Active Insurance
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F276RMh52vEEBfRj1WDwH6l%2F512511c420b4dd874e1ae78c8edb927a%2FBlog-Newsletter-Header-June.jpg&w=3840&q=75)
Familiar Threat Actor Attack Tactics Find New Life
Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4TnBj3IW4IORoIe9xWEaR7%2F9be323701fd2559cfc662a510495ccbd%2FSecurity-Labs-SIM-Swapping_Extortion.jpg&w=3840&q=75)
Threat Actor Claims 100% Success With SIM-Swapping Extortion
SIM-swapping extortion attacks are on the rise due to self-service password resets, which help threat actors bypass interaction with their victims.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2q0NLVHJ4byIG3tqWezuQi%2F8751734c3bc316ac91e2a87076cf430a%2FBlog_Timely-Reporting.png&w=3840&q=75)
Timely Reporting Can Be the Deciding Factor in Cyber Insurance
The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1Ry1ADEYvDgW4vxoaONgY9%2F0952ce02df151111cf7c69a28aa62a1a%2FCoalition_Blog-Q2-Launch.jpg&w=3840&q=75)
Collaborate With Colleagues Across Accounts Using ‘Team View’
The Broker Platform enables collaboration across entire teams, allowing you to perform the same actions on accounts owned by your team members as you would on your own accounts.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3Ua7tZNScgsHL9MpXCd5rY%2F78d8f41f63ee58f83df0f15c899f3879%2FCoalition_Blog_2024-Claims.jpg&w=3840&q=75)
The State of Active Insurance: 2024 Cyber Claims Report
Discover the latest trends in ransomware, funds transfer fraud, risky technology, and the state of Active Insurance in Coalition’s 2024 Cyber Claims Report.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3Bra2ENCNKJXa7pEfMhqqh%2F783981a306fce81c65bf34859510a582%2FBlog_april-newsletter__1_.png&w=3840&q=75)
The Double-Edged Sword of Using Boundary Devices
Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3oZDMYtaYgOy8Ls9spxJKS%2F157ac91118698b60744b488e33108185%2FBlog-ChangeHealthcareAttackFallout.jpg&w=3840&q=75)
Change Healthcare Attack Fallout: How Coalition is Responding
The attack on Change Healthcare is a reminder of our shared dependency on technology and the ever-present cyber threats facing modern businesses.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5VUQZLtUA5VRHlG1JM0A3N%2F44549d6f951bbc6d223c24f382ea615c%2FBlog_Ransomware-Myths.png&w=3840&q=75)
Ransomware Myths Busted: How Cyber Insurance Impacts Payments
The decision to pay a ransomware demand is complex. Misconceptions about the role of cyber insurance in these incidents can exacerbate the problem.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FnHUI614nFy2H6LNoOSkwD%2Fadd475f2b590387bd24fc6e555b637d8%2FOptimized_Quoting_Experience.jpg&w=3840&q=75)
Optimize Your Cyber Quoting Experience on the Broker Platform
Coalition’s Broker Platform is designed with productivity in mind. Learn how to quote multiple markets, customize quotes, and leverage our recommendations.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5x7m6cuI2vTSZnpXBcwfLV%2F8ee5a6dcbd271ee82f15c5af422b6f9d%2FMDR-Premium-Credit.jpg&w=3840&q=75)
Coalition is Now Offering Premium Credits to MDR Customers
Businesses that use Coalition Managed Detection & Response are eligible for up to 12.5% premium credit on cyber insurance policies provided by Coalition.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4jnyDS27GDG9lL5ar2VhmR%2F968b741345da10565377530b5ba0a33b%2FBlog-Q1_Product_Launch_Blog__3.jpg&w=3840&q=75)
Increase Efficiency with Self-Service Tools on the Broker Platform
To meet the demands of a fast-paced cyber insurance market, Coalition's Broker Platform optimizes for self-sufficiency and provides on-demand resources.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F47ziNhMiGSccBrEEIhUGNl%2Ffe7859ddcc7f3fc0f80f47e843a3d1d5%2FBlog_Q1_Product_Launch__2.jpg&w=3840&q=75)
Empower Your Clients (and Yourself) With More Visibility Into Cyber Risks
Increased visibility across Coalition's quoting and risk management platforms can empower you as a cyber risk advisor.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7DJ9OCR1ge6Zpw8d5JDUnO%2F9903b86927e98b6aaa725211e75378b3%2FBlog_Cyber-Tax-Fraud.png&w=3840&q=75)
Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)
During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F28oI7DIG04euRoYt3j0ZlP%2Fc3cf70f3e5d10533b2cc8e5cfaf73b45%2FBlog_MDR-MFA.png&w=3840&q=75)
Why MDR is the Next MFA for Cyber Insurance
Cyber insurance providers are increasingly encouraging businesses to implement MDR — if not incentivizing it — just as they did with MFA.
![](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4KRs7czmuv8h5iomhPkMUV%2Fc1117027591dff1ea7fc51d887bd95ff%2FBlog_International_Retrospective_V2.jpg&w=3840&q=75)