Ransomware demands surged 47% last year. See how businesses fought back.
Skip To Main Content
Cyber Incident? Get Help

Featured resources

Cyber Knowledge Center

Build your cyber expertise, access exclusive insights, read real customer stories, and more.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Home Incident TypesIndustriesProducts & ServicesTopics

Incident Types

Incident Types

Business Email Compromise

Cyber Insurance

Blog

5 Essential Insights From Our 2026 Cyber Claims Report

Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.
Robert JonesMarch 05, 2026

Case Study

CEO’s business email compromise leads to leak of customer data

CEO’s business email compromise leads to leak of customer data
Security

Blog

How to Translate Cyber Risk Into Financial Impact

Coalition’s Financial Risk Calculator translates cyber risks into clear financial impact so you can remove the guesswork and make smarter security decisions.
Shubham LalwaniSeptember 29, 2025
Security

Blog

Defense in Depth: Building a Multi-Layered Security Strategy

Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.
Alok OjhaAugust 27, 2025
Cyber Insurance

Blog

How MSPs and Cyber Insurance Providers Can Unite to Fortify the Future

Partnering with cyber insurance providers can help MSPs create new revenue opportunities, simplify service offerings, and deepen client relationships.
Kevin SchmidtJuly 02, 2025
Cyber Insurance

Blog

3 Crucial Insights to Shape Your Cyber Risk Strategy

Dive deep into key insights from Coalition’s 2025 Cyber Claims Report that should be top of mind for anyone responsible for managing cyber risk.
Kaly ConnollyMay 27, 2025
Security

Blog

Limiting Employee Access Can Reduce Your Cyber Exposure

Role-based access control can strengthen your security posture by reducing employee error and malicious insiders while addressing compliance requirements.
Meet PatelMay 23, 2025
Cyber Insurance

Blog

Insights from Coalition's 2025 Cyber Claims Report

Despite a changing risk landscape, Coalition observed year-over-year stability in 2024, reaffirming the fact that prevention must be prioritized over reaction.
Robert JonesMay 08, 2025
Security

Blog

Why Every SMB Should Shrink Its Attack Surface

Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.
Alok OjhaMay 01, 2025
Security

Blog

Are Your Weak Passwords Welcoming a Cyber Attack?

Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.
Shubham LalwaniApril 17, 2025
Security

Blog

Infostealers Are Silently Siphoning Businesses’ Sensitive Data

Attackers are increasingly using infostealers to loot private data en masse. Businesses can mitigate these risks with support from Coalition Security.
Kaly ConnollyMarch 05, 2025
Security

Blog

How MDR Helps Businesses Protect Against Top Cyber Threats

Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.
Cory MarchandFebruary 27, 2025
Security

Blog

The Psychology of Social Engineering

The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.
Cory MarchandFebruary 13, 2025
Security

Blog

7 Security Actions for SMBs to Prioritize in 2025

Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient. 
Kaly ConnollyJanuary 30, 2025

Case Study

Demolition company’s compromised email leads to theft of $56,000 invoice payment

Demolition company’s compromised email leads to theft of $56,000 invoice payment

Maximize your

coverage for digital

and technology risks

Protect your business from technology risks with Active Cyber and Tech E&O insurance offered by Coalition.

Tech_E+O_4