Policyholder Education

Blog
Shades of Gray: The Risk of Doing Business with Hackers
Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?

Blog
The Old Privacy Laws That May Be Putting Your Business At Risk
Almost anything outdated can be reinvented with a modern twist. Decades-old privacy laws fuel modern litigation and turn compliance into a moving target.

Blog
It’s Time to Say Goodbye to On-Premises Microsoft Exchange
Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.

Blog
How Hackers Leverage Insurance Details in Ransomware Attacks
Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.

Blog
Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks
Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.

Blog
Defense in Depth: Building a Multi-Layered Security Strategy
Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.

Blog
Timely Reporting Can Be the Deciding Factor in Cyber Insurance
The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.

Blog
Taking Responsibility in the Age of Non-Stop CVEs
Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.

Blog
Funds Transfer Fraud: 3 Steps to a Successful Clawback
Coalition has recovered a total of $101 million in stolen funds through clawbacks. What does the path to recovery look like?

Blog
Why Every SMB Should Shrink Its Attack Surface
Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
Are Your Weak Passwords Welcoming a Cyber Attack?
Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.

Blog
Best Practices to Avoid a Wrongful Collection Event
The legal and regulatory landscape is constantly evolving. We’ll explore how businesses can reduce their exposure to legal action.

Blog
Infostealers Are Silently Siphoning Businesses’ Sensitive Data
Attackers are increasingly using infostealers to loot private data en masse. Businesses can mitigate these risks with support from Coalition Security.











