Security

Blog
Threat Actors Are Impersonating IT Teams to Deploy Ransomware
Coalition Incident Response has noted a trend where cybercriminals impersonate the help desk through Microsoft Teams to gain remote access and execute ransomware.

Blog
The Psychology of Social Engineering
The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.

Blog
Empowering MSPs as Trusted Cyber Risk Advisors
IT Nation Connect 2024 was a testament to the collaborative spirit of the managed service provider community and opportunities for deeper relationships.

Blog
7 Security Actions for SMBs to Prioritize in 2025
Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient.

Blog
5 Red Flags That Your Security Partners Might Not Be the Right Fit
The right cybersecurity partners should make your life easier, not more complicated. Make sure you’re partnering with someone that puts your security first.

Blog
Security Alert: rsync Vulnerability Allows for Remote Code Execution
Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.

Blog
Why the Best Security Partner for SMBs Might Be a Cyber Insurance Provider
Small and midsize businesses need a security partner who's invested in their well-being — so why not a cyber insurance provider?

Blog
Phishing Scams Will Be Harder to Spot in 2025
Artificial intelligence helps attackers execute sophisticated phishing scams that are personalized, grammatically flawless, and contextually relevant.

Blog
How Email Logs Tell the Story Behind an Inbox Compromise
If an email account is compromised, you’re going to want to know the story of what happened. Email logs can help.

Blog
Expect Everyday Cybercrime to Increase in 2025
Small and midsize businesses must be prepared for everyday cybercrime to increase in 2025, particularly attacks targeting email accounts and endpoints.

Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.

Blog
SMBs Need Cyber Experts Invested in Their Security
Cyber insurance providers have a vested interest in protecting policyholders with security products designed for small businesses.

Blog
Introducing Coalition Security Copilot
Coalition Security Copilot gives policyholders an AI-driven assistant designed to provide personalized guidance for managing security risks.

Blog
The Mission of a Strategic Cyber Pro
A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.
