Policyholder Education

Blog
How Hackers Leverage Insurance Details in Ransomware Attacks
Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.

Blog
Defense in Depth: Building a Multi-Layered Security Strategy
Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.

Blog
Taking Responsibility in the Age of Non-Stop CVEs
Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.

Blog
Coalition’s Response to the UK’s Ransomware Consultation: An Opportunity to Prioritise Resilience and Recovery
Coalition contributed a formal response to the UK Home Office's public ransomware consultation and is sharing its views publicly to promote transparency and facilitate a conversation on this important issue.

Blog
Why Every SMB Should Shrink Its Attack Surface
Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.

Blog
Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors
Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.

Blog
Infostealers Are Silently Siphoning Businesses’ Sensitive Data
Attackers are increasingly using infostealers to loot private data en masse. Businesses can mitigate these risks with support from Coalition Security.

Blog
How MDR Helps Businesses Protect Against Top Cyber Threats
Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.

Blog
Introducing Cyber Health Rating
Cyber Health Rating is a comprehensive cyber health metric in Coalition Control® that provides actionable steps to improve your cybersecurity posture.

Blog
The Unrealized Vision of Cyber Warranties
Businesses may mistakenly think that cyber warranties offer the same benefits as cyber insurance policies, but the two are not the same.

Blog
CrowdStrike Outage: Policyholder Guidance and Insurance Implications
The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.

Blog
CrowdStrike Software Update Triggers Global Outage
A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.

Blog
Palo Alto Networks: Patch Available for PAN-OS Zero-day
A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.

Blog
Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning
Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.










