Phishing

Blog
How Threat Actors Are Outsmarting Your Email Defenses
Coalition Incident Response has seen an uptick in phishing attacks via Microsoft 365’s Direct Send feature. How does that work?

Blog
Deepfakes Are Making Cyber Scams More Difficult to Detect
While deepfakes introduce a need for increased scrutiny, businesses can combat the rise of AI-enhanced technology with always-on security awareness.

Blog
Your Email Account is the Primary Gateway for Cyber Attackers
Business email compromise is one of the most pervasive cyber threats. Learn how to protect your business with security awareness training.

Blog
Limiting Employee Access Can Reduce Your Cyber Exposure
Role-based access control can strengthen your security posture by reducing employee error and malicious insiders while addressing compliance requirements.

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
Are Your Weak Passwords Welcoming a Cyber Attack?
Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.

Blog
How MDR Helps Businesses Protect Against Top Cyber Threats
Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.

Blog
Threat Actors Are Impersonating IT Teams to Deploy Ransomware
Coalition Incident Response has noted a trend where cybercriminals impersonate the help desk through Microsoft Teams to gain remote access and execute ransomware.

Blog
The Psychology of Social Engineering
The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.

Blog
Introducing Coalition Security Awareness Training
Coalition Security Awareness Training makes it easy for small businesses to educate employees on cybersecurity, monitor performance, and track compliance.

Blog
QR Codes Increasingly Used in Phishing Attacks
Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.

Blog
From Blockchain to the Dark Web: Cybersecurity Buzzword Myths Debunked
New tech is worthy of promotion, but when buzzwords and FOMO define purchasing decisions, your cybersecurity program is likely to be a patchwork affair of half-useful tools.

Blog
The Tremendous Opportunity (and Threat) of Artificial Intelligence
When considering the benefits of artificial intelligence, striking the right balance is essential in Coalition's commitment to protecting the unprotected.

Blog
Security Alert: MFA Spamming Attacks Increase Cyber Claims
MFA fatigue, overwhelming users with constant authentication requests, can lead to cyber insurance claims. Learn what mitigations are available.










