{"id":975,"date":"2020-10-21T14:00:00","date_gmt":"2020-10-21T18:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=975"},"modified":"2020-10-21T13:37:36","modified_gmt":"2020-10-21T17:37:36","slug":"businesses-need-to-review-security-amid-pandemic","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/","title":{"rendered":"Businesses Need to Review Security Amid Pandemic"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Amid the strain on businesses during the COVID-19 pandemic, global cyber-attacks are on the rise. Making internal business changes holds the key to survival, businesses need to review security protocols now.<\/h2>\n\n\n\n<p>Over the last few months, we have seen a huge increase in the amount of cyber-attacks. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/social-media-hacking-is-on-the-rise\/\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>. Garmin. Reddit. YouTube. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/healthcare-systems-worldwide-are-under-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">The many healthcare systems<\/a>. The <a href=\"https:\/\/www.pwvconsultants.com\/blog\/all-open-sourced-code-should-be-reviewed\/\" target=\"_blank\" rel=\"noreferrer noopener\">recent npm packages<\/a>. There are more, but those security issues made the biggest headlines. On top of cyber-attacks, we\u2019ve seen multiple cloud services problems, Microsoft had a configuration issue impacting several areas of business, Bank of America had a typo in its code resulting in customers seeing a $0 balance online. If businesses want to avoid extra labor costs and everything else that comes with a service disruption, as well as do more to prevent a breach, something has to change. Businesses need to review security protocols as soon as possible.<\/p>\n\n\n\n<p>We\u2019ve talked before about how the <a href=\"https:\/\/www.pwvconsultants.com\/blog\/changing-the-culture-around-info-sec\/\" target=\"_blank\" rel=\"noreferrer noopener\">culture around InfoSec needs to change<\/a>. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/\" target=\"_blank\" rel=\"noreferrer noopener\">InfoSec professionals are burning out<\/a> for a variety of reasons. Cybersecurity budgets are improperly drawn because executives often don\u2019t consider certain costs. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hackers continuously change their tactics<\/a>. Incident response teams are on high alert.<\/p>\n\n\n\n<p>As humans, our emotions and current stress levels are heightened right now. Adults are working from home, kids are being educated from home, some families are under isolation due to health concerns and going anywhere causes anxiety levels to rise as we try to keep our distance and wear masks. We thrive on social interaction, it\u2019s a fundamental part of how humans survive. In lieu of being and interacting with other people in-person, we are doing everything virtually. Virtual happy hour. Virtual game night. Virtual movie and concert experiences. All of this internet-based activity means that bad actors have more surface area to exploit.<\/p>\n\n\n\n<p>On top of that, some people lost their jobs or were furloughed or saw their business get shut down. As those people struggle, they are sometimes even more susceptible to bad actors because they are more likely to fight skeptical feelings in the pursuit of opportunity. <\/p>\n\n\n\n<p>In light of all of this, it is imperative, crucial, vital, necessary to ensure that your business has <a href=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">proper protections in place<\/a>. It\u2019s time to review your security practices, your storage methods, your incident response plan, your budget. Budgets for 2020 have already been blown in some places because business is vastly less than anticipated. But if you have to throw money at a certain part of your business, make it security. It is a foundational obligation to you, as a business owner, to ensure the safety and security of your customers, clients, business partners and employees sensitive information. If there is a breach of any kind, it falls on the business. That will lead to extra costs like fixing the weak spot, mitigation of the breach, loss of business due to lack of trust, legal fees and reparations.\u00a0<\/p>\n\n\n\n<p>Look again at the Capital One incident where they were fined $80 million for leaving a known vulnerability unpatched. That doesn\u2019t account for the legal fees, reparations, mitigation, fixing the problem or loss of business due to lack of trust. In all, Capital One paid out far more than that. As a giant financial institution, they have the assets to cover those costs. But the majority of businesses out there do not.<\/p>\n\n\n\n<p>So, here are some key things to review right now:<\/p>\n\n\n\n<ul><li>IAM controls (ensure least privilege is used everywhere)<\/li><li><a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-proper-incident-response-matters\/\" target=\"_blank\" rel=\"noreferrer noopener\">Incident Response plan<\/a>, including <a href=\"https:\/\/www.pwvconsultants.com\/blog\/components-of-successful-incident-response-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">which employees are on the team<\/a><\/li><li>Firewall and other cybersecurity settings<\/li><li>Email filters<\/li><li>Systems and processes (look for fragility and modernization opportunities)<\/li><li>Cloud services settings and costs<\/li><li>Cloud migration if not using the cloud<\/li><li>Open-sourced code<\/li><li>VPN settings (every remote employee should be logging in through a VPN using 2FA)<\/li><li>What alerts are set and who gets notified<\/li><\/ul>\n\n\n\n<p>Remember, your business is on the hook if something goes awry. Bad actors are on the hunt, looking for easy prey to exploit. Don\u2019t be easy prey, make it hard for attackers to get through. They\u2019d rather move on and remain undetected than bludgeon a hole through a wall and raise alarms. Be safe and ensure the safety of your data and information. And if you\u2019re not sure how to do even one of those things, hire an expert! That cost will be far less than the cost of a breach. At the end of the day, you want your business to run smoothly, efficiently, securely, and, most importantly, you want it to stay open. Take the steps to make it happen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The COVID-19 pandemic has changed the way the world works. In light of this, businesses need to review security protocols immediately.<\/p>\n","protected":false},"author":1,"featured_media":985,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4],"tags":[25,1910,31,539,708,40,575,558],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Businesses Need to Review Security Amid Pandemic - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The COVID-19 pandemic has changed the way the world works. In light of this, businesses need to review security protocols immediately.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Businesses Need to Review Security Amid Pandemic\" \/>\n<meta property=\"og:description\" content=\"The COVID-19 pandemic has changed the way the world works. In light of this, businesses need to review security protocols immediately.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-21T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-21T17:37:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Businesses Need to Review Security Amid Pandemic\",\"datePublished\":\"2020-10-21T18:00:00+00:00\",\"dateModified\":\"2020-10-21T17:37:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\"},\"wordCount\":769,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png\",\"keywords\":[\"cyber attack\",\"CyberSec\",\"Cybersecurity\",\"hacking\",\"Incident Response\",\"Info Sec\",\"Information Security\",\"work from home\"],\"articleSection\":[\"Cyber Security\",\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\",\"name\":\"Businesses Need to Review Security Amid Pandemic - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png\",\"datePublished\":\"2020-10-21T18:00:00+00:00\",\"dateModified\":\"2020-10-21T17:37:36+00:00\",\"description\":\"The COVID-19 pandemic has changed the way the world works. In light of this, businesses need to review security protocols immediately.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png\",\"width\":1920,\"height\":1080,\"caption\":\"Image by VIN JD from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Businesses Need to Review Security Amid Pandemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Businesses Need to Review Security Amid Pandemic - PWV Consultants","description":"The COVID-19 pandemic has changed the way the world works. In light of this, businesses need to review security protocols immediately.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/","og_locale":"en_US","og_type":"article","og_title":"Businesses Need to Review Security Amid Pandemic","og_description":"The COVID-19 pandemic has changed the way the world works. In light of this, businesses need to review security protocols immediately.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-10-21T18:00:00+00:00","article_modified_time":"2020-10-21T17:37:36+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png","type":"image\/png"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Businesses Need to Review Security Amid Pandemic","datePublished":"2020-10-21T18:00:00+00:00","dateModified":"2020-10-21T17:37:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/"},"wordCount":769,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png","keywords":["cyber attack","CyberSec","Cybersecurity","hacking","Incident Response","Info Sec","Information Security","work from home"],"articleSection":["Cyber Security","Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/","url":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/","name":"Businesses Need to Review Security Amid Pandemic - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png","datePublished":"2020-10-21T18:00:00+00:00","dateModified":"2020-10-21T17:37:36+00:00","description":"The COVID-19 pandemic has changed the way the world works. In light of this, businesses need to review security protocols immediately.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/hacking-3112539_1920.png","width":1920,"height":1080,"caption":"Image by VIN JD from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Businesses Need to Review Security Amid Pandemic"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/975"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=975"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/975\/revisions"}],"predecessor-version":[{"id":1117,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/975\/revisions\/1117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/985"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}