{"id":10487,"date":"2023-07-24T22:19:08","date_gmt":"2023-07-25T03:19:08","guid":{"rendered":"https:\/\/www.fortis-cyber.com\/web\/?page_id=10487"},"modified":"2025-08-28T12:09:20","modified_gmt":"2025-08-28T17:09:20","slug":"blog","status":"publish","type":"page","link":"https:\/\/www.fortis-cyber.com\/web\/blog\/","title":{"rendered":"Oversharing"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row css=&#8221;.vc_custom_1692037763702{border-radius: 2px !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1756400958170{background-color: #c1ff00 !important;}&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/conta.cc\/45R4bVO\" target=\"_blank\" rel=\"noopener\">CLICK HERE TO READ OUR LATEST NEWSLETTER<\/a><\/h3>\n<p>[\/vc_column_text][vc_empty_space]<div class=\"qodef-blog-list-holder qodef-boxes qodef-two-columns\">\n\t<ul class=\"qodef-blog-list\">\n\t<li class=\"qodef-blog-list-item clearfix\">\n\t<div class=\"qodef-blog-list-item-inner\">\n\t\t<div class=\"qodef-item-image\">\n\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/12\/16\/before-you-log-off-cybersecurity-holiday-checklist\/\">\n\t\t\t\t\t\t\t\t\n\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"qodef-item-text-holder\">\n\t\t\t<h2 class=\"qodef-item-title\">\n\t\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/12\/16\/before-you-log-off-cybersecurity-holiday-checklist\/\" >\n\t\t\t\t\tBefore You Log-off: Cybersecurity Holiday Checklist\t\t\t\t<\/a>\n\t\t\t<\/h2>\n\t\t\t\n\t\t\t<div class=\"qodef-item-info-section\">\n\t\t\t\t<div class=\"qodef-post-info-author\">by <a class=\"qodef-post-info-author-link\" href=\"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/\">Fortis Cyber Solutions<\/a><\/div>\n<div class=\"qodef-post-info-category\">\n    in <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/helpful-overshare\/\" rel=\"category tag\">Helpful Overshare<\/a><\/div>\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"qodef-excerpt\">Holiday breaks are essential for rest, reflection, and recharging. But while your team steps away, cyber threats continue to operate at full speed. Holidays often create ideal conditions for attackers, with reduced monitoring, delayed responses, and relaxed routines. A few proactive steps before clo...<\/p>\n\t\t\t\t\t<\/div>\n\t<\/div>\t\n<\/li><li class=\"qodef-blog-list-item clearfix\">\n\t<div class=\"qodef-blog-list-item-inner\">\n\t\t<div class=\"qodef-item-image\">\n\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/11\/19\/the-risk-hidden-in-the-just-one-quick-purchase\/\">\n\t\t\t\t\t\t\t\t\n\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"qodef-item-text-holder\">\n\t\t\t<h2 class=\"qodef-item-title\">\n\t\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/11\/19\/the-risk-hidden-in-the-just-one-quick-purchase\/\" >\n\t\t\t\t\tThe Risk Hidden in the \u201cJust One Quick Purchase\u201d\t\t\t\t<\/a>\n\t\t\t<\/h2>\n\t\t\t\n\t\t\t<div class=\"qodef-item-info-section\">\n\t\t\t\t<div class=\"qodef-post-info-author\">by <a class=\"qodef-post-info-author-link\" href=\"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/\">Fortis Cyber Solutions<\/a><\/div>\n<div class=\"qodef-post-info-category\">\n    in <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a><\/div>\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"qodef-excerpt\">It\u2019s tempting. A team member logs into their work laptop for a moment, spots a great deal on a pair of headphones, and clicks \u201cBuy Now.\u201d The transaction seems harmless. But when personal shopping happens on a company-issued device or via the corporate network, the......<\/p>\n\t\t\t\t\t<\/div>\n\t<\/div>\t\n<\/li><li class=\"qodef-blog-list-item clearfix\">\n\t<div class=\"qodef-blog-list-item-inner\">\n\t\t<div class=\"qodef-item-image\">\n\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/08\/28\/when-employees-leak-data-risks-from-the-inside\/\">\n\t\t\t\t\t\t\t\t\n\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"qodef-item-text-holder\">\n\t\t\t<h2 class=\"qodef-item-title\">\n\t\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/08\/28\/when-employees-leak-data-risks-from-the-inside\/\" >\n\t\t\t\t\tWhen Employees Leak Data &#8211; Risks From the Inside\t\t\t\t<\/a>\n\t\t\t<\/h2>\n\t\t\t\n\t\t\t<div class=\"qodef-item-info-section\">\n\t\t\t\t<div class=\"qodef-post-info-author\">by <a class=\"qodef-post-info-author-link\" href=\"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/\">Fortis Cyber Solutions<\/a><\/div>\n<div class=\"qodef-post-info-category\">\n    in <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/case-study\/\" rel=\"category tag\">Case Study<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a><\/div>\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"qodef-excerpt\">Cybersecurity often focuses on external threats, but insider leaks, whether intentional or accidental, are a serious and growing concern. According to SpyCloud\u2019s 2025 Insider Threat Pulse Report, 56% of organizations experienced an insider threat incident in the past year, and both negligent and m...<\/p>\n\t\t\t\t\t<\/div>\n\t<\/div>\t\n<\/li><li class=\"qodef-blog-list-item clearfix\">\n\t<div class=\"qodef-blog-list-item-inner\">\n\t\t<div class=\"qodef-item-image\">\n\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/07\/24\/cybersecurity-in-the-hybrid-workplace-are-you-leaving-the-door-open\/\">\n\t\t\t\t\t\t\t\t\n\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"qodef-item-text-holder\">\n\t\t\t<h2 class=\"qodef-item-title\">\n\t\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/07\/24\/cybersecurity-in-the-hybrid-workplace-are-you-leaving-the-door-open\/\" >\n\t\t\t\t\tCybersecurity in the Hybrid Workplace: Are You Leaving the Door Open?\t\t\t\t<\/a>\n\t\t\t<\/h2>\n\t\t\t\n\t\t\t<div class=\"qodef-item-info-section\">\n\t\t\t\t<div class=\"qodef-post-info-author\">by <a class=\"qodef-post-info-author-link\" href=\"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/\">Fortis Cyber Solutions<\/a><\/div>\n<div class=\"qodef-post-info-category\">\n    in <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a><\/div>\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"qodef-excerpt\">As hybrid work continues to redefine the modern office, many organizations have adapted their physical spaces but not their digital defenses. When your team is split between home offices, coffee shops, and corporate buildings, it creates a web of access points, devices, and security risks......<\/p>\n\t\t\t\t\t<\/div>\n\t<\/div>\t\n<\/li><li class=\"qodef-blog-list-item clearfix\">\n\t<div class=\"qodef-blog-list-item-inner\">\n\t\t<div class=\"qodef-item-image\">\n\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/05\/22\/how-outdated-tech-could-be-hurting-your-business-and-what-to-do-about-it\/\">\n\t\t\t\t\t\t\t\t\n\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"qodef-item-text-holder\">\n\t\t\t<h2 class=\"qodef-item-title\">\n\t\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/05\/22\/how-outdated-tech-could-be-hurting-your-business-and-what-to-do-about-it\/\" >\n\t\t\t\t\tHow Outdated Tech Could Be Hurting Your Business and What to Do About It\t\t\t\t<\/a>\n\t\t\t<\/h2>\n\t\t\t\n\t\t\t<div class=\"qodef-item-info-section\">\n\t\t\t\t<div class=\"qodef-post-info-author\">by <a class=\"qodef-post-info-author-link\" href=\"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/\">Fortis Cyber Solutions<\/a><\/div>\n<div class=\"qodef-post-info-category\">\n    in <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/optimization\/\" rel=\"category tag\">Optimization<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a><\/div>\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"qodef-excerpt\">Technology is a tool meant to move your business forward, not hold it back. Your systems are running on borrowed time. Outdated tech doesn\u2019t just make things slower; it makes your business more vulnerable, more expensive to maintain, and less competitive. At Fortis Cyber Solutions,......<\/p>\n\t\t\t\t\t<\/div>\n\t<\/div>\t\n<\/li><li class=\"qodef-blog-list-item clearfix\">\n\t<div class=\"qodef-blog-list-item-inner\">\n\t\t<div class=\"qodef-item-image\">\n\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/04\/30\/email-security-in-2025-what-to-know\/\">\n\t\t\t\t\t\t\t\t\n\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"qodef-item-text-holder\">\n\t\t\t<h2 class=\"qodef-item-title\">\n\t\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/04\/30\/email-security-in-2025-what-to-know\/\" >\n\t\t\t\t\tEmail Security in 2025: What to Know\t\t\t\t<\/a>\n\t\t\t<\/h2>\n\t\t\t\n\t\t\t<div class=\"qodef-item-info-section\">\n\t\t\t\t<div class=\"qodef-post-info-author\">by <a class=\"qodef-post-info-author-link\" href=\"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/\">Fortis Cyber Solutions<\/a><\/div>\n<div class=\"qodef-post-info-category\">\n    in <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/artificial-intelligence\/\" rel=\"category tag\">Artificial Intelligence<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a><\/div>\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"qodef-excerpt\">Email continues to be one of the most heavily targeted gateways into an organization, and attackers are getting smarter. At Fortis Cyber Solutions, we recognize that modern email security requires more than spam filters. The 2025 Email Threat LandscapePhishing scams are more sophisticated than ever,...<\/p>\n\t\t\t\t\t<\/div>\n\t<\/div>\t\n<\/li><li class=\"qodef-blog-list-item clearfix\">\n\t<div class=\"qodef-blog-list-item-inner\">\n\t\t<div class=\"qodef-item-image\">\n\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/04\/30\/embracing-dynamically-retrainable-firewalls\/\">\n\t\t\t\t\t\t\t\t\n\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"qodef-item-text-holder\">\n\t\t\t<h2 class=\"qodef-item-title\">\n\t\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/04\/30\/embracing-dynamically-retrainable-firewalls\/\" >\n\t\t\t\t\tEmbracing Dynamically Retrainable Firewalls\t\t\t\t<\/a>\n\t\t\t<\/h2>\n\t\t\t\n\t\t\t<div class=\"qodef-item-info-section\">\n\t\t\t\t<div class=\"qodef-post-info-author\">by <a class=\"qodef-post-info-author-link\" href=\"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/\">Fortis Cyber Solutions<\/a><\/div>\n<div class=\"qodef-post-info-category\">\n    in <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/innovation\/\" rel=\"category tag\">Innovation<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a><\/div>\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"qodef-excerpt\">Today, we\u2019re seeing a shift where traditional firewalls are giving way to intelligent, self-updating, dynamically retrainable firewalls. Why the Change?Cyber threats are more dynamic than ever. Attackers evolve daily, and rule-based systems can\u2019t keep up. Static firewalls often leave organizatio...<\/p>\n\t\t\t\t\t<\/div>\n\t<\/div>\t\n<\/li><li class=\"qodef-blog-list-item clearfix\">\n\t<div class=\"qodef-blog-list-item-inner\">\n\t\t<div class=\"qodef-item-image\">\n\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/03\/31\/carf-compliance-ohiomhas-certification\/\">\n\t\t\t\t\t\t\t\t\n\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"qodef-item-text-holder\">\n\t\t\t<h2 class=\"qodef-item-title\">\n\t\t\t\t<a href=\"https:\/\/www.fortis-cyber.com\/web\/2025\/03\/31\/carf-compliance-ohiomhas-certification\/\" >\n\t\t\t\t\tCARF Compliance &amp; OhioMHAS Certification\t\t\t\t<\/a>\n\t\t\t<\/h2>\n\t\t\t\n\t\t\t<div class=\"qodef-item-info-section\">\n\t\t\t\t<div class=\"qodef-post-info-author\">by <a class=\"qodef-post-info-author-link\" href=\"https:\/\/www.fortis-cyber.com\/web\/author\/fortiscyber_crimyl\/\">Fortis Cyber Solutions<\/a><\/div>\n<div class=\"qodef-post-info-category\">\n    in <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/all\/technology\/\" rel=\"category tag\">Technology<\/a>, <a href=\"https:\/\/www.fortis-cyber.com\/web\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a><\/div>\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"qodef-excerpt\">On July 4, 2023, Ohio Governor Mike DeWine signed House Bill 33 into law, setting new standards for behavioral health providers across the state. This legislation significantly impacts certified community behavioral health providers, private psychiatric hospitals, and residential Class 1, 2, and 3 f...<\/p>\n\t\t\t\t\t<\/div>\n\t<\/div>\t\n<\/li>\t<\/ul>\t\n<\/div>\n<div class=\"qodef-separator-holder clearfix  qodef-separator-center\">\n\t<div class=\"qodef-separator\" style=\"border-color: #00274c;width: 100%;border-width: 10px\"><\/div>\n<\/div>\n[vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1692037763702{border-radius: 2px !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1756400958170{background-color: #c1ff00 !important;}&#8221;] CLICK HERE TO READ OUR LATEST NEWSLETTER [\/vc_column_text][vc_empty_space][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.fortis-cyber.com\/web\/wp-json\/wp\/v2\/pages\/10487"}],"collection":[{"href":"https:\/\/www.fortis-cyber.com\/web\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fortis-cyber.com\/web\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fortis-cyber.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fortis-cyber.com\/web\/wp-json\/wp\/v2\/comments?post=10487"}],"version-history":[{"count":11,"href":"https:\/\/www.fortis-cyber.com\/web\/wp-json\/wp\/v2\/pages\/10487\/revisions"}],"predecessor-version":[{"id":11480,"href":"https:\/\/www.fortis-cyber.com\/web\/wp-json\/wp\/v2\/pages\/10487\/revisions\/11480"}],"wp:attachment":[{"href":"https:\/\/www.fortis-cyber.com\/web\/wp-json\/wp\/v2\/media?parent=10487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}