[Live Demo] See how Wirespeed MDR delivers lightning-fast, automated security.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Phishing

Security

Blog

How Threat Actors Are Outsmarting Your Email Defenses

Coalition Incident Response has seen an uptick in phishing attacks via Microsoft 365’s Direct Send feature. How does that work?
Joshua SmithOctober 01, 2025
Security

Blog

Deepfakes Are Making Cyber Scams More Difficult to Detect

While deepfakes introduce a need for increased scrutiny, businesses can combat the rise of AI-enhanced technology with always-on security awareness.
Alok OjhaAugust 13, 2025
Cyber Insurance

Blog

Your Email Account is the Primary Gateway for Cyber Attackers

Business email compromise is one of the most pervasive cyber threats. Learn how to protect your business with security awareness training.
Anne JuntunenJune 11, 2025
Security

Blog

Limiting Employee Access Can Reduce Your Cyber Exposure

Role-based access control can strengthen your security posture by reducing employee error and malicious insiders while addressing compliance requirements.
Meet PatelMay 23, 2025
Security

Blog

Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors

Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.
Ramya RagavanApril 22, 2025
Security

Blog

Are Your Weak Passwords Welcoming a Cyber Attack?

Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.
Shubham LalwaniApril 17, 2025
Security

Blog

How MDR Helps Businesses Protect Against Top Cyber Threats

Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.
Cory MarchandFebruary 27, 2025
Security

Blog

Threat Actors Are Impersonating IT Teams to Deploy Ransomware

Coalition Incident Response has noted a trend where cybercriminals impersonate the help desk through Microsoft Teams to gain remote access and execute ransomware.
Ramya RagavanFebruary 19, 2025
Security

Blog

The Psychology of Social Engineering

The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.
Cory MarchandFebruary 13, 2025
Security

Blog

Introducing Coalition Security Awareness Training

Coalition Security Awareness Training makes it easy for small businesses to educate employees on cybersecurity, monitor performance, and track compliance.
Alok OjhaJuly 16, 2024
Security

Blog

QR Codes Increasingly Used in Phishing Attacks

Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
Jason VitaleJanuary 11, 2024
Security

Blog

From Blockchain to the Dark Web: Cybersecurity Buzzword Myths Debunked

New tech is worthy of promotion, but when buzzwords and FOMO define purchasing decisions, your cybersecurity program is likely to be a patchwork affair of half-useful tools. 
Aaron KrausJanuary 04, 2024
Cyber Insurance

Blog

The Tremendous Opportunity (and Threat) of Artificial Intelligence

When considering the benefits of artificial intelligence, striking the right balance is essential in Coalition's commitment to protecting the unprotected.
Gregory AndersenNovember 29, 2023
Security

Blog

Security Alert: MFA Spamming Attacks Increase Cyber Claims

MFA fatigue, overwhelming users with constant authentication requests, can lead to cyber insurance claims. Learn what mitigations are available.
Joshua SmithJune 12, 2023
Cyber Insurance

Blog

Threat Actors Aren’t Targeting Your Business — You’re Just Making the Cash Grab Easy

Coalition’s Head of Claims explains why funds transfer fraud is now the top attack method, along with other key findings from the 2023 Cyber Claims Report.
Catherine LyleMay 16, 2023