no matter what, so when you\u2019re looking at durability, it\u2019s about having a system where even if the underlying technology fails, you don\u2019t lose the data. Whether it\u2019s a five 9\u2019s, a seven 9\u2019s guarantee or hourly backups, you to have the data to secure it. Data should be replicated to multiple locations and multiple drives, or into multiple data stores underlying the service that you\u2019re using and therefore there are multiple copies of it any given time. So if one copy is compromised or fails, you have still ensured that your business has access to its data.<\/p>\n\n\n\n<p>Availability is durability. The availability of your data is directly related to the durability of your data storage solution.<\/p>\n\n\n\n<p>Scalability also contributes to availability. You want your data to be able to scale with you, you want to be able to add more to your data stores as your business grows. You also want to make sure you can retrieve your data as needed without hitting a bottleneck.<\/p>\n\n\n\n<p>Integrity is protected in data stores through versioning and logging. It\u2019s really important, when you have a data storage solution, that you have saved versions of the data objects. This way, if data is tampered with or destroyed, you have backups and versions that are intact and can ensure integrity. With a version made each time data is changed, it essentially creates a new copy, including deleting data. But deleting it doesn\u2019t delete the old versions, unless you intentionally delete all versions. Your data is therefore recoverable with versioning.<\/p>\n\n\n\n<p>Other considerations with versioning are change management, logging data access and data manipulation. This tells you who is accessing what data and how it was altered, which also ensures integrity. These access controls also contribute to confidentiality.<\/p>\n\n\n\n<p>When it comes to confidentiality, data should be isolated away from the public as much as possible. This includes everything from not having public facing S3 buckets to isolating data storage solutions, data drives and databases into non-public networks. Ensure that access is limited, especially in large scale production environments. You really only want machines to access production data systems. Prod data access should only be indirect for users via robust  credentialing systems. However, even when eliminating direct human access in prod, machine access will still require keys and\/or credentials. Those keys and access credentials should be kept in key stores or other secure stores, isolated away from everything else on your network.<\/p>\n\n\n\n<p>It is incredibly important to have a key store or key vault as part of your data storage solution. There are a variety of different systems like key management systems and secret management systems that can be used. And If the information is incredibly secret or secure or other highly confidential information, you can always look into an HSM. They are much more expensive even as a fractional cloud service, but they are assembled by different parties with separations of concerns. For instance, setup\/initiation and managing the hardware key to it, and maintenance are all assembled by different parties. Many are also built to essentially destroy the data they house if tampering is attempted.<\/p>\n\n\n\n<p>As you\u2019re setting up these protections, don\u2019t fall prey to the two most common mistakes: failing to implement versioning and putting your data at risk accidentally. More often than not, you\u2019re likely to see accidental data destruction or nefarious data destruction than you will theft of data. Truthfully, the \u201ctheft\u201d that is often seen is regularly tracked back to either incidental exposure or negligent exposure, meaning that people have left access points or other information open to the public when they should have been made private. Or, worse, failing to patch a known vulnerability. <\/p>\n\n\n\n<p>The best way to prevent the problems above is by selecting the right data solutions, configuring them correctly and isolating them as much as possible. When it comes to data, as with most of information security, use least privilege. No one should be directly accessing data storage solutions and data stores as a human being in a production environment. It frankly should not be necessary for a human to need to access it unless it\u2019s an extreme emergency \u201cbreak glass in case of fire\u201d situation. Meaning something critical has happened and someone needs to go in and repair the problem with the least amount of access possible, and the process should be logged and recorded and only for a short period of time.<\/p>\n\n\n\n<p>Having the <a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-characteristics-of-a-good-data-storage-solution\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">proper data storage solution<\/a> is only part of the puzzle, you must also ensure that your data is secure, that it\u2019s durable and available and has integrity. Your business literally depends on this, because if something becomes exposed, you\u2019re on the hook. And if that something was a known vulnerability, it can get very ugly in terms of fines and compliance crack downs. Don\u2019t expose your data! Always remember, if you question anything, hire an expert to help you! Make sure it\u2019s done right the first time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Having the proper data storage solution in place is step one. That data storage solution must also be secure and isolated to ensure it remains confidential.<\/p>\n","protected":false},"author":1,"featured_media":800,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,961,958,14],"tags":[543,18,626,1812,25,686,31,925,1763,1762,1767,1813,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Your Data Storage Solution - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Having the proper data storage solution in place is step one. That data storage solution must also be secure and isolated to ensure it remains confidential.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Your Data Storage Solution\" \/>\n<meta property=\"og:description\" content=\"Having the proper data storage solution in place is step one. That data storage solution must also be secure and isolated to ensure it remains confidential.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-18T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-17T22:51:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Protecting Your Data Storage Solution\",\"datePublished\":\"2020-09-18T16:00:00+00:00\",\"dateModified\":\"2020-09-17T22:51:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/\"},\"wordCount\":965,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg\",\"keywords\":[\"availability\",\"Cloud\",\"cloud services\",\"confidentiality\",\"cyber attack\",\"cyber sec\",\"Cybersecurity\",\"data\",\"data storage\",\"data storage solution\",\"integrity\",\"least privilege\",\"Security\"],\"articleSection\":[\"Cyber Security\",\"Data Stores\",\"Information Technology\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/\",\"name\":\"Protecting Your Data Storage Solution - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg\",\"datePublished\":\"2020-09-18T16:00:00+00:00\",\"dateModified\":\"2020-09-17T22:51:27+00:00\",\"description\":\"Having the proper data storage solution in place is step one. That data storage solution must also be secure and isolated to ensure it remains confidential.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg\",\"width\":1920,\"height\":1334,\"caption\":\"Image by S. Hermann &amp; F. Richter from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Your Data Storage Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Your Data Storage Solution - PWV Consultants","description":"Having the proper data storage solution in place is step one. That data storage solution must also be secure and isolated to ensure it remains confidential.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Your Data Storage Solution","og_description":"Having the proper data storage solution in place is step one. That data storage solution must also be secure and isolated to ensure it remains confidential.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-09-18T16:00:00+00:00","article_modified_time":"2020-09-17T22:51:27+00:00","og_image":[{"width":1920,"height":1334,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Protecting Your Data Storage Solution","datePublished":"2020-09-18T16:00:00+00:00","dateModified":"2020-09-17T22:51:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/"},"wordCount":965,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg","keywords":["availability","Cloud","cloud services","confidentiality","cyber attack","cyber sec","Cybersecurity","data","data storage","data storage solution","integrity","least privilege","Security"],"articleSection":["Cyber Security","Data Stores","Information Technology","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/","url":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/","name":"Protecting Your Data Storage Solution - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg","datePublished":"2020-09-18T16:00:00+00:00","dateModified":"2020-09-17T22:51:27+00:00","description":"Having the proper data storage solution in place is step one. That data storage solution must also be secure and isolated to ensure it remains confidential.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Protecting-Your-Data-Storage-Solution.jpg","width":1920,"height":1334,"caption":"Image by S. Hermann &amp; F. Richter from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/protecting-your-data-storage-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting Your Data Storage Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/788"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=788"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/788\/revisions"}],"predecessor-version":[{"id":825,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/788\/revisions\/825"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/800"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}