Cyber Threats

Blog
The Psychology of Social Engineering
The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.

Blog
Empowering MSPs as Trusted Cyber Risk Advisors
IT Nation Connect 2024 was a testament to the collaborative spirit of the managed service provider community and opportunities for deeper relationships.

Blog
7 Security Actions for SMBs to Prioritize in 2025
Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient.

Blog
Security Alert: rsync Vulnerability Allows for Remote Code Execution
Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.

Blog
Why the Best Security Partner for SMBs Might Be a Cyber Insurance Provider
Small and midsize businesses need a security partner who's invested in their well-being — so why not a cyber insurance provider?

Blog
International Reflections: The Enduring Power of Active Insurance
Coalition had a landmark year in 2024, entering new countries, adding staff, and expanding Active Insurance's footprint.

Blog
Phishing Scams Will Be Harder to Spot in 2025
Artificial intelligence helps attackers execute sophisticated phishing scams that are personalized, grammatically flawless, and contextually relevant.

Blog
Expect Everyday Cybercrime to Increase in 2025
Small and midsize businesses must be prepared for everyday cybercrime to increase in 2025, particularly attacks targeting email accounts and endpoints.

Blog
Introducing Cyber Health Rating
Cyber Health Rating is a comprehensive cyber health metric in Coalition Control® that provides actionable steps to improve your cybersecurity posture.

Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.

Blog
The Unrealized Vision of Cyber Warranties
Businesses may mistakenly think that cyber warranties offer the same benefits as cyber insurance policies, but the two are not the same.

Blog
The Mission of a Strategic Cyber Pro
A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.

Blog
AI and the Future of Actuarial Science
Traditional models simply can’t keep up with the dynamic cyber risk landscape. We need to retool our approach to actuarial science — and AI can help.

Blog
How MDR Elevates the Role of In-house Security and IT Teams
A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.
