[{"id":11459,"link":"https:\/\/www.fortis-cyber.com\/web\/2025\/05\/22\/how-outdated-tech-could-be-hurting-your-business-and-what-to-do-about-it\/","name":"how-outdated-tech-could-be-hurting-your-business-and-what-to-do-about-it","thumbnail":{"url":false,"alt":false},"title":"How Outdated Tech Could Be Hurting Your Business and What to Do About It","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"May 22, 2025","dateGMT":"2025-05-22 16:49:50","modifiedDate":"2025-05-22 12:06:21","modifiedDateGMT":"2025-05-22 17:06:21","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/optimization\/\" rel=\"category tag\">Optimization<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/optimization\/\" rel=\"category tag\">Optimization<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cybersecurity-risk\/' rel='post_tag'>cybersecurity risk<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/outdated-technology\/' rel='post_tag'>outdated technology<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/system-upgrade\/' rel='post_tag'>system upgrade<\/a>"},"readTime":{"min":2,"sec":18},"status":"publish","excerpt":""},{"id":11403,"link":"https:\/\/www.fortis-cyber.com\/web\/2025\/04\/30\/email-security-in-2025-what-to-know\/","name":"email-security-in-2025-what-to-know","thumbnail":{"url":false,"alt":false},"title":"Email Security in 2025: What to Know","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Apr 30, 2025","dateGMT":"2025-04-30 18:04:16","modifiedDate":"2025-04-30 13:04:17","modifiedDateGMT":"2025-04-30 18:04:17","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/artificial-intelligence\/\" rel=\"category tag\">Artificial Intelligence<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/artificial-intelligence\/\" rel=\"category tag\">Artificial Intelligence<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/email-security\/' rel='post_tag'>email security<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/email-security-best-practices\/' rel='post_tag'>email security best practices<\/a>"},"readTime":{"min":1,"sec":15},"status":"publish","excerpt":""},{"id":11398,"link":"https:\/\/www.fortis-cyber.com\/web\/2025\/04\/30\/embracing-dynamically-retrainable-firewalls\/","name":"embracing-dynamically-retrainable-firewalls","thumbnail":{"url":false,"alt":false},"title":"Embracing Dynamically Retrainable Firewalls","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Apr 30, 2025","dateGMT":"2025-04-30 17:43:39","modifiedDate":"2025-04-30 12:48:15","modifiedDateGMT":"2025-04-30 17:48:15","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/innovation\/\" rel=\"category tag\">Innovation<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/innovation\/\" rel=\"category tag\">Innovation<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/digital-defense\/' rel='post_tag'>digital defense<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/firewall\/' rel='post_tag'>firewall<\/a>"},"readTime":{"min":1,"sec":21},"status":"publish","excerpt":""},{"id":11385,"link":"https:\/\/www.fortis-cyber.com\/web\/2025\/03\/31\/carf-compliance-ohiomhas-certification\/","name":"carf-compliance-ohiomhas-certification","thumbnail":{"url":false,"alt":false},"title":"CARF Compliance & OhioMHAS Certification","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Mar 31, 2025","dateGMT":"2025-03-31 14:26:01","modifiedDate":"2025-03-31 11:13:57","modifiedDateGMT":"2025-03-31 16:13:57","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/behavioral-health-accreditation\/' rel='post_tag'>behavioral health accreditation<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/carf-compliance\/' rel='post_tag'>CARF Compliance<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/ohiomhas\/' rel='post_tag'>OhioMHAS<\/a>"},"readTime":{"min":2,"sec":8},"status":"publish","excerpt":""},{"id":11370,"link":"https:\/\/www.fortis-cyber.com\/web\/2025\/03\/28\/is-ai-getting-out-of-hand\/","name":"is-ai-getting-out-of-hand","thumbnail":{"url":false,"alt":false},"title":"Is AI Getting Out of Hand?","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Mar 28, 2025","dateGMT":"2025-03-28 17:23:30","modifiedDate":"2025-03-31 08:38:37","modifiedDateGMT":"2025-03-31 13:38:37","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/artificial-intelligence\/\" rel=\"category tag\">Artificial Intelligence<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/innovation\/\" rel=\"category tag\">Innovation<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/artificial-intelligence\/\" rel=\"category tag\">Artificial Intelligence<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/innovation\/\" rel=\"category tag\">Innovation<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/ai-privacy\/' rel='post_tag'>AI privacy<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/disable-ai-features\/' rel='post_tag'>disable AI features<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/predictive-text\/' rel='post_tag'>predictive text<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/smart-replies\/' rel='post_tag'>smart replies<\/a>"},"readTime":{"min":3,"sec":40},"status":"publish","excerpt":""},{"id":11324,"link":"https:\/\/www.fortis-cyber.com\/web\/2024\/12\/04\/the-rise-of-ransomware-attacks-on-schools\/","name":"the-rise-of-ransomware-attacks-on-schools","thumbnail":{"url":false,"alt":false},"title":"The Rise of Ransomware Attacks on Schools","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Dec 4, 2024","dateGMT":"2024-12-05 04:45:14","modifiedDate":"2024-12-04 23:46:47","modifiedDateGMT":"2024-12-05 04:46:47","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/education\/\" rel=\"category tag\">Education<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/education\/\" rel=\"category tag\">Education<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/education\/' rel='post_tag'>Education<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/itconsultant\/' rel='post_tag'>itconsultant<\/a>"},"readTime":{"min":2,"sec":6},"status":"publish","excerpt":""},{"id":11318,"link":"https:\/\/www.fortis-cyber.com\/web\/2024\/11\/27\/the-importance-of-reviewing-and-updating-your-security-policies\/","name":"the-importance-of-reviewing-and-updating-your-security-policies","thumbnail":{"url":false,"alt":false},"title":"The Importance of Reviewing and Updating Your Security Policies","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Nov 27, 2024","dateGMT":"2024-11-27 17:13:54","modifiedDate":"2024-11-27 12:15:11","modifiedDateGMT":"2024-11-27 17:15:11","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/data-management\/' rel='post_tag'>data management<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/staff-training\/' rel='post_tag'>staff training<\/a>"},"readTime":{"min":1,"sec":51},"status":"publish","excerpt":""},{"id":11223,"link":"https:\/\/www.fortis-cyber.com\/web\/2024\/11\/01\/how-managed-service-providers-msps-can-support-internal-it-teams-to-prevent-burnout\/","name":"how-managed-service-providers-msps-can-support-internal-it-teams-to-prevent-burnout","thumbnail":{"url":false,"alt":false},"title":"How Managed Service Providers (MSPs) Can Support Internal IT Teams to Prevent Burnout","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Nov 1, 2024","dateGMT":"2024-11-01 16:41:42","modifiedDate":"2024-11-01 11:47:23","modifiedDateGMT":"2024-11-01 16:47:23","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/helpful-overshare\/\" rel=\"category tag\">Helpful Overshare<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/helpful-overshare\/\" rel=\"category tag\">Helpful Overshare<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/it-department\/' rel='post_tag'>IT department<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/managed-service-providers\/' rel='post_tag'>managed service providers<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/msp-support\/' rel='post_tag'>MSP support<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/outsourced-it\/' rel='post_tag'>Outsourced IT<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/prevent-burnout\/' rel='post_tag'>prevent burnout<\/a>"},"readTime":{"min":3,"sec":56},"status":"publish","excerpt":""},{"id":11220,"link":"https:\/\/www.fortis-cyber.com\/web\/2024\/11\/01\/preparing-your-business-for-year-end-cybersecurity-compliance\/","name":"preparing-your-business-for-year-end-cybersecurity-compliance","thumbnail":{"url":false,"alt":false},"title":"Preparing Your Business for Year-End Cybersecurity Compliance","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Nov 1, 2024","dateGMT":"2024-11-01 15:35:43","modifiedDate":"2024-11-01 10:38:10","modifiedDateGMT":"2024-11-01 15:38:10","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cybersecurity-audits\/' rel='post_tag'>cybersecurity audits<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/fortis-cyber-solutions\/' rel='post_tag'>Fortis Cyber Solutions<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/small-business-compliance\/' rel='post_tag'>small business compliance<\/a>"},"readTime":{"min":2,"sec":22},"status":"publish","excerpt":""},{"id":11217,"link":"https:\/\/www.fortis-cyber.com\/web\/2024\/11\/01\/holiday-cybersecurity-protecting-your-business-during-peak-season\/","name":"holiday-cybersecurity-protecting-your-business-during-peak-season","thumbnail":{"url":false,"alt":false},"title":"Holiday Cybersecurity: Protecting Your Business During Peak Season","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Nov 1, 2024","dateGMT":"2024-11-01 13:55:53","modifiedDate":"2024-11-01 10:39:46","modifiedDateGMT":"2024-11-01 15:39:46","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/successful-tips-and-tricks\/\" rel=\"category tag\">Successful Tips and Tricks<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/successful-tips-and-tricks\/\" rel=\"category tag\">Successful Tips and Tricks<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/fortis-cyber-solutions\/' rel='post_tag'>Fortis Cyber Solutions<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/holiday-cybersecurity\/' rel='post_tag'>holiday cybersecurity<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/small-business-cybersecurity\/' rel='post_tag'>small business cybersecurity<\/a>"},"readTime":{"min":2,"sec":32},"status":"publish","excerpt":""},{"id":11188,"link":"https:\/\/www.fortis-cyber.com\/web\/2024\/09\/26\/the-latest-on-pci-compliance-what-your-business-needs-to-know\/","name":"the-latest-on-pci-compliance-what-your-business-needs-to-know","thumbnail":{"url":false,"alt":false},"title":"The Latest on PCI Compliance: What Your Business Needs to Know","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Sep 26, 2024","dateGMT":"2024-09-26 15:29:55","modifiedDate":"2024-09-26 10:35:12","modifiedDateGMT":"2024-09-26 15:35:12","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/finance\/\" rel=\"category tag\">Finance<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/finance\/\" rel=\"category tag\">Finance<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cloud-security\/' rel='post_tag'>cloud security<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cyber-threats\/' rel='post_tag'>cyber threats<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/pci-compliance\/' rel='post_tag'>PCI compliance<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/pci-dss-4-0\/' rel='post_tag'>PCI DSS 4.0<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/pci-standards\/' rel='post_tag'>PCI standards<\/a>"},"readTime":{"min":4,"sec":33},"status":"publish","excerpt":""},{"id":11182,"link":"https:\/\/www.fortis-cyber.com\/web\/2024\/09\/26\/microsofts-new-ciso-leadership-a-strategic-move-for-cybersecurity\/","name":"microsofts-new-ciso-leadership-a-strategic-move-for-cybersecurity","thumbnail":{"url":false,"alt":false},"title":"Microsoft\u2019s New CISO Leadership: A Strategic Move for Cybersecurity","author":{"name":"Fortis Cyber Solutions","link":"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/"},"date":"Sep 26, 2024","dateGMT":"2024-09-26 14:23:54","modifiedDate":"2024-09-26 09:30:02","modifiedDateGMT":"2024-09-26 14:30:02","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/artificial-intelligence\/\" rel=\"category tag\">Artificial Intelligence<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/trending\/\" rel=\"category tag\">Trending<\/a>","space":"<a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/artificial-intelligence\/\" rel=\"category tag\">Artificial Intelligence<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a> <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/trending\/\" rel=\"category tag\">Trending<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.fortis-cyber.com\/web\/tag\/artificial-intelligence\/' rel='post_tag'>artificial intelligence<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/ciso\/' rel='post_tag'>CISO<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/threat-detection\/' rel='post_tag'>threat detection<\/a><a href='https:\/\/www.fortis-cyber.com\/web\/tag\/user-trust\/' rel='post_tag'>user trust<\/a>"},"readTime":{"min":2,"sec":36},"status":"publish","excerpt":""}]